CSE2SIA Cryptographic Data Protection
- Subject Code :
CSE2SIA
Assignment problem
All businesses handle sensitive data as they conduct their operations. Cryptography provides many ways to help protect these data, depending on the data type, data state and the apparent data threats/attacks. Good security design relies on appropriately assessing the business workflow and threat landscape in order to implement appropriate controls to mitigate the data threats.
Your task is to model a real business threat scenario identifying any applicable sensitive data. Consider one state of this data in the business environment, and then propose and justify appropriate cryptographic controls to ensure data integrity and authenticity for this business.
Please select a business scenario (the scenario must be not the same as your Assignment 1) from the following list:
- A GP who provides treatments to her patients through the Australian My Health Record (MHR) platform.
- A bank manager who is providing financial services to his customers.
- A cybersecurity team lead who verifies roles and responsibilities through Identity and Access Management (IAM) system as first line of defense.
- A local clinic with several doctors and nurses specializing in family care. ? An independent mortgage broker who processes loan applications for customers. ? A subscription-based video content streaming service for children, allowing subscribers to watch TV shows from multiple devices.
Assignment guidance
You should use approximately 1000 words to cover the following sections (excluding references). The marking rubric is given below. A suggestion for the template of the assignment is as follows:
- Introduction explaining the business data and the processing environment (at a high level) based on your chosen scenario. Please include your assumptions to enrich the scenario.
- Identify and describe the data threats/attacks from the scenario.
- Appropriate cryptographic controls (to ensure data integrity and authenticity) to mitigate the identified threats/attacks.
- Any references used. Referencing and citations should use a format approved by La Trobe. You can follow Harvard referencing style in the text and in the reference list at the end.
- Please prepare at least 10 slides including the above sections.