diff_months: 19

CSE2SIA Cryptographic Data Protection

Download Solution Now
Added on: 2022-12-27 08:55:06
Order Code: CLT301917
Question Task Id: 0
  • Subject Code :


Assignment problem  

All businesses handle sensitive data as they conduct their operations. Cryptography provides many  ways to help protect these data, depending on the data type, data state and the apparent data  threats/attacks. Good security design relies on appropriately assessing the business workflow and  threat landscape in order to implement appropriate controls to mitigate the data threats.  

Your task is to model a real business threat scenario identifying any applicable sensitive data.  Consider one state of this data in the business environment, and then propose and justify appropriate cryptographic controls to ensure data integrity and authenticity for this business.  

Please select a business scenario (the scenario must be not the same as your Assignment 1) from  the following list:  

  • A GP who provides treatments to her patients through the Australian My Health Record  (MHR) platform.  
  • A bank manager who is providing financial services to his customers.  
  •  A cybersecurity team lead who verifies roles and responsibilities through Identity and  Access Management (IAM) system as first line of defense.  
  •  A local clinic with several doctors and nurses specializing in family care.  ? An independent mortgage broker who processes loan applications for customers.  ? A subscription-based video content streaming service for children, allowing subscribers to  watch TV shows from multiple devices.  

Assignment guidance  

You should use approximately 1000 words to cover the following sections (excluding references).  The marking rubric is given below. A suggestion for the template of the assignment is as follows:  

  •  Introduction explaining the business data and the processing environment (at a high level)  based on your chosen scenario. Please include your assumptions to enrich the scenario. 
  •  Identify and describe the data threats/attacks from the scenario.  
  •  Appropriate cryptographic controls (to ensure data integrity and authenticity) to mitigate  the identified threats/attacks.  
  •  Any references used. Referencing and citations should use a format approved by La Trobe.  You can follow Harvard referencing style in the text and in the reference list at the end.
  •  Please prepare at least 10 slides including the above sections.
  • Uploaded By : Katthy Wills
  • Posted on : December 27th, 2022
  • Downloads : 0
  • Views : 167

Download Solution Now

Can't find what you're looking for?

Whatsapp Tap to ChatGet instant assistance

Choose a Plan


80 USD
  • All in Gold, plus:
  • 30-minute live one-to-one session with an expert
    • Understanding Marking Rubric
    • Understanding task requirements
    • Structuring & Formatting
    • Referencing & Citing


30 50 USD
  • Get the Full Used Solution
    (Solution is already submitted and 100% plagiarised.
    Can only be used for reference purposes)
Save 33%


20 USD
  • Journals
  • Peer-Reviewed Articles
  • Books
  • Various other Data Sources – ProQuest, Informit, Scopus, Academic Search Complete, EBSCO, Exerpta Medica Database, and more