diff_months: 10

MIS311 Cybersecurity Research Report

Download Solution Now
Added on: 2023-07-03 08:33:40
Order Code: clt156511
Question Task Id: 0

Assessment Task

In the first three weeks, we have explored some fundamental concepts about cyber security, vulnerabilities, and common cyber security attacks. This first assessment develops your understanding of the various tenets of cyber security by asking you to apply what you have learnt.

Please refer to the Instructions for details on how to complete this task.

Context

Worthy College is a medium-sized tertiary college located on the Mornington Peninsula in Victoria. It is managed by Dr Elaine Worthy. The college uses (1) a basic accounting software package, (2) a learning management software (Moodle) and (3) a student data management software that was developed for them several years ago by previous graduates. Elaine has recently been made aware of a “stored XSS” cyber attack on Moodle and she is concerned that such a cybe rattack could occur at Worthy College. You should investigate this kind of cyber attack using media coverage and/or cyber security literature, then report your findings. The following pages may help, but you need more than these references for the stored XSS attack.

She has also heard that many organizations have recently suffered phishing cyberattacks. Elaine would like you to give her a written report on these two types of cyberattacks, as well as a third cyberattack that you think may be important to Worthy College.

Therefore, you need to describe three cyber attacks:

  1. The real-world XSS attack on Moodle (Moodle is a learning management software)
  2. A phishing threat, and relate it to a real-world cyber attack,
  3. Any threat/vulnerability you think may be important to Worthy College. You can select one of the following types. If you want to describe an attack that is not in the following list, then discuss it with your facilitator before progressing. You can choose the third threat from the list below, but you need a real-world example of the attack, and relate it to a similar attack “discovered” at the business.

Ransomware, Backup and Business Continuity, Failure of Policy or Management Commitment, Employee Awareness, Information Security Insurance, Service-level Agreement, DR, Rainbow Attack, Social Engineering, Botnets and Trojans, USB attack, Attacks on TLS/SSL, Wi-Fi Insecurities, Phishing Attacks, DoS, DDoS, VPN insecurities, Mobile Devices, Password Storage, Password Entropy, Password Reuse, Identity Theft, Physical Theft, Insider attacks, Social Networks, ACL Lists, Security Policy Update, Security Policy Documentation, Security Policy Design, Security Policy Dissemination, Biometric Access Control, Bluetooth Attacks, Session Hijacking, Cross-Site Scripting (XSS), Shoulder Surfing, Rootkit or Bootkit, Logic Bomb, Software Backdoor, Keylogger, Blockchain (discuss this in-depth with your tutor before committing to this topic), Credit card fraud, attacks on 2 factor

In each case, Elaine wants you to first describe a real-world example of the cyberattack that has occurred within the last 5 years with clear references to the cyberattacks.

Are you struggling to keep up with the demands of your academic journey? Don't worry, we've got your back! Exam Question Bank is your trusted partner in achieving academic excellence for all kind of technical and non-technical subjects.

Our comprehensive range of academic services is designed to cater to students at every level. Whether you're a high school student, a college undergraduate, or pursuing advanced studies, we have the expertise and resources to support you.

To connect with expert and ask your query click here Exam Question Bank

  • Uploaded By : Katthy Wills
  • Posted on : July 03rd, 2023
  • Downloads : 0
  • Views : 89

Download Solution Now

Can't find what you're looking for?

Whatsapp Tap to ChatGet instant assistance

Choose a Plan

Premium

80 USD
  • All in Gold, plus:
  • 30-minute live one-to-one session with an expert
    • Understanding Marking Rubric
    • Understanding task requirements
    • Structuring & Formatting
    • Referencing & Citing
Most
Popular

Gold

30 50 USD
  • Get the Full Used Solution
    (Solution is already submitted and 100% plagiarised.
    Can only be used for reference purposes)
Save 33%

Silver

20 USD
  • Journals
  • Peer-Reviewed Articles
  • Books
  • Various other Data Sources – ProQuest, Informit, Scopus, Academic Search Complete, EBSCO, Exerpta Medica Database, and more