Great Deal! Get Instant $10 FREE in Account on First Order + 10% Cashback on Every Order Order Now

Assessment item 2 back to top Research Report task Value: 15% Due Date: 24-Aug-2018 Return Date: 14-Sep-2018 Length: Submission method options: Alternative submission method Task back to top Part A:...

1 answer below »
Assessment item 2
ack to top
Research Report task
Value: 15%
Due Date: 24-Aug-2018
Return Date: 14-Sep-2018
Length:
Submission method options: Alternative submission method
Task
ack to top
Part A: 10 Marks
1. Search the web for news on computer security
eaches that occu
ed during January-August 2018. Research one such reported incident. Prepare a report focusing on the following issues:
· What the problem was;
· How and why it occu
ed;
· What could have been done to prevent it?
Length: Around 900 words (Excluding references)
Part B: 10 Marks
Research the WannaCry and the Petya cyber-attacks and prepare a report comparing the two, focusing on the following issues:
· What the problem was;
· The scope of the attack;
· Operational details of the attack;
· What could have been done to prevent the attack?
Length: Around 900 words (Excluding references)
Rationale
ack to top
This assessment task will assess the following learning outcome/s:
· be able to justify security goals and the importance of maintaining the secure computing environment against digital threats.
· be able to explain the fundamental concepts of cryptographic algorithms.
· be able to examine malicious activities that may affect the security of a computer program and justify the choice of various controls to mitigate threats.
· be able to compare and contrast the security mechanisms of a trusted operating system with those used in a general purpose operating system.
Marking criteria and standards
ack to top
    Assessment criteria
    PART A : 10 marks
    Assessable Components
    HD
100% - 85%
    DI
84% - 75%
    CR
74% - 65%
    PS
64% - 50%
    FL
49% - 0
    Search the web for news on computer security
eaches that occu
ed during January-August 2018. Research one such reported incident. Prepare a report focusing on the following issues:
· What the problem was;
· How and why it occu
ed;
· What could have been done to prevent it?
    1. The comprehensive report addressing all criteria. Evidence of in-depth research.
 (Value: 95%)  
2. Referenced a wide range of appropriate sources.  
Referencing style co
ectly used.
  (Value: 5%)
    1. The comprehensive report addressing all criteria. Evidence of in-depth research. Minor omissions only.
 (Value: 95%) 
 2. Referenced a range of appropriate sources.
 
 Referencing style co
ectly used. Minor e
ors only.
  (Value: 5%)
    
 1. Mostly well-researched and well-presented report addressing all criteria. Some omissions.
 (Value: 95%)
2. Referenced a range of appropriate sources.
Referencing style co
ectly used. Some e
ors and omissions.
  (Value: 5%)
    1. The partially complete report addressing most of the criteria. Evidence of research. Some omissions.
 (Value: 95%)    
2. Referenced some appropriate sources.
Referencing style mostly co
ectly used. Some e
ors and omissions.
  (Value: 5%)
    1. Major omissions or inco
ect answers(Value: 95%)
 2. Either no evidence of literature being consulted or cited references i
elevant to the assignment set.
 
 Major e
ors in referencing style.
  (Value: 5%)
    Possible marks
    10.0 – 8.5
    8.4-7.5
    7.49 – 6.5
    6.49 –5.0
    4.99 – 0
    PART B: 10 marks
    Research the WannaCry and the Petya cyber-attacks and prepare a report comparing the two, focusing on the following issues:
· What the problem was;
· The scope of the attack;
· Operational details of the attack;
· What could have been done to prevent the attack?
    1. The comprehensive report addressing all criteria. Evidence of in-depth research.
 (Value: 95%)
 
 2. Referenced a wide range of appropriate sources.
 
 Referencing style co
ectly used.
 (Value: 5%)
    1. The comprehensive report addressing all criteria. Evidence of in-depth research. Minor omissions only.
 (Value: 95%)
2. Referenced a range of appropriate sources.
 
 Referencing style co
ectly used. Minor e
ors only.
 (Value: 5%)
    1. Mostly well-researched and well-presented report addressing all criteria. Some omissions.
 (Value: 95%)
2. Referenced a range of appropriate sources.
Referencing style co
ectly used. Some e
ors and omissions.
 (Value: 5%)
    1. The partially complete report addressing most of the criteria. Evidence of research. Some omissions.
 (Value: 95%)
2. Referenced some appropriate sources.
Referencing style mostly co
ectly used. Some e
ors and omissions.
 (Value: 5%)
    1. Major omissions or inco
ect answers.
 (Value: 95%)
2.  Either no evidence of literature being consulted or cited references i
elevant to the assignment set.
 
 Major e
ors in referencing style.
 (Value: 5%)
    Possible marks
    10.0 – 8.5
    8.4-7.5
     XXXXXXXXXX
     XXXXXXXXXX
     XXXXXXXXXX
Presentation
ack to top
· Assessment MUST be submitted as ONE MS Word file via Turnitin. Please do not submit *.zip or *.rar or multiple files. Assessments may be marked and feedback may be generated using MS Word-based tool. Reports that are submitted in PDF format will be re-formatted to Word format in order to be marked. Allowances will not be made for any loss of information, diagrams or images as a result of the re-formatting.
· Your answers to the questions should be precise but complete and informative.
· Each question should be answered individually with the co
esponding label to indicate the tasks completed e.g. Task 1 a.
· APA reference style must be used throughout the document, with the  Reference list not counted in the page limit. APA referencing guide can be found  in http:
student.csu.edu.au/study
eferencing-at-csu
· A cover page must be included and should contain relevant identifying information (Student name, Student ID#, Subject Code, Subject name, Session and Assessment Number).
Answered Same Day Aug 07, 2020

Solution

Ankit answered on Aug 16 2020
147 Votes
1
                Student_Id
                Student_Name
                Computer security
eaches
                WannaCry and the Petya cyber-attacks
Table of Contents
Computer security
eaches that occu
ed during January-August 2018    3
Introduction    3
Problem    3
How and why it occu
ed    4-5
What could have been done to prevent it?    5
Conclusion    5-6
The WannaCry and the Petya cyber-attacks     6
Introduction    6
Problem    6
Scope of attack    7
Operational details of the attack    7
What could have been done to prevent it?    8
Conclusion    8-9
Computer security
eaches that occu
ed during January-August 2018
Introduction
Now days there are growing number of security
eaches which affect the network system. A security
eaches is any vulnerability that outcomes in unapproved access of information that allows the hacker to take control of system or network. Many firms such as IT organizations, government organizations etc. are at the risk of
eaches. Security
eaches can be classified as internal and external to firm.
Security is must for every firm and if there is not good security then it may give rise to security
eaches. It is the basic responsibility of firm to make a system which will be secure for their users. There are various types of attacks such as unauthenticated emails, spyware/Trojans/Virus/Worms etc. which may occur due to poor security as hacker gain unauthorized access to the system easily.
In this report we will focus on security
eaches that occur in June 2018 for Reddit's system. The report focuses on actual problem, how and why it occu
ed. The report also shows what is done to prevent it.
Problem
The problem is Reddit database get hacked by hacker to misuse it.
Reddit's frameworks were accessed in June, the webpage reported in a blog entry. The employees of Reddit were attempting to login to their frameworks through instant messages sent by means of filling userid and password but the messages were blocked. Utilizing the employee individuals' records the attackers could take email ids of present Reddit users and their database. Reddit hasn't conceded what number of email ids was endangered. The stress for users is that email ids may be misused and it will be conceivable to connect mysterious records to genuine persons. [Wired]
How and why it occu
ed
A attacker ruined into a couple of Reddit's frameworks and figured out how to get to some client information, including present email ids and a 2007 database backup containing past lively things and encrypted passwords.
Reddit's system suffers serious attack on June 19. The hacker traded off a couple of their staff records with their cloud and source code hosting vendors. The hackers have already their basic access points for code and framework on the side of rigid verification that is based on two factor validation (2FA). They discovered that SMS-based confirmation is not reliable as they trust blindly and the fundamental attack on system was by means of SMS message. They direct this out toward urge everybody here to migrate to new technique i.e. token-based 2FA.
The hacker did not get write up access to Reddit frameworks but they were successfully in gaining read only access to a few frameworks that contained backup information, source code and different logs. They failed in editing Reddit data. They have made steps since the occasion to additionally secure and turn all generation privileged insights and API keys, and to upgrade their logging and database frameworks.
The data that is accessed by hacker via cloud on june 19, 2018 attack consists of following:
a) Reddit record from 2007 database which also consist of login credentials and email ids
Things...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here