` Assessment Details and Submission Guidelines Trimester T1, 2022 Unit Code BN324 Unit Title Enterprise Cyber Security and Management Assessment Type Individual assignment – (Assignment 1) Assessment...

1 answer below »
Help me please


` Assessment Details and Submission Guidelines Trimester T1, 2022 Unit Code BN324 Unit Title Enterprise Cyber Security and Management Assessment Type Individual assignment – (Assignment 1) Assessment Title Recent Web Application Attacks and Security Principles Purpose of the assessment (with ULO Mapping) This assignment assesses the following Unit Learning Outcomes; students should be able to demonstrate their achievements in them. b) Evaluate the cyber security posture of an organisation. c) Analyse the cyber security of an organisation's mission, considering both those inside and those outside the organisation. Weight 5% Total Marks 40 Word limit 1300-1500 words Due Date Week 3 (10/04/2022) Submission Guidelines  All work must be submitted on Moodle by the due date along with a completed Assignment Cover Page.  The assignment must be in MS Word format, 1.5 spacing, 12-pt Calibri (Body) font and 2 cm margins on all four sides of your page with appropriate section headings.  Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using IEEE referencing style. Extension If an extension of time to submit work is required, a Special Consideration Application must be submitted directly to the School's Administration Officer, on academic reception level. You must submit this application within three working days of the assessment due date. Further information is available at: http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and- guidelines/specialconsiderationdeferment Academic Misconduct  Academic Misconduct is a serious offence. Depending on the seriousness of the case, penalties can vary from a written warning or zero marks to exclusion from the course or rescinding the degree. Students should make themselves familiar with the full policy and procedure available at: http://www.mit.edu.au/about-mit/institute- publications/policies-procedures-and-guidelines/Plagiarism-Academic-Misconduct- Policy-Procedure. For further information, please refer to the Academic Integrity Section in your Unit Description. http://www.mit.edu.au/about http://www.mit.edu.au/about http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy-Procedure http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy-Procedure http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy-Procedure BN324 Enterprise Cyber Security and Management Page 2 of 3 Prepared by: Dr. Ammar Alazab Moderated by: Dr Imran Jokhio March, 2022 Assignment Overview In this part of the assignment, select any two of the Web Application recent attacks (which happened in the years 2017-2022). Carry out an in-depth literature review about these two attacks. Your discussion must address the following points with proper in-text citations. A. Introduction about Web Application security, Web Application attacks and their impacts on the society. Analyse and discuss the significance of web application security for organisations. B. Variants of Web Application attacks: a. Discussion of the three of Web Application attacks which happened in the years 2017- 2022. b. Identify and discuss the main reasons for these select Web Application attacks being successful. C. Working Mechanism a. The working mechanism of the selected Web Application attacks. D. Mitigation techniques: a. Analyse how these attacks, selected from part A, could be mitigated. b. Recommendations on any two mitigation techniques to tackle the Web Application attack and discuss the effectiveness of the selected techniques. E. Summary: a. Summarise the overall contributions of the report F. References: a. Must consider at least five current references from journal/conference papers and books. Marking Criteria for the Assignment 1: Marks are allocated as described in the following table. Sections No. Description of the section Marks Introduction  Introduction about Web Application security, Web Application attacks and their impacts on the society  Analyse and discuss the significance of web application security for organisations 05 Variants of Web Application attacks  Discuss the three variants of Web Application attacks  Discuss the selected Web Application attacks 10 Working Mechanism The working mechanism of Web Application attacks  Discuss the working mechanism of Web Application attacks with proper citation 05 Mitigation techniques  Analyse how could these attacks, selected from part A, could be mitigated.  Recommendations on any two mitigation techniques to tackle the Web Application attack and discuss the effectiveness of the selected techniques. 10 BN324 Enterprise Cyber Security and Management Page 3 of 3 Prepared by: Dr. Ammar Alazab Moderated by: Dr Imran Jokhio March, 2022 Summary  Summarise the overall contributions of the report 05 References References  Must consider at least five current references from journal/conference papers and books.  Must follow IEEE Transactions on Networking style 05 Total Marks 40 Example Marking Rubric for Assignment #: Total Marks 40 Grade Mark HD 80% + D 70%-79% CR 60%-69% P 50%-59% Fail<50% excellent very good good satisfactory unsatisfactory introduction /5 introduction is very well written with very clear background, discussion about the impact of web application attacks on the society, and the report outline introduction is well written with clear discussion about the impact of web application attacks on the society, and the report outline introduction is generally presented in good fashion, however missing one element such as the impact of web application attacks on the society/ the report outline introduction is presented briefly with some relevance and missing elements such as the impact of web application attacks on the society/ the report outline poor introduction with irrelevant details variants of web application attacks /10 in-depth and very clear discussion about five variants of recent web application attacks very clear discussion about five variants of recent web application attacks generally good discussion about five variants web application attacks brief discussion about some variants of web application attacks poor discussion with irrelevant information working mechanism /5 a very detailed and very clear working mechanism of web application attacks very clear working mechanism of web application attacks generally good discussion about working mechanism of web application attacks brief discussion about working mechanism of web application attacks poor discussion with irrelevant information mitigation tools /10 an in-depth and very clear discussion about mitigation tools and their effectiveness very clear discussion about mitigation tools and their effectiveness generally good discussion about mitigation tools brief discussion about mitigation tools irrelevant discussion about the mitigation tools summary /5 a section very clearly summarizing the overall contribution a section clearly summarizing the overall contribution generally good summary of the report brief summary of the report with some relevance summary not relating to the report references /5 clear styles with excellent source of references. clear referencing/ style generally good referencing/style unclear referencing/style lacks consistency with many errors. excellent="" very="" good="" good="" satisfactory="" unsatisfactory="" introduction="" 5="" introduction="" is="" very="" well="" written="" with="" very="" clear="" background,="" discussion="" about="" the="" impact="" of="" web="" application="" attacks="" on="" the="" society,="" and="" the="" report="" outline="" introduction="" is="" well="" written="" with="" clear="" discussion="" about="" the="" impact="" of="" web="" application="" attacks="" on="" the="" society,="" and="" the="" report="" outline="" introduction="" is="" generally="" presented="" in="" good="" fashion,="" however="" missing="" one="" element="" such="" as="" the="" impact="" of="" web="" application="" attacks="" on="" the="" society/="" the="" report="" outline="" introduction="" is="" presented="" briefly="" with="" some="" relevance="" and="" missing="" elements="" such="" as="" the="" impact="" of="" web="" application="" attacks="" on="" the="" society/="" the="" report="" outline="" poor="" introduction="" with="" irrelevant="" details="" variants="" of="" web="" application="" attacks="" 10="" in-depth="" and="" very="" clear="" discussion="" about="" five="" variants="" of="" recent="" web="" application="" attacks="" very="" clear="" discussion="" about="" five="" variants="" of="" recent="" web="" application="" attacks="" generally="" good="" discussion="" about="" five="" variants="" web="" application="" attacks="" brief="" discussion="" about="" some="" variants="" of="" web="" application="" attacks="" poor="" discussion="" with="" irrelevant="" information="" working="" mechanism="" 5="" a="" very="" detailed="" and="" very="" clear="" working="" mechanism="" of="" web="" application="" attacks="" very="" clear="" working="" mechanism="" of="" web="" application="" attacks="" generally="" good="" discussion="" about="" working="" mechanism="" of="" web="" application="" attacks="" brief="" discussion="" about="" working="" mechanism="" of="" web="" application="" attacks="" poor="" discussion="" with="" irrelevant="" information="" mitigation="" tools="" 10="" an="" in-depth="" and="" very="" clear="" discussion="" about="" mitigation="" tools="" and="" their="" effectiveness="" very="" clear="" discussion="" about="" mitigation="" tools="" and="" their="" effectiveness="" generally="" good="" discussion="" about="" mitigation="" tools="" brief="" discussion="" about="" mitigation="" tools="" irrelevant="" discussion="" about="" the="" mitigation="" tools="" summary="" 5="" a="" section="" very="" clearly="" summarizing="" the="" overall="" contribution="" a="" section="" clearly="" summarizing="" the="" overall="" contribution="" generally="" good="" summary="" of="" the="" report="" brief="" summary="" of="" the="" report="" with="" some="" relevance="" summary="" not="" relating="" to="" the="" report="" references="" 5="" clear="" styles="" with="" excellent="" source="" of="" references.="" clear="" referencing/="" style="" generally="" good="" referencing/style="" unclear="" referencing/style="" lacks="" consistency="" with="" many="">
Answered 7 days AfterMar 28, 2022

Answer To: ` Assessment Details and Submission Guidelines Trimester T1, 2022 Unit Code BN324 Unit Title...

Shubham answered on Apr 05 2022
106 Votes
UNIT CODE BN324
UNIT TITLE ENTERPRISE CYBER SECURITY AND MANAGEMENT
RECENT WEB APPLICATION ATTACKS AND SECURITY PRINCIPLES
Table of Contents
A. Introduction    3
Web Application Security:    3
Web Application Attacks:    3
Significance of Web Application Security for Organisations:    3
B. Variants of Web Application Attacks    4
a. Three Web Application Attacks in 2017- 2022:    4
(i) 1st Attack    4
(ii) 2nd Attack    4
(iii)
3rd Attack    4
b. Reasons for These Selected Web Application Attacks    5
(i) Canva:    5
(ii) Ubiquiti Networks:    5
C. Working Mechanism    5
a. Working Mechanism of Selected Web Application Attacks:    5
D. Mitigation Techniques    6
a. Mitigation of These Attacks:    6
(i) Data Sanitisation:    6
(ii) Session Hijacking:    6
b. Recommendations on Two Mitigation Techniques and their Effectiveness    6
(i) Secure Development Testing    6
(ii) Automated Vulnerability Scanning and Security Testing    6
(iii) Web Application Firewalls    6
E. Summary    6
a. Summary of Overall Contributions of the Report    6
F. References    8
A. Introduction
Web Application Security:
It can be defined as a tools and series of protocols, which are created to secure cloud app, mobile app, website or desktop application from cyber threats or accidental failures in security [1]. This process helps to find, fix and eliminate the vulnerabilities so that hackers cannot take advantage of it. Its products such as multi-factor authentication (MFA), web application firewalls (WAFs), validation of cookies helps in maintaining privacy status.
Web Application Attacks:
Web applications are computer programs, which help the user to submit their information and retrieve the same over Internet using a preferred browser. Due to improper coding serious concerns, stem up, which gave hackers a chance to steal sensitive data, which is known as web application attack [2]. In is it important to ensure their security else it will allow hackers to gain access to public and sensitive data and make illegal use of it [3].
Impact on Society:
It has negative impact on society as it has given stress to people who are dependent on Internet for their business transactions. It might lead to theft of money on online platform and it has given rise to fraudulent acts. The cybercrimes are on rise due to vulnerabilities as unsecure platforms welcome phishing.
Significance of Web Application Security for Organisations:
Security is an integral part of organisation’s operations and success. When applications are built to enhance user experience and ensure faster growth some security incidents left unchecked. Modern software development is done with agility and the efforts are concentrated in CI/CD pipeline.
This makes applications vulnerable to attacks. When such attacks occur sensitive customer data gets compromised leading to security breach. Protecting it is important as customer’s confidence and trust is associated with it. These days customers are more careful about their data is handled and how responsibly the company is implementing ethical code of conduct [4].
Failure to this hurts the image of the company in the market in long run and attracts penalties from regulatory authorities. It might lead to cancellation of licenses and lead to loss in revenue. If a company has strong security system it helps to increase the brand value of the company because integrity is maintained and customer’s data is protected giving it a competitive edge. Therefore, there are three reasons for web application security:
(i) Preventing the loss of sensitive data,
(ii) Understanding that security is about more than just testing, and
(iii) Security is required to maintain business reputation and minimise losses.
B. Variants of Web Application Attacks
a. Three Web Application Attacks in 2017- 2022:
(i) 1st Attack
In 2019, Canva Data Breach took place, which affected 139 million users worldwide [5]. A cybercriminal attacked the defence system of the company and get access to user names, real names, country data, encrypted passwords, email address and partial payment details. Later the attacker shared the incident on dark web forums but later he was stopped before many major damage could have happen. This...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here