Help me please
` Assessment Details and Submission Guidelines Trimester T1, 2022 Unit Code BN324 Unit Title Enterprise Cyber Security and Management Assessment Type Individual assignment – (Assignment 1) Assessment Title Recent Web Application Attacks and Security Principles Purpose of the assessment (with ULO Mapping) This assignment assesses the following Unit Learning Outcomes; students should be able to demonstrate their achievements in them. b) Evaluate the cyber security posture of an organisation. c) Analyse the cyber security of an organisation's mission, considering both those inside and those outside the organisation. Weight 5% Total Marks 40 Word limit 1300-1500 words Due Date Week 3 (10/04/2022) Submission Guidelines All work must be submitted on Moodle by the due date along with a completed Assignment Cover Page. The assignment must be in MS Word format, 1.5 spacing, 12-pt Calibri (Body) font and 2 cm margins on all four sides of your page with appropriate section headings. Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using IEEE referencing style. Extension If an extension of time to submit work is required, a Special Consideration Application must be submitted directly to the School's Administration Officer, on academic reception level. You must submit this application within three working days of the assessment due date. Further information is available at: http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and- guidelines/specialconsiderationdeferment Academic Misconduct Academic Misconduct is a serious offence. Depending on the seriousness of the case, penalties can vary from a written warning or zero marks to exclusion from the course or rescinding the degree. Students should make themselves familiar with the full policy and procedure available at: http://www.mit.edu.au/about-mit/institute- publications/policies-procedures-and-guidelines/Plagiarism-Academic-Misconduct- Policy-Procedure. For further information, please refer to the Academic Integrity Section in your Unit Description. http://www.mit.edu.au/about http://www.mit.edu.au/about http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy-Procedure http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy-Procedure http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy-Procedure BN324 Enterprise Cyber Security and Management Page 2 of 3 Prepared by: Dr. Ammar Alazab Moderated by: Dr Imran Jokhio March, 2022 Assignment Overview In this part of the assignment, select any two of the Web Application recent attacks (which happened in the years 2017-2022). Carry out an in-depth literature review about these two attacks. Your discussion must address the following points with proper in-text citations. A. Introduction about Web Application security, Web Application attacks and their impacts on the society. Analyse and discuss the significance of web application security for organisations. B. Variants of Web Application attacks: a. Discussion of the three of Web Application attacks which happened in the years 2017- 2022. b. Identify and discuss the main reasons for these select Web Application attacks being successful. C. Working Mechanism a. The working mechanism of the selected Web Application attacks. D. Mitigation techniques: a. Analyse how these attacks, selected from part A, could be mitigated. b. Recommendations on any two mitigation techniques to tackle the Web Application attack and discuss the effectiveness of the selected techniques. E. Summary: a. Summarise the overall contributions of the report F. References: a. Must consider at least five current references from journal/conference papers and books. Marking Criteria for the Assignment 1: Marks are allocated as described in the following table. Sections No. Description of the section Marks Introduction Introduction about Web Application security, Web Application attacks and their impacts on the society Analyse and discuss the significance of web application security for organisations 05 Variants of Web Application attacks Discuss the three variants of Web Application attacks Discuss the selected Web Application attacks 10 Working Mechanism The working mechanism of Web Application attacks Discuss the working mechanism of Web Application attacks with proper citation 05 Mitigation techniques Analyse how could these attacks, selected from part A, could be mitigated. Recommendations on any two mitigation techniques to tackle the Web Application attack and discuss the effectiveness of the selected techniques. 10 BN324 Enterprise Cyber Security and Management Page 3 of 3 Prepared by: Dr. Ammar Alazab Moderated by: Dr Imran Jokhio March, 2022 Summary Summarise the overall contributions of the report 05 References References Must consider at least five current references from journal/conference papers and books. Must follow IEEE Transactions on Networking style 05 Total Marks 40 Example Marking Rubric for Assignment #: Total Marks 40 Grade Mark HD 80% + D 70%-79% CR 60%-69% P 50%-59% Fail<50% excellent very good good satisfactory unsatisfactory introduction /5 introduction is very well written with very clear background, discussion about the impact of web application attacks on the society, and the report outline introduction is well written with clear discussion about the impact of web application attacks on the society, and the report outline introduction is generally presented in good fashion, however missing one element such as the impact of web application attacks on the society/ the report outline introduction is presented briefly with some relevance and missing elements such as the impact of web application attacks on the society/ the report outline poor introduction with irrelevant details variants of web application attacks /10 in-depth and very clear discussion about five variants of recent web application attacks very clear discussion about five variants of recent web application attacks generally good discussion about five variants web application attacks brief discussion about some variants of web application attacks poor discussion with irrelevant information working mechanism /5 a very detailed and very clear working mechanism of web application attacks very clear working mechanism of web application attacks generally good discussion about working mechanism of web application attacks brief discussion about working mechanism of web application attacks poor discussion with irrelevant information mitigation tools /10 an in-depth and very clear discussion about mitigation tools and their effectiveness very clear discussion about mitigation tools and their effectiveness generally good discussion about mitigation tools brief discussion about mitigation tools irrelevant discussion about the mitigation tools summary /5 a section very clearly summarizing the overall contribution a section clearly summarizing the overall contribution generally good summary of the report brief summary of the report with some relevance summary not relating to the report references /5 clear styles with excellent source of references. clear referencing/ style generally good referencing/style unclear referencing/style lacks consistency with many errors. excellent="" very="" good="" good="" satisfactory="" unsatisfactory="" introduction="" 5="" introduction="" is="" very="" well="" written="" with="" very="" clear="" background,="" discussion="" about="" the="" impact="" of="" web="" application="" attacks="" on="" the="" society,="" and="" the="" report="" outline="" introduction="" is="" well="" written="" with="" clear="" discussion="" about="" the="" impact="" of="" web="" application="" attacks="" on="" the="" society,="" and="" the="" report="" outline="" introduction="" is="" generally="" presented="" in="" good="" fashion,="" however="" missing="" one="" element="" such="" as="" the="" impact="" of="" web="" application="" attacks="" on="" the="" society/="" the="" report="" outline="" introduction="" is="" presented="" briefly="" with="" some="" relevance="" and="" missing="" elements="" such="" as="" the="" impact="" of="" web="" application="" attacks="" on="" the="" society/="" the="" report="" outline="" poor="" introduction="" with="" irrelevant="" details="" variants="" of="" web="" application="" attacks="" 10="" in-depth="" and="" very="" clear="" discussion="" about="" five="" variants="" of="" recent="" web="" application="" attacks="" very="" clear="" discussion="" about="" five="" variants="" of="" recent="" web="" application="" attacks="" generally="" good="" discussion="" about="" five="" variants="" web="" application="" attacks="" brief="" discussion="" about="" some="" variants="" of="" web="" application="" attacks="" poor="" discussion="" with="" irrelevant="" information="" working="" mechanism="" 5="" a="" very="" detailed="" and="" very="" clear="" working="" mechanism="" of="" web="" application="" attacks="" very="" clear="" working="" mechanism="" of="" web="" application="" attacks="" generally="" good="" discussion="" about="" working="" mechanism="" of="" web="" application="" attacks="" brief="" discussion="" about="" working="" mechanism="" of="" web="" application="" attacks="" poor="" discussion="" with="" irrelevant="" information="" mitigation="" tools="" 10="" an="" in-depth="" and="" very="" clear="" discussion="" about="" mitigation="" tools="" and="" their="" effectiveness="" very="" clear="" discussion="" about="" mitigation="" tools="" and="" their="" effectiveness="" generally="" good="" discussion="" about="" mitigation="" tools="" brief="" discussion="" about="" mitigation="" tools="" irrelevant="" discussion="" about="" the="" mitigation="" tools="" summary="" 5="" a="" section="" very="" clearly="" summarizing="" the="" overall="" contribution="" a="" section="" clearly="" summarizing="" the="" overall="" contribution="" generally="" good="" summary="" of="" the="" report="" brief="" summary="" of="" the="" report="" with="" some="" relevance="" summary="" not="" relating="" to="" the="" report="" references="" 5="" clear="" styles="" with="" excellent="" source="" of="" references.="" clear="" referencing/="" style="" generally="" good="" referencing/style="" unclear="" referencing/style="" lacks="" consistency="" with="" many="">50% excellent very good good satisfactory unsatisfactory introduction /5 introduction is very well written with very clear background, discussion about the impact of web application attacks on the society, and the report outline introduction is well written with clear discussion about the impact of web application attacks on the society, and the report outline introduction is generally presented in good fashion, however missing one element such as the impact of web application attacks on the society/ the report outline introduction is presented briefly with some relevance and missing elements such as the impact of web application attacks on the society/ the report outline poor introduction with irrelevant details variants of web application attacks /10 in-depth and very clear discussion about five variants of recent web application attacks very clear discussion about five variants of recent web application attacks generally good discussion about five variants web application attacks brief discussion about some variants of web application attacks poor discussion with irrelevant information working mechanism /5 a very detailed and very clear working mechanism of web application attacks very clear working mechanism of web application attacks generally good discussion about working mechanism of web application attacks brief discussion about working mechanism of web application attacks poor discussion with irrelevant information mitigation tools /10 an in-depth and very clear discussion about mitigation tools and their effectiveness very clear discussion about mitigation tools and their effectiveness generally good discussion about mitigation tools brief discussion about mitigation tools irrelevant discussion about the mitigation tools summary /5 a section very clearly summarizing the overall contribution a section clearly summarizing the overall contribution generally good summary of the report brief summary of the report with some relevance summary not relating to the report references /5 clear styles with excellent source of references. clear referencing/ style generally good referencing/style unclear referencing/style lacks consistency with many errors.>