HOLMES INSTITUTE FACULTY OF HIGHER EDUCATION HI5019 Strategic Information Systems for Business and Enterprise Group Assignment Assessment Details and Submission Guidelines Trimester T1 2020 Unit Code...

1 answer below »
HI5019 Group Assignment T1 2020232332.pdf


HOLMES INSTITUTE FACULTY OF HIGHER EDUCATION HI5019 Strategic Information Systems for Business and Enterprise Group Assignment Assessment Details and Submission Guidelines Trimester T1 2020 Unit Code HI5019 Unit Title Strategic Information Systems for Business and Enterprise Assessment Type Group assignment Assessment Title Cyber Security Case Studies Purpose of the assessment (with ULO Mapping) Students are required to:  Evaluate systems development methodologies and the role of accountants in system development projects (ULO 3)  Appraise the risks inherent in computer-based systems/ERP, including the role of ethics and the various internal control processes that need to be in place (ULO 4)  Critically evaluate the range of cultural, security, privacy and ethical issues facing individuals and organisations as a result of information systems (ULO 5) Weight 30% of the total assessments Total Marks 30 Word limit Not more than 3,500 words Due Date Week 11, Friday 5:00 pm (AEST) Submission Guidelines  This assignment is to be completed by a group of 2 - 4 students.  Students must report the names and student IDs for all group members to the lecturer of their class by e-mail before the end of week 8.  All work must be submitted on Blackboard by the due date along with a completed Assignment Cover Page.  The assignment must be in MS Word format, no spacing, 12-pt Arial font and 2 cm margins on all four sides of your page with appropriate section headings and page numbers.  Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using Harvard referencing style. Page 2 of 6 HI5019 Strategic Information Systems for Business and Enterprise Group Assignment Assignment Specifications Purpose This assignment aims at developing your group’s understanding of latest cyber security issues and their impacts on business operations. Your group is required to critically evaluate three recent cyber security case studies and their lessons to business organisations. Required Your group is required to conduct a literature search and select three (3) cyber security case studies that are published between 2014 – 2019. Based on the selected case studies, your group is required to prepare a written report to cover the following points:  Description of case company in each case o General information of the company o Key business processes of the company  Cyber security issues covered in each case o Key cyber security issues identified in each case o Risks associated with the issues o Impacts of the issues on case company  Lessons learnt from each case o Actions reported in each case to address the identified issues o Outcomes of the reported actions o Proposed actions other than the reported ones that could be taken to address the issues o Suggestions for preventing the issues in future Assignment Structure The report should include the following components:  Assignment cover page clearly stating your name and student number  A table of contents  A brief introduction or overview of what the report is about.  Body of the report with sections to answer the above issues and with appropriate section headings  Conclusion  List of references The report should be grounded on relevant literature and all references must be properly cited and included in the reference list. Page 3 of 6 HI5019 Strategic Information Systems for Business and Enterprise Group Assignment Group contribution To ensure that all students participate equitably in the group assignment and that students are responsible for the academic integrity of all components of the assignment. Your group needs to complete the in a table similar to the following one which identifies which student/students are responsible for the various sections of the assignment. Assignment Section Student/Students The table needs to be completed and submitted with the assignment as it is a compulsory component required before any grading is undertaken. Marks may be deducted if a student does not make sufficient contribution to the assignment. It is students' responsibility to provide evidence for their contributions to the assignment in the event of dispute. Marking criteria Marking criteria Weighting General information of case companies 2% Key business processes of case companies 2% Key cyber security issues identified in each case 4% Risks associated with the identified cyber security issues 3% Impacts of the identified cyber security issues 3% Actions reported to address the identified issues 4% Outcomes of the reported actions 4% Proposed actions other than the reported ones for addressing the issues 2% Suggestions for preventing the issues in future 2% Presentation 2% Research quality 2% TOTAL Weight 30% Page 4 of 6 HI5019 Strategic Information Systems for Business and Enterprise Group Assignment Marking Rubric Excellent Very Good Good Satisfactory Unsatisfactory General Information of case companies /2 Provide clear, concise and accurate information of case companies. Provide complete and accurate information of case companies. Provide accurate information of case companies. Provide information of case companies that is mostly accurate. Fail to provide accurate information of case companies. Key business processes of case companies /2 Identify all key business processes of case companies. Identify most key business process of case companies. Identify most key business processes of case companies with minor errors. Identify some business processes of case companies with errors and/or omissions. Fail to identify any key business process of case companies. Key cyber security issues identified in each case /4 Identify all key cyber security issues identified in the cases. Identify most key cyber security issues identified in the cases. Identify most key cyber security issues identified in the cases with minor errors. Identify some key cyber security issues identified in the cases with errors and/or omissions. Fail to identify any key cyber security issue identified in the cases. Risks associated with the identified cyber security issues /3 Present an excellent discussion on risks associated with the identified cyber security issues. Present a very good discussion on risks associated with the identified cyber security issues. Present a good discussion on risks associated with the identified cyber security issues with minor errors and/or omissions. Present a reasonable discussion on risks associated with the identified cyber security issues with errors and/or omissions. Fail to present a proper discussion on risks associated with the identified cyber security issues. Impacts of the identified cyber security issues /3 Present an excellent discussion on impacts of the identified cyber security issues. Present a very good discussion on impacts of the identified cyber security issues. Present a good discussion on impacts of the identified cyber security issues minor errors and/or omissions. Present a reasonable discussion on impacts of the identified cyber security issues with errors and/or omissions. Fail to present a proper discussion on impacts of the identified cyber security issues. Actions reported to address the identified issues /4 Identify all reported actions for addressing the identified issues. Identify most reported actions for addressing the identified issues. Identify most reported actions for addressing the identified issues with minor errors. Identify some reported actions for addressing the identified issues with errors and/or omissions. Fail to identify any reported action for addressing the identified issues. Page 5 of 6 HI5019 Strategic Information Systems for Business and Enterprise Group Assignment Outcomes of the reported actions /4 Present an excellent discussion on outcomes of the reported actions. Present a very good discussion on outcomes of the reported actions. Present a good discussion on outcomes of the reported actions with minor errors and/or omissions. Present a reasonable discussion on outcomes of the reported actions with errors and/or omissions. Fail to present a proper discussion on outcomes of the reported actions. Proposed actions other than the reported ones for addressing the issues /2 Propose practical and effective actions based on strong arguments. Propose practical and effective actions based on good arguments. Propose sound actions based on reasonably good arguments. Proposed sound actions with errors and omissions based on valid arguments. Fail to propose proper actions or back the proposed actions with valid argument.. Suggestions for preventing the issues in future /2 Present an excellent discussion on suggestions for preventing the issues in future. Present a very good discussion on suggestions for preventing the issues in future. Present a good discussion on suggestions for preventing the issues in future with minor errors and/or omissions. Present a reasonable discussion on suggestions for preventing the issues in future with errors
Answered Same DayJun 07, 2021HI5019

Answer To: HOLMES INSTITUTE FACULTY OF HIGHER EDUCATION HI5019 Strategic Information Systems for Business and...

Rithik answered on Jun 10 2021
131 Votes
HI5019
STRATEGIC INFORMATION SYSTEMS FOR BUSINESS AND ENTERPRISE
NAME AND STUDENT NUMBER: _________________________
Table of Contents
Introduction    3
Case Study 1: Cognizant    3
Description of Case Company    3
General Information of the Company    3
Key Business Processes of the Company    3
Cyber Security Issues Covered    3
Key Cyber Security Issues Identified in the Case    3
Risks Associated with the Issue    3
Impacts of the Issues on the Case Company    3
Lessons Learnt from the Case    4
Actions Reported in the Case to Address the Identified Issues    4
Outcomes of the Reported Actions    4
Proposed Actions Other than the Reported Ones that could be taken to address the Issues    4
Suggestions for Preventing the
Issues in Future    4
Case Study 2: Ascena    4
Description of Case Company    4
General Information of the Company    4
Key Business Processes of the Company    5
Cyber Security Issues Covered    5
Key Cyber Security Issues Identified in the Case    5
Risks Associated with the Issue    5
Impacts of the Issues on the Case Company    5
Lessons Learnt from the Case    5
Actions Reported in the Case to Address the Identified Issues    5
Outcomes of the Reported Actions    6
Proposed Actions Other than the Reported Ones that could be taken to address the Issues    6
Suggestions for Preventing the Issues in Future    6
Case Study 3: Allegiant Travel    6
Description of Case Company    6
General Information of the Company    6
Key Business Processes of the Company    6
Cyber Security Issues Covered    6
Key Cyber Security Issues Identified in the Case    6
Risks Associated with the Issue    7
Impacts of the Issues on the Case Company    7
Lessons Learnt from the Case    7
Actions Reported in the Case to Address the Identified Issues    7
Outcomes of the Reported Actions    7
Proposed Actions Other than the Reported Ones that could be taken to address the Issues    7
Suggestions for Preventing the Issues in Future    8
Conclusion    8
References    9
Introduction
The knowledge of cyber security is very important to have now a days because it provides the better understanding and also helps to understand that what are the possible given outcomes, in which one can save themselves from the grip of the cyber attackers or cyber operators. Besides that, if one can caught with them then it is not an option to get over it completely. Only the cyber operator or cyber attackers could allow one to decode the malware but in exchange they want plenty of money or something only in that case they going to allow to the one their particular file. Apparently in order to eliminate or kicking out these sort of problems, therefore, the one should have any sort of cyber security. It allows to the particular system to control the any kind of upcoming cyber-attacks. And the main cyber security, which need to opting to the any kind of giant multinational companies or the business firms, which is Artificial Intelligence (AI) and Internet of things (IOT).
Case Study 1: Cognizant
Description of Case Company
General Information of the Company
Cognizant is an American multinational company, which provides IT services, which founded in 26 January 1994 including the services related to the digital business, technology enhancement, consulting and operation sort of services. The headquarters of the Cognizant is situated in Teaneck, New Jersey and United States (Cognizant, 2020).
Key Business Processes of the Company
In Cognizant, the company treats their business processes as a service and it is a type of business process outsourcing, which is delivered on a cloud services model. BPaaS is meant to connect with the other services also, which comprises of services processing and it may even be a sort of personal services, which is fully configurable. BPaaS is stated to provide the services, which are related to the people, technology and processes (Kale, Veeravalli & Wang, 2020). In order to making use of the availability in the company they need to operate the pay per use sort of service.
Cyber Security Issues Covered
Key Cyber Security Issues Identified in the Case
The company itself released a statement, in which they stated that the Cognizant could confirm that a security breach or incident involving the company internal systems and that causing services disruption for some of the existing clients of the company it is happening because of the maze ransomware attacked their systems. The Cognizant stated that their internal security teams were supplemented by leading their cyber defence firms are jump in this incident in order to get rid of it (Cognizant, 2020). On the other side, the company also engaged in the with the legitimate law authorities, which help them to move out from the particular instance legally.
Risks Associated with the Issue
The maze Ransom ware is known for the encrypted the data and it was launched in May 2017. Besides, it is known for hacking the files of the company system by breaking any sort of breach easily and entered into a company system. Moreover, typically the goal of the ransomware is to attack the computers in a network and encrypted the files and in addition to that, they demand a ransom to recover the files. Generally, the attacker who operates the ransomware has the ability to facilitate the exfiltration of the data or transfer the data into their server (Kale, Veeravalli & Wang, 2020).
Impacts of the Issues on the Case Company
Due to the maze ransomware attack, the Cognizant has not yet been named on an official website with maze attackers. Although the website has named other companies in the earlier years in order to failing to comply, which is related to the maze attackers’ ransomware demand. In order to clear the things with the media of the world Cognizant stated that the spokesperson of the company is not supposes to give the clarifications beyond their threshold.
Lessons Learnt from the Case
Actions Reported in the Case to Address the Identified Issues
The Cognizant also added in their statement that they would take the stock of the incident and refer that it is measurable for the client to take further necessary steps for them. Besides that, the company claimed that their internal security teams, which was supplemented by the leading cyber defence firm, which are actively participated. In the further, they thought of taking steps, which contain the information of this incident. Cognizant also commend that they are kept engage in the ongoing communication with their specific clients (Lacy & Prince, 2018). It is also provided them with some sort of an indicator of the compromise and other important technical information.
Outcomes of the Reported Actions
The company named Aroba of Cybie said that the ransomware group, which belongs in that particular, case and understands the brand value of the particular organisation. In addition, it has turned to a well-funded network or a connectivity in the upcoming years the company spokesperson said that due to the successful attacks of the ransomware it reflects the growth of their particular affiliates, which belong from the particular organisation. Due to the increasing...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here