KING’S OWN INSTITUTE* Success in Higher Education ICT 205 CYBER SECURITY T220 24/06/2020 15:36 PAGE 1 OF 16 *AUSTRALIAN INSTITUTE OF BUSINESS AND MANAGEMENT PTY LTD © ABN: XXXXXXXXXXCRICOS 03171A ICT...

1 answer below »
description in page 11 to 13


KING’S OWN INSTITUTE* Success in Higher Education ICT 205 CYBER SECURITY T220 24/06/2020 15:36 PAGE 1 OF 16 *AUSTRALIAN INSTITUTE OF BUSINESS AND MANAGEMENT PTY LTD © ABN: 72 132 629 979 CRICOS 03171A ICT 205 CYBER SECURITY T220 All information in the Subject Outline is correct at the time of approval. KOI reserves the right to make changes to the Subject Outline if they become necessary. Any changes require the approval of the KOI Academic Board and will be formally advised to those students who may be affected by email and via Moodle. Information contained within this Subject Outline applies to students enrolled in the trimester as indicated 1. General Information 1.1 Administrative Details Associated HE Award(s) Duration Level Subject Coordinator Bachelor of Information Technology (BIT) 1 trimester Level 2 Dr Smitha Shivhankar [email protected] P: 92833583 L: Level 1-2, 17 O’Connell St. Consultation: via Moodle or by appointment. 1.2 Core / Elective Core subject for BIT 1.3 Subject Weighting Indicated below is the weighting of this subject and the total course points. Subject Credit Points Total Course Credit Points 4 BIT (96 Credit Points) 1.4 Student Workload Indicated below is the expected student workload per week for this subject No. Timetabled Hours/Week* No. Personal Study Hours/Week** Total Workload Hours/Week*** 4 hours/week (2 hour Lecture + 2 hour Tutorial) 6 hours/week 10 hours/week * Total time spent per week at lectures and tutorials ** Total time students are expected to spend per week in studying, completing assignments, etc. *** Combination of timetable hours and personal study. 1.5 Mode of Delivery Blended, that is face-to-face/online 1.6 Pre-requisites ICT 106 Data Communications and Networks 1.7 General Study and Resource Requirements o Dedicated computer laboratories are available for student use. Normally, tutorial classes are conducted in the computer laboratories. o Students are expected to attend classes with the requisite textbook and must read specific chapters prior to each tutorial. This will allow them to actively take part in discussions. Students should have elementary skills in both word processing and electronic spreadsheet software, such as Office 365 or MS Word and MS Excel. o Computers and WIFI facilities are extensively available for student use throughout KOI. Students are encouraged to make use of the campus Library for reference materials. o Students will require access to the internet and email. Where students use their own computers, they should have internet access. KOI will provide access to required software. Approved by KOI Academic Board for T2 2020 mailto:[email protected] ICT205 ICT 205 CYBER SECURITY T220 24/06/2020 15:36 PAGE 2 OF 16 *AUSTRALIAN INSTITUTE OF BUSINESS AND MANAGEMENT PTY LTD © ABN: 72 132 629 979 CRICOS 03171A Resource requirements specific to this subject: MS Imagine, Office 365. 2 Academic Details 2.1 Overview of the Subject As the Internet becomes more pervasive, so do security threats to our computer systems and communications. Cybersecurity affects the social and economic health of the world. This subject provides students with a grounding in security technology and the fundamentals of encryption systems. Students will learn about types of attacks, access control and authentication, firewalls, wireless network security, intrusion detection systems, and cryptographic techniques and their applications. 2.2 Graduate Attributes for Undergraduate Courses Graduates of Bachelor courses from King’s Own Institute (KOI) will achieve the graduate attributes expected under the Australian Qualifications Framework (2nd edition, January 2013). Graduates at this level will be able to apply a broad and coherent body of knowledge across a range of contexts for the purposes of professional practice or academic scholarship, and as a pathway for further learning. King’s Own Institute’s key generic graduate attributes for a bachelor’s level degree are summarised below: Across the course, these skills are developed progressively at three levels: o Level 1 Foundation – Students learn the basic skills, theories and techniques of the subject and apply them in basic, standalone contexts o Level 2 Intermediate – Students further develop the skills, theories and techniques of the subject and apply them in more complex contexts, and begin to integrate this application with other subjects. o Level 3 Advanced – Students demonstrate an ability to plan, research and apply the skills, theories and techniques of the subject in complex situations, integrating the subject content with a range of other subject disciplines within the context of the course. KOI Bachelor Degree Graduate Attributes Detailed Description Knowledge Current, comprehensive, and coherent and connected knowledge Critical Thinking Critical thinking and creative skills to analyse and synthesise information and evaluate new problems Communication Communication skills for effective reading, writing, listening and presenting in varied modes and contexts and for transferring knowledge and skills to a variety of audiences Information Literacy Information and technological skills for accessing, evaluating, managing and using information professionally Problem Solving Skills Skills to apply logical and creative thinking to solve problems and evaluate solutions Ethical and Cultural Sensitivity Appreciation of ethical principles, cultural sensitivity and social responsibility, both personally and professionally Teamwork Leadership and teamwork skills to collaborate, inspire colleagues and manage responsibly with positive results Professional Skills Professional skills to exercise judgement in planning, problem solving and decision making Approved by KOI Academic Board for T2 2020 ICT205 ICT 205 CYBER SECURITY T220 24/06/2020 15:36 PAGE 3 OF 16 *AUSTRALIAN INSTITUTE OF BUSINESS AND MANAGEMENT PTY LTD © ABN: 72 132 629 979 CRICOS 03171A 2.3 Subject Learning Outcomes This is a Level 2 subject. On successful completion of this subject, students should be able to: Subject Learning Outcomes Contribution to Graduate Attributes a) Analyse and evaluate the organisational adoption of security controls b) Design solutions for concrete security problems for distributed applications c) Formulate and evaluate security countermeasures to reduce potential security risks d) Analyse emerging security threats and controls. 2.4 Subject Content and Structure Below are details of the subject content and how it is structured, including specific topics covered in lectures and tutorials. Reading refers to the text unless otherwise indicated. Weekly Planner: Week (beginning) Topic covered in each week’s lecture Reading(s) Expected work as listed in Moodle 1 06 Jul Introduction to network security Ch. 1 Complete exercises in Tutorials on challenges of securing information, information security and types of attackers. Formative not graded 2 13 Jul Malware and social engineering attacks Ch. 2 Complete exercises in Tutorials on basic steps of an attack and principles of defence and different types of malware and payloads of malware. Formative not graded. 3 20 Jul Applications network attacks and risk mitigation Ch. 15 Complete exercises in Tutorials on client-side attacks, overflow attacks and different types of networking- based attacks. Formative not graded. 4 27 Jul Vulnerability assessment and data security Ch. 13 Complete exercises in Tutorials. Formative not graded. 5 03 Aug Networking-based and webserver attacks Ch. 5 Complete exercises in Tutorials on securing a host computer and application security. How to secure data. Formative not graded. 6 10 Aug Network security devices, technologies, and design Ch. 6 Complete exercises in Tutorials on network security devices and their uses, network technologies and security. Formative not graded. Assignment 1 due: Report Submission Summative worth 16% 16 Aug 2020 – 23 Aug 2020 Mid trimester break Approved by KOI Academic Board for T2 2020 ICT205 ICT 205 CYBER SECURITY T220 24/06/2020 15:36 PAGE 4 OF 16 *AUSTRALIAN INSTITUTE OF BUSINESS AND MANAGEMENT PTY LTD © ABN: 72 132 629 979 CRICOS 03171A 7 24 Aug Administering a secure network and systems and application security Chs. 7, 9 Complete exercises in Tutorials on network design elements, functions of common network protocols, principles of network administration and how they can be secured. Formative not graded. Assignment 1 due: Demonstration Summative worth 4% 8 31 Aug Wireless network security and mobile and embedded devices Chs. 8, 10 Complete exercises in Tutorials on different types of wireless network attacks and the vulnerabilities in IEEE 802.11 security. Solutions for securing a wireless network. Formative not graded. 9 07 Sep Access management fundamentals Ch. 11 Complete exercises in Tutorials on four access control models, how to implement access control and the different types of authentication services. Formative not graded. 10 14 Sep Authentication and account management Ch. 12 Complete exercises in Tutorials on authentication credentials and account management procedures for securing passwords. Formative not graded. 11 21 Sep Cryptography: hash; symmetric; and asymmetric algorithm Chs. 3, 4 Assignment 2 due: Report Submission Summative worth 25% Complete exercises in Tutorials on cryptography, hash, symmetric, and asymmetric cryptographic algorithms. Formative not graded. 12 28 Sep Business continuity Ch. 14 Assignment 2 due: Presentation Summative worth 5% Complete exercises in Tutorials on how to control risk, ways in which security policies can reduce risk Formative not graded. 13 04 Oct Study review week 14 12 Oct Examination Please see exam timetable for exam date, time and location 15 18 Oct Student
Answered Same DaySep 15, 2021ICT205

Answer To: KING’S OWN INSTITUTE* Success in Higher Education ICT 205 CYBER SECURITY T220 24/06/2020 15:36 PAGE...

Deepti answered on Sep 23 2021
133 Votes
Executive Summary
This report aims at discussing an exhaustive security plan for information systems of the target company Seek Hardware Pty Ltd. Th company sells IT hardware parts and operates from several locations using point to point connections.
The purpose of this report is to address the security aspect of the holdings of the target company in all respects. The assets need to be secured against various types of thr
eats and cyberattacks. The report proposes an absolute training program to create awareness among the employees about the threats that encompass the company information and how they can contribute in maintaining a protective and secure environment for themselves and the business processes.
Table of Contents
Executive Summary    1
Introduction    3
Security Plan    3
Security Solutions    4
Training    5
Security Policy    6
Conclusion    7
References    7
Introduction
Owing to the increasing advancements in technology, the organizations face grave security threats at large. Cyber threats are the fastest growing threats in cyberspace which have grown exponentially in frequency, severity and scope of impact. This requires small, medium and large organizations to thoroughly discuss and plan the security mechanisms for protecting their sensitive information from risks of theft and attack, etc. The target company Seek Hardware is seriously considering to address this issue through its security team.
The report includes an absolute security plan addressing the threats anticipated for the information systems of the company, the assets that may be at risk, the roles and responsibilities of personnel for ensuring security, the countermeasures and security training program for the staff at all locations of the company. Each of those aspects have been discussed in detail in the following sections. The report assesses the reliability of the proposed plan for the company at the end.
Security Plan
Information systems are constantly at risk from a number of bad actors using abundant techniques for gaining unauthorized access to sensitive information. The information holdings of the target company that are at risk are identified as:
· Computing devices and non-computing networked devices at each location
· Software for business processes used by the staff to accomplish their day to day tasks.
· Network equipment including routers, switches, servers, etc. that connect the locations with each other and connect the customers and suppliers with the company.
· Information about customers, employee, suppliers, etc.
The roles of security team shall include chief security officer, security program manager and managers complying with IT awareness and training requirements. Users are the most important set of people who can contribute in reducing unintentional issues and vulnerabilities. The responsibilities of the inducted security team along with the employees who are skilled with security aspects for establishing security to the IT infrastructure of the company include setting security policies, access controls, network monitoring, regular audits for security compliance, endpoint detection deployment, setting patch management systems to ensure automatic update of applications, security management for on-premises and cloud assets, collaborating with IT team in developing disaster recovery plan and business continuity plan, working with security administrators and HR to implement security training and awareness program all across the company locations.
The threats that the company’s security team should deal with are
· Password attack: A single-way authentication password can be hacked by the attackers. The different methods used in attacking passwords are brute force attack, phishing, dictionary attack, rainbow table attack, credential stuffing, password spraying and keylogger attack.
· Network Injection attack can impact the switches, routers and hubs of the system thus bringing down the network (Choi, 2008).
· Ad-Hoc Network attack is a security threat which can occur between the wireless devices between multiple locations of the company which have no access point.
· Malicious software attack: Cyber criminals create malicious software which is intentionally installed in the user’s device without...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here