Subject Code and Title ASSESSMENT 2 PART C BRIEF MIS311 Cybersecurity Case Study Report and Presentation: Presentation Group Part C: 6 minute presentation Assessment Individual/Group Length Learning...

1 answer below »


page1image913559888
page1image913995408
page1image913807168
page1image913869088
page1image913869392



Subject Code and Title







ASSESSMENT 2 PART C BRIEF




page1image913996576
page1image914191248



MIS311 Cybersecurity
Case Study Report and Presentation: Presentation Group
Part C: 6 minute presentation




page1image914148960
page1image914149248
page1image914149536



Assessment




page1image914151360
page1image914151648
page1image914151936



Individual/Group




page1image914111376
page1image914111664
page1image914111952



Length




page1image914246992
page1image914247280
page1image914247568
page1image914247856



Learning Outcomes




page1image914137168
page1image914137456



Submission







The Subject Learning Outcomes demonstrated by successful completion of the task below include:



a) Investigate and analyse the tenets of cybersecurity



b) Identify and communicate a range of threats and vulnerabilities to informational assets.



c) Recommend and justify robust solutions to identified threats and vulnerabilities to cybersecurity



d) Develop own professional practice and ethical standards around security issues and implementation of solutions




page1image914230656



Due by 11:55pm AEST/AEDT Sunday end of Module 6.1 15%
100 marks




page1image914238944
page1image914239232
page1image914239520



Weighting




page1image914241312
page1image914241600



Total Marks




page1image914198016
page1image914198304



Assessment Task







The management of the business received your previous reports and decided to invite you to present your analysis to upper management and the board. You are free to discuss any of the elements from assessment 1 or assessment 2 A and B, but you must cover the main outcome of your study, the proposed mitigation scheme, its costings and proposed benefits.



Also include a few sentences on an ethically significant issue associated with cybersecurity practices (suggestion: privacy and government requirements on privacy).



You will be given time of 6 minutes only for your presentation of the main points. (You will actually be recording a 6-minute video.) Each minute over 6 minutes attracts a 10% presentation penalty.



Six minutes is not much time but keep in mind that the business management do not have a technical background, and they only want to know the main points. They should come away with a clear understanding of these. In the video, you will speak to the management as a cybersecurity specialist. A little bit of theatre here will help with presentation marks. Take the exercise seriously: dress as for a board meeting, address comments to Elaine, Jerry, etc. Show your skill as a presenter. A few rehearsals will help greatly. Don’t over promise security but be convincing in your presentation.



Instructions



1. Review your Assessment 2 Part B, focusing on the recommendations.




page1image561049824



MIS311_Assessment_2_Part C_Brief_Case Study Report_Presentation _Module 6.1
Page
1
of
6






page2image561272784





  1. Create a 6-minute video presentation





  2. Requirements for the video presentation:



    a. All group members must present in the video presentation.
    b. For authentication purposes, all group members must show their face in the video presentation for at least 1 minute each.
    c. Your presentation must be in video format (mp4, MOV, etc.) for uploading onto Blackboard. There is a lot of free software that can be used to create a group presentation video, e.g. Zoom and Microsoft Teams. You may create a Zoom meeting for the presentation among your group members and record the meeting.





  3. Before submitting your assessment, you should check it against the assessment criteria and the marking rubric included in this specification to ensure that you have satisfactorily addressed all the criteria that will be used to mark your submission.





  4. Download the Group Participation Matrix from Assessment 2 Part C section. Use this document to review your group members’ performance in this assessment and to specify their specific contribution made to the group work. This Group Participation Matrix document needs to be submitted individually through the Assessment 2 Part C submission link.





Referencing



It is essential that you use appropriate APA style for citing and referencing research. Please see more information on referencing in the
https://library.torrens.edu.au/academicskills/apa/tool



Submission Instructions



Group submission




Each team will submit their video via the Assessment link in the main navigation menu in Blackboard. The Learning Facilitator will provide feedback via the Grade Centre in the LMS portal. Feedback can be viewed in My Grades. For detailed instructions on compressing (if necessary) and uploading video presentations, see the link on the main Assessments page. After uploading your video presentation, retain a copy in a safe place.



Peer evaluation – Individual Submission




Each individual student is to submit a completed Group Participation Matrix document in the Peer Evaluation submission link. Please submit a peer review correctly, as no submission may result in zero grading for this assessment criteria.



Academic Integrity



All students are responsible for ensuring that all work submitted is their own and is appropriately referenced and academically written according to the
Academic Writing Guide
. Students also need to have read and be aware of Torrens University Australia Academic Integrity Policy and Procedure and subsequent penalties for academic misconduct. These are viewable online at
http://www.torrens.edu.au/policies-and-forms



Students also must keep a copy of all submitted material and any assessment drafts.



Special Consideration



To apply for special consideration for a modification to an assessment or exam due to unexpected or extenuating circumstances, please consult the
Assessment Policy for Higher Education Coursework and ELICOS
and, if applicable to your circumstance, submit a completed
Application for Assessment Special Consideration Form
to your Learning Facilitator




page2image561738448
page2image561738736
page2image561739024
page2image561739376
page2image561739664
page2image561739952
page2image561740240
page2image561740656
page2image561740944



MIS311_Assessment_2_Part C_Brief_Case Study Report_Presentation _Module 6.1
Page
2
of
6






page3image912801120



Assessment Rubric



































Assessment Attributes








Fail
(Yet to achieve minimum standard) 0-49%








Pass (Functional) 50-64%








Credit (Proficient) 65-74%








Distinction (Advanced) 75-84%








High Distinction (Exceptional) 85-100%








Knowledge and Understanding



- Clear presentation of threats - Appropriate discussion of



mitigation
- Appropriate discussion of ethical



issue



Percentage for this criterion = 35%








Little or no understanding of ethical standards around security issues and implementation of solutions.



Key components of the assessment are not addressed.








Understands the fundamentals of ethical standards around security issues and implementation of solutions.



Often confuses assertion of personal opinion with information substantiated by evidence from the research/course materials.



Some of the key components of the assessment are not addressed.








Sound understanding of ethical standards around security issues and implementation of solutions.



Supports personal opinion and information substantiated by evidence from the research/course materials.



All key components of the assessment are addressed with an adequate capacity to explain and apply relevant key concepts.








Very good understanding of ethical standards around security issues and implementation of solutions.



Discriminates between assertion of personal opinion and information substantiated by robust evidence from the research/course materials and extended reading.



All of the key components are addressed. Well demonstrated capacity to explain and apply relevant key concepts.








Excellent understanding of ethical standards around security issues and implementation of solutions. Systematically and critically discriminates between assertion of personal opinion and information substantiated by robust evidence from the research/course materials and extended reading.



All of the key components are addressed. Demonstrates mastery and application of key concepts.





page3image913054160



MIS311_Assessment_2_Part C_Brief_Case Study Report_Presentation _Module 6.1
Page
3
of
6






page4image932176160










































Assessment Attributes








Fail
(Yet to achieve minimum standard) 0-49%








Pass (Functional) 50-64%








Credit (Proficient) 65-74%








Distinction (Advanced) 75-84%








High Distinction (Exceptional) 85-100%








Effective Communication





  • - Clear and logical structure





  • - Flow of information





  • - Clarity and quality of verbal



    communication





  • - Good use of time





  • - Appropriate for upper management



    presentation



    Percentage for this criterion = 35%










Difficult to understand for audience, no logical/clear structure, poor flow of ideas, argument lacks supporting evidence.



Audience cannot follow the line of reasoning.



Does not engage the audience or look at the camera. Body language inappropriate or not professional.



Inaccurate information. Inadequate or excessive length.








Information, arguments and evidence are presented in a way that is not always clear and logical.



Line of reasoning is difficult to follow at times.



Speech and tone not always appropriate for audience; however, not throughout the entire presentation.



The presentation is of an acceptable length.








Information, arguments and evidence are well presented, with a mostly clear flow of ideas and arguments.



Line of reasoning is easy to follow.



Uses engaging presentation techniques (e.g. posture; eye contact; gestures; volume; pitch and pace of voice)



The presentation is of an acceptable length.








Information, arguments and evidence are very well presented; the presentation is logical, clear and well supported by evidence.



Confidently and consistently uses a range of engaging presentation techniques (e.g. posture; eye contact; gestures; volume; pitch and pace of voice).



Clear and confident delivery.



The presentation is of an acceptable length.








Expertly presented — the presentation is logical, persuasive, and well supported by evidence, demonstrating a clear flow of ideas and arguments. Engages and sustains audience’s interest in the topic.



Dynamic, integrated and professional use of a wide range of engaging presentation techniques (e.g. posture; eye contact; gestures; volume; pitch and pace of voice).



Clear, confident and persuasive delivery. The presentation is of an acceptable length.








Teamwork



Percentage for this criterion = 10%








Does not participate effectively in a team environment.








Participates effectively in teams.








Contributes to small group discussions to








Understands group dynamics and team roles.








Builds team’s identity and commitment. Leads





page4image253039344



MIS311_Assessment_2_Part C_Brief_Case Study Report_Presentation _Module 6.1
Page
4
of
6






page5image240410112







































Assessment Attributes








Fail
(Yet to achieve minimum standard) 0-49%








Pass (Functional) 50-64%








Credit (Proficient) 65-74%








Distinction (Advanced) 75-84%








High Distinction (Exceptional) 85-100%








Places individual goals ahead of the group responsibility.



Hinders the group process and upsets the schedule.








Identifies team and individual goals, tasks, responsibilities and schedules.



Contributes to group processes. Supports the team.








reach agreement on issues.



Works together with others towards shared goals. Renegotiates responsibilities to meet needed change.








Facilitates team development. Renegotiates responsibilities, tasks and schedules to meet needed change.








team. Evaluates teams’ outcomes.



Implements strategies for enhancing team effectiveness.








Content, audience and purpose





  • - Appropriate standard of dress for the occasion (tidy and free of distracting features)





  • - First impression was one of confidence and poise





  • - Speakers attracted audience’s attention from the outset





  • - Little or no fidgeting and few



    distracting mannerisms





  • - Greet the audience courteously,



    and maintained their interest





  • - Presentation met level of



    knowledge and needs of audience





  • - Use of client friendly language



    Percentage for this criterion = 20%










Demonstrates no awareness of context and/or purpose of the assessment.



No effort is made to use client friendly language.








Demonstrates limited awareness of context and/or purpose of the assessment. Demonstrates limited awareness of the context and use of client friendly language.








Demonstrates consistent awareness of context and/or purpose of the assessment. Demonstrates a reasonable awareness of the context and use of client friendly language.








Demonstrates an advanced and integrated understanding of context and/or purpose of the assessment.



Demonstrates a good awareness of the context and use of client friendly language.








Consistently demonstrates a systematic and critical understanding of context and purpose of the assessment.



Demonstrates a thorough awareness of the context and use of client friendly language.





page5image931978592



MIS311_Assessment_2_Part C_Brief_Case Study Report_Presentation _Module 6.1
Page
5
of
6






page6image240393696
page6image240222080
page6image240260064



The following Subject Learning Outcomes are addressed in this assessment




page6image240577776
page6image240451920
page6image240412480



Investigate and analyse the tenets of cybersecurity
Identify and communicate a range of threats and vulnerabilities to informational assets. Recommend and justify robust solutions to identified threats and vulnerabilities to cybersecurity



SLO d) Develop own professional practice and ethical standards around security issues and implementation of solutions.







SLO a)




page6image240212608
page6image240212896



SLO b)




page6image240381840
page6image240382128



SLO c)




page6image240383696
page6image240383984
page6image240384528
page6image240384720



MIS311_Assessment_2_Part C_Brief_Case Study Report_Presentation _Module 6.1
Page
6
of
6




Answered 2 days AfterAug 14, 2022

Answer To: Subject Code and Title ASSESSMENT 2 PART C BRIEF MIS311 Cybersecurity Case Study Report and...

Shubham answered on Aug 16 2022
61 Votes
Question 1
Confidentiality is the first tenet that is designed for preventing unauthorized access to the information. The purpose of this t
enet is to keep information private and it will help in ensuring that the information is accessible and visible to authorized individuals.
Integrity is the second tenet that ensures consistency of information. This ensures that the information is protected against unauthorized changes like deletion, additions, and alteration of data. This tenet ensures that data is reliable and ensures that it cannot be modified incorrectly. It provides protection against malicious activities.
Availability is another tenet that provides protection to the ability of the system for making software system data available according to the needs of users. The purpose of this tenet is for the development of technological infrastructure, data, and applications that are available according to the needs of the organizational process.
Question 2
Insider threats are threats to informational assets and employees with authorized access to the network can misuse the access to negatively affect an organization’s critical data. In this insider threat, employees can intentionally bypass security measures out of ill-considered attempts for becoming more productive. This breaches cybersecurity protocol and deletes data, exploits, and steals data to sell informational...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here