Write My Paper Button

WhatsApp Widget

Write My Paper Button

WhatsApp Widget

Task Paper- CPO442 Cybersecurity Principles & Organisational Practice Assignment Help

CPO442 Cybersecurity Principles & Organisational Practice Assignment Help

ASSESSMENT 1 BRIEF

Subject Code and TitleĀ 

CPO442 Cybersecurity Principles and Organisational Practice

AssessmentĀ 

Report

Individual/GroupĀ 

Individual

LengthĀ 

500 words (+/- 10%) plus diagrams

Learning OutcomesĀ 

The Subject Learning Outcomes demonstrated by successfulĀ  completion of the task below include:Ā 

a) Describe human factors and their cybersecurityĀ Ā 

consequences on business operationsĀ 

b) Appraise cybersecurity standards and governanceĀ  requirements to safeguard humans users within anĀ Ā 

organisation

SubmissionĀ 

12-week duration: Due by 11:55pm AEST/AEDT Sunday end ofĀ  Module 4(Week 4).Ā 

6-week duration: Due by Due by 11:55pm AEST/AEDT Sunday endĀ  of Module 4 (Week 2).

WeightingĀ 

25%

Total MarksĀ 

100 marks

Assessment TaskĀ 

Write a 500-word (+/- 10%) report about the human factor in a company’s cybersecurityĀ  environment. The report will explore the influence of the human factor in cybersecurity and theĀ  legal or other regulatory requirements that apply to cybersecurity practices. The content of theĀ  report must be supported by relevant diagrams.Ā 

Please refer to the instructions section below for details of how to complete this task.Ā 

ContextĀ 

Cybersecurity is a broad field that includes many different areas of expertise. Anyone working inĀ  cybersecurity must possess a basic knowledge of field related terminology and general procedures.Ā  This includes knowledge of key technical and organisational methods that can be used to implementĀ  security measures, how the human factor influences key decisions regarding which security methodsĀ  to implement and why the human factor needs to be addressed when setting up a cybersecurityĀ  project. In this assessment you will need to write a report which addresses specific questions around

that knowledge in order to prepare you for your future studies and work in cybersecurity relatedĀ  roles.Ā 

InstructionsĀ 

To complete this assessment task, you must write a 500-word (+/- 10%) report discussing theĀ  importance of the human factor in a company’s cybersecurity environment. Please review allĀ  learning resources for Modules 1-3 prior to writing the report.Ā 

The content of the report should:Ā 

o provide a definition of cybersecurityĀ 

o explain why addressing cybersecurity is an ongoing task for an organisation o discuss recent cybersecurity threats and attacks and how they are exploited byĀ  hackersĀ 

o evaluate attack vectors that are not user-specific (e.g., brute-force password attack) o evaluate successful attack vectors which are specific to human activities (user specific)Ā 

o discuss the role of governance, which is based on cybersecurity frameworks andĀ  determines the regulations and/or laws that are required for effective cybersecurityĀ  practicesĀ 

o include a list of applicable local (Australian) and international laws and branch specific regulations that have been created by business organisations. (PleaseĀ  ensure that you include indirect regulations that require cyber security measures),Ā  and;Ā 

o include relevant diagrams which demonstrate the relationships between humanĀ  activity, cybersecurity threats and cybersecurity attack vectors.Ā 

The report should be written for people with very limited technical knowledge.Ā 

In addition to the recommended readings from Modules 1-3 you must support your report withĀ  further information obtained by reviewing peer reviewed articles and textbooks. Search specificallyĀ  using the terms ā€œcybersecurity governanceā€ and ā€œhuman factors in cybersecurityā€.Ā 

Please review the Academic Skills page for further support with formatting your report: Report Writing – Academic Skills – Assessment Preparation – Library at TorrensĀ 

ReferencingĀ 

It is essential that you use current APA style for citing and referencing the sources that you use.Ā  Please see more information on citing and referencing guidelines on the Academic Skills webpage.Ā 

Submission InstructionsĀ 

Submit this task via the Assessment 1 link in the main navigation menu in CPO442 CybersecurityĀ  Principles and Organisational Practice. The Learning Facilitator will provide feedback via the GradeĀ  Centre in the LMS portal. Feedback can be viewed in My Grades.Ā 

Academic IntegrityĀ 

All students are responsible for ensuring that all work submitted is their own, is academically writtenĀ  and appropriately referenced following the Academic Writing Guide. Students also need to haveĀ  read and be aware of Torrens University Australia Academic integrity policy and procedures andĀ  subsequent penalties for academic misconduct. These are available online.Ā 

Students must also keep a copy of all submitted material and any assessment drafts.Ā 

Special ConsiderationĀ 

To apply for special consideration for a modification to an assessment task or exam due toĀ  unexpected or extenuating circumstances, please consult the Assessment Policy for Higher Education Coursework and ELICOS and, if applicable to your circumstance, submit a completedĀ  Application for Assessment Special Consideration Form to your Learning Facilitator.

Assessment Rubric

AssessmentĀ Ā 

Attributes

FailĀ 

(Yet to achieveĀ Ā 

minimum standard)Ā 

0-49%

PassĀ Ā 

(Functional)Ā 

50-64%

CreditĀ Ā 

(Proficient)Ā 

65-74%

DistinctionĀ Ā 

(Advanced)Ā 

75-84%

High DistinctionĀ Ā 

(Exceptional)Ā 

85-100%

Importance ofĀ Ā 

cybersecurity explained;Ā  explanation supportedĀ  with diagrams.Ā 

Total Percentage forĀ  this AssessmentĀ Ā 

Attribute = 20%

No or only rudimentaryĀ  explanation of theĀ Ā 

importance ofĀ Ā 

cybersecurity for anĀ Ā 

organisation.Ā 

No supporting diagrams.

General explanation ofĀ Ā 

the importance ofĀ Ā 

cybersecurity for anĀ Ā 

organisation; noĀ Ā 

justification of itsĀ Ā 

importance provided.Ā 

No supporting diagrams.

Clear explanation ofĀ Ā 

the importance ofĀ Ā 

cybersecurity for anĀ Ā 

organisation; someĀ Ā 

justification of theĀ Ā 

implementation ofĀ Ā 

cybersecurityĀ Ā 

projects.Ā 

At least one diagramĀ Ā 

showing increases inĀ Ā 

attacks or amount ofĀ Ā 

damage caused.

ComprehensiveĀ Ā 

explanation of theĀ Ā 

importance ofĀ Ā 

cybersecurity for anĀ Ā 

organisation; solidĀ Ā 

justification of theĀ Ā 

implementation ofĀ Ā 

cybersecurityĀ Ā 

projects.Ā 

At least two diagramsĀ Ā 

showing increases inĀ Ā 

attacks or amount ofĀ Ā 

damage caused.

Expert explanation ofĀ Ā 

the importance ofĀ Ā 

cybersecurity for anĀ Ā 

organisation; solidĀ Ā 

and detailedĀ Ā 

justification of theĀ Ā 

implementation ofĀ Ā 

cybersecurityĀ Ā 

projects.Ā 

More than two diagramsĀ  showing increases inĀ Ā 

attacks and amount ofĀ Ā 

damage caused.

Explanation andĀ Ā 

justification of whyĀ Ā 

cybersecurity is anĀ Ā 

ongoing task; pointsĀ  supported with sourcedĀ  diagrams.

No explanation orĀ Ā 

justification of whyĀ Ā 

cybersecurity is anĀ Ā 

ongoing task.Ā 

No explanation of theĀ  concept of threatĀ Ā 

evolution and the ensuing

Brief explanation andĀ Ā 

justification of whyĀ Ā 

cybersecurity is an ongoingĀ  task.Ā 

Brief explanation of theĀ Ā 

concept ofthreat evolutionĀ  and the ensuing change of

Some explanation andĀ Ā 

justification of whyĀ Ā 

cybersecurity is an ongoingĀ  task.Ā 

Clear explanation of theĀ  concept ofthreat evolutionĀ  and the ensuing change of

Comprehensive explanationĀ  and justification of whyĀ  cybersecurity is an ongoingĀ  task.Ā 

Comprehensive explanationĀ  of the concept of threatĀ  evolution and the ensuing

Expert explanation andĀ  justification of whyĀ Ā 

cybersecurity is an ongoingĀ  task.Ā 

Expert explanation of theĀ  concept ofthreat evolutionĀ  and the ensuing change of

Total Percentage forĀ  this AssessmentĀ Ā 

Attribute = 10%

change ofservices.Ā 

No supporting diagrams.

services.Ā 

No supporting diagrams.

services.Ā 

One diagram thatsupportsĀ  a particular concept orĀ Ā 

topic included andĀ Ā 

referenced.

change ofservices.Ā 

Two diagramsthatsupportĀ  particular concepts orĀ Ā 

topics included andĀ Ā 

referenced.

services.Ā 

More than two diagramsĀ  that support particularĀ  concepts ortopicsincludedĀ  and referenced.

Role of governance,Ā  local and internationalĀ  legislation andĀ Ā 

regulations inĀ Ā 

cybersecurity.Ā 

Total Percentage forĀ  this AssessmentĀ Ā 

Attribute = 30%

No awareness of the roleĀ  of governance, localĀ Ā 

and/or internationalĀ Ā 

legislation and regulationsĀ  around cybersecurity orĀ  data privacyĀ Ā 

demonstrated.

A limited list of applicableĀ  laws provided demonstrates aĀ  basic awareness of the role ofĀ  governance, local and/orĀ  international cybersecurityĀ  regulations and data privacyĀ  legislation.

A partial list of applicableĀ  laws provided andĀ Ā 

identification of regulationsĀ  for business areasĀ Ā 

demonstrate a competentĀ  understanding of the role ofĀ  governance, local and/orĀ  international cybersecurityĀ  regulations and data privacyĀ  legislation.

An almost complete list ofĀ  applicable laws provided,Ā  with brief discussion ofĀ  indirect laws includedĀ Ā 

demonstrate a detailedĀ  understanding of the role ofĀ  governance, local and/orĀ  international cybersecurityĀ  regulations and data privacyĀ  legislation.

A complete list of applicableĀ  laws provided, withĀ Ā 

sufficient discussion ofĀ  indirect laws includedĀ Ā 

demonstrate an exemplaryĀ  and comprehensiveĀ Ā 

understanding of the role ofĀ  governance, local and/orĀ  international cybersecurityĀ  regulations and data privacyĀ  legislation.

Identification andĀ Ā 

evaluation of genericĀ  attack vectorsĀ 

Total Percentage forĀ  this AssessmentĀ Ā 

Attribute = 15%

No attack vectorsĀ Ā 

identified.

Two attack vectors identified.Ā 

Three attack vectorsĀ Ā 

identified and evaluated.

Four attack vectorsĀ Ā 

identified and evaluated.

Five or more attack vectorsĀ  identified and evaluated.

Identification andĀ Ā 

evaluation of userĀ 

centric attack vectors

No user centric attackĀ Ā 

identified.

One user centric attack vectorĀ  identified.

Two user centric attackĀ  vectors identified andĀ Ā 

evaluated.

Three user centric attackĀ  vectors identified andĀ Ā 

evaluated.

Four or more user centricĀ  attack vectorsidentified andĀ  evaluated.

Total Percentage forĀ  this AssessmentĀ Ā 

Attribute = 15%






Report conformstoĀ Ā 

academic writingĀ Ā 

conventionsĀ 

Total Percentage forĀ  this AssessmentĀ Ā 

Attribute = 4%

Poor level of appropriateĀ  language. Punctuation,Ā  spelling, style, tone andĀ  grammar are oftenĀ Ā 

inadequately expressed orĀ  used incorrectly.

Adequate level ofĀ 

appropriate language.Ā Ā 

Punctuation, spelling, style,Ā  tone and grammar areĀ Ā 

adequately expressed but areĀ  often incorrect.

Good level of appropriateĀ  language. Punctuation,Ā  spelling, style, tone andĀ  grammar are sometimesĀ  incorrect.

Excellent use of languageĀ  Punctuation,spelling,style,Ā  tone and grammar are wellĀ  expressed and correct.Ā 

Report is understandableĀ  and coherently phrased.

Highly sophisticated use ofĀ  language. Punctuation,Ā  spelling, style, tone andĀ  grammar are very wellĀ Ā 

expressed and correct.Ā 

.

Consistent use ofĀ Ā 

reliable resourcesĀ 

Total Percentage forĀ  this AssessmentĀ Ā 

Attribute = 3%

DemonstratesinconsistentĀ  use of sources to supportĀ  and develop ideas.

Demonstrates use of sourcesĀ  to support and develop someĀ  ideas.

Demonstrates use ofĀ Ā 

sourcesto support andĀ Ā 

develop most ideas.

Demonstrates use ofĀ Ā 

sources to support andĀ  develop almost all ideas.

Demonstrates use ofsourcesĀ  to support and develop allĀ  ideas.

Referencing/CorrectĀ Ā 

citation of resourcesĀ 

Total Percentage forĀ  this AssessmentĀ Ā 

Attribute = 3%

Citations follow noĀ Ā 

discernible referencingĀ  format or pattern ofĀ Ā 

frequent citation errors.

Citations follow APA styleĀ  format with several citationĀ  errors.

Most citations are correctlyĀ  cited following APA styleĀ  with no more than twoĀ  citation errors.

Nearly all citations areĀ Ā 

correctly cited followingĀ  APA style with no moreĀ  than one citation error.

All citations are correctlyĀ  cited following APA style.