CPO442 Cybersecurity Principles & Organisational Practice Assignment Help
|
ASSESSMENT 1 BRIEF
|
|
Subject Code and TitleĀ
|
CPO442 Cybersecurity Principles and Organisational Practice
|
|
AssessmentĀ
|
Report
|
|
Individual/GroupĀ
|
Individual
|
|
LengthĀ
|
500 words (+/- 10%) plus diagrams
|
|
Learning OutcomesĀ
|
The Subject Learning Outcomes demonstrated by successfulĀ completion of the task below include:Ā
a) Describe human factors and their cybersecurityĀ Ā
consequences on business operationsĀ
b) Appraise cybersecurity standards and governanceĀ requirements to safeguard humans users within anĀ Ā
organisation
|
|
SubmissionĀ
|
12-week duration: Due by 11:55pm AEST/AEDT Sunday end ofĀ Module 4(Week 4).Ā
6-week duration: Due by Due by 11:55pm AEST/AEDT Sunday endĀ of Module 4 (Week 2).
|
|
WeightingĀ
|
25%
|
|
Total MarksĀ
|
100 marks
|
Assessment TaskĀ
Write a 500-word (+/- 10%) report about the human factor in a companyās cybersecurityĀ environment. The report will explore the influence of the human factor in cybersecurity and theĀ legal or other regulatory requirements that apply to cybersecurity practices. The content of theĀ report must be supported by relevant diagrams.Ā
Please refer to the instructions section below for details of how to complete this task.Ā
ContextĀ
Cybersecurity is a broad field that includes many different areas of expertise. Anyone working inĀ cybersecurity must possess a basic knowledge of field related terminology and general procedures.Ā This includes knowledge of key technical and organisational methods that can be used to implementĀ security measures, how the human factor influences key decisions regarding which security methodsĀ to implement and why the human factor needs to be addressed when setting up a cybersecurityĀ project. In this assessment you will need to write a report which addresses specific questions around
that knowledge in order to prepare you for your future studies and work in cybersecurity relatedĀ roles.Ā
InstructionsĀ
To complete this assessment task, you must write a 500-word (+/- 10%) report discussing theĀ importance of the human factor in a companyās cybersecurity environment. Please review allĀ learning resources for Modules 1-3 prior to writing the report.Ā
The content of the report should:Ā
o provide a definition of cybersecurityĀ
o explain why addressing cybersecurity is an ongoing task for an organisation o discuss recent cybersecurity threats and attacks and how they are exploited byĀ hackersĀ
o evaluate attack vectors that are not user-specific (e.g., brute-force password attack) o evaluate successful attack vectors which are specific to human activities (user specific)Ā
o discuss the role of governance, which is based on cybersecurity frameworks andĀ determines the regulations and/or laws that are required for effective cybersecurityĀ practicesĀ
o include a list of applicable local (Australian) and international laws and branch specific regulations that have been created by business organisations. (PleaseĀ ensure that you include indirect regulations that require cyber security measures),Ā and;Ā
o include relevant diagrams which demonstrate the relationships between humanĀ activity, cybersecurity threats and cybersecurity attack vectors.Ā
The report should be written for people with very limited technical knowledge.Ā
In addition to the recommended readings from Modules 1-3 you must support your report withĀ further information obtained by reviewing peer reviewed articles and textbooks. Search specificallyĀ using the terms ācybersecurity governanceā and āhuman factors in cybersecurityā.Ā
Please review the Academic Skills page for further support with formatting your report: Report Writing ā Academic Skills ā Assessment Preparation ā Library at TorrensĀ
ReferencingĀ
It is essential that you use current APA style for citing and referencing the sources that you use.Ā Please see more information on citing and referencing guidelines on the Academic Skills webpage.Ā
Submission InstructionsĀ
Submit this task via the Assessment 1 link in the main navigation menu in CPO442 CybersecurityĀ Principles and Organisational Practice. The Learning Facilitator will provide feedback via the GradeĀ Centre in the LMS portal. Feedback can be viewed in My Grades.Ā
Academic IntegrityĀ
All students are responsible for ensuring that all work submitted is their own, is academically writtenĀ and appropriately referenced following the Academic Writing Guide. Students also need to haveĀ read and be aware of Torrens University Australia Academic integrity policy and procedures andĀ subsequent penalties for academic misconduct. These are available online.Ā
Students must also keep a copy of all submitted material and any assessment drafts.Ā
Special ConsiderationĀ
To apply for special consideration for a modification to an assessment task or exam due toĀ unexpected or extenuating circumstances, please consult the Assessment Policy for Higher Education Coursework and ELICOS and, if applicable to your circumstance, submit a completedĀ Application for Assessment Special Consideration Form to your Learning Facilitator.
Assessment Rubric
|
AssessmentĀ Ā
Attributes
|
FailĀ
(Yet to achieveĀ Ā
minimum standard)Ā
0-49%
|
PassĀ Ā
(Functional)Ā
50-64%
|
CreditĀ Ā
(Proficient)Ā
65-74%
|
DistinctionĀ Ā
(Advanced)Ā
75-84%
|
High DistinctionĀ Ā
(Exceptional)Ā
85-100%
|
|
Importance ofĀ Ā
cybersecurity explained;Ā explanation supportedĀ with diagrams.Ā
Total Percentage forĀ this AssessmentĀ Ā
Attribute = 20%
|
No or only rudimentaryĀ explanation of theĀ Ā
importance ofĀ Ā
cybersecurity for anĀ Ā
organisation.Ā
No supporting diagrams.
|
General explanation ofĀ Ā
the importance ofĀ Ā
cybersecurity for anĀ Ā
organisation; noĀ Ā
justification of itsĀ Ā
importance provided.Ā
No supporting diagrams.
|
Clear explanation ofĀ Ā
the importance ofĀ Ā
cybersecurity for anĀ Ā
organisation; someĀ Ā
justification of theĀ Ā
implementation ofĀ Ā
cybersecurityĀ Ā
projects.Ā
At least one diagramĀ Ā
showing increases inĀ Ā
attacks or amount ofĀ Ā
damage caused.
|
ComprehensiveĀ Ā
explanation of theĀ Ā
importance ofĀ Ā
cybersecurity for anĀ Ā
organisation; solidĀ Ā
justification of theĀ Ā
implementation ofĀ Ā
cybersecurityĀ Ā
projects.Ā
At least two diagramsĀ Ā
showing increases inĀ Ā
attacks or amount ofĀ Ā
damage caused.
|
Expert explanation ofĀ Ā
the importance ofĀ Ā
cybersecurity for anĀ Ā
organisation; solidĀ Ā
and detailedĀ Ā
justification of theĀ Ā
implementation ofĀ Ā
cybersecurityĀ Ā
projects.Ā
More than two diagramsĀ showing increases inĀ Ā
attacks and amount ofĀ Ā
damage caused.
|
|
Explanation andĀ Ā
justification of whyĀ Ā
cybersecurity is anĀ Ā
ongoing task; pointsĀ supported with sourcedĀ diagrams.
|
No explanation orĀ Ā
justification of whyĀ Ā
cybersecurity is anĀ Ā
ongoing task.Ā
No explanation of theĀ concept of threatĀ Ā
evolution and the ensuing
|
Brief explanation andĀ Ā
justification of whyĀ Ā
cybersecurity is an ongoingĀ task.Ā
Brief explanation of theĀ Ā
concept ofthreat evolutionĀ and the ensuing change of
|
Some explanation andĀ Ā
justification of whyĀ Ā
cybersecurity is an ongoingĀ task.Ā
Clear explanation of theĀ concept ofthreat evolutionĀ and the ensuing change of
|
Comprehensive explanationĀ and justification of whyĀ cybersecurity is an ongoingĀ task.Ā
Comprehensive explanationĀ of the concept of threatĀ evolution and the ensuing
|
Expert explanation andĀ justification of whyĀ Ā
cybersecurity is an ongoingĀ task.Ā
Expert explanation of theĀ concept ofthreat evolutionĀ and the ensuing change of
|
|
Total Percentage forĀ this AssessmentĀ Ā
Attribute = 10%
|
change ofservices.Ā
No supporting diagrams.
|
services.Ā
No supporting diagrams.
|
services.Ā
One diagram thatsupportsĀ a particular concept orĀ Ā
topic included andĀ Ā
referenced.
|
change ofservices.Ā
Two diagramsthatsupportĀ particular concepts orĀ Ā
topics included andĀ Ā
referenced.
|
services.Ā
More than two diagramsĀ that support particularĀ concepts ortopicsincludedĀ and referenced.
|
|
Role of governance,Ā local and internationalĀ legislation andĀ Ā
regulations inĀ Ā
cybersecurity.Ā
Total Percentage forĀ this AssessmentĀ Ā
Attribute = 30%
|
No awareness of the roleĀ of governance, localĀ Ā
and/or internationalĀ Ā
legislation and regulationsĀ around cybersecurity orĀ data privacyĀ Ā
demonstrated.
|
A limited list of applicableĀ laws provided demonstrates aĀ basic awareness of the role ofĀ governance, local and/orĀ international cybersecurityĀ regulations and data privacyĀ legislation.
|
A partial list of applicableĀ laws provided andĀ Ā
identification of regulationsĀ for business areasĀ Ā
demonstrate a competentĀ understanding of the role ofĀ governance, local and/orĀ international cybersecurityĀ regulations and data privacyĀ legislation.
|
An almost complete list ofĀ applicable laws provided,Ā with brief discussion ofĀ indirect laws includedĀ Ā
demonstrate a detailedĀ understanding of the role ofĀ governance, local and/orĀ international cybersecurityĀ regulations and data privacyĀ legislation.
|
A complete list of applicableĀ laws provided, withĀ Ā
sufficient discussion ofĀ indirect laws includedĀ Ā
demonstrate an exemplaryĀ and comprehensiveĀ Ā
understanding of the role ofĀ governance, local and/orĀ international cybersecurityĀ regulations and data privacyĀ legislation.
|
|
Identification andĀ Ā
evaluation of genericĀ attack vectorsĀ
Total Percentage forĀ this AssessmentĀ Ā
Attribute = 15%
|
No attack vectorsĀ Ā
identified.
|
Two attack vectors identified.Ā
|
Three attack vectorsĀ Ā
identified and evaluated.
|
Four attack vectorsĀ Ā
identified and evaluated.
|
Five or more attack vectorsĀ identified and evaluated.
|
|
Identification andĀ Ā
evaluation of userĀ
centric attack vectors
|
No user centric attackĀ Ā
identified.
|
One user centric attack vectorĀ identified.
|
Two user centric attackĀ vectors identified andĀ Ā
evaluated.
|
Three user centric attackĀ vectors identified andĀ Ā
evaluated.
|
Four or more user centricĀ attack vectorsidentified andĀ evaluated.
|
|
Total Percentage forĀ this AssessmentĀ Ā
Attribute = 15%
|
|
|
|
|
|
|
Report conformstoĀ Ā
academic writingĀ Ā
conventionsĀ
Total Percentage forĀ this AssessmentĀ Ā
Attribute = 4%
|
Poor level of appropriateĀ language. Punctuation,Ā spelling, style, tone andĀ grammar are oftenĀ Ā
inadequately expressed orĀ used incorrectly.
|
Adequate level ofĀ
appropriate language.Ā Ā
Punctuation, spelling, style,Ā tone and grammar areĀ Ā
adequately expressed but areĀ often incorrect.
|
Good level of appropriateĀ language. Punctuation,Ā spelling, style, tone andĀ grammar are sometimesĀ incorrect.
|
Excellent use of languageĀ Punctuation,spelling,style,Ā tone and grammar are wellĀ expressed and correct.Ā
Report is understandableĀ and coherently phrased.
|
Highly sophisticated use ofĀ language. Punctuation,Ā spelling, style, tone andĀ grammar are very wellĀ Ā
expressed and correct.Ā
.
|
|
Consistent use ofĀ Ā
reliable resourcesĀ
Total Percentage forĀ this AssessmentĀ Ā
Attribute = 3%
|
DemonstratesinconsistentĀ use of sources to supportĀ and develop ideas.
|
Demonstrates use of sourcesĀ to support and develop someĀ ideas.
|
Demonstrates use ofĀ Ā
sourcesto support andĀ Ā
develop most ideas.
|
Demonstrates use ofĀ Ā
sources to support andĀ develop almost all ideas.
|
Demonstrates use ofsourcesĀ to support and develop allĀ ideas.
|
|
Referencing/CorrectĀ Ā
citation of resourcesĀ
Total Percentage forĀ this AssessmentĀ Ā
Attribute = 3%
|
Citations follow noĀ Ā
discernible referencingĀ format or pattern ofĀ Ā
frequent citation errors.
|
Citations follow APA styleĀ format with several citationĀ errors.
|
Most citations are correctlyĀ cited following APA styleĀ with no more than twoĀ citation errors.
|
Nearly all citations areĀ Ā
correctly cited followingĀ APA style with no moreĀ than one citation error.
|
All citations are correctlyĀ cited following APA style.
|