Skip to main content

. Search the web for news on computer security breaches that occurred during April-August 2017. Research one such reported incident (Excluding the May 2017 ransomware cyber-attack) .

Answer the following question:
1. Search the web for news on computer security breaches that occurred during April-August 2017. Research one such reported incident (Excluding the May 2017 ransomware cyber-attack) . Prepare a report focusing on what the problem was, how and why it occurred and what are the possible solutions.
Length: Around 900 words

Part B : 10 Marks
1. Research the May 2017 ransomware cyber-attack on the web and prepare a report focusing on the following questions:
What was the problem?
Who were affected and how?
How was the attack carried out?
What could have been done to prevent the attack?

Length: Around 900 words

Rationale
This assessment task is based on the following topics discussed in the subject: the overview of Information security fundamentals, security threats, cryptography, malicious software, and operating system security.
The assessment task is aligned with the following learning outcomes of the subject:

be able to justify security goals and the importance of maintaining the secure computing environment against digital threats;
be able to explain the fundamental concepts of cryptographic algorithms;
be able to examine malicious activities that may affect the security of a computer program and justify the choice of various controls to mitigate threats.
be able to compare and contrast the security mechanisms of a trusted operating system with those used in a general purpose operating system;
Marking criteria
Assessment criteria
PART A : 10 marks
Assessable Components
HD
100% – 85%
DI
84% – 75%
CR
74% – 65%
PS
64% – 50%
FL
49% – 0

Search the web for news on computer security breaches that occurred during April-August 2017. Research one such reported incident (Excluding the May 2017 ransomware cyber-attack). Prepare a report focusing on what the problem was, how and why it occurred and what are the possible solutions.
1. Comprehensive report addressing all criteria. Evidence of in-depth research.
(Value: 95%)
2. Referenced a wide range of appropriate sources.
Referencing style correctly used.
(Value: 5%)

1. Comprehensive report addressing all criteria. Evidence of in-depth research. Minor omissions only.
(Value: 95%)
2. Referenced a range of appropriate sources. Referencing style correctly used. Minor errors only.
(Value: 5%)
1. Mostly well-researched and well-presented report addressing all criteria. Some omissions.
(Value: 95%)
2. Referenced a range of appropriate sources.
Referencing style correctly used. Some errors and omissions.
(Value: 5%)
1. Partially complete report addressing most of the criteria. Evidence of research. Some omissions.
(Value: 95%)
2. Referenced some appropriate sources.
Referencing style mostly correctly used. Some errors and omissions.
(Value: 5%)
1. Major omissions or incorrect answers.
(Value: 95%)
2. Either no evidence of literature being consulted or cited references irrelevant to the assignment set. Major errors in referencing style.
(Value: 5%)
Possible marks
10.0 – 8.5
8.4-7.5
7.49 – 6.5
6.49 –5.0
4.99 – 0
PART B: 10 marks
Research the May 2017 ransomware cyber-attack on the web and prepare a report focusing on the following questions:
What was the problem?
Who were affected and how?
How was the attack carried out?
What could have been done to prevent the attack?
1. Comprehensive report addressing all criteria. Evidence of in-depth research.
(Value: 95%)
2. Referenced a wide range of appropriate sources.
Referencing style correctly used.
(Value: 5%)

1. Comprehensive report addressing all criteria. Evidence of in-depth research. Minor omissions only.
(Value: 95%)

2. Referenced a range of appropriate sources. Referencing style correctly used. Minor errors only.
(Value: 5%)

1. Mostly well-researched and well-presented report addressing all criteria. Some omissions.
(Value: 95%)

2. Referenced a range of appropriate sources.

Referencing style correctly used. Some errors and omissions.
(Value: 5%)

1. Partially complete report addressing most of the criteria. Evidence of research. Some omissions.
(Value: 95%)

2. Referenced some appropriate sources.

Referencing style mostly correctly used. Some errors and omissions.
(Value: 5%)

1. Major omissions or incorrect answers.
(Value: 95%)

2. Either no evidence of literature being consulted or cited references irrelevant to the assignment set. Major errors in referencing style.
(Value: 5%)
Possible marks
10.0 – 8.5
8.4-7.5
7.49-6.5
6.49-5.0
4.99 – 0
Presentation
You are recommended to write the answers in a word document and submit it via Turnitin. You can also submit your document in pdf format as well.
Your answers to the questions should be precise but complete and informative.
Each question should be answered individually with the corresponding label to indicate the tasks completed e.g. Task 1 a.
APA reference style must be used throughout the document with the bibliography not counted in the page limit. APA referencing guide can be found in http://ift.tt/1MBH9H7
A cover page must be included and should contain relevant identifying information (Name, Student ID#, Subject Code, Session and Assessment Number).



CLICK HERE TO ORDER THIS PAPER………………………NO PLAGIARISM Get 100% Original papers from the writing expertsLogo CLICK HERE TO GET A PROFESSIONAL WRITER TO WORK ON THIS PAPER AND OTHER SIMILAR PAPERS, GET A NON PLAGIARIZED PAPER FROM OUR EXPERTS……

Comments

Popular posts from this blog

Netanel (1996) talks about the NIEP theory approach to copyright and the democratic paradigm. Explain the difference between these in your own words. Lessig (2008) talks about read-only (RO) and read/write (RW) culture. How can copyright facilitate both of these?

chapter one Introduction A ‘‘Largely Ignored Paradox’’ The u.s. supreme court has famously labeled copyright ‘‘the engine of free expression.’’1 Copyright law, the Court tells us, provides a vital economic incentive for the creation and distribution of much of the literature, commentary, music, art, and film that makes up our public discourse. Yet copyright also burdens speech. We often copy or build upon another’s words, images, or music to convey our own ideas effectively. We cannot do that if a copyright holder withholds permission or insists upon a license fee that is beyond our means. And copyright does not extend merely to literal copying. It can also prevent parodying, remolding, critically dissecting, or incorporating portions of existing expression into a new, independently created work. Consider The Wind Done Gone, a recent, best-selling novel by African American writer Alice Randall. Randall’s novel revisits the setting and characters of Margaret Mitchell’s classic Civil War...

1. Good time management for project managers includes initiating contact with key stakeholders only when there is a valid issue to deal with. -True -False

1. Good time management for project managers includes initiating contact with key stakeholders only when there is a valid issue to deal with. -True -False Click here for more on this paper ……. Click here to have a similar A+ quality paper done for you by one of our writers within the set deadline at a discounted 2. A project manager should identify a problem in terms of its alternate solutions so that team members can more easily reach a decision on how to solve the problem. -True -False 3. Networks are mutually beneficial alliances that are generally Click here for more on this paper ……. Click here to have a similar A+ quality paper done for you by one of our writers within the set deadline at a discounted governed by the law of: a Supply-demand b Brooks’s law c Reciprocity d A squeaky wheel e Risk-reward Click here for more on this paper ……. Click here to have a similar A+ quality paper done for you by one of our writers within the set deadline at a discounted 4...

How did life in the British colonies contribute to creating a unique American identity?

How did life in the British colonies contribute to creating a unique American identity? How do you see that identity manifested in modern American society? 200 to 300 words Click here for more on this paper ……. Click here to have a similar A+ quality paper done for you by one of our writers within the set deadline at a discounted Assignment status :  Solved by our Writing Team at EssayCabinet.com. MAKE YOUR ORDER