Skip to main content

. Search the web for news on computer security breaches that occurred during April-August 2017. Research one such reported incident (Excluding the May 2017 ransomware cyber-attack) .

Answer the following question:
1. Search the web for news on computer security breaches that occurred during April-August 2017. Research one such reported incident (Excluding the May 2017 ransomware cyber-attack) . Prepare a report focusing on what the problem was, how and why it occurred and what are the possible solutions.
Length: Around 900 words

Part B : 10 Marks
1. Research the May 2017 ransomware cyber-attack on the web and prepare a report focusing on the following questions:
What was the problem?
Who were affected and how?
How was the attack carried out?
What could have been done to prevent the attack?

Length: Around 900 words

Rationale
This assessment task is based on the following topics discussed in the subject: the overview of Information security fundamentals, security threats, cryptography, malicious software, and operating system security.
The assessment task is aligned with the following learning outcomes of the subject:

be able to justify security goals and the importance of maintaining the secure computing environment against digital threats;
be able to explain the fundamental concepts of cryptographic algorithms;
be able to examine malicious activities that may affect the security of a computer program and justify the choice of various controls to mitigate threats.
be able to compare and contrast the security mechanisms of a trusted operating system with those used in a general purpose operating system;
Marking criteria
Assessment criteria
PART A : 10 marks
Assessable Components
HD
100% – 85%
DI
84% – 75%
CR
74% – 65%
PS
64% – 50%
FL
49% – 0

Search the web for news on computer security breaches that occurred during April-August 2017. Research one such reported incident (Excluding the May 2017 ransomware cyber-attack). Prepare a report focusing on what the problem was, how and why it occurred and what are the possible solutions.
1. Comprehensive report addressing all criteria. Evidence of in-depth research.
(Value: 95%)
2. Referenced a wide range of appropriate sources.
Referencing style correctly used.
(Value: 5%)

1. Comprehensive report addressing all criteria. Evidence of in-depth research. Minor omissions only.
(Value: 95%)
2. Referenced a range of appropriate sources. Referencing style correctly used. Minor errors only.
(Value: 5%)
1. Mostly well-researched and well-presented report addressing all criteria. Some omissions.
(Value: 95%)
2. Referenced a range of appropriate sources.
Referencing style correctly used. Some errors and omissions.
(Value: 5%)
1. Partially complete report addressing most of the criteria. Evidence of research. Some omissions.
(Value: 95%)
2. Referenced some appropriate sources.
Referencing style mostly correctly used. Some errors and omissions.
(Value: 5%)
1. Major omissions or incorrect answers.
(Value: 95%)
2. Either no evidence of literature being consulted or cited references irrelevant to the assignment set. Major errors in referencing style.
(Value: 5%)
Possible marks
10.0 – 8.5
8.4-7.5
7.49 – 6.5
6.49 –5.0
4.99 – 0
PART B: 10 marks
Research the May 2017 ransomware cyber-attack on the web and prepare a report focusing on the following questions:
What was the problem?
Who were affected and how?
How was the attack carried out?
What could have been done to prevent the attack?
1. Comprehensive report addressing all criteria. Evidence of in-depth research.
(Value: 95%)
2. Referenced a wide range of appropriate sources.
Referencing style correctly used.
(Value: 5%)

1. Comprehensive report addressing all criteria. Evidence of in-depth research. Minor omissions only.
(Value: 95%)

2. Referenced a range of appropriate sources. Referencing style correctly used. Minor errors only.
(Value: 5%)

1. Mostly well-researched and well-presented report addressing all criteria. Some omissions.
(Value: 95%)

2. Referenced a range of appropriate sources.

Referencing style correctly used. Some errors and omissions.
(Value: 5%)

1. Partially complete report addressing most of the criteria. Evidence of research. Some omissions.
(Value: 95%)

2. Referenced some appropriate sources.

Referencing style mostly correctly used. Some errors and omissions.
(Value: 5%)

1. Major omissions or incorrect answers.
(Value: 95%)

2. Either no evidence of literature being consulted or cited references irrelevant to the assignment set. Major errors in referencing style.
(Value: 5%)
Possible marks
10.0 – 8.5
8.4-7.5
7.49-6.5
6.49-5.0
4.99 – 0
Presentation
You are recommended to write the answers in a word document and submit it via Turnitin. You can also submit your document in pdf format as well.
Your answers to the questions should be precise but complete and informative.
Each question should be answered individually with the corresponding label to indicate the tasks completed e.g. Task 1 a.
APA reference style must be used throughout the document with the bibliography not counted in the page limit. APA referencing guide can be found in http://ift.tt/1MBH9H7
A cover page must be included and should contain relevant identifying information (Name, Student ID#, Subject Code, Session and Assessment Number).



CLICK HERE TO ORDER THIS PAPER………………………NO PLAGIARISM Get 100% Original papers from the writing expertsLogo CLICK HERE TO GET A PROFESSIONAL WRITER TO WORK ON THIS PAPER AND OTHER SIMILAR PAPERS, GET A NON PLAGIARIZED PAPER FROM OUR EXPERTS……

Comments

Popular posts from this blog

Netanel (1996) talks about the NIEP theory approach to copyright and the democratic paradigm. Explain the difference between these in your own words. Lessig (2008) talks about read-only (RO) and read/write (RW) culture. How can copyright facilitate both of these?

chapter one Introduction A ‘‘Largely Ignored Paradox’’ The u.s. supreme court has famously labeled copyright ‘‘the engine of free expression.’’1 Copyright law, the Court tells us, provides a vital economic incentive for the creation and distribution of much of the literature, commentary, music, art, and film that makes up our public discourse. Yet copyright also burdens speech. We often copy or build upon another’s words, images, or music to convey our own ideas effectively. We cannot do that if a copyright holder withholds permission or insists upon a license fee that is beyond our means. And copyright does not extend merely to literal copying. It can also prevent parodying, remolding, critically dissecting, or incorporating portions of existing expression into a new, independently created work. Consider The Wind Done Gone, a recent, best-selling novel by African American writer Alice Randall. Randall’s novel revisits the setting and characters of Margaret Mitchell’s classic Civil War

Explain why HAMILTON is considered “a cultural monument?”

  Module 7: Theatre Now: Steps Toward Diversity Chapter Questions Read Chapter 9 “Musicals of the Twenty-First Century” (pages 244 to 246) and Chapter 10 (pages 247 to 260) in your textbook. Choose only 5 of these questions to answer. Write your answers in your own words; if you choose to quote from the textbook, remember to identify the source. Question # Chapter Questions 1 9 Explain how Broadway musicals have changed in the 21st century. 2 9 Explain why HAMILTON is considered “a cultural monument?” 3 10 Identify the current focus/topics of the American theatre’s social awareness. 4 10 Give an example of how current theatre is addressing inequality in each of these areas: (a) gender and sexuality (b) racism (c) access to theatre for people with disabilities 5 10 How has theatre moved from its pre-1960s attitude that plays must not be open about the Love that dare not speak its name? [This expression was first used by Lord Alfred Douglas in his 1894 poem, “Two Loves” written in refere

CBS Undercover Boss website

  Go to the CBS   Undercover Boss   website and search for a full episode of the show. Imagine you are the CEO of the company in the selected episode.  please do this with 2 pages Provide a detailed comparison of two job positions from the episode. Perform a job analysis of each position. Provide a clear, detailed description of your method of collecting the information for the job analysis. Examples include one-on-one, interview, or survey. Create a detailed job description from the two positions you analyzed. Provide clear, conclusive rationale for why the job analyses and job descriptions comply with state and federal regulations. Support your propositions, assertions, arguments, or conclusions with at least three credible, relevant, and appropriate sources synthesized in a coherent analysis. Cite each source on your source list at least once within your assignment. For help with research, writing, and citation, access the  library  or review  library guides . Write clearly and conc