Reference no: EM133929503 , Length: Word Count:3000
Question 1: Analyse and evaluate procedures, tools and languages required to implement secure and reliable systems.
Question 2: Apply procedures and methodologies of cybersecurity in information security and secure systems development and analysis, and critically discuss the challenges facing cybersecurity practitioners and managers.
Where you are asked to submit an individual piece of work, the work must be entirely your own. The safety of your assessments is your responsibility. You must not permit another student access to your work at any time during the inception, design or development of your coursework submission and must take great care in this respect.
Where referencing is required, unless otherwise stated, the Harvard referencing system must be used (see your Programme Guide or university library website).
Assessment Task
In this assignment you are required to produce a research report of no more than 3000 words in length. Within this report you will review a number of topics on cyber resilience, and you will also critically review industry standard software. Your report must make effective use of literature and be presented with Harvard Referencing.
Section 1 covers learning outcome LO2. You are required to research and critically evaluate a number of topics that inform the design and implementation of secure and resilient systems. This section will consist of a number of sub-topics (see guidance below) and should be approximately 2000 words in length.
Section 1 Topics Guide Word Count Potential Marks
Authentication and Authorisation
Configuration management
Sensitive data and Cryptography
Exception management and Parameter manipulation
Auditing and logging
Your discussion of these topics should be well structed and presented under an appropriate heading. You should present references to the academic literature in each section. In your consideration of each topic you should critically evaluate the literature and draw conclusions that are illustrated with examples for each topic. You may also note the importance of each topic to the development of resilient programs linking this to principles, standards, laws and policies in addition to the potential security flaws within software that provide said service and the importance of implementing the topic to a system/program. It is not enough to regurgitate or summarise material found in literature.
Section 2 (40% weighting) covers learning outcome LO4 (and will consist of a developmental and critical analysis of software development processes (Agile vs Waterfall for example) investigating the security features and the potential flaws prevalent within the system in addition to how these can overcome. Get expert online assignment help in the USA.
For section two you are to prepare a developmental, critical analysis of the following: "How developing software systems following a software development lifecycle could introduce security flaws". You should investigate the security features and the potential flaws prevalent within the system and make recommendations as to how these may be overcome.
Section 2: A developmental,
critical analysis of Software Development Lifecycles.
Structure and Referencing
A further 10 marks are available for the structure and use of referencing (quality of references and adherence to Harvard Style). You should make effective used of subheadings and referenced. A reference list presented must be included at the end of the research paper. You are to reference relevant conferences, journal articles.
Submission Requirements
You are required to submit your paper as a single PDF file via the Canvas submission portal.
Harvard referencing.