Reference no: EM133017802
Cybersecurity (Threat Model Report)
Task Summary
The goal of assessment 2 (A2) is to identify threats/vulnerabilities in the case scenario described in the associated file, Assessment Initial Case Scenario.docx (page#5). Not all threats/vulnerabilities you "discover" are in the initial case scenario. The scenario discusses some elements of the business that are needing mitigation, but you will need to also "discover" other threats/vulnerabilities.
The word count for this assessment is 1,500 words (±10%), not counting tables or figures. Tables and figures must be captioned (labelled) and referred to by caption (note that publishers do not guarantee tables and figures to be placed the same order or location as in your article). Caution: Items without a caption may be treated as if they are not in the report.
DFD (Data Flow diagram) Requirements
The DFD must relate to the business described in the initial case scenario. Remember, the DFD is the first step in the risk analysis, but it is not the main output of the assessment. The main output is the categorised threats, see below.
For the DFD, you need at least a context diagram and a level-0 diagram (see example attached). You can include further levels if you feel they are needed to show a threat boundary, but this is not necessary. The level-0 diagram (and further level diagrams, if needed) must not break the rules for proper DFD formation. And the DFDs (excluding the context diagram) must have labelled threat boundaries.
Threat Discovery
The main output of A2 should be a set of no less than 10 threats or vulnerabilities that need mitigation in the organisation. You will discover these with the help of the DFD and the threat boundaries.
The main threat for this assessment resembles a real-world attack. You need to develop a brief, factual overview of the real-world attack (web links can count as references here since the attack might not yet be covered academically). You are required to reference suggested mitigations, or costs in the real-world attack, this will help enormously with both A2 and A3 and will be taken into consideration when marking. Note carefully that any explanation of the real-world case is based on real information/data, not speculation or simulated "discovery".
You can make assumptions, but the report is written from the point of view of a consultant who has made "discoveries" from their investigations. In the simulation you may gather needed information from stakeholders. Assessment markers are aware that the technical information "discovered" by you might not be 100% accurate in all details. However, your discoveries should be somewhat realistic.
4 Reference Requirement (6 quality references)
5 Report Structure & Format
The report should have the following heading structure.
Introduction
Case study/Scenario
Cyber threats associated in the case
Context diagram
Level-0 diagram
Trust Boundaries
Conclusion
References
Attachment:- Threat Model Report.rar