Reference no: EM133541547
Cyber Security
Assignment - Investigation into Cyber Security Countermeasures
Learning Outcome 1: Propose appropriate countermeasures to address contemporary threats and vulnerabilities
Learning Outcome 2: Evaluate the ethical and legal issues associated with information security and analyse their implications
Situation:
The US Government is proposing a cyber security labelling program for smart devices. The program is expected to provide consumers with information about the security of their smart devices. There has been numerous opinions and viewpoints on the usefulness and effectiveness of such a model. The Minister for Cyber Security in Australia has requested that. you analyse the proposed program as to whether it would be an effective strategy for
Australia to implement.
Task:
To complete the assessment successfully you must:
1. Identify and justify the threat(s) that such a program could mitigate to individuals. Each identified threat (that the program could mitigate) must be appropriately supported with contemporary evidence, logical reasoning and justification.
2. Evaluate the effectiveness of such a program as a countermeasure for individuals. Critique whether such a countermeasure would improve the cyber security posture for end-users?
3. Evaluate the ethical and/or legal challenges that may arise from the proposed program.
Your final submission for this assessment must be a Panopto video and the accompanying
Microsoft PowerPoint slides. Your submission is not complete until both are submitted.
Tips
- You are encouraged to refer to and embed content from sources such as ASD Cyber. OWASP Top Ten, NIST, Australian Cyber Security Centre, US Cert, Deloitte Cyber Reports, and any other Government or corporate cyber security centric reports.
- The language and explanations used should be professional, technical and refer to specific technologies, standards, procedures and best practices.
- The task will require you to consider the effectiveness of current standards and/or the processes used to support end-users at the moment.
|
Which piece of legislation was essential for maintaining
: Which piece of legislation was essential for maintaining the balance of power between North and South in the early nineteenth century?
|
|
Discuss the united states exited wwii as one of the most
: The United States exited WWII as one of the most powerful countries in the world. Some could argue that this could not have happened without our victory
|
|
Influence of age in health care from patients perspective
: Write an essay on the Stages-of-Life and the influence of age in health care from a patient's perspective.
|
|
What might this say about the later 20th century development
: Do ethnic divisions in the early 20th century West run deeper than class divisions? What might this say about the later 20th century development
|
|
Evaluate the ethical and legal challenges
: CSI6199.3 Cyber Security, Edith Cowan University Assignment - Investigation into Cyber Security Countermeasures - Evaluate the effectiveness of such a program
|
|
Identify learning theory behavioral or cognitive
: Identify a learning theory (CONSTRUCTIVISM)-behavioral or cognitive, and describe the related domains, outcomes, styles, and activities
|
|
Examine the invoices looking for suspicious characteristics
: Examine invoices looking for suspicious characteristics. Look for items on invoice that compensate for suspicious items identified in query of vendor database.
|
|
Discuss implications of these statements to your practice
: Discuss the implications of these statements to your practice, giving examples. Identify conflicts and issues encountered in the examples.
|
|
Which is really a cover sheet with names of each team member
: ACCT 503- Which is really a cover sheet with the names of each team member, the course, the date, your instructor's name, and the title for the project.
|