Exploring cyber security characteristics & potential impact

Assignment Help Computer Networking
Reference no: EM133741743 , Length: 8 minutes

Introduction to Cyber Security

Assessment - Malware Video Entry

Your Task

In this individual assessment, you will demonstrate your understanding of cyber security concepts as outlined in LO1 and LO2. You will create a video presentation focusing on a specific type of malware, exploring its characteristics, behavior, and potential impact on the IT infrastructure of organisations. Your video should contextualise the terminology associated with cyber security for diverse stakeholders in business (LO1) and identify vulnerabilities and threats relevant to the IT infrastructure of organisations (LO2). You have the freedom to choose two malware types discussed in class or conduct independent research to investigate a different variant. Through this assessment, you will not only showcase your knowledge of cyber security fundamentals but also showcase your ability to effectively communicate complex technical concepts to a diverse audience.

LO1: Contextualise the terminology associated with cyber security for diverse stakeholders in business.

LO2:  Identify vulnerabilities and threats pertaining to the IT infrastructure of organisations.

Assessment Description

In this assessment, you will demonstrate your ability to research, discuss and present information on two malware types of your choice. Your research must be supported by at least five references. Your video recording must be supported by a visual aid (presentation), which must include the following slide headings:

Introduction
Malware Overview
Malware #1 Characteristics
Impact on IT Infrastructure
Malware #1 Prevention and Mitigation
Malware #2 Characteristics
Impact on IT Infrastructure
Malware #2 Prevention and Mitigation
Similarities of Malware #1 & #2
Conclusion

Note: "Malware #1" and "Malware #2" should be replaced by the name of the actual malware types you choose.

Your video entry must include both non-technical and technical elements of the type of malware you talk about.

Assessment instructions for this assessment:

Read the ‘your task' and ‘assessment instructions' section of this document to fully understand the requirements of this assessment.
Choose and finalise which types of malware you will be talking about.
Create the visual aid (presentation) that will be supporting your video entry submission.
Create the ten (10) slide headings which must be included and are listed above.

 

Reference no: EM133741743

Questions Cloud

Analyse the current user experience of the social media : Analyse the current user experience of the social media platform, identifying strengths, weaknesses, and areas for improvement. Utilise your understanding
What are all of lucias options if bob declines to do repairs : Bob, the landlord, refuses to fix a small gap in a windowsill in the basement window. What are all of Lucia's options if Bob declines to do the repairs?
Knowledge of cyber security fundamentals : Knowledge of cyber security fundamentals but also showcase your ability to effectively communicate complex technical concepts to a diverse audience
What causes postural instability in the patient : MSN 570 United States University- What causes postural instability in this patient? Compare and contrast pyramidal vs. extrapyramidal.
Exploring cyber security characteristics & potential impact : Understanding of cyber security concepts, Exploring its characteristics, behavior, and potential impact on the IT infrastructure of organisations
What is the experimental approach to testing the hypothesis : What is the experimental approach to testing the hypothesis? What was measured? What were the important quantitative results?
Service transition - release and deployment management : Service and Operations Management in IT - Service Transition - Release and Deployment Management Discuss, with specific recommendations -
Write about the disorder including causes and effect on body : HIM 205 ashford university- Write about the disorder, including the causes and effects on the body. Make sure to discuss treatments and long-term issues.
Describe the procedures and methods of data collection : Describe the procedures and methods of data collection, measures/instruments used, the participants and how they were selected and statistical techniques used.

Reviews

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd