Identify vulnerabilities and threats pertaining

Assignment Help Computer Network Security
Reference no: EM133739296

Introduction to Cyber Security

Assessment - Malware Video Entry

Your Task

In this individual assessment, you will demonstrate your understanding of cyber security concepts as outlined in LO1 and LO2. You will create a video presentation focusing on a specific type of malware, exploring its characteristics, behavior, and potential impact on the IT infrastructure of organisations. Your video should contextualise the terminology associated with cyber security for diverse stakeholders in business (LO1) and identify vulnerabilities and threats relevant to the IT infrastructure of organisations (LO2). You have the freedom to choose two malware types discussed in class or conduct independent research to investigate a different variant. Through this assessment, you will not only showcase your knowledge of cyber security fundamentals but also showcase your ability to effectively communicate complex technical concepts to a diverse audience.

LO1: Contextualise the terminology associated with cyber security for diverse stakeholders in business.

LO2:  Identify vulnerabilities and threats pertaining to the IT infrastructure of organisations.

Assessment Description

In this assessment, you will demonstrate your ability to research, discuss and present information on two malware types of your choice. Your research must be supported by at least five references. Your video recording must be supported by a visual aid (presentation), which must include the following slide headings:

Introduction
Malware Overview
Malware #1 Characteristics
Impact on IT Infrastructure
Malware #1 Prevention and Mitigation
Malware #2 Characteristics
Impact on IT Infrastructure
Malware #2 Prevention and Mitigation
Similarities of Malware #1 & #2
Conclusion

Note: "Malware #1" and "Malware #2" should be replaced by the name of the actual malware types you choose.

Your video entry must include both non-technical and technical elements of the type of malware you talk about.

Assessment instructions for this assessment:

Read the ‘your task' and ‘assessment instructions' section of this document to fully understand the requirements of this assessment.
Choose and finalise which types of malware you will be talking about.
Create the visual aid (presentation) that will be supporting your video entry submission.
Create the ten (10) slide headings which must be included and are listed above.

Reference no: EM133739296

Questions Cloud

Matrix system for evaluating employee performance : You are an HR manager for Strathmore International. You are implementing a nine-box matrix system for evaluating employee performance
Conduct independent research to investigate : Conduct independent research to investigate a different variant. Through this assessment, you will not only showcase your knowledge of cyber security
Motivational theory from material to base your efforts : Choose motivational theory from the material to base your efforts around. Provide specifics on why this choice was made and how it fits food truck's philosophy
Explain the roles of people and information technology : How does Mercantile view quality? Explain the roles of people and information technology in achieving quality in the Mercantile organization.
Identify vulnerabilities and threats pertaining : Identify vulnerabilities and threats pertaining to the IT infrastructure of organisations and discuss and present information on two malware types
Hallway door and behind dented cans : The Certified Dietary Manager notices several items in the storeroom have been placed close to the hallway door and behind dented cans
How can you compensate for your weaknesses : What does this material suggest are the kinds of projects that would best suit you? How can you compensate for your weaknesses?
What are the internal and external factors that influence : What are the internal and external factors that influence an organization's recruitment strategy? How effectively are these factors being managed
How can corporate culture be changed : How should a corporation attempt to achieve synergy among functions and business units? How can corporate culture be changed?

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd