Reference no: EM133850397 , Length: word count:1000
IoT, Cloud and Digital Infrastructure Protection
Assessment Task - Case report - cybersecurity concerns of digital infrastructures.
Learning Outcome 1: Assess the risks, threats and vulnerabilities associated with network and digital infrastructure with an emphasis on remote access and protection.
Learning Outcome 2: Evaluate cybersecurity tools and methodologies to protect digital infrastructure, including the Internet of Things (IoT), cloud networks, and other extended computing networks. Get Trusted Assignment Writing Help Now!
Assessment Task
In groups of 3-4 students, produce a 1000-word report that investigates the potential cybersecurity issues of an organisation's proposed digital infrastructure.
Please refer to the Instructions section below for details on how to complete this assessment task.
Context
Rapid technological growth of interconnected devices and cloud technologies has brought immense benefits but also introduced cyber threats and vulnerabilities to organisations. As technology progresses, it becomes essential for organisations to protect their network and digital infrastructure from cyber threats by employing proactive security controls such as AI protection systems, zero trust implementation, and protecting against cloud and IoT Malware while also providing educational materials and awareness campaigns.
This assessment task will evaluate your understanding of IoT and cloud technologies along with their associated risks and your ability to propose effective cybersecurity measures.
Instructions
To complete this assessment task, you will need to apply your existing knowledge of IoT and cloud technologies to assess the cybersecurity concerns associated with the network and digital infrastructure of an organisation.
To complete this assessment task successfully, you must follow the steps outlined below:
Form and register a group.
Form a group of 3-4 students. Send a registration email to the learning facilitator before the registration deadline. Note: the deadline for team registration is 11:45 pm AEST Friday, end of Module 6. Please contact the learning facilitator immediately if you are unable to find a group.
The registration email must be sent by a group member with the subject line "[ICD542] Team Registration". In the body of that email, please list all the group members' names and student ID numbers.
After the registration deadline, those students who are not in a group will be allocated to groups by the learning facilitator.
Please refer to the Assessment task 2 and 3 Group Formation Guidelines in the Assessment Section on Blackboard for more information.
Review the Case Study.
Access the case study from the learning facilitator in Module 6.
Carefully review the case study to understand the context and requirements related to potential security concerns for the organisation's digital infrastructure.
Complete a group report (1000 words)
Based on the provided case study, analyse and present findings on the cybersecurity concerns of a specific organisation's digital infrastructure. You must also cite at least three (3) sources using APA referencing 7th edition guidelines to support your responses. The sources cited must be included in your reference list.
The Report must contain the following parts:
Introduction (approx. 200 words):
Define the objectives and structure of your report, outlining its purpose and structure.
Describe the risks, threats and vulnerabilities faced by the digital infrastructure related to the case study.
Explain how these potential risks, threats and vulnerabilities might impact the digital infrastructure for this case study.
Rationalise the importance of protecting IoT, cloud, and digital infrastructures.
Research any recent IoT and cloud cybersecurity attacks and defences on a similar organisation and the required responses with statistical support for their response efforts.
Body (approx. 600 words):
Investigate the efficacy of various security requirements in protecting an IoT and cloud environment for this case study.
Evaluate the various cybersecurity tools and methodologies available to protect the organisation's network and digital infrastructure regarding IoT and cloud technologies.
Articulate the importance of taking adequate security measures in IoT and cloud environments, such as using AI protection systems, implementing zero trust solutions, protecting against cloud malware attacks and providing educational and awareness programs.
Determine best practices for mitigating security risks in IoT and cloud environments to guard against future external threats, such as:
IoT Device Security: Address the significance of maintaining IoT devices by updating security patches, implementing strong authentication mechanisms, and conducting regular security audits.
Cloud Security Measures: Define the importance of secure authentication, encryption and access control mechanisms within cloud platforms.
Monitoring and Detection: Examine the importance of intrusion detection systems to quickly detect security breaches in IoT and cloud environments.
Conclusion (approx. 200 words):
Summarise your findings and proposed solutions.
Reference List:
Include all sources cited using the APA style guidelines.
Appendix:
Include a copy of the completed group contract, signed and dated by all group members.
Referencing
It is essential that you use the current APA style for citing and referencing the sources that you use.