Plan and implement operational assurance programs

Assignment Help Other Subject
Reference no: EM132897715 , Length: word count:4500

BN223 Cyber Security Principles - Melbourne Institute of Technology

Assessment - Cybersecurity for critical infrastructures

Learning outcome 1: Understand the common types of threat and vulnerabilities to cyber systems and data

Learning outcome 2: Demonstrate an understanding of the tactical and strategic means of detecting and monitoring anomalous activity

Learning outcome 3: Understand physical security impacts on the enterprise information infrastructure

Learning outcome 4: Plan and implement operational assurance programs

Assignment Description

Tasks:

There are two parts to this assignment, i.e. part A and part B.

A. Write a group report onone of the following topics listed at Part A. Your tutor will allocate you a group number (maximum five students in a group) and your topic.

B. Demonstration. Make a group video demonstration of threecomputer security tools.

Part A description:

In this part, you are required to select any one of the listed applications and write a group report including the following sections:
» Historyand background of the selected application.
» Literature review about your topic.
» Present the security challenges in implementing the application in a IoT environment based on the referred research papers.
» Current cyber security threats and challenges in critical infrastructures protection.
» Address the securityissues.
» Analyse and review the existing security techniques and identify among them the best technique.
» Analyse the challenges and Propose/ Reviewsome solutions that can be taken to overcome these challenges.
» Examine the security tools based on your selected topic.
» Investigate the relevant computer security tools and techniques that can be used to address the challenges of the above case.
» Propose/ Review some solutions that can be taken to overcome these challenges.
» Presents an approach allowing to implement, manage and maintain cyber security program for Instrumentation and Control (I&C) systems of your selected application.

The list of applications are given below:
» Smart home
» Wearables
» Smart City
» Smart grids
» Industrial internet
» Connected car. ...
» Connected Health (Digital health/Telehealth/Telemedicine).
» Smart retail.
» Smart supply chain
» Smart farming

Instructions:
Prepare your article as below
1. Go to the IEEE website and download the WORD template for the format.
2. Another link for the template:
3. Read and familiarise yourself with the instructions carefully.
4. Prepare a paper using the IEEE format and the example attached. Follow the template if there are any confusions. Also, refer to the link below to have ideas about how to start (see section 6).
5. Complete the assignment (minimum 6 and maximum 19 pages) including all the sections below. The number of words will be counted thoroughly and you must keep the minimum number of words to avoid any penalties.
» Title (maximum 15 words)
» Abstract (200 - 250 words)
» Introduction (800 - 2000 words)
» Literature Review (1000 - 3000 words)
» Main body (1000 - 3000 words)
» Conclusion (200 - 300 words)
» Future Works (150 - 300 words)
» References (minimum 10 references)
6. The article must be a ‘Review' article, including at least 5 references and not more than 25.
7. Strictly follow the IEEE reference format for in-body citations and the references section.
8. See the attached files for guidance on how to prepare a review paper. You can also find thorough instructions from IEEE and the Internet.
9. Contents must include:
» History and background of the topic
» Challenges and drawbacks
» Examine the security tools based on your selected topic.
» Possible options (solutions) and future research areas proposed
» Include a minimum of two (2) figures to show the overall concept and summarised overview of the topic from the review of minimum 10 - 15 (but not limited to) papers
10. Remember to strictly follow the template and the instructions above to avoid penalties.

Part B description:

Make a group video demonstration of threesecurity tools Prepare slides (between 8 - 12 slides) for your video demonstration. As a team of five, create a 5-8 minutes video demo using Zoom application (along with presenters' video) addressing the following tasks:
1. Analyse and discuss the importance of your selected computer security tools
2. Perform three selected security tools
3. Identify and discuss the strengths and weakness of each computer security tools
4. Which computer security would you recommend? Justify your recommendation.

Attachment:- Cyber Security Principles.rar

Reference no: EM132897715

Questions Cloud

What is the firm net cash flow : A firm has net income of $5 million. Assuming that depreciation of $1 million is its only noncash expense, what is the firm's net cash flow
What impact does this have on net cash : A firm has inventories of $2 million for the previous year and $1.5 million for the current year. What impact does this have on net cash provided by operations
How learn in a supervised mode and in an unsupervised mode : ANN can be used for both supervised and unsupervised learning. Explain how they learn in a supervised mode and in an unsupervised mode
Find tourism-related establishments : Surf the Internet and look up the case of Melva Nath versus Shangri la Manila Hotel, a deluxe hotel in Makati City. Melva Nath was the former director of rooms
Plan and implement operational assurance programs : Demonstrate an understanding of the tactical and strategic means of detecting and monitoring anomalous activity and Plan and implement operational assurance
What is its resulting retained earnings balance : In the current year, its net income is $2.5 million. If it pays $1 million in common dividends in the current year, what is resulting retained earnings balance
What is a forensic read blocker : How do identify some situations where it makes sense to use the hardware versions or when it makes sense to use software versions?
Discuss the future or emerging technologies : Discuss how IT can leverage innovative technologies such as social media, big data and business intelligence to provide value to the business
What was result of implementing cloud computing : Describe the organization's Cloud Computing implementation and the benefits realized from the implementation. What was result of implementing Cloud Computing.

Reviews

Write a Review

Other Subject Questions & Answers

  Cross-cultural opportunities and conflicts in canada

Short Paper on Cross-cultural Opportunities and Conflicts in Canada.

  Sociology theory questions

Sociology are very fundamental in nature. Role strain and role constraint speak about the duties and responsibilities of the roles of people in society or in a group. A short theory about Darwin and Moths is also answered.

  A book review on unfaithful angels

This review will help the reader understand the social work profession through different concepts giving the glimpse of why the social work profession might have drifted away from its original purpose of serving the poor.

  Disorder paper: schizophrenia

Schizophrenia does not really have just one single cause. It is a possibility that this disorder could be inherited but not all doctors are sure.

  Individual assignment: two models handout and rubric

Individual Assignment : Two Models Handout and Rubric,    This paper will allow you to understand and evaluate two vastly different organizational models and to effectively communicate their differences.

  Developing strategic intent for toyota

The following report includes the description about the organization, its strategies, industry analysis in which it operates and its position in the industry.

  Gasoline powered passenger vehicles

In this study, we examine how gasoline price volatility and income of the consumers impacts consumer's demand for gasoline.

  An aspect of poverty in canada

Economics thesis undergrad 4th year paper to write. it should be about 22 pages in length, literature review, economic analysis and then data or cost benefit analysis.

  Ngn customer satisfaction qos indicator for 3g services

The paper aims to highlight the global trends in countries and regions where 3G has already been introduced and propose an implementation plan to the telecom operators of developing countries.

  Prepare a power point presentation

Prepare the power point presentation for the case: Santa Fe Independent School District

  Information literacy is important in this environment

Information literacy is critically important in this contemporary environment

  Associative property of multiplication

Write a definition for associative property of multiplication.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd