SlideShare a Scribd company logo
Student Name:
Student ID:
Max
Mark
Final
Mark
Comments
Not
done
Poor
(F)
Average
(P)
Good
(C)
Very Good
(D)
Excellent
(HD)
NOTE TO MARKERS:
30 0.00
Task 1 12 Task 1 Task 1
Identify the most critical components of the university's
information system - the critical information assets.
3 0
Identify critical components -
x
Identify the critical components of the information system using
correct methods. Provide sufficient arguments
to support the results.
Identify what threats the BYOD policy may bring to the
identified critical assets.
3 0
Identify BYOD policy threats -
x
Correctly identify threats related to BYOD policy. Sufficient
explanation is provided.
Identify potential vulnerabilities of each asset against the
identified threats.
3 0
Identify vulnerabilities of assets -
x
Correctly identify the vulnerabilities associated with the
identified assets. Sufficient explaination is provided.
Assess the risk to the university's information system. 3 0
Risk assessment - Correctly carry the risk assessment using
either quantitative or qualitative risk assessment process.
Document
the result correctly with sufficient explanation.
Sub Total: 0
Task 2 10 Task 2
Not
done
Poor
(F)
Average
(P)
Good
(C)
Very Good
(D)
Excellent
(HD)
Task 2
Clearly explains the working principle of the certificate-
based authentication.
3 0
Explain certificate based authentication -
x
The explanation is correct and captures the working principle of
the certificate based authentication
mechanism.
Compare and contrast the certificate-based authentication
and password-based authentication.
3 0
Compare certificate and password authentication -
x
Clearly and sufficiently shows the pros and cons of each
authentication mechanism.
Correctly identify and highlight the useful features of the
certificate-based authentication for BYOD policy.
3 0
Identify features of certificate based authentication -
x Correctly identify and highlight the useful features of the
certificate-based authentication for BYOD policy.
Quality of references. 1 0
Quality of references -
x The reference source is correctly cited according to the
citation style. The source quality is high.
Sub Total : 0
Task 3 8 Task 3
Not
done
Poor
(F)
Average
(P)
Good
(C)
Very Good
(D)
Excellent
(HD)
Task 3
Correctly identify the characteristics of a Spam and
Spamming act.
2 0
Identify Spam and Spamming act -
x
The Spam Act 2003 prohibits the sending of unsolicited commer
cial electronic messages—known as
spam—
with an Australian link. A message has an Australian link if it o
riginates or was commissioned in
Australia, or originates overseas but was sent to an address
accessed in Australia. Students should define the
Provide three representative examples of Spams 3 0
Three examples of Spam -
x
The examples are correct with sufficient explaination according
to the Spam Act 2003. If no explaination is
given, half of the total mark is awarded as the maximum.
Spam handling instruction 3 0
Spam handling instruction -
x
The instruction is correct, sufficient, clear, consised and takes
into account to the assignment context. If
external reference is used, provide the source.
Sub Total: 0
TOTAL 30 0.00
Less late Penalty (10% per day)
No of Days 0 0.00
TOTAL (with LATE PENALTY) 0% 0.00
HD: High Distinction, D: Distinction, C:Credit, P:Pass, F:Fail
CMP71001 - Assignment 2
Grade Rubric
HD
85+
D
75+
C
65+
P
50+
F The project is incomplete and/or work well below industry
standards. Functionality is poor or absent. Failure to meet
project specifications. Little or no innovation. A large
volume of work would be required to bring the project up to
industry standards. Insufficient effort or competence is
demonstrated to achieve a passing grade.
Other Comments -
The project is realised to a very high professional standard.
Technically it is fully functional and meets all specifications. It
demonstrates high levels of creativity and
innovation both in terms of its function and usability. It has
been carefully quality controlled to ensure full functionality and
that no errors are evident.
The project is realised to a high professional standard, with a
good level of functionality and meets most specifications. It
demonstrates occasional levels of creativity and
innovation. While there may be a few errors, these are of a
minor nature. Generally the product would be well-regarded by
industry standards.
The project is realised to an acceptable professional standard
with generally adequate levels of functionality and generally
meets specifications, although there are a number
of problems evident. There is evidence of creativity and
innovation although these are not sustained throughout. Further
development could have improved this product.
Generally it would not be highly regarded by industry and
would need more work before release, but still shows good
developing competence.
The project was completed, but to a less than acceptable
industry standard. Functionally it was problematic and some
aspects did not meet required specifications. There is
little evidence of creativity or innovation in the project.
Additional work would be required to bring this up to industry
standards, but overall it demonstrates sufficient
competence to merit a passing grade.
1
School of Business and Tourism
Unit Cybersecurity
Unit code CMP71001
Assignment 2 Security consultation report and guideline.
Due Date Sunday 23:59:59 of the last study week.
Learning
Outcomes 3 – 6
Graduate
Attributes 3, 4 & 5
Weight 30% of overall unit assessment
Suggestion This assignment is developmental and cumulative.
You are strongly advised to start
doing this assignment from Week-6 in your study. Leaving
your starting date to
the week before the due date is a very poor strategy for success
in the unit.
Marks A marking scheme will be posted on MySCU to help you
direct your efforts
successfully.
Task Description
You are hired by Southern Cross University as a cybersecurity
consultant to work on a
security program to address the contemporary and emerging
risks from the cyber threats
the university is facing. Your tasks are the following:
is currently using a password based
authentication system
to control the user access to the university’s information
system. However, the
Bring Your Own Device (BYOD) policy recently implemented
by the university
has raised some security concerns. As a security consultant,
assess the risk from
the BYOD policy to the university's information system.
you suggest the
university to replace the current password-based authentication
scheme with a
Certificate-Based Authentication. To justify your suggestion,
write a technical
report to explain the working principle of the Certificate-Based
Authentication
mechanism and discuss why the university should use the
mechanism in this case
by comparing it with the password-based authentication
mechanism. Use figure
when necessary to support your answers.
cybersecurity threats facing
by the university. Use the Spam Act 2003 and available online
resources to develop
a guideline for the university students and staff to combat with
the threat. The
guideline will include the following:
o Definition of spam and its distinctive characteristics.
2
o At least three (3) real examples of spams showing the spam
characteristics.
o An instruction to the users of how to recognise and safely
handle a spam.
o An instruction to the IT administrator of how to minimize the
spam threat.
Assignment-2 guideline
Task 1: BOYD risk assessment
To complete this task, use the following guidelines:
information system - the
critical information assets.
identified critical assets.
identified threats.
either quantitative or
qualitative risk assessment approach and document the risk
assessment process.
Task 2: Certificate-based Authentication
To complete this task, use the following guidelines:
principle, pros and cons of
the Certificate-based Authentication mechanism. Document all
reference sources.
the Certificate-based
Authentication mechanism. Compare the certificate-based
authentication against
the password-based authentication and highlight the features
you think are useful
for combating the threats from the BYOD policy.
resources. Use your
own words and figures. Acknowledge all reference sources.
Task 3: Anti-spam guideline
To complete this task, use the following guidelines:
document is available
at: https://www.legislation.gov.au/Details/C2016C00614. The
Act will help you to
define what type of electronic messages should be treated as
spams, what are the
distinctive characteristics of a spam and what act is considered
as spamming?
own spams as examples.
the development of
spam handling instructions. The instructions should be clear,
concise and precise.
Assignment-2 Marking Rubric
A spreadsheet that will be used for the marking of your site is
provided (co-located with
this assignment specification) on MySCU to itemise exactly
what tutors will be looking at
in relation to marking your assignment. It contains a detailed
breakdown of the marking
criteria for this assignment. I strongly suggest you peruse this
spreadsheet.
3
Submission Format
When you have completed the assignment, you are required to
submit your assignment in
the PDF/DOC format. The file will be named using the
following convention:
filename = FirstInitialYourLastName_CMP71001_A2.pdf
(i.e. FJones_CMP71001_A2.pdf)
Note to IBS students: Please check with your local lecturer/tutor
the submission
requirements for your assignments. Typically, they will be
different from on-shore students
of Southern Cross University.
Original work
It is a University requirement that a student’s work complies
with the Academic Policy,
Chapter 4.20 on Student Academic Integrity. It is a student’s
responsibility to be familiar
with the Policy.
Failure to comply with the Policy can have severe consequences
in the form of University
sanctions. For information on this Policy please refer to Chapter
4.20 on Student Academic
Integrity at the following website:
http://www.scu.edu.au/governance/academicboard/policy/
As part of a University initiative to support the development of
academic integrity,
assessments may be checked for plagiarism, including through
an electronic system, either
internally or by a plagiarism checking service, and be held for
future checking and
matching purposes.
Retain duplicate copy
Before submitting the assignment, you are advised to retain
electronic copies of original
work. In the event of any uncertainty regarding the submission
of assessment items, you
may be requested to reproduce a final copy.
School Extension Policy
In general, I will NOT give extension unless where there are
exceptional circumstances.
Students wanting an extension must make a request at least 24
hours before the assessment
item is due and the request must be received in writing by the
unit assessor or designated
academic. Extensions within 24 hours of submission or
following the submission deadline
will not be granted (unless supported by a doctor’s certificate or
where there are exceptional
circumstances – this will be at unit assessor’s discretion and
will be considered on a case
by case basis). Extensions will be for a maximum of 48 hours
(longer extensions supported
by a doctor’s certificate or alike to be considered on a case by
case basis).
A penalty of 5% of the total available grade will accrue for each
24-hour period that an
assessment item is submitted late. Therefore, an assessment
item worth 20 marks will have
1 marks deducted for every 24-hour period and at the end of 20
days will receive 0 marks.
Students who fail to submit following the guidelines in this Unit
Information Guide will be
deemed to have not submitted the assessment item and the
above penalty will be applied
http://www.scu.edu.au/governance/academicboard/policy/
4
until the specified submission guidelines are followed.
Marks and Feedback
All assessment materials submitted during the semester will
normally be marked and
returned within two weeks of the required date of submission
(provided that the assessment
materials have been submitted by the due date).
Marks will be made available to each student via the MySCU
Grade book.

More Related Content

Similar to Student NameStudent IDMax MarkFinal Mark.docx

erm Paper Penetration TestingDue Week 10 and worth 120 points.docx
erm Paper Penetration TestingDue Week 10 and worth 120 points.docxerm Paper Penetration TestingDue Week 10 and worth 120 points.docx
erm Paper Penetration TestingDue Week 10 and worth 120 points.docx
mealsdeidre
 
Cmgt 433 Entire Course NEW
Cmgt 433 Entire Course NEWCmgt 433 Entire Course NEW
Cmgt 433 Entire Course NEW
shyamuop
 
CMGT 433 Entire Course NEW
CMGT 433 Entire Course NEWCMGT 433 Entire Course NEW
CMGT 433 Entire Course NEW
shyamuopuop
 
Ifsm 370 project 2 white paper instructions
Ifsm 370 project 2  white paper instructionsIfsm 370 project 2  white paper instructions
Ifsm 370 project 2 white paper instructions
bestwriter
 
Page 1 of 6 [1514] COM7005 Information S.docx
Page 1 of 6 [1514] COM7005   Information S.docxPage 1 of 6 [1514] COM7005   Information S.docx
Page 1 of 6 [1514] COM7005 Information S.docx
karlhennesey
 
CMGT 582 STUDY Inspiring Innovation--cmgt582study.com
 CMGT 582 STUDY Inspiring Innovation--cmgt582study.com CMGT 582 STUDY Inspiring Innovation--cmgt582study.com
CMGT 582 STUDY Inspiring Innovation--cmgt582study.com
KeatonJennings98
 
Technical Paper Risk AssessmentGlobal Finance, Inc. Netwo.docx
Technical Paper Risk AssessmentGlobal Finance, Inc. Netwo.docxTechnical Paper Risk AssessmentGlobal Finance, Inc. Netwo.docx
Technical Paper Risk AssessmentGlobal Finance, Inc. Netwo.docx
mattinsonjanel
 
Strengthening the Weakest Link - Reducing Risks from Social Engineering Attacks
Strengthening the Weakest Link - Reducing Risks from Social Engineering AttacksStrengthening the Weakest Link - Reducing Risks from Social Engineering Attacks
Strengthening the Weakest Link - Reducing Risks from Social Engineering Attacks
FitCEO, Inc. (FCI)
 
Cyber security technologist occupational brief
Cyber security technologist occupational briefCyber security technologist occupational brief
Cyber security technologist occupational brief
Enda Crossan
 
Due 12 10 2016Week 10 Term PaperClick the link above to submit.docx
Due 12 10 2016Week 10 Term PaperClick the link above to submit.docxDue 12 10 2016Week 10 Term PaperClick the link above to submit.docx
Due 12 10 2016Week 10 Term PaperClick the link above to submit.docx
sagarlesley
 
Project 1CST630 Project ChecklistStudent Name DateNote This che
Project 1CST630 Project ChecklistStudent Name DateNote This cheProject 1CST630 Project ChecklistStudent Name DateNote This che
Project 1CST630 Project ChecklistStudent Name DateNote This che
davieec5f
 
Cyber review-guide
Cyber review-guideCyber review-guide
Cyber review-guide
aqazad
 
IntroductionThis is an individual project. Each student must comp.docx
IntroductionThis is an individual project.  Each student must comp.docxIntroductionThis is an individual project.  Each student must comp.docx
IntroductionThis is an individual project. Each student must comp.docx
mariuse18nolet
 
Discussion Shared Practice The Triple Bottom LineIs the o.docx
Discussion Shared Practice The Triple Bottom LineIs the o.docxDiscussion Shared Practice The Triple Bottom LineIs the o.docx
Discussion Shared Practice The Triple Bottom LineIs the o.docx
elinoraudley582231
 
Running Head CYBER SECURITY IMPROVEMENT AREASCYBER SECURITY.docx
Running Head CYBER SECURITY IMPROVEMENT AREASCYBER SECURITY.docxRunning Head CYBER SECURITY IMPROVEMENT AREASCYBER SECURITY.docx
Running Head CYBER SECURITY IMPROVEMENT AREASCYBER SECURITY.docx
susanschei
 
Assessment Worksheet Aligning Risks, Threats, and Vuln.docx
Assessment Worksheet Aligning Risks, Threats, and Vuln.docxAssessment Worksheet Aligning Risks, Threats, and Vuln.docx
Assessment Worksheet Aligning Risks, Threats, and Vuln.docx
festockton
 
Assignment 2 Implementing Network and Personnel Security Meas.docx
Assignment 2 Implementing Network and Personnel Security Meas.docxAssignment 2 Implementing Network and Personnel Security Meas.docx
Assignment 2 Implementing Network and Personnel Security Meas.docx
annrodgerson
 
ACS Code of Professional Conduct Case Studies .docx
ACS Code of Professional Conduct Case Studies .docxACS Code of Professional Conduct Case Studies .docx
ACS Code of Professional Conduct Case Studies .docx
nettletondevon
 
ACS Code of Professional Conduct Case Studies .docx
ACS Code of Professional Conduct Case Studies .docxACS Code of Professional Conduct Case Studies .docx
ACS Code of Professional Conduct Case Studies .docx
bobbywlane695641
 
Cmgt 582 Education Specialist -snaptutorial.com
Cmgt 582  Education Specialist -snaptutorial.comCmgt 582  Education Specialist -snaptutorial.com
Cmgt 582 Education Specialist -snaptutorial.com
DavisMurphyC37
 

Similar to Student NameStudent IDMax MarkFinal Mark.docx (20)

erm Paper Penetration TestingDue Week 10 and worth 120 points.docx
erm Paper Penetration TestingDue Week 10 and worth 120 points.docxerm Paper Penetration TestingDue Week 10 and worth 120 points.docx
erm Paper Penetration TestingDue Week 10 and worth 120 points.docx
 
Cmgt 433 Entire Course NEW
Cmgt 433 Entire Course NEWCmgt 433 Entire Course NEW
Cmgt 433 Entire Course NEW
 
CMGT 433 Entire Course NEW
CMGT 433 Entire Course NEWCMGT 433 Entire Course NEW
CMGT 433 Entire Course NEW
 
Ifsm 370 project 2 white paper instructions
Ifsm 370 project 2  white paper instructionsIfsm 370 project 2  white paper instructions
Ifsm 370 project 2 white paper instructions
 
Page 1 of 6 [1514] COM7005 Information S.docx
Page 1 of 6 [1514] COM7005   Information S.docxPage 1 of 6 [1514] COM7005   Information S.docx
Page 1 of 6 [1514] COM7005 Information S.docx
 
CMGT 582 STUDY Inspiring Innovation--cmgt582study.com
 CMGT 582 STUDY Inspiring Innovation--cmgt582study.com CMGT 582 STUDY Inspiring Innovation--cmgt582study.com
CMGT 582 STUDY Inspiring Innovation--cmgt582study.com
 
Technical Paper Risk AssessmentGlobal Finance, Inc. Netwo.docx
Technical Paper Risk AssessmentGlobal Finance, Inc. Netwo.docxTechnical Paper Risk AssessmentGlobal Finance, Inc. Netwo.docx
Technical Paper Risk AssessmentGlobal Finance, Inc. Netwo.docx
 
Strengthening the Weakest Link - Reducing Risks from Social Engineering Attacks
Strengthening the Weakest Link - Reducing Risks from Social Engineering AttacksStrengthening the Weakest Link - Reducing Risks from Social Engineering Attacks
Strengthening the Weakest Link - Reducing Risks from Social Engineering Attacks
 
Cyber security technologist occupational brief
Cyber security technologist occupational briefCyber security technologist occupational brief
Cyber security technologist occupational brief
 
Due 12 10 2016Week 10 Term PaperClick the link above to submit.docx
Due 12 10 2016Week 10 Term PaperClick the link above to submit.docxDue 12 10 2016Week 10 Term PaperClick the link above to submit.docx
Due 12 10 2016Week 10 Term PaperClick the link above to submit.docx
 
Project 1CST630 Project ChecklistStudent Name DateNote This che
Project 1CST630 Project ChecklistStudent Name DateNote This cheProject 1CST630 Project ChecklistStudent Name DateNote This che
Project 1CST630 Project ChecklistStudent Name DateNote This che
 
Cyber review-guide
Cyber review-guideCyber review-guide
Cyber review-guide
 
IntroductionThis is an individual project. Each student must comp.docx
IntroductionThis is an individual project.  Each student must comp.docxIntroductionThis is an individual project.  Each student must comp.docx
IntroductionThis is an individual project. Each student must comp.docx
 
Discussion Shared Practice The Triple Bottom LineIs the o.docx
Discussion Shared Practice The Triple Bottom LineIs the o.docxDiscussion Shared Practice The Triple Bottom LineIs the o.docx
Discussion Shared Practice The Triple Bottom LineIs the o.docx
 
Running Head CYBER SECURITY IMPROVEMENT AREASCYBER SECURITY.docx
Running Head CYBER SECURITY IMPROVEMENT AREASCYBER SECURITY.docxRunning Head CYBER SECURITY IMPROVEMENT AREASCYBER SECURITY.docx
Running Head CYBER SECURITY IMPROVEMENT AREASCYBER SECURITY.docx
 
Assessment Worksheet Aligning Risks, Threats, and Vuln.docx
Assessment Worksheet Aligning Risks, Threats, and Vuln.docxAssessment Worksheet Aligning Risks, Threats, and Vuln.docx
Assessment Worksheet Aligning Risks, Threats, and Vuln.docx
 
Assignment 2 Implementing Network and Personnel Security Meas.docx
Assignment 2 Implementing Network and Personnel Security Meas.docxAssignment 2 Implementing Network and Personnel Security Meas.docx
Assignment 2 Implementing Network and Personnel Security Meas.docx
 
ACS Code of Professional Conduct Case Studies .docx
ACS Code of Professional Conduct Case Studies .docxACS Code of Professional Conduct Case Studies .docx
ACS Code of Professional Conduct Case Studies .docx
 
ACS Code of Professional Conduct Case Studies .docx
ACS Code of Professional Conduct Case Studies .docxACS Code of Professional Conduct Case Studies .docx
ACS Code of Professional Conduct Case Studies .docx
 
Cmgt 582 Education Specialist -snaptutorial.com
Cmgt 582  Education Specialist -snaptutorial.comCmgt 582  Education Specialist -snaptutorial.com
Cmgt 582 Education Specialist -snaptutorial.com
 

More from cpatriciarpatricia

Strict APA format 1 page and no references before 2015. Peer-reviewe.docx
Strict APA format 1 page and no references before 2015. Peer-reviewe.docxStrict APA format 1 page and no references before 2015. Peer-reviewe.docx
Strict APA format 1 page and no references before 2015. Peer-reviewe.docx
cpatriciarpatricia
 
Stress and Healthcare Workers Productivity at Lexington Medical .docx
Stress and Healthcare Workers Productivity at Lexington Medical .docxStress and Healthcare Workers Productivity at Lexington Medical .docx
Stress and Healthcare Workers Productivity at Lexington Medical .docx
cpatriciarpatricia
 
Stress and Chronic Illness- Choose and describe chronic illness su.docx
Stress and Chronic Illness- Choose and describe chronic illness su.docxStress and Chronic Illness- Choose and describe chronic illness su.docx
Stress and Chronic Illness- Choose and describe chronic illness su.docx
cpatriciarpatricia
 
StrengthsWeaknessesOpportunitiesThreatsSkillsK.docx
StrengthsWeaknessesOpportunitiesThreatsSkillsK.docxStrengthsWeaknessesOpportunitiesThreatsSkillsK.docx
StrengthsWeaknessesOpportunitiesThreatsSkillsK.docx
cpatriciarpatricia
 
Strengths-based nursing (SBN) is an approach to care in which eigh.docx
Strengths-based nursing (SBN) is an approach to care in which eigh.docxStrengths-based nursing (SBN) is an approach to care in which eigh.docx
Strengths-based nursing (SBN) is an approach to care in which eigh.docx
cpatriciarpatricia
 
Strengths-to-Strategies, Curriculum Vitae, and Action PlanDue.docx
Strengths-to-Strategies, Curriculum Vitae, and Action PlanDue.docxStrengths-to-Strategies, Curriculum Vitae, and Action PlanDue.docx
Strengths-to-Strategies, Curriculum Vitae, and Action PlanDue.docx
cpatriciarpatricia
 
Street Sense Media uses a range of creative platforms to spotl.docx
Street Sense Media uses a range of creative platforms to spotl.docxStreet Sense Media uses a range of creative platforms to spotl.docx
Street Sense Media uses a range of creative platforms to spotl.docx
cpatriciarpatricia
 
Strengths Paper Write a 2-page paper that identifies your top 5 str.docx
Strengths Paper Write a 2-page paper that identifies your top 5 str.docxStrengths Paper Write a 2-page paper that identifies your top 5 str.docx
Strengths Paper Write a 2-page paper that identifies your top 5 str.docx
cpatriciarpatricia
 
Stratification and Prejudice in Current EventsThe purpose of t.docx
Stratification and Prejudice in Current EventsThe purpose of t.docxStratification and Prejudice in Current EventsThe purpose of t.docx
Stratification and Prejudice in Current EventsThe purpose of t.docx
cpatriciarpatricia
 
Street CodeConsider this quote from Robert Sampson and William J.docx
Street CodeConsider this quote from Robert Sampson and William J.docxStreet CodeConsider this quote from Robert Sampson and William J.docx
Street CodeConsider this quote from Robert Sampson and William J.docx
cpatriciarpatricia
 
Strengths and Barriers to Program Implementation As you de.docx
Strengths and Barriers to Program Implementation As you de.docxStrengths and Barriers to Program Implementation As you de.docx
Strengths and Barriers to Program Implementation As you de.docx
cpatriciarpatricia
 
Strengths 1. Large Enrollment 2. Flexible class schedules1. The.docx
Strengths 1. Large Enrollment 2. Flexible class schedules1. The.docxStrengths 1. Large Enrollment 2. Flexible class schedules1. The.docx
Strengths 1. Large Enrollment 2. Flexible class schedules1. The.docx
cpatriciarpatricia
 
Street artist Shepard Fairey, who was graduated from the Rhode I.docx
Street artist Shepard Fairey, who was graduated from the Rhode I.docxStreet artist Shepard Fairey, who was graduated from the Rhode I.docx
Street artist Shepard Fairey, who was graduated from the Rhode I.docx
cpatriciarpatricia
 
Stream MorphologyInvestigation ManualENVIRONMENTAL SCI.docx
Stream MorphologyInvestigation ManualENVIRONMENTAL SCI.docxStream MorphologyInvestigation ManualENVIRONMENTAL SCI.docx
Stream MorphologyInvestigation ManualENVIRONMENTAL SCI.docx
cpatriciarpatricia
 
STRATEGYLeadershipLighting a fire under theniWhy urgen.docx
STRATEGYLeadershipLighting a fire under theniWhy urgen.docxSTRATEGYLeadershipLighting a fire under theniWhy urgen.docx
STRATEGYLeadershipLighting a fire under theniWhy urgen.docx
cpatriciarpatricia
 
STRATEGIESWhat can I do with this majorAREAS EMPLOYER.docx
STRATEGIESWhat can I do with this majorAREAS EMPLOYER.docxSTRATEGIESWhat can I do with this majorAREAS EMPLOYER.docx
STRATEGIESWhat can I do with this majorAREAS EMPLOYER.docx
cpatriciarpatricia
 
Strategies for ChangeWeek 7 The Hard Side of Change Management.docx
Strategies for ChangeWeek 7 The Hard Side of Change Management.docxStrategies for ChangeWeek 7 The Hard Side of Change Management.docx
Strategies for ChangeWeek 7 The Hard Side of Change Management.docx
cpatriciarpatricia
 
Strategic PlanningUnrestrictedthe managerial proc.docx
Strategic PlanningUnrestrictedthe managerial proc.docxStrategic PlanningUnrestrictedthe managerial proc.docx
Strategic PlanningUnrestrictedthe managerial proc.docx
cpatriciarpatricia
 
StrategicCompetitive PositionApple Inc. is known for its state-of.docx
StrategicCompetitive PositionApple Inc. is known for its state-of.docxStrategicCompetitive PositionApple Inc. is known for its state-of.docx
StrategicCompetitive PositionApple Inc. is known for its state-of.docx
cpatriciarpatricia
 
Strategies for Negotiation & Conflict Resolution Dr. Janice Ba.docx
Strategies for Negotiation & Conflict Resolution Dr. Janice Ba.docxStrategies for Negotiation & Conflict Resolution Dr. Janice Ba.docx
Strategies for Negotiation & Conflict Resolution Dr. Janice Ba.docx
cpatriciarpatricia
 

More from cpatriciarpatricia (20)

Strict APA format 1 page and no references before 2015. Peer-reviewe.docx
Strict APA format 1 page and no references before 2015. Peer-reviewe.docxStrict APA format 1 page and no references before 2015. Peer-reviewe.docx
Strict APA format 1 page and no references before 2015. Peer-reviewe.docx
 
Stress and Healthcare Workers Productivity at Lexington Medical .docx
Stress and Healthcare Workers Productivity at Lexington Medical .docxStress and Healthcare Workers Productivity at Lexington Medical .docx
Stress and Healthcare Workers Productivity at Lexington Medical .docx
 
Stress and Chronic Illness- Choose and describe chronic illness su.docx
Stress and Chronic Illness- Choose and describe chronic illness su.docxStress and Chronic Illness- Choose and describe chronic illness su.docx
Stress and Chronic Illness- Choose and describe chronic illness su.docx
 
StrengthsWeaknessesOpportunitiesThreatsSkillsK.docx
StrengthsWeaknessesOpportunitiesThreatsSkillsK.docxStrengthsWeaknessesOpportunitiesThreatsSkillsK.docx
StrengthsWeaknessesOpportunitiesThreatsSkillsK.docx
 
Strengths-based nursing (SBN) is an approach to care in which eigh.docx
Strengths-based nursing (SBN) is an approach to care in which eigh.docxStrengths-based nursing (SBN) is an approach to care in which eigh.docx
Strengths-based nursing (SBN) is an approach to care in which eigh.docx
 
Strengths-to-Strategies, Curriculum Vitae, and Action PlanDue.docx
Strengths-to-Strategies, Curriculum Vitae, and Action PlanDue.docxStrengths-to-Strategies, Curriculum Vitae, and Action PlanDue.docx
Strengths-to-Strategies, Curriculum Vitae, and Action PlanDue.docx
 
Street Sense Media uses a range of creative platforms to spotl.docx
Street Sense Media uses a range of creative platforms to spotl.docxStreet Sense Media uses a range of creative platforms to spotl.docx
Street Sense Media uses a range of creative platforms to spotl.docx
 
Strengths Paper Write a 2-page paper that identifies your top 5 str.docx
Strengths Paper Write a 2-page paper that identifies your top 5 str.docxStrengths Paper Write a 2-page paper that identifies your top 5 str.docx
Strengths Paper Write a 2-page paper that identifies your top 5 str.docx
 
Stratification and Prejudice in Current EventsThe purpose of t.docx
Stratification and Prejudice in Current EventsThe purpose of t.docxStratification and Prejudice in Current EventsThe purpose of t.docx
Stratification and Prejudice in Current EventsThe purpose of t.docx
 
Street CodeConsider this quote from Robert Sampson and William J.docx
Street CodeConsider this quote from Robert Sampson and William J.docxStreet CodeConsider this quote from Robert Sampson and William J.docx
Street CodeConsider this quote from Robert Sampson and William J.docx
 
Strengths and Barriers to Program Implementation As you de.docx
Strengths and Barriers to Program Implementation As you de.docxStrengths and Barriers to Program Implementation As you de.docx
Strengths and Barriers to Program Implementation As you de.docx
 
Strengths 1. Large Enrollment 2. Flexible class schedules1. The.docx
Strengths 1. Large Enrollment 2. Flexible class schedules1. The.docxStrengths 1. Large Enrollment 2. Flexible class schedules1. The.docx
Strengths 1. Large Enrollment 2. Flexible class schedules1. The.docx
 
Street artist Shepard Fairey, who was graduated from the Rhode I.docx
Street artist Shepard Fairey, who was graduated from the Rhode I.docxStreet artist Shepard Fairey, who was graduated from the Rhode I.docx
Street artist Shepard Fairey, who was graduated from the Rhode I.docx
 
Stream MorphologyInvestigation ManualENVIRONMENTAL SCI.docx
Stream MorphologyInvestigation ManualENVIRONMENTAL SCI.docxStream MorphologyInvestigation ManualENVIRONMENTAL SCI.docx
Stream MorphologyInvestigation ManualENVIRONMENTAL SCI.docx
 
STRATEGYLeadershipLighting a fire under theniWhy urgen.docx
STRATEGYLeadershipLighting a fire under theniWhy urgen.docxSTRATEGYLeadershipLighting a fire under theniWhy urgen.docx
STRATEGYLeadershipLighting a fire under theniWhy urgen.docx
 
STRATEGIESWhat can I do with this majorAREAS EMPLOYER.docx
STRATEGIESWhat can I do with this majorAREAS EMPLOYER.docxSTRATEGIESWhat can I do with this majorAREAS EMPLOYER.docx
STRATEGIESWhat can I do with this majorAREAS EMPLOYER.docx
 
Strategies for ChangeWeek 7 The Hard Side of Change Management.docx
Strategies for ChangeWeek 7 The Hard Side of Change Management.docxStrategies for ChangeWeek 7 The Hard Side of Change Management.docx
Strategies for ChangeWeek 7 The Hard Side of Change Management.docx
 
Strategic PlanningUnrestrictedthe managerial proc.docx
Strategic PlanningUnrestrictedthe managerial proc.docxStrategic PlanningUnrestrictedthe managerial proc.docx
Strategic PlanningUnrestrictedthe managerial proc.docx
 
StrategicCompetitive PositionApple Inc. is known for its state-of.docx
StrategicCompetitive PositionApple Inc. is known for its state-of.docxStrategicCompetitive PositionApple Inc. is known for its state-of.docx
StrategicCompetitive PositionApple Inc. is known for its state-of.docx
 
Strategies for Negotiation & Conflict Resolution Dr. Janice Ba.docx
Strategies for Negotiation & Conflict Resolution Dr. Janice Ba.docxStrategies for Negotiation & Conflict Resolution Dr. Janice Ba.docx
Strategies for Negotiation & Conflict Resolution Dr. Janice Ba.docx
 

Recently uploaded

NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptxNEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
iammrhaywood
 
MDP on air pollution of class 8 year 2024-2025
MDP on air pollution of class 8 year 2024-2025MDP on air pollution of class 8 year 2024-2025
MDP on air pollution of class 8 year 2024-2025
khuleseema60
 
Oliver Asks for More by Charles Dickens (9)
Oliver Asks for More by Charles Dickens (9)Oliver Asks for More by Charles Dickens (9)
Oliver Asks for More by Charles Dickens (9)
nitinpv4ai
 
Haunted Houses by H W Longfellow for class 10
Haunted Houses by H W Longfellow for class 10Haunted Houses by H W Longfellow for class 10
Haunted Houses by H W Longfellow for class 10
nitinpv4ai
 
Leveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit InnovationLeveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit Innovation
TechSoup
 
Benner "Expanding Pathways to Publishing Careers"
Benner "Expanding Pathways to Publishing Careers"Benner "Expanding Pathways to Publishing Careers"
Benner "Expanding Pathways to Publishing Careers"
National Information Standards Organization (NISO)
 
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
EduSkills OECD
 
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
indexPub
 
How to Predict Vendor Bill Product in Odoo 17
How to Predict Vendor Bill Product in Odoo 17How to Predict Vendor Bill Product in Odoo 17
How to Predict Vendor Bill Product in Odoo 17
Celine George
 
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptxBeyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
EduSkills OECD
 
skeleton System.pdf (skeleton system wow)
skeleton System.pdf (skeleton system wow)skeleton System.pdf (skeleton system wow)
skeleton System.pdf (skeleton system wow)
Mohammad Al-Dhahabi
 
Educational Technology in the Health Sciences
Educational Technology in the Health SciencesEducational Technology in the Health Sciences
Educational Technology in the Health Sciences
Iris Thiele Isip-Tan
 
How Barcodes Can Be Leveraged Within Odoo 17
How Barcodes Can Be Leveraged Within Odoo 17How Barcodes Can Be Leveraged Within Odoo 17
How Barcodes Can Be Leveraged Within Odoo 17
Celine George
 
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptxRESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
zuzanka
 
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem studentsRHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
Himanshu Rai
 
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
TechSoup
 
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
National Information Standards Organization (NISO)
 
Electric Fetus - Record Store Scavenger Hunt
Electric Fetus - Record Store Scavenger HuntElectric Fetus - Record Store Scavenger Hunt
Electric Fetus - Record Store Scavenger Hunt
RamseyBerglund
 
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
imrankhan141184
 
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
Nguyen Thanh Tu Collection
 

Recently uploaded (20)

NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptxNEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
 
MDP on air pollution of class 8 year 2024-2025
MDP on air pollution of class 8 year 2024-2025MDP on air pollution of class 8 year 2024-2025
MDP on air pollution of class 8 year 2024-2025
 
Oliver Asks for More by Charles Dickens (9)
Oliver Asks for More by Charles Dickens (9)Oliver Asks for More by Charles Dickens (9)
Oliver Asks for More by Charles Dickens (9)
 
Haunted Houses by H W Longfellow for class 10
Haunted Houses by H W Longfellow for class 10Haunted Houses by H W Longfellow for class 10
Haunted Houses by H W Longfellow for class 10
 
Leveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit InnovationLeveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit Innovation
 
Benner "Expanding Pathways to Publishing Careers"
Benner "Expanding Pathways to Publishing Careers"Benner "Expanding Pathways to Publishing Careers"
Benner "Expanding Pathways to Publishing Careers"
 
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
 
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
 
How to Predict Vendor Bill Product in Odoo 17
How to Predict Vendor Bill Product in Odoo 17How to Predict Vendor Bill Product in Odoo 17
How to Predict Vendor Bill Product in Odoo 17
 
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptxBeyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
 
skeleton System.pdf (skeleton system wow)
skeleton System.pdf (skeleton system wow)skeleton System.pdf (skeleton system wow)
skeleton System.pdf (skeleton system wow)
 
Educational Technology in the Health Sciences
Educational Technology in the Health SciencesEducational Technology in the Health Sciences
Educational Technology in the Health Sciences
 
How Barcodes Can Be Leveraged Within Odoo 17
How Barcodes Can Be Leveraged Within Odoo 17How Barcodes Can Be Leveraged Within Odoo 17
How Barcodes Can Be Leveraged Within Odoo 17
 
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptxRESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
 
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem studentsRHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
 
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
 
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
 
Electric Fetus - Record Store Scavenger Hunt
Electric Fetus - Record Store Scavenger HuntElectric Fetus - Record Store Scavenger Hunt
Electric Fetus - Record Store Scavenger Hunt
 
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
 
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
 

Student NameStudent IDMax MarkFinal Mark.docx

  • 2. Excellent (HD) NOTE TO MARKERS: 30 0.00 Task 1 12 Task 1 Task 1 Identify the most critical components of the university's information system - the critical information assets. 3 0 Identify critical components - x Identify the critical components of the information system using correct methods. Provide sufficient arguments to support the results. Identify what threats the BYOD policy may bring to the identified critical assets. 3 0 Identify BYOD policy threats - x Correctly identify threats related to BYOD policy. Sufficient explanation is provided. Identify potential vulnerabilities of each asset against the
  • 3. identified threats. 3 0 Identify vulnerabilities of assets - x Correctly identify the vulnerabilities associated with the identified assets. Sufficient explaination is provided. Assess the risk to the university's information system. 3 0 Risk assessment - Correctly carry the risk assessment using either quantitative or qualitative risk assessment process. Document the result correctly with sufficient explanation. Sub Total: 0 Task 2 10 Task 2 Not done Poor (F) Average (P) Good (C)
  • 4. Very Good (D) Excellent (HD) Task 2 Clearly explains the working principle of the certificate- based authentication. 3 0 Explain certificate based authentication - x The explanation is correct and captures the working principle of the certificate based authentication mechanism. Compare and contrast the certificate-based authentication and password-based authentication. 3 0 Compare certificate and password authentication - x Clearly and sufficiently shows the pros and cons of each authentication mechanism. Correctly identify and highlight the useful features of the certificate-based authentication for BYOD policy.
  • 5. 3 0 Identify features of certificate based authentication - x Correctly identify and highlight the useful features of the certificate-based authentication for BYOD policy. Quality of references. 1 0 Quality of references - x The reference source is correctly cited according to the citation style. The source quality is high. Sub Total : 0 Task 3 8 Task 3 Not done Poor (F) Average (P) Good (C) Very Good (D) Excellent
  • 6. (HD) Task 3 Correctly identify the characteristics of a Spam and Spamming act. 2 0 Identify Spam and Spamming act - x The Spam Act 2003 prohibits the sending of unsolicited commer cial electronic messages—known as spam— with an Australian link. A message has an Australian link if it o riginates or was commissioned in Australia, or originates overseas but was sent to an address accessed in Australia. Students should define the Provide three representative examples of Spams 3 0 Three examples of Spam - x The examples are correct with sufficient explaination according to the Spam Act 2003. If no explaination is given, half of the total mark is awarded as the maximum. Spam handling instruction 3 0 Spam handling instruction - x The instruction is correct, sufficient, clear, consised and takes
  • 7. into account to the assignment context. If external reference is used, provide the source. Sub Total: 0 TOTAL 30 0.00 Less late Penalty (10% per day) No of Days 0 0.00 TOTAL (with LATE PENALTY) 0% 0.00 HD: High Distinction, D: Distinction, C:Credit, P:Pass, F:Fail CMP71001 - Assignment 2 Grade Rubric HD 85+ D 75+ C 65+ P
  • 8. 50+ F The project is incomplete and/or work well below industry standards. Functionality is poor or absent. Failure to meet project specifications. Little or no innovation. A large volume of work would be required to bring the project up to industry standards. Insufficient effort or competence is demonstrated to achieve a passing grade. Other Comments - The project is realised to a very high professional standard. Technically it is fully functional and meets all specifications. It demonstrates high levels of creativity and innovation both in terms of its function and usability. It has been carefully quality controlled to ensure full functionality and that no errors are evident. The project is realised to a high professional standard, with a good level of functionality and meets most specifications. It demonstrates occasional levels of creativity and innovation. While there may be a few errors, these are of a minor nature. Generally the product would be well-regarded by industry standards. The project is realised to an acceptable professional standard with generally adequate levels of functionality and generally meets specifications, although there are a number of problems evident. There is evidence of creativity and innovation although these are not sustained throughout. Further development could have improved this product.
  • 9. Generally it would not be highly regarded by industry and would need more work before release, but still shows good developing competence. The project was completed, but to a less than acceptable industry standard. Functionally it was problematic and some aspects did not meet required specifications. There is little evidence of creativity or innovation in the project. Additional work would be required to bring this up to industry standards, but overall it demonstrates sufficient competence to merit a passing grade. 1 School of Business and Tourism Unit Cybersecurity Unit code CMP71001 Assignment 2 Security consultation report and guideline. Due Date Sunday 23:59:59 of the last study week. Learning Outcomes 3 – 6
  • 10. Graduate Attributes 3, 4 & 5 Weight 30% of overall unit assessment Suggestion This assignment is developmental and cumulative. You are strongly advised to start doing this assignment from Week-6 in your study. Leaving your starting date to the week before the due date is a very poor strategy for success in the unit. Marks A marking scheme will be posted on MySCU to help you direct your efforts successfully. Task Description You are hired by Southern Cross University as a cybersecurity consultant to work on a security program to address the contemporary and emerging risks from the cyber threats the university is facing. Your tasks are the following: is currently using a password based authentication system to control the user access to the university’s information system. However, the Bring Your Own Device (BYOD) policy recently implemented by the university
  • 11. has raised some security concerns. As a security consultant, assess the risk from the BYOD policy to the university's information system. you suggest the university to replace the current password-based authentication scheme with a Certificate-Based Authentication. To justify your suggestion, write a technical report to explain the working principle of the Certificate-Based Authentication mechanism and discuss why the university should use the mechanism in this case by comparing it with the password-based authentication mechanism. Use figure when necessary to support your answers. cybersecurity threats facing by the university. Use the Spam Act 2003 and available online resources to develop a guideline for the university students and staff to combat with the threat. The guideline will include the following:
  • 12. o Definition of spam and its distinctive characteristics. 2 o At least three (3) real examples of spams showing the spam characteristics. o An instruction to the users of how to recognise and safely handle a spam. o An instruction to the IT administrator of how to minimize the spam threat. Assignment-2 guideline Task 1: BOYD risk assessment To complete this task, use the following guidelines: information system - the critical information assets. identified critical assets. identified threats. either quantitative or
  • 13. qualitative risk assessment approach and document the risk assessment process. Task 2: Certificate-based Authentication To complete this task, use the following guidelines: principle, pros and cons of the Certificate-based Authentication mechanism. Document all reference sources. the Certificate-based Authentication mechanism. Compare the certificate-based authentication against the password-based authentication and highlight the features you think are useful for combating the threats from the BYOD policy. resources. Use your own words and figures. Acknowledge all reference sources. Task 3: Anti-spam guideline To complete this task, use the following guidelines: document is available
  • 14. at: https://www.legislation.gov.au/Details/C2016C00614. The Act will help you to define what type of electronic messages should be treated as spams, what are the distinctive characteristics of a spam and what act is considered as spamming? own spams as examples. the development of spam handling instructions. The instructions should be clear, concise and precise. Assignment-2 Marking Rubric A spreadsheet that will be used for the marking of your site is provided (co-located with this assignment specification) on MySCU to itemise exactly what tutors will be looking at in relation to marking your assignment. It contains a detailed breakdown of the marking criteria for this assignment. I strongly suggest you peruse this spreadsheet. 3
  • 15. Submission Format When you have completed the assignment, you are required to submit your assignment in the PDF/DOC format. The file will be named using the following convention: filename = FirstInitialYourLastName_CMP71001_A2.pdf (i.e. FJones_CMP71001_A2.pdf) Note to IBS students: Please check with your local lecturer/tutor the submission requirements for your assignments. Typically, they will be different from on-shore students of Southern Cross University. Original work It is a University requirement that a student’s work complies with the Academic Policy, Chapter 4.20 on Student Academic Integrity. It is a student’s responsibility to be familiar with the Policy. Failure to comply with the Policy can have severe consequences in the form of University sanctions. For information on this Policy please refer to Chapter 4.20 on Student Academic
  • 16. Integrity at the following website: http://www.scu.edu.au/governance/academicboard/policy/ As part of a University initiative to support the development of academic integrity, assessments may be checked for plagiarism, including through an electronic system, either internally or by a plagiarism checking service, and be held for future checking and matching purposes. Retain duplicate copy Before submitting the assignment, you are advised to retain electronic copies of original work. In the event of any uncertainty regarding the submission of assessment items, you may be requested to reproduce a final copy. School Extension Policy In general, I will NOT give extension unless where there are exceptional circumstances. Students wanting an extension must make a request at least 24 hours before the assessment item is due and the request must be received in writing by the unit assessor or designated
  • 17. academic. Extensions within 24 hours of submission or following the submission deadline will not be granted (unless supported by a doctor’s certificate or where there are exceptional circumstances – this will be at unit assessor’s discretion and will be considered on a case by case basis). Extensions will be for a maximum of 48 hours (longer extensions supported by a doctor’s certificate or alike to be considered on a case by case basis). A penalty of 5% of the total available grade will accrue for each 24-hour period that an assessment item is submitted late. Therefore, an assessment item worth 20 marks will have 1 marks deducted for every 24-hour period and at the end of 20 days will receive 0 marks. Students who fail to submit following the guidelines in this Unit Information Guide will be deemed to have not submitted the assessment item and the above penalty will be applied http://www.scu.edu.au/governance/academicboard/policy/ 4
  • 18. until the specified submission guidelines are followed. Marks and Feedback All assessment materials submitted during the semester will normally be marked and returned within two weeks of the required date of submission (provided that the assessment materials have been submitted by the due date). Marks will be made available to each student via the MySCU Grade book.