Assessment item 2 – Scenario Analysis and Short Answer Questions
Length:2000 words
This assessment relates to Topics 1 – 6 and consists of two tasks as follows :
Task 1 : Scenario Analysis (30 Marks)
- Watch the YouTube videos and read the news articles about the Optus data breach and then write a report to analyse this data breach using the vulnerability-threat-control paradigm and make recommendation(s) on the basis of your analysis providing reasons for the recommendation(s). The following sample videos will help you to start learning about this data breach. You can also use other resources like news articles etc to get more information. [15 Marks]
- Tech expert answers your burning questions about Optus hack
- Optus hackers demand $1.5 million ransom
- Our Personal Data and the Optus Breach | Q+A
- https://www.youtube.com/watch?
v=kUGYgakPdAc - https://www.youtube.com/watch?
v=BVNjFOjTAmc - https://www.youtube.com/watch?
v=1ElrOQBS4p0
- Encrypt and decrypt the following text, “LIFE IS FULL OF BEAUTY. NOTICE IT”, using the RSA Public Key algorithm, and briefly describe each step using accurate symbols and equations used in this algorithm. You are required to use tables/figures to explain the steps. Equations, tables, and figures will not count towards your total word length. [15 Marks]
Task 2 : Short Answer Questions (30 Marks)
- The Department of Foreign Affairs & Trade Australia is planning to deploy biometric authentication technology to protect physical and electronic resources. Research various biometric authentication technologies and write a report to suggest any four biometric authentication technologies. Your report should include key features, usage, challenges, false rejections, false acceptances, and future trends for your chosen biometric authentication technologies. [15 Marks]
- The ability to access an object is a yes or no decision. Discuss, how you can make sure that the appropriate activity is being performed on an object. Further, from an access control point of view, why is the level of specificity cumbersome to implement? Provide examples as well. [15 Marks]
Subject learning outcomes
This assessment task will assess the following learning outcome/s:
- be able to justify security goals and the importance of maintaining the secure computing environment against digital threats.
- be able to examine malicious activities that may affect the security of a computer program and justify the choice of various controls to mitigate threats.
- be able to compare and contrast the security mechanisms of a trusted operating system with those used in a general purpose operating system.
- be able to compare and contrast foundational security policies and models that deal with integrity and confidentiality.
Graduate learning outcomes
This task also contributes to the assessment of the following Charles Sturt Graduate Learning Outcome/s:
- Academic Literacy and Numeracy (Knowledge) – Charles Sturt Graduates understand the use and structure of appropriate language in written, oral, visual, mathematical, and multi-modal communication.
- Academic Literacy and Numeracy (Skill) – Charles Sturt Graduates demonstrate the literacy and numeracy skills necessary to understand and interpret information and communicate effectively according to the context.
- Academic Literacy and Numeracy (Application) – Charles Sturt Graduates consider the context, purpose, and audience when gathering, interpreting, constructing, and presenting information.
Marking criteria and standard
Criteria |
High Distinction (100% – 85%) |
Task 1.1 (15 Marks)
Vulnerability-Threat-Control framework. |
Report demosntrates comprehensive analysis of the cyber security breach, and presents carefully identifies and justifies the artefacts of vulnerability, threat, and control within the scenario to form a cohesive and well integrated framework.
Makes a convincing and a justifiable recommendation. (15.00-12.75) |
Task 1.2 (15 Marks)
RSA Public Key scheme |
All steps used to explain RSA public key scheme are correctly described include all symbols and equations are well defined using relevant figures/tables. (15.00-12.75) |
Task 2.1 (15 Marks)
Biometric authentication technologies. |
Four major biometric authentication technologies are identified and compared using all key features. The literature and sources presented are evidence of the high-level application of research skills. (15.00-12.75) |
Task 2.2 (15 Marks)
Access control on object. |
A thorough discussion about different ways to protect the object from malicious activities justifies the reasons why implementation of the level of specificity is cumbersome. (15.00-12.75) |