Computer Science Assignments | Online Homework Help
There are two parts to this assignment, i.e. part A and part B.
A. Write a review article for the topic described below. Note that final mark of part A would be affected
by the presentation result of part B. This is to assure that students understand the work presented in
part A. overall mark of part A could be deducted by 50% for poor presentation 90 marks
B. Presentation (to present in 5-8 slides only in 5-8 minutes during Laboratory time) 10 marks
Part A description:
1. Topic – Network security Vulnerability and its impact on threats and attacks
System security challenges have increased over the years especially with critical systems such as
banking, healthcare, and the use of advance utilities becoming more connected. On the other hand,
the malicious actors have evolved from early-day hackers whose intentions were mostly curiosity to
modern-day hackers who has the intentions of financial gain to espionage and beyond. To effectively
secure against these threats and attacks, it is important to understand what we are securing, how we
are securing it, and who we are securing against.
You need to cover the following topics to secure the company network:
1. Identify a target company: You need to select an existing company and describe its
current network setup, business mission/objectives, and historical attacks if existed.
This company should have multiple branches nationally and/or internationally that are
connected over internet.
2. Know The Enemy. You need to conduct a research and identify the possible enemy
according to business of the selected company, and what would motivate them to
conduct possible attacks.
3. Know The Self. Threat is the presence of something valuable that makes a threat credible.
The value and nature of a valuable define the nature of the threat, the risk posed by a
threat, and the cost of defense. You need to define/list the assets that you have to protect,
the risks associated with those assets, and the costs of protecting or not protecting them,
so you can define the threat to your network. This analysis of an organization’s assets and
risks would lead to create a proper security policy. You need to prepare the following:
BN223 Cyber Security Principles Page 3 of total pages
Prepared by: Dr. Ghassan Kbar Moderated by: Dr Sihui (Sue) Zhou March, 2019
a. Assess the vulnerability of the company system network. Discuss the possible
vulnerabilities might exist at the company and how to check for them.
b. Discuss the different type of threats facing this company.
c. What could be the potential risks and how to mitigate them.
d. The cost of defence for addressing the important risks.
e. Describe the steps for security policy needed to secure the company’s network.
f. What is the role of security standards in improving the network security? You
can give example of NIST framework
g. Search for CISCO SAFE model (as shown in the reference below) and describe
their method for analyzing threats, risks, and policies across an organization and
Reference: “SAFE Overview Guide: Threats, Capabilities, and the Security Reference