[Solved] MITS5004 IT Security

2020S1 Assignment No 1 Case Study and Presentation

Submission Guidelines:
This assessment task is done in small groups (maximum of 3 students) and you will be required to work together to apply your knowledge, to analyse research topic. In this assignment you will be given a small case study and you will need to apply your knowledge to Identify security components, design security models and analyse security threats. This will cover the first two learning outcomes of the unit. All submissions are to be submitted through turn-it-in. Drop-boxes linked to turn-it-in will be set up in the Unit of Study Moodle account. Assignments not submitted through these drop- boxes will not be considered. Submissions must be made by the due date week-5 or session-5 and time will be Friday 4:00PM.
The turn-it-in similarity score will be used in determining the level if any of plagiarism. Turn-it-in will check conference web-sites, Journal articles, the Web and your own class member submissions for plagiarism. You can see your turn-it-in similarity score when you submit your assignment to the appropriate drop-box. If this is a concern you will have a chance to change your assignment and re-submit. However, re-submission is only allowed prior to the submission due date and time. After the due date and time have elapsed you cannot make re-submissions and you will have to live with the similarity score as there will be no chance for changing. Thus, plan early and submit early to take advantage of this feature. You can make multiple submissions, but please remember we only see the last submission, and the date and time you submitted will be taken from that submission.
Your document should be a single word or pdf document containing your report.

NOTE: This Document is used in conjunction with Assessment 1 [Case Studies & Presentation] in the Unit Guide [MITS5004 IT Security-Unit Guide]
Objective(s)
This assessment item relates to the unit learning outcomes 1 & 2 as in the unit descriptor. This assessment is designed to improve student’s presentation skills and to give students experience in researching a topic and writing a report relevant to the Unit of Study subject matter. Also the objective is to make the student work in small groups. Each individual group need to elect a group leader who will be coordinating the group’s tasks, and will be responsible for submission of assignment in LMS (Moodle)
INSTRUCTIONS
These instructions apply to Assignment 1 – Case Studies & Presentation
Assignment 1 – Case Studies & Presentation – 10% (Sessions 5-12) group Assignment
For this component you will be required to form small groups of 3 students max and do a 5-10 minutes of presentation on a recent academic paper on a topic related to IT Security. Some possible topic areas include but are not limited to:
• Encryption Techniques
• System and Network Security
• Digital Forensics
• Cloud and IoT Security
• Application Security
• Data Security
• Threats, attacks and malware
• Social Engineering and phishing attacks
• Ethical Implications in Wireless Networks
• Information Security Management and Risk Assessment
The paper you select must be directly relevant to one of the above topics or another topic and be related to IT Security. The paper must be approved by your lecturer and be related to what we are studying this semester in IT Security. The paper can be from any academic conference or other relevant Journal. All groups must select a different paper. Thus, the paper must be approved by your lecturer before proceeding. In case two groups are wanting to present on the same paper, the first who emails the lecturer with their choice will be allocated that paper. Please note that popular magazine or web-site articles are NOT academic papers.

A grade of 10% of the total Units mark will be awarded for your group presentation and your participation in other student’s presentations. You are required to prepare a 5-8 slides of Power Point presentation. Also from the marking criteria it is essential you participate in other group presentations, If you do not participate in other groups presentations i.e. at least 70% of them, then your group will be forfeiting a significant proportion of the marks for this component.
Note: Since the class numbers are large the presentations are organized into groups.
The presentations will occur in sessions 5-12 on the academic calendar over the semester and the order of presentations will be by arrangement, but these will be evenly spread over those sessions.
What to Submit.
Groups are allocated marks based on your presentation and participation, a copy of the presentation (ppt) must be submitted on the Moodle link for Assignment 1
Plagiarism and collusion
All students in the groups are warned that VIT takes a serious stand on Plagiarism and collusion. VIT will apply heavy penalties if individuals and groups are caught in academic misconduct. VIT uses sophisticated TURNITIN software built-in the LMS Moodle system for detecting plagiarism and collusion.

Solutions

Introduction

  • Social engineering attacks weakening cybersecurity chain
  • U.S. Department of Justice: Social Engineering is among the worst threats in the world
  • U.S. Federal Bureau of Investigation (FBI): There are increasing numbers of email scams and CEO fraud reported cases
  • Detection techniques
  • Countermeasure method

Social engineering attacks

  • Greatest threat to cybersecurity
  • Can be detected but not stopped
  • The attacks differ from one another
  • Common pattern with similar phases
  • Info collection
  • Relationship development with target
  • Info exploitation
  • Exit devoid of possible traces………………………………….To access the rest of the presentation for $5, please click on the purchase button.