Assessment Overview:
The purpose of this assessment is to assess the students’ ability to apply their theoretical knowledge on risk assessment and management using standard models such as STRIDE and DREAD.
Weighting 50%
Length and/or format 3000
IEEE REPORT FORMAT
Context
The context of this assignment is that you have been employed as a security specialist and you are required to assess security threats and identify effective security measures to mitigate risks. To perform your jobs, you need to investigate an IT system, analyse impacts of security threats, identify five common security threats, analyse security requirements, rating the risks for each threat, calculate the severity of security threats on the whole system and recommend appropriate security solutions.
Instructions
In this assignment, you have to choose an Information System or IT system to write a report on security analysis and planning. You can choose a system from the following list or your own. However, you must choose an IS or IT system. The report would be based on two security models: STRIDE and DREAD. First, you need to identify 5 common security threats to your selected system. Then, you should list the security requirements to deal with those threats using STRIDE model. In the second part of your report, you have to analyse the risk of each threat on your system using DREAD model. You also need to measure the overall risk of the system and propose appropriate security measures to overcome the threats.
List of IT Systems:
1. Enterprise Resource Planning
2. Data Warehousing
3. Office Automation
4. Global Information Systems
5. Library Management Systems
6. Online Ticket Reservation Systems
7. Hotel Management System
8. Hospital Management System
9. Restaurant Management System
10. Supply Chain Management System
Abstract: An abstract (a short summary of the report) needs to convey a complete synopsis of the paper, but within a word tight limit. Writing an abstract includes brief introduction to the general topic of the work and then explanation of the exact research strategies, including the aims. It should then highlight the outcomes.
Introduction: In the Introduction, you are attempting to inform the reader about the rationale behind the work. The introduction does not have a strict word limit, unlike the abstract, but it should be as concise as possible. It can be a tricky part of the paper to write, so many scientists and researchers prefer to write it last, ensuring that they miss no major points. The introduction gives an overall view of the report but does address a few slightly different issues from the abstract. An introduction should emphasize on background, importance, limitations, and assumptions. You should provide a short overview of the chosen system in this section. If possible, a diagram of the system should be provided.
Analyse Impacts of Security Threats: You need to analyse impacts of security threats across societies and national borders for your chosen system. The statements need to be supported by most recent and relevant examples.
Identify Five Common Security Threats: In this section, you will be identifying five common security threats that might have significant impacts on your system. You have to choose specific security attack on different security services such as attacks on integrity, data confidentiality, availability, authentication, non-repudiation and so on.
Analyse Security Requirements using STRIDE model: Here you need to analyse the security requirements using STRIDE model and also map the requirements with respect to security attacks (known as STRIDE threat classification). An explanation should be provided whether the chosen system can defend the security threats classified by the STRIDE model.
Risk Rating Using DREAD Model: In this section, you have to calculate risk values for each threat. Using DREAD model, you have to quantify the risk factor for each category and then calculate the overall risk value to evaluate the severity of risks on your information or IT system. You also need to describe some mitigation techniques to overcome the risks.
Recommendations:On the basis of threat analysis and risk assessment outcomes, you need to recommend a number of security measures to defend the system against common security attacks. A diagram integrating all security measures would be highly appreciated.
Conclusion: This is really just a more elaborate version of the abstract. In a few lines you should summarize your findings. Your abstract will do most of this for you but, as long as you do not get carried away, especially for longer reports, it can help the reader absorb your findings a little more.
GET SOLUTION FOR THIS ASSIGNMENT
TO BE RE-WRITTEN FROM THE SCRATCH
- Original and non-plagiarized custom papers.
- Timely Delivery.
- Customer satisfaction.
- Privacy and safety.
- Writing services provided by experts.
- Confidentiality
- Premium papers,
Get Professionally Written Papers From The Writing Experts
Comments
Post a Comment