CSI6199 Report On Contemporary Cyber Security Issues Assignment

Subject Code & Title :-  CSI6199 Report On Contemporary Cyber Security Issues
Assessment Type :-  Assignment
As security professionals you may be required to analyse products to identify security issues and vulnerabilities that may expose an organisation or asset to cyber attacks. In these scenarios clients are generally trying to find ways of reducing their risks and vulnerabilities. As security professionals you will also be required to make recommendations. Your recommendations need to be reasonable well explained and well justified.
CSI6199 Report On Contemporary Cyber Security Issues Assignment

CSI6199 Report On Contemporary Cyber Security Issues Assignment

Assignment Brief :-
Cryptography has evolved and become more secure in line with new vulnerabilities that are being discovered. For this assessment, you are required to examine a security issue within a legacy cryptographic algorithm. To complete this assessment you must address the following core requirements;

I. Identify a cryptographic algorithm that contains a known vulnerability or weakness.
II. Analyse and critique why the identified vulnerability or weakness resulted in the algorithm being deprecated.
III. Demonstrate what the security issue was and why it was of concern using an innovative communication strategy – beyond descriptive text. To achieve this outcome you may use graphical images, data flow diagrams worked procedural examples or screenshots from software that you took yourself.
IV. Compare and contrast the legacy algorithm to modern alternatives that are still in use and considered secure. In achieving this outcome you may wish to evaluate how a contemporary secure cryptographic algorithm addresses the short comings of the legacy algorithm.

You may choose any cryptographic algorithm (i.e. confidentiality or integrity based).Assume that your target audience has minimal understanding of cyber security. As a result you must ensure that you communicate your report outcomes in a simplistic manner. Use analogies diagrams and data flow diagrams to communicate the prominent themes in a simplistic manner. You must make use of adequate in-text references (correctly aligned to a reference list) throughout your entire report.

a simplistic manner. Use analogies if it enables you to communicate the identified issue in a simplistic manner. You must make use of adequate in-text references (correctly aligned to a reference list) throughout your entire report.

CSI6199 Report On Contemporary Cyber Security Issues Assignment

PRO TIP :

Always address the assignment instructions.

The keys to understanding the assignment instructions have been highlighted above.

For example (from the Assignment Brief):
1. This first task should convey to the reader what cryptographic algorithm you have selected is and why. This could be an algorithm used for achieving confidentiality or integrity. Keep your justification short but informative.

2. Analyse and critique. Analyse means to explore something methodically and in fine detail. Describe and analyse are completely different. Critique means to conduct a formal assessment of and draw substantiated opinions and conclusions.

3.Demonstrate what the security issue was and why it was of concern using an innovative communication strategy. Descriptive text is not an innovative communication strategy. Consider the way in which marketing companies sell you product. Do they write about their product? Or do they use creative techniques to draw your attention to the product? Hence using diagrams or similar approaches enables you to convey your message in a unique and engaging method.

CSI6199 Report On Contemporary Cyber Security Issues Assignment

CSI6199 Report On Contemporary Cyber Security Issues Assignment

4.Compare and contrast the legacy algorithm to modern alternatives. In other words how has/did a modern algorithm address the constraints of a legacy algorithm. Consider the first ever car auto mobile that was invented and made available to consumers.

This early car encompassed many issues (i.e. comfort safety performance reliability entertainment etc.). If you had to compare and contrast a car from 1880 to a car from 2020 there are many evident issues that have been addressed. When choosing your algorithm ensure you are comparing algorithms designed for similar purposes. In other words do not compare and contrast a horse with a car – because although they are both forms of transportation.

Assignment Example :-

The following are excerpts from an example vulnerability report and recommendations provided to client. The example provided does not cover analysis of TrueCrypt. This is an example of writing style and analysis methods only.

CSI6199 Report On Contemporary Cyber Security Issues Assignment

For the purposes of demonstration only, SQL Injection vulnerabilities have been discussed.

SQL injection should not be a consideration for your analysis and recommendations for this assignment.

The purpose of this report is to clearly communicate to nontechnical readers the findings from your research in to threats and vulnerabilities posed by a SQL injection attacks.

NOTE:
The example given is to help understand the requirements of the assignment only.
The annotated example does NOT provide a perfect assignment merely a guide that can help students understand what is expected as well what problems to look out for. As post graduate students it is up to you to perform the required assignment interpretation additional readings, background research and analysis sufficient to formulate a successful assignment response.

Excellent Assignment Help

We Aim At:

  • Lowest Price.
  • 100% Uniqueness.
  • Assignment Fastest Delivery.
Call Now : +61 363 877 039