Skip to document

CSE -Spring 20-21-Assign 1

Course

Computer and Network Security (ECC4703)

68 Documents
Students shared 68 documents in this course
Academic year: 2020/2021
Uploaded by:
350Uploads
130upvotes

Comments

Please sign in or register to post comments.

Preview text

CSE210 – Spring 20 -21 – Assignment#

Objective and Overview Marks: out of 10 %

▪ Identify, describe and evaluate the levels of protection and response to security threats

Grading Rules - rubric Individual Submission

▪ Evaluation Criteria:

o Correctness and clarity:

▪ The answer is correct and has no factual mistakes.

▪ The answer is explained with clear language and is supported by

illustrating examples whenever necessary. o Completeness:

▪ The answer covers all required elements/criteria.

o Critical analysis

▪ Justifications and reasoning are logical and supported by logical

arguments.

▪ The student makes reflections from his/her own opinion whenever

necessary. o Format

▪ Report is properly formatted using consistent font size/style,

consistent alignment, page numbers, captions, and headers.

▪ Proper citation and referencing is applied wherever appropriate.

5% Part (A)

5% Part (B)

Submission Rules

▪ Submit in word or PDF format on blackboard.

▪ Include the front page with All the details (Course description, Student id, name etc.)

▪ Please note this is an individual assignment.

▪ Use proper referencing wherever required.

▪ Due on 2oth March 2021 – late submissions will be penalized. Reports will be scanned for similarity

and high similarity score will be penalized.

  • Analyze the Case Studies/Articles on BB then complete Part (A) and Part (B) tasks.

Part (A)

Background / Scenario

Security breaches occur when individuals or applications are trying to gain unauthorized access to data, applications, services, or devices. During these breaches, the attackers, whether they are insiders or not, attempt to obtain information that they could use for financial gains or other advantages. In this task, you will explore a few security breaches to determine (1) what was taken, (2) what exploits were used, and (3) what you can do to protect yourself.

o Read the following 2 articles available on your BB:Missing drives contained PHI on 950K Centene customers.Article 29 Working Party still not happy with Windows 10 privacy controls o Conduct some search to look for similar incidents/attacks (at least 5) and record the findings in the below table:

Incident Date

Affected Organization

How many victims?

What was Taken?

What exploits were used?

How do you protect yourself?

Reference Source

Was this document helpful?

CSE -Spring 20-21-Assign 1

Course: Computer and Network Security (ECC4703)

68 Documents
Students shared 68 documents in this course
Was this document helpful?
CSE210 Spring 20-21 Assignment#1
Objective and Overview
Marks: out of 10%
Identify, describe and evaluate the levels of protection and response to security threats
Grading Rules - rubric
Individual Submission
Evaluation Criteria:
o Correctness and clarity:
The answer is correct and has no factual mistakes.
The answer is explained with clear language and is supported by
illustrating examples whenever necessary.
o Completeness:
The answer covers all required elements/criteria.
o Critical analysis
Justifications and reasoning are logical and supported by logical
arguments.
The student makes reflections from his/her own opinion whenever
necessary.
o Format
Report is properly formatted using consistent font size/style,
consistent alignment, page numbers, captions, and headers.
Proper citation and referencing is applied wherever appropriate.
5% Part (A)
5% Part (B)
Submission Rules
Submit in word or PDF format on blackboard.
Include the front page with All the details (Course description, Student id, name etc.)
Please note this is an individual assignment.
Use proper referencing wherever required.
Due on 2oth March 2021 late submissions will be penalized. Reports will be scanned for similarity
and high similarity score will be penalized.
Analyze the Case Studies/Articles on BB then complete Part (A) and Part (B) tasks.
Part (A)
Background / Scenario
Security breaches occur when individuals or applications are trying to gain unauthorized access to data,
applications, services, or devices. During these breaches, the attackers, whether they are insiders or not,
attempt to obtain information that they could use for financial gains or other advantages. In this task,
you will explore a few security breaches to determine (1) what was taken, (2) what exploits were
used, and (3) what you can do to protect yourself.
o Read the following 2 articles available on your BB:
Missing drives contained PHI on 950K Centene customers.
Article 29 Working Party still not happy with Windows 10 privacy controls
o Conduct some search to look for similar incidents/attacks (at least 5) and record the findings
in the below table: