CIS6006-Cyber Security WRIT1
CIS6006-Cyber Security WRIT1
CIS6006-Cyber Security WRIT1
Assessment Methods
Assessment Code Duration/Length Weighting Threshold Approximate
and Method of Assessment of Date of
Method Assessment Submission
PRES1 -- Group 15 minutes 25% 1 Mid module
Presentation
WRIT1 -- 3,000 word 75% 1 Throughout
Assignment equivalent
Aim(s)
This module aims to encourage students to critically reflect on a range of information security
concepts and topical issues including information security, cryptography, cryptoanalysis and
secure systems. Students will have the opportunity to analyse, assess risk and to evaluate,
design and implement secure cyber systems.
Learning Outcomes
Indicative Content
Data protection laws, data retention laws, data disclosure laws, computer misuse laws,
intellectual property laws, investigations, ethics, international standards.
Encryption and decryption, types of cipher, symmetric and asymmetric key systems,
message digests and signatures. Principle of least privilege, personnel and operations
controls, recording, monitoring and reporting, backup and recovery, automated testing,
penetration testing, media management, due diligence.
Required Reading
Keith, M (2017) Everyday Cryptography: Fundamental Principles and Applications, OUP
Oxford; 2nd edition.
Recommended Reading
Vacca, J (2013) Cyber Security and IT Infrastructure Protection, Syngress
Alexander, D., Finch, A., Sutton, D. and Taylor, A. (2013) Information Security
Management Principles (2nd ed.), BCS
Name
Student ID
Mode of delivery
Assessment Details
Topic of the Case Study Identifying the key components of Cyber security along with what are
the current problems and methodologies that have been followed in real
world.
Declaration
I certify that the attached material is my original work. No other person’s work or ideas have been used without
acknowledgement. Except where I have clearly stated that I have used some of this material elsewhere, I have not
presented it for examination / assessment in any other course or unit at this or any other institution
Name/Signature Date
Submission
Return to:
Result
Marks by 1st Name & Signature of the 1st Assessor Agreed Mark
Assessor
Comments on the
Agreed mark
CMU B.Sc. (HONS) BIS - ASSESMENT FEEDBACK SHEET –ICBT CAMPUS
For student use: Critical feedback on the individual progression towards achieving the assignment outcomes
Task Strengths
No/Quest
ion No
Task No / Weaknesses
Question
No
Marks
Total
Marks
Date
Scenario
GECH is the newly formed crypto currency and it’s going to be the next booming currency type among
crypto currencies with very high market share. Interested users can hire or purchase online servers and
virtual platforms to mining their currency and save them on their own virtual wallets.
As well GECH company make a platform to their customers to spend this crypto currency on different
platforms to make different payments. Also they allow customers to convert GECH to dollars, euro, yen
like leading currencies if customers want, also again this can save on their personal wallet and use for
any online payments.
Now this company GECH, connected with most of the companies and banks in different countries to
provide this service to customers using advance third party services, APIs and advance different Add-
Ons. Customers can make their own account on web or mobile platform to maintain all these services
with effective manner.
Task 01
You need to consider about the Identity and Access Management (IAM) strategy for this GECH platform.
Conduct a research and propose how do you manage triple-A concept (authentication, authorization
and auditing) of the application by utilization technologies like SSO federation with OpenID and access
controls with OAuth2. Consider how do you provide APIs for this GECH company.
(25 marks)
Task 02
This will be a critical application for all customers as their all crypto currency, converted currency are
stored in this platform. You need to propose a Business continuity plan for the GECH Company. Conduct
a Business Impact Analysis (BIA) by following correct Business Impact Analysis Process with help of Risk
Assessment and identify key services. Then suggest controls and actions to prevent or minimize the
damage to support business continuity. Here you need to consider aspects such as facility recovery and
Hardware and Software recovery.
(20 marks)
Task 03
As this application involves with different users in different countries, confidentiality is a crucial aspect
of the system. Explain how do you achieve CIA (Confidentiality, Integrity and Availability) properties with
this system. You need to consider how to apply them in storage and during transmission or data over
the internet. (25 marks)
Task 04
Managing well standard secure environment is very much important within this platform. Discuss how
ISO 27000 certification provides well defined standards and practices to preserve CIA within the GECH
organization. On the other hand, it will be a good indication for GECH customers who mainly interact
with this platform as they seriously consider about information security integrity. Select few controls
from ISO 27000 which could be applicable for this organization and mention the objectives of those.
Consider about ethical aspect of the system and discuss how do you enforce rules and policies within
GECH? (20 marks)
Task 05
The report must be of properly formatted and adhere to the guidelines. All the sources must be
correctly cited using Harvard referencing method.
(10 Marks)
This assignment is not covering the entire unit; it covers following learning outcomes.
Task 01 & 03
• Demonstrate understand of and justify the use of appropriate security and cryptographic techniques
for the design and implementation of secure systems
Task 02
• Identify and evaluate information security risks in a variety of real world environments
Task 04
Task 1
Task 2
Task 3
Task 4
(>=70%): Critically discuss how the ISO 27001 guidelines can 14-20
be effectively implemented in the selected controls
Task 5