For faster services, inquiry about  new assignments submission or  follow ups on your assignments please text us/call us on +1 (251) 265-5102

WhatsApp Widget

Assessment 2 Task Re-familiarise yourself with the information provided in the case study information PDF, and your previous submission for Assessment 1: Case Study Part 1, to help you formulate an answer to the following task. Assessment Task Evaluate the information you have been provided, both about the CricTech technical environment and the Ransomware attack, and propose, with justification, tools, processes, methods or procedures you think should be used to validate the security issues that exist within the technical environment you identified in Assessment 1

Assessment 2: Case Study – Part 2

Value: 15%

Length: 1400-2000 words

Assessment 2 is the second of three assessments that focus on a single case study of a specific security incident. In this case study you will act as an IT Security Consultant for your customer – CricTech Pty Ltd. Using the information provided in the referent document “ITI581 Case Study Information.pdf” provide answers to the tasks listed below for Assessment 2. Use the document entitled “Assessment 2 Template.docx” to submit your answers in the required format.

Assessment 2 Task

Re-familiarise yourself with the information provided in the case study information PDF, and your previous submission for Assessment 1: Case Study Part 1, to help you formulate an answer to the following task.

Assessment Task

Evaluate the information you have been provided, both about the CricTech technical environment and the Ransomware attack, and propose, with justification, tools, processes, methods or procedures you think should be used to validate the security issues that exist within the technical environment you identified in Assessment 1. (30 Marks)

 

Marking Criteria (Rubric)

 

Criteria
HD
DI
CR
PS
FL

 
 
 
 
 
 

Evaluate the
Students have
Students have
Students have
Students have
Students have

information
provided a
provided a
provided a
provided a
provided little

provided in
clear and
clear and very
clear and good
clear,
useful

the case study
comprehensive
good
evaluation of
adequate
evaluation of

and, using this
evaluation of
evaluation of
the case study
evaluation of
the case study

evaluation,
the case study
the case study
information
the case study
information

describe and
information
information
and clearly
information
and identified,

justify the
and clearly
and clearly
identified,
and identified,
described and

different
identified,
identified,
described and
described and
justified <3

methods,
described and
described and
justified 3-4
justified 3-4
security tools,

tools,
justified 6+
justified 5-6
security tools,
security tools,
methods,

processes or
security tools,
security tools,
methods,
methods,
processes or

procedures
methods,
methods,
processes or
processes or
procedures

that can be
processes or
processes or
procedures
procedures
that will

used to
procedures
procedures
that will
that will
provide little

identify
that will
that will
provide a good
provide an
understanding

security issues
provide a
provide a very
understanding
adequate
of the current

in the
comprehensive
good
of the current
understanding
security issues

technical
understanding
understanding
security issues
of the current
within the

environment.
of the current
of the current
within the
security issues
technical

(100%)
security issues
security issues
technical
within the
environment;

 
within the
within the
environment
technical
student

 
technical
technical
to a good
environment
demonstrates

 
environment
environment
standard;
to an adequate
an inadequate

 
to an
to a very good
student
standard;
grasp of

 
outstanding
standard;
demonstrates
student
cybersecurity

 
standard;
student
a good grasp of
demonstrates
concepts;

 
student
demonstrates
cybersecurity
an adequate
 

 
demonstrates
a very good
concepts;
grasp of
 

 
a superior
grasp of
 
cybersecurity
 

 
grasp of
cybersecurity
 
concepts;
 

 
cybersecurity
concepts;
 
 
 

 
concepts;
 
 
 
 

 
 
 
 
 
 

 

The post Assessment 2 Task Re-familiarise yourself with the information provided in the case study information PDF, and your previous submission for Assessment 1: Case Study Part 1, to help you formulate an answer to the following task. Assessment Task Evaluate the information you have been provided, both about the CricTech technical environment and the Ransomware attack, and propose, with justification, tools, processes, methods or procedures you think should be used to validate the security issues that exist within the technical environment you identified in Assessment 1 first appeared on My professonal Blog.

WhatsApp
Hello! Need help with your assignments?

For faster services, inquiry about  new assignments submission or  follow ups on your assignments please text us/call us on +1 (251) 265-5102

Submit Your Questions to Writers for FREE!!

X
GET YOUR PAPER DONE