Assessment 2: Case Study – Part 2
Value: 15%
Length: 1400-2000 words
Assessment 2 is the second of three assessments that focus on a single case study of a specific security incident. In this case study you will act as an IT Security Consultant for your customer – CricTech Pty Ltd. Using the information provided in the referent document “ITI581 Case Study Information.pdf” provide answers to the tasks listed below for Assessment 2. Use the document entitled “Assessment 2 Template.docx” to submit your answers in the required format.
Assessment 2 Task
Re-familiarise yourself with the information provided in the case study information PDF, and your previous submission for Assessment 1: Case Study Part 1, to help you formulate an answer to the following task.
Assessment Task
Evaluate the information you have been provided, both about the CricTech technical environment and the Ransomware attack, and propose, with justification, tools, processes, methods or procedures you think should be used to validate the security issues that exist within the technical environment you identified in Assessment 1. (30 Marks)
Marking Criteria (Rubric)
Criteria
HD
DI
CR
PS
FL
Evaluate the
Students have
Students have
Students have
Students have
Students have
information
provided a
provided a
provided a
provided a
provided little
provided in
clear and
clear and very
clear and good
clear,
useful
the case study
comprehensive
good
evaluation of
adequate
evaluation of
and, using this
evaluation of
evaluation of
the case study
evaluation of
the case study
evaluation,
the case study
the case study
information
the case study
information
describe and
information
information
and clearly
information
and identified,
justify the
and clearly
and clearly
identified,
and identified,
described and
different
identified,
identified,
described and
described and
justified <3
methods,
described and
described and
justified 3-4
justified 3-4
security tools,
tools,
justified 6+
justified 5-6
security tools,
security tools,
methods,
processes or
security tools,
security tools,
methods,
methods,
processes or
procedures
methods,
methods,
processes or
processes or
procedures
that can be
processes or
processes or
procedures
procedures
that will
used to
procedures
procedures
that will
that will
provide little
identify
that will
that will
provide a good
provide an
understanding
security issues
provide a
provide a very
understanding
adequate
of the current
in the
comprehensive
good
of the current
understanding
security issues
technical
understanding
understanding
security issues
of the current
within the
environment.
of the current
of the current
within the
security issues
technical
(100%)
security issues
security issues
technical
within the
environment;
within the
within the
environment
technical
student
technical
technical
to a good
environment
demonstrates
environment
environment
standard;
to an adequate
an inadequate
to an
to a very good
student
standard;
grasp of
outstanding
standard;
demonstrates
student
cybersecurity
standard;
student
a good grasp of
demonstrates
concepts;
student
demonstrates
cybersecurity
an adequate
demonstrates
a very good
concepts;
grasp of
a superior
grasp of
cybersecurity
grasp of
cybersecurity
concepts;
cybersecurity
concepts;
concepts;
The post Assessment 2 Task Re-familiarise yourself with the information provided in the case study information PDF, and your previous submission for Assessment 1: Case Study Part 1, to help you formulate an answer to the following task. Assessment Task Evaluate the information you have been provided, both about the CricTech technical environment and the Ransomware attack, and propose, with justification, tools, processes, methods or procedures you think should be used to validate the security issues that exist within the technical environment you identified in Assessment 1 first appeared on My professonal Blog.