Assessment 3 Information
Subjec tCode: | TECH2400 | ||
Subject Name: | Introduction to Cyber Security | ||
Assessment Title: | Protocol Presentation and Evaluation | ||
Assessment Type: | Presentation and Evaluation | ||
Word Count: | 10 | Minutes | (+/-10%) |
Weighting: | 40% | ||
Total Marks: | 40 | ||
Submission: | MyKBS | ||
: | Week13 |
Inthis assessment, you will undertake an individual task focused on conductinga comprehensive protocolanalysisusingWireshark.Yourobjectiveistothoroughlyexaminethenetworkprotocol trafficcapturedinthedumpfile,delvingintoitsvariousaspectstogainvaluableinsights.Building uponyour analysis, you will createacompelling presentation that not only highlights your findings but also establishes connections to the key concepts covered in class, showcasing your understandingoflearningoutcomeLO1.Thisassessmentservesasameanstoevaluateyour proficiency in network protocol analysis and your ability to apply this knowledge in practical scenarios.Additionally,itprovidesanexcellentopportunityforyoutodemonstrateyourskillsin analysingreal-worldnetworktrafficandeffectivelypresentingyourfindings.
Furthermore, this assessment requires you to defend your recommendations to diverse stakeholders,whichinvolvesarticulatingyourproposedstrategies,mitigations,andsolutionsina mannerthataddressestheconcernsandprioritiesofvariousstakeholders.Moreover,itexpects you to contextualise the terminology associated with cybersecurity in a way that is accessible and understandable for diverse stakeholders in the business environment. By effectively communicatingthesignificanceofyouranalysisandrecommendations,youwilldemonstrateyour abilitytobridgethegapbetweentechnicaljargonandthepracticalimplicationsofcybersecurityfor differentstakeholderswithinabusinesssetting.
LO1: | Contextualisetheterminologyassociatedwithcybersecurityfordiverse stakeholders in business. |
In the ever-evolvingandintricaterealmoftheinternet,characterisedbyanarrayofsophisticated threatsandtheconstantpresenceofcybercriminals,yourroleasacybersecurityprofessionaltakes onparamountsignificance.WiththenetworkprotocoltrafficWiresharkdumpfile,whichcaptured a pivotal event,your mission istometiculously examine itsintricacies. Your objective is to unravel the technical complexities inherent in this event, leaving no stone unturned. Armed with a comprehensive analysis, you will embark on the critical task of presenting your meticulously gatheredfindings,bridgingthegapbetweentechnicaljargonandthepracticalimplicationsof cybersecurity.Thisincludescontextualisingtheterminologyassociatedwithcybersecurityina mannerthatresonateswithdiversestakeholdersinthebusinesslandscape.Moreover,asan esteemedprofessionaloperatingatthehighestlevelofexpertise,youareexpectedtoengageina profounddiscourseonrobustdefensemechanisms.Bydoingso,youwillequiporganisationswith theknowledgeandstrategiesneededtofortifytheirdefensesagainstthisspecificformofattack.
<student_ID>.pcap).
Academic Integrity and Conduct Policy
https://www.kbs.edu.au/admissions/forms-and-policies
KBS values academic integrity.Allstudentsmustunderstandthemeaningandconsequencesofcheating, plagiarism and other academic offences under the Academic Integrity and Conduct Policy.
Please read the policy to lear nthe answers to the sequestions:
https://www.kbs.edu.au/admissions/forms-and-policies
Penalties may be applied for assessment submissions that exceed prescribed limits.
Students may seek study assistance from their local Academic Learning Advisor or refer to the resources on the MyKBS Academic Success Centre page. Further details can be accessed at https://elearning.kbs.edu.au/course/view.php?id=1481
Get original papers written according to your instructions and save time for what matters most.