首页
网站开发
桌面应用
管理软件
微信开发
App开发
嵌入式软件
工具软件
数据采集与分析
其他
首页
>
> 详细
代写 CYBR7001、代做 C++,Python 程序设计
项目预算:
开发周期:
发布时间:
要求地区:
The University of Queensland
CYBR7001 Fundamentals of Cyber Security
Assignment 1 – Individual Work
Due Date: 02 September 1400hrs (Brisbane time)
Total possible score: 100 marks (which contributes to 35% of total CYBR7001 assessment score)
Submission: Only via Learn.UQ Blackboard site. Submit only in PDF format. Remember to put your name and student
ID on the submission document.
Please observe strict academic integrity. All submissions will be checked by Turn-it-in for plagiarism and for original written
content. Submissions with 20% or higher similarity scores will be flagged for disciplinary action.
Part 1: Situation Assessment and Policy Brief (50 marks)
In this part of the assignment, you will take on the role of policy adviser of Lucky Country (LC) as part of a
hypothetical cybersecurity taskforce, preparing to brief the LC Prime Minister’s Committee on National Security.
This assignment information document contains fictional information on the background and current situation
involving a major cyber incident affecting systems. The attacks notionally take place in 2024. The scenario
presents a fictional account of political developments and public reporting surrounding the cyber incident.
The LC Prime Minister’s Committee on National Security needs information on the full range of response options
available to them regarding this incident. Your team has been tasked with developing an appropriate course of
action for them to recommend to the LC Prime Minister.
You are to consider as facts the following pages for formulating your response.
You will use the fictional scenario material presented to write a Situation Assessment and Policy Brief (no
more than 2 A4-sized pages; Arial font size 10):
Write an analytical policy brief that provides a concise assessment of the situation, addresses potential impacts
and risks, and discusses the implications of the cyber incident. Describe policy considerations for different
potential state and non-state actors and explore the course of action you are recommending in depth.
The length of the brief is limited to two single-sided pages in length.
Part 1 marking rubrics:
- 15 marks – Quality of situational assessment and analysis depth
- 10 marks – Quality of immediate/short-term recommendations
- 10 marks – Quality of long-term recommendations
- 10 marks – Clarity of communication to appropriate audience
- 5 marks – Writing style, grammar, structure and formatting
Keep these tips in mind as you are reading and considering your policy response alternatives:
● Analyse the issues. The goal of this assignment is to grapple with complex issues and weigh the strengths and
weaknesses of sometimes conflicting interests. Priority should be given to analysis of the issues and not to listing
all possible issues or solutions.
● Engage the scenario. Believe that the universe we have created is plausible and that the events that happen in
it are realistic. Nevertheless, remember to think critically about the intelligence you have been provided and its
provenance.
● Think multi-dimensionally. When analysing the scenario, remember to consider implications for other
organizations and domains (e.g. private sector, military, law enforcement, diplomatic) and incorporate these
insights along with cyber security.
● Consider who you are, and who you’re briefing. You are cyber policy professionals briefing the upper echelons
of the Lucky Country government, which happened to have a very similar cyber security ecosystem as
that of its ally Australia. As such, you should be ready to answer questions on agency responsibility, provide
justifications for your recommendations, and have potential alternatives ready. In other words, for ease of
describing the organisations in the ecosystem, you may use Australian organisations/agencies (e.g.
LCCSC likened to ACSC, or any organisation from the Patrick Fair overview) in your brief.
● Be creative. Cyber policy is an evolving discourse, and there is no single correct course of action to the
scenario information provided. There are many ideas to experiment with in responding to the crisis.
Note: Most of this part of the assignment is based on and referenced from the Atlantic Council Cyber 9/12 cyber competition packages. All
materials included are fictional and were created only for the purpose of this assignment. All scenario content is for academic purposes and is not
meant to represent the views of the university, authors, or any affiliated organizations. All names and places, if relating to any real-world
characters or places, are purely coincidental. If you score really well, we may nominate you to represent UQ at the next competition. J
CYBR7001 Assignment 1
2
From: Lucky Country (LC) Cyber Security Centre
Re: Vulnerabilities in Key LC Systems Date: August 5th, 2024
As senior policy advisers preparing to brief the Prime Minister’s Committee on
National Security on a developing threat to LC, I’ll let you know what her leading
worries are.
Based off initial intelligence, the Prime Minister has indicated that she is concerned
about threat vectors concerning the status of LC electricity supply security and how
it could affect the rest of the nation. There may be other threat vectors that the
PM is not yet aware of.
Given the unclear nature of the threat, the PM requests your team prepare a concise
assessment of the ongoing situation and reporting. Your assessment should include:
How or where the relevant systems could be vulnerable to exploitation, and
what steps can be made to mitigate these vulnerabilities;
An assessment of potential risks and impacts to consider if the vulnerabilities
are successfully exploited; and
Immediate and long-term responses the LC government can or should consider to
address these vulnerabilities, taking into account the severity and likelihood
of the threat.
To provide this assessment and policy recommendations, you will apply your
understanding of UQ’s CYBR7001 (e.g. elements of cyber security threats,
vulnerabilities, technologies involved, law, foreign policy, international relations,
criminology) to synthesize useful policy measures from limited information. Your
recommendation must analyse the possible strengths, weaknesses, opportunities, and
threats of your proposed response.
As policy advisers, in formulating your response you will be expected to have
considered, at a minimum:
All stakeholders when determining an action or recommendation, including the
role of the government and private sector;
The long and short-term impacts of your recommendation;
Which agency will be responsible for the action you have recommended,
Whether you can, or should, attribute the threat; and
The covert or overt nature of your response.
Additionally, this message is accompanied by several documents that may assist your
team in preparing a comprehensive policy recommendation for the task force:
Tab 1 – LCNN Article #1
Tab 2 – LCNN Article #2
Twitter feeds
CYBR7001 Assignment 1
3
LCNN Article #1
[Breaking] Devastating Power Outage Across Lucky
Country’s East Coast
5th August 2024 0600 hrs LCT
Report by Jonathan de Souza
A power cut has hit all cities and towns along the entire east coast of the Lucky Country. The blackout
lasted just over five hours and started just before 11pm on 4th August 2024, causing service disruption
and possible life loss.
The blackout caused all traffic lights and telecommunication base stations to malfunction and essential
services to run on backup generator power. Several traffic accidents have occurred across most cities
along the east coast. At least three hospitals reported power outages after their backup power were
depleted after three hours, causing disruption to hospital operating theatres and intensive care units
(ICU).
There have been unconfirmed reports of a handful of patients affected by the disrupted operations and
social media coverage of the chaos at affected emergency departments.
Prime Minister Michelle Macintosh said the blackout was attributed to the outage of the grid system
linking the entire east coast of the country and cited possible cyber-attacks on the country’s grid systems.
The PM has activated the LC Defence Force to assist in all affected areas. She also urged all citizens
to remain calm and stay indoors wherever possible.
The PM elaborated that the attack was likely caused by a state actor deploying an advanced persistent
threat vector on the power grid’s industrial control systems. When asked by LCNN, the PM refused to
name the state actor involved.
Cyber security expert Professor Andrew Cole said the electricity and power supply industry has been a
sitting duck to cyber-attacks for a long time, with power companies guilty of ignoring the risks repeatedly
highlighted by the LC Cyber Security Centre and many cyber security professionals.
He said that power companies are guilty of negligence and bad governance, since the attacks were
similar to the attacks on the Ukrainian power plants in 2015 and 2016, the January 2024 Ukraine cyber-
attacks on government websites, and more recently, a smaller scale series of power outages on LC’s
Old North Wales (ONW) state in June 2024.
The cyber-security company Information Security and Assurance Partners (ISAP) has linked the
incident to the hack and ONW blackout in June 2024 that affected 225,000. It also said a series of other
recent attacks in South America were connected.
CEO of Power Lucky Country, Mr Bradley Wilson, the company managing the grid line on LC’s East
Coast, denied these accusations and said that the company has passed all cyber security audits and
is certified to the ISO/IEC 27001 cyber security standard.
The chief police commissioner, Commissioner Wilfred Chan, urged all members of the public to remain
indoors and report possible looting to the police.
Access to electricity is a major contention as the price of electricity has risen sharply across the country
despite the increased unreliability of the providers. The loss of power could impact essential services
and businesses throughout Lucky Country. The debate seems likely to continue further still as the
country enters one of the coldest winters on record.
More to come…
CYBR7001 Assignment 1
4
LCNN Article #2
Lucky Country Announces Sanctions on the
Democratic People’s Republic of Korrelle
20th May 2024 0900 hrs LCT
Report by Santokh Singh
The Prime Minister of Lucky Country Michelle Macintosh has announced that Lucky Country will impose
economic sanctions and bans on all petroleum imports and coal exports for the Democratic People’s
Republic of Korelle (DPRK).
With this announcement, Lucky Country has joined at least five other nations announcing similar
sanctions on the country embroiled in years of conflict with its neighbouring countries. The move is
likely going to impact the already-impoverished DPRK, which has largely depended on fuel imports for
its local economy.
United Nations experts said in key sections of a recently released report obtained on 10th May by LCNN
that DPRK has also evaded sanctions through “targeted” cyber attacks against officials of 10 countries
on the U.N. Security Council and on members of its expert panel. They did not elaborate or identify
which of the 10 council nations were targeted.
In the report to the U.N. Security Council, the experts said DPRK has maintained its nuclear facilities
and continues to produce fissile material, including highly enriched uranium, that can be used in nuclear
weapons. It has also continued “to develop infrastructure and capacity for its ballistic missile program”
and moved ahead on construction of an experimental light water reactor, they said.
CYBR7001 Assignment 1
5
Twitter Feeds
(Note: Do not post these fictitious tweets online)
CYBR7001 Assignment 1
6
Part 2 – Case Study (50 marks)
In this part of the assignment, you will take on the role of Chief Information Security Officer (CISO) of Norsk
Hydro when it was just struck by a cyber-attack.
See: https://news.microsoft.com/transform/hackers-hit-norsk-hydro-ransomware-company-responded-transparency/
You are encouraged to do your own research.
Write an advisory (limited to 800 words) for the company’s senior management
o Using the Lockheed Martin Cyber Kill Chain as a visual tool, detail the events which led to the cyber-attack.
(5 marks)
o Describe the actor(s), motivation(s) and vulnerabilities involved in this attack. (10 marks)
o Recommended actions for the company. (10 marks)
o In bullet point form, key things to note for a media press release to media companies. (10 marks)
o Longer-term mitigation strategies for the company to prevent such attacks from happening again (hint: many
strategies and approaches were described in the CYBR7001 lectures). (15 marks)
(Note that the word limit is strict. Exceeding the word limit may result in penalties).
End of Assignment 1
软件开发、广告设计客服
QQ:99515681
邮箱:99515681@qq.com
工作时间:8:00-23:00
微信:codinghelp
热点项目
更多
代写data driven business mod...
2024-11-12
代做acct1101mno introduction...
2024-11-12
代做can207 continuous and di...
2024-11-12
代做dsci 510: principles of ...
2024-11-12
代写25705 financial modellin...
2024-11-12
代做ccc8013 the process of s...
2024-11-12
代做intro to image understan...
2024-11-12
代写eco380: markets, competi...
2024-11-12
代写ems726u/p - engineering ...
2024-11-12
代写cive5975/cw1/2024 founda...
2024-11-12
代做csci235 – database syst...
2024-11-12
代做ban 5013 analytics softw...
2024-11-12
代写cs 17700 — lab 06 fall ...
2024-11-12
热点标签
mktg2509
csci 2600
38170
lng302
csse3010
phas3226
77938
arch1162
engn4536/engn6536
acx5903
comp151101
phl245
cse12
comp9312
stat3016/6016
phas0038
comp2140
6qqmb312
xjco3011
rest0005
ematm0051
5qqmn219
lubs5062m
eee8155
cege0100
eap033
artd1109
mat246
etc3430
ecmm462
mis102
inft6800
ddes9903
comp6521
comp9517
comp3331/9331
comp4337
comp6008
comp9414
bu.231.790.81
man00150m
csb352h
math1041
eengm4100
isys1002
08
6057cem
mktg3504
mthm036
mtrx1701
mth3241
eeee3086
cmp-7038b
cmp-7000a
ints4010
econ2151
infs5710
fins5516
fin3309
fins5510
gsoe9340
math2007
math2036
soee5010
mark3088
infs3605
elec9714
comp2271
ma214
comp2211
infs3604
600426
sit254
acct3091
bbt405
msin0116
com107/com113
mark5826
sit120
comp9021
eco2101
eeen40700
cs253
ece3114
ecmm447
chns3000
math377
itd102
comp9444
comp(2041|9044)
econ0060
econ7230
mgt001371
ecs-323
cs6250
mgdi60012
mdia2012
comm221001
comm5000
ma1008
engl642
econ241
com333
math367
mis201
nbs-7041x
meek16104
econ2003
comm1190
mbas902
comp-1027
dpst1091
comp7315
eppd1033
m06
ee3025
msci231
bb113/bbs1063
fc709
comp3425
comp9417
econ42915
cb9101
math1102e
chme0017
fc307
mkt60104
5522usst
litr1-uc6201.200
ee1102
cosc2803
math39512
omp9727
int2067/int5051
bsb151
mgt253
fc021
babs2202
mis2002s
phya21
18-213
cege0012
mdia1002
math38032
mech5125
07
cisc102
mgx3110
cs240
11175
fin3020s
eco3420
ictten622
comp9727
cpt111
de114102d
mgm320h5s
bafi1019
math21112
efim20036
mn-3503
fins5568
110.807
bcpm000028
info6030
bma0092
bcpm0054
math20212
ce335
cs365
cenv6141
ftec5580
math2010
ec3450
comm1170
ecmt1010
csci-ua.0480-003
econ12-200
ib3960
ectb60h3f
cs247—assignment
tk3163
ics3u
ib3j80
comp20008
comp9334
eppd1063
acct2343
cct109
isys1055/3412
math350-real
math2014
eec180
stat141b
econ2101
msinm014/msing014/msing014b
fit2004
comp643
bu1002
cm2030
联系我们
- QQ: 9951568
© 2021
www.rj363.com
软件定制开发网!