Network Security
Assessment Details and Submission Guidelines
|
|||||||||
Unit Code
|
MN502
|
||||||||
Unit Title
|
Overview
of Network Security
|
||||||||
Assessment Type
|
Individual
Assessment
|
||||||||
Assessment Title
|
Potential
threats and mitigation tools for ransomware (Assignment one)
|
||||||||
Purpose of
|
the
|
Students
should be able to demonstrate their achievements in the following
|
|||||||
assessment
|
(with
|
unit learning
outcomes:
|
|||||||
ULO Mapping)
|
b. Analyse and
discuss common emerging threats, attacks, mitigation
|
||||||||
and
countermeasures in networked information systems
|
|||||||||
Total Marks
|
60
|
||||||||
Word limit
|
1500
- 2000
|
Assignment
Description
The
security remains a challenge in networked information systems. One of the
fastest evolving malware is ransomware. The ransomware embeds itself onto the
computer in such a manner that it cannot be segregated, and even rebooting
causes the ransomware to launch malicious code again. A ransomware continues to
be a serious threat to the network users.
Assume
you have an interview for the ransomware analyst position with Regal Security
Solutions company. You are supposed to be prepared about the ransomware, their
types, threats, and mitigation tools. In this context write a report including
the following sections:
A.
Introduction
about ransomware and their impacts on the society
B. Discussion
of any five variants of ransomware (Consider some recently developed ransomware)
C.
The
working mechanism of ransomware
D.
Potential
threats posed by ransomware
E.
Case
study of at least one recent attack carried out by the ransomware
F. Recommendations
on any two mitigation tools to tackle the ransomware attack and discuss the
effectiveness of the selected tools
G.
Summary
H.
References
in IEEE Transactions on Networking style
Marking Criteria for the Assignment 1:
Marks are
allocated as described in the following table.
Sections No.
|
Description of the section
|
Marks
|
|
Introduction
|
Introduction
about ransomware and their impacts on the
|
05
|
|
society
|
|||
|
Introduction about ransomware
|
||
The impact of ransomware on the society
|
|||
|
The report outline
|
||
Variants
of
|
Discuss
any five variants of ransomware (Consider some
|
10
|
|
Ransomware
|
recently
developed ransomware)
|
||
|
Draw taxonomy
|
||
Discuss the selected ransomware
|
|||
Working
|
The
working mechanism of ransomware
|
05
|
|
Mechanism
|
Discuss the working mechanism of ransomware
with
|
||
proper citation
|
|||
Potential
|
Potential
threats posed by ransomware
|
10
|
|
Threats
|
|
System lockup
|
|
Encrypting and deleting the files
|
|||
Recent
|
Case study of one recent attack carried out by the
ransomware
|
05
|
Attack
|
during
2017-2018 period.
|
|
Mitigation
|
Recommend any
two mitigation tools
to tackle the
|
15
|
Tools
|
ransomware
attacks and discuss the effectiveness of these
|
|
tools
|
||
Discuss any two mitigation tools
|
||
Discuss the effeteness of selected
mitigation tools in
|
||
terms of
response time and resolution time
|
||
Summary
|
Summary
|
05
|
Summarise the overall contributions of the
report
|
||
References
|
References
|
05
|
Must consider at least five current
references from
|
||
journal/conference
papers and books.
|
||
Must follow IEEE Transactions on Networking
style
|
||
Total
Marks
|
60
|
Comments
Post a Comment