|
Assessment Details and Submission Guidelines
|
|||||||||
|
Unit Code
|
MN502
|
||||||||
|
Unit Title
|
Overview of Network Security
|
||||||||
|
Assessment Type
|
Individual Assessment
|
||||||||
|
Assessment Title
|
Potential threats and mitigation tools for ransomware (Assignment one)
|
||||||||
|
Purpose of
|
the
|
Students should be able to demonstrate their achievements in the following
|
|||||||
|
assessment
|
(with
|
unit learning outcomes:
|
|||||||
|
ULO Mapping)
|
b. Analyse and discuss common emerging threats, attacks, mitigation
|
||||||||
|
and countermeasures in networked information systems
|
|||||||||
|
Total Marks
|
60
|
||||||||
|
Word limit
|
1500 – 2000
|
||||||||
Assignment Description
The security remains a challenge in networked information systems. One of the fastest evolving malware is ransomware. The ransomware embeds itself onto the computer in such a manner that it cannot be segregated, and even rebooting causes the ransomware to launch malicious code again. A ransomware continues to be a serious threat to the network users.
Assume you have an interview for the ransomware analyst position with Regal Security Solutions company. You are supposed to be prepared about the ransomware, their types, threats, and mitigation tools. In this context write a report including the following sections:
A. Introduction about ransomware and their impacts on the society
B. Discussion of any five variants of ransomware (Consider some recently developed ransomware)
C. The working mechanism of ransomware
D. Potential threats posed by ransomware
E. Case study of at least one recent attack carried out by the ransomware
F. Recommendations on any two mitigation tools to tackle the ransomware attack and discuss the effectiveness of the selected tools
G. Summary
H. References in IEEE Transactions on Networking style
Marking Criteria for the Assignment 1:
Marks are allocated as described in the following table.
|
Sections No.
|
Description of the section
|
Marks
|
|
|
Introduction
|
Introduction about ransomware and their impacts on the
|
05
|
|
|
society
|
|||
|
|
Introduction about ransomware
|
||
|
The impact of ransomware on the society
|
|||
|
|
The report outline
|
||
|
Variants of
|
Discuss any five variants of ransomware (Consider some
|
10
|
|
|
Ransomware
|
recently developed ransomware)
|
||
|
|
Draw taxonomy
|
||
|
Discuss the selected ransomware
|
|||
|
Working
|
The working mechanism of ransomware
|
05
|
|
|
Mechanism
|
Discuss the working mechanism of ransomware with
|
||
|
proper citation
|
|||
|
Potential
|
Potential threats posed by ransomware
|
10
|
|
|
Threats
|
|
System lockup
|
|
|
Encrypting and deleting the files
|
|||
|
Recent
|
Case study of one recent attack carried out by the ransomware
|
05
|
|
Attack
|
during 2017-2018 period.
|
|
|
Mitigation
|
Recommend any two mitigation tools to tackle the
|
15
|
|
Tools
|
ransomware attacks and discuss the effectiveness of these
|
|
|
tools
|
||
|
Discuss any two mitigation tools
|
||
|
Discuss the effeteness of selected mitigation tools in
|
||
|
terms of response time and resolution time
|
||
|
Summary
|
Summary
|
05
|
|
Summarise the overall contributions of the report
|
||
|
References
|
References
|
05
|
|
Must consider at least five current references from
|
||
|
journal/conference papers and books.
|
||
|
Must follow IEEE Transactions on Networking style
|
||
|
Total Marks
|
60
|
To get solution visit our website www.sourceessay.com
Source: New feed