This assignment assesses your understanding in relation to the following three course
1. analyse information security vulnerabilities and threats and determine appropriate controls
that can be applied to mitigate the potential risks
2. explain why continual improvement is necessary to maintain reasonably secure
information systems and IT infrastructure and to describe the role of disaster recovery and
business continuity plans in recovering information and operational systems when systems
and hardware fail
4. demonstrate an ability to communicate effectively both written and orally about the
management of information security in organisations.
This assignment assesses the following graduate skills: Problem Solving, Academic &
Professional Literacy and Oral and Written Communication at level 2.
This assignment relates to the topics covered in modules 1 to 10. This assignment can be
completed by groups of two students or as an individual assignment. Details regarding the
allocation of students to teams will be provided on the course study desk. Each student team
will be allocated their own discussion forum for assignment 3 to specifically work
collaboratively as a team in developing and discussing their approach to assignment 3 case
study and the required Security report and presentation. Regular participation in each
team’s discussion forum by the team members each week from Monday 8th September until
Friday 17th October is expected. Each team member will also be required to keep a journal of
their activities and progress related to completing this assignment and will form part of the
assessment for assignment 3. In date order clearly list the following:
• date of research activity/discussion
• topics researched or discussed
• time duration of activity.
Submit this journal for each team member as an appendix to the assignment 3
Recommendations report. Any reference to web pages and on line resources such as white
papers, blogs, wikis etc. should be listed at the end of the journal.
Regular participation on the discussion forums dedicated for this assessment is highly
recommended and can assist greatly with this assessment item. Also note that you are
expected to do research outside of the course materials provided.
Weighting Due date
Assignment 3 Report and Presentation based
CASE STUDY: BCX.COM
(A fictitious analysis of a security breach)
Length: 3000 words approx. plus Appendices
100 30% 17th
2014Case Study: BIGCOINX (A fictitious analysis of the importance
of Security in the Digital Currency World)
BigCoinX (BCX) is an Internet bitcoin exchange start-up founded in early 2013 riding on the boom of
interest in the bitcoin currency of the last few years.
Established by former work colleagues in the investment banking industry, Mark Buck (current CEO)
and Peter Gates (CTO), the company by late 2013 was relatively successful and doing an estimated
1% of all global bitcoin trades.
While in the scheme of things, the user base numbers seems good, both Mark and Peter know, that to
achieve a critical mass of users that will establish BCX as a “player” in the bitcoin world, they will
need to reach numbers upwards of 10% of global bitcoin trades.
With bitcoin being a hot topic and Internet start-ups springing up all the time to try to make money
from the bitcoin rush, BCX knows it has to stay ahead of the game.
The company is continually innovating and responding to user requirements, industry trends and
competitive challenges. Mark and Peter’s 5 person business, based in Sydney’s upcoming Technology
Hub, Redfern, is a busy and dynamic environment.
BCX is aiming to become profitable and self-sufficient by the end of 2014 at the latest. It is at this
time that their capital funds will be exhausted, but they estimate, once they hit the 3% global mark,
and have deployed into production their new bitcoin trading software, (both aggressively targeted for
October, 2014), they will have positive financial results.