On successful completion of this module students will be able to:
Assignment support:
Although you will be guided throughout the module by your lecturer, you can get extra support for your assignment, just make an appointment with the ACE team for any language, research and study skills issues and/or talk, email the Computing ACE expert for any advice on how to approach your assignment. REMEMBER: they are not here to give you the answers!
Deliverables:
Coursework 2 is an individual report and will be submitted as a MS Word document (suggested word count: 2000 words in total excluding all diagrams, documentation and description) via Turnitin on Moodle and must include all the required components.
Coursework 2 is worth 60% of the overall assignment. The assignment preparation guidelines are outlined below:
Submission instructions:
Submit in due time in Turnitin on Moodle. Late submission, where the student submits work seven calendar days after the deadline up to 2pm, will be accepted and marked. The percentage mark for the component of assessment will be capped at 40%.
Coursework Brief
Attempt all the following tasks in the assignment. Marks will be awarded for producing a documented system that meets the requirements as specified below.
Please specify the task number in your assignment.
Task 1: Security vulnerabilities
You are an Information Security officer working for InfoIT Limited. You have been informed of some vulnerabilities in your company's web server. These can be seen in the following list:
a.Give a detailed explanation of how each vulnerability from the above list can be exploited and give recommendations on what should be done against each of them.
b.You have been told that one of your application has a "SQL injection" vulnerability. What tool/techniques can be used to detect and exploit "SQL injection"? Perform a SQL injection using an appropriate tool and demonstrate steps with brief explanation.
Task 2: Social Engineering
According to Barracuda Networks (2020), phishing emails have spiked by over 600% since the end of February as cyber-criminals look to capitalise on the fear and uncertainty generated by the COVID-19 pandemic. The security vendor observed just 137 incidents in January, rising to 1188 in February and 9116 in March. Around 2% of the 468,000 global email attacks detected by the firm were classified as COVID-19-themed. These attacks used widespread awareness of the pandemic to trick users into handing over their log-ins and financial information, and/or unwittingly downloading malware to their computers of the COVID-19 phishing attacks, 54% were classed as scams, 34% as brand impersonation attacks, 11% blackmail and 1% as business email compromise (BEC) (Infosecurity Magazine, 2020).
Task 3: Business Continuity Management
Despite the progress made on the implementation of Business Continuity Management (BCM) within organisations for nearly over two decades, the depth and breadth of planning in smaller firms remains a cause for concern. Over the past 10 years, there has been a greater focus on the risks associated with supply chains. Additionally, due to the pressure from larger customers, some SMEs have implemented BCM programmes which increase certification and compliance expectations. However, there is much scepticism about whether or not international standards for BCM, such as ISO 22301, can be applied to the SME marketplace. Keeping this in mind:
Task 4: Ethical hacking