Sample Exam Paper (2)

.docx

School

University of New South Wales *

*We aren’t endorsed by this school

Course

1701

Subject

Information Systems

Date

Jun 23, 2024

Type

docx

Pages

5

Uploaded by AdmiralTeamCaterpillar31

THE UNIVERSITY OF NEW SOUTH WALES SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY MANAGEMENT TERM 3 2023 INFS1701: NETWORKING AND SECURITY FINAL EXAMINATION 1. Writing Time: 2 Hours. 2. Reading and Submission Allowance Time: 1 Hour. 3. This is an Online Open-Book Exam, your responses must be your original work. You must attempt this Final Exam by yourself without any help from others. Thus, you have NOT worked, collaborated or colluded with any other persons in formulating your responses. The work that you are submitting for your Final Exam is your OWN work. 4. Release date/time (via Moodle): day, Date 8:00am / 1:00pm (Australian Eastern Time Zone) 5. Submission date/time (Via Turnitin): day, Date 12:00pm / 5:00pm (Australian Eastern Time Zone) 6. Failure to upload the exam by the submission time will result in a penalty of 15% of the available marks per hour of lateness. 7. This Examination Paper has 5 pages, including the cover page. 8. Total number of Questions: 7 Questions. 9. Answer all 7 Questions. 10. Total marks available: 100 marks. This examination is worth 50 % of the total marks for the course. 11. Questions are not of equal value. Marks available for question sub-parts are shown on this examination paper. 12. Some questions have word limits as indicated on the question. These word limits must be adhered to. Text in excess of the specified word limit(s) may not be considered in the marking process. 13. Answers to questions are to be written in the exam answer sheet template provided. Please ensure that you provide all details required on the cover
sheet of your Final Exam answer sheet. Make sure you name the answer file using your zID for example z1234567.pdf 14. Failure to submit exam answers with the correct exam answer sheet will result in 10% penalty of your overall exam marks. 15. Students are reminded of UNSW’s rules regarding Academic Integrity and Plagiarism . Plagiarism is a serious breach of ethics at UNSW and is not taken lightly. For details, see Examples of plagiarism . 16. The use of any generative AI tools or services to search for or generate information or answers is prohibited. If its use is detected, it will be regarded as serious academic misconduct and subject to the standard penalties, which may include 00FL, suspension and exclusion. 17. This Final Exam is an open book/open web, and further information is available “ Here ”. You are permitted to refer to your course notes, any materials provided by the course convenor or lecturer, books, journal articles, or tutorial materials. It is sufficient to use in-text citations that include the following information: the name of the author or authors; the year of publication; the page number (where the information/idea can be located on a particular page when directly quoted), For example, (McConville, 2011, p.188). You are required to cite your sources and attribute direct quotes appropriately when using external sources (other than your course materials). When citing Internet sources, please use the following format: website/page title and date. If you provide in-text citations, you MUST provide a Reference List. The Reference list will NOT BE counted towards your word limit. 18. Students are advised to read the Final Exam paper thoroughly before commencing. 19. The Lecturer-in-Charge (LiC) / Exam Referee will be available online (via Moodle) after the Open-book Exam paper is released for a period of one hour. PAGE 2 OF 5
This exam relates to the following case study. Read all aspects of the case study thoroughly before attempting the questions that follow. All your answers must be related to this case study. You currently work in the IT department of a loyalty services provider called BuyGood. Many other businesses sign up for BuyGood’s loyalty program as a way to gain better insights into their customers’ shopping behaviours. These businesses encourage their customers to use BuyGood regularly in return for incentives such as discounts on their purchases and occasional free items. In return, BuyGood provides these businesses with insights about shopping trends, behaviours, and forecasts. For various reasons, BuyGood has not had a strategic position about its cybersecurity and therefore, has not hired dedicated cybersecurity personnel and/or created a cybersecurity department responsible for protecting against cybersecurity incidents. The following diagram depicts the way in which BuyGood, other businesses that use BuyGood services and their customers interact with each other: Note that the ‘Actor’ could be a customer or a threat actor. In light of some recent cybersecurity breaches in Australia and overseas, BuyGood realises that it needs to improve its cybersecurity position. Your manager knows you are very interested in all things cybersecurity, and as a graduate of UNSW, she knows you have all the right credentials to advise BuyGood about their way forward with cybersecurity. She has suggested that you be appointed as their cybersecurity advisor. You have been asked to provide a briefing paper to your manager to enable her to update senior executives of BuyGood about their cybersecurity position and what they should do to protect their operations. Your manager needs to update the board in three hours so your answers must be PAGE 3 OF 5
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help