VU21990_AE_Pro_2of3 (1)
docx
keyboard_arrow_up
School
TAFE NSW - Sydney Institute *
*We aren’t endorsed by this school
Course
22334VIC
Subject
Information Systems
Date
Apr 3, 2024
Type
docx
Pages
10
Uploaded by MegaIceFlamingo6004
Project assessment: Cyber security attacks and techniques
Criteria
Unit code, name and release number
VU21990 Recognise the need for cyber security in an organisation
Qualification/Course code, name and release number
22334VIC Certificate IV in Cyber Security
Student details
Student number
Student name
Assessment Declaration
●
This assessment is my original work and no part of it has been copied from any other source except where due acknowledgement is made.
●
No part of this assessment has been written for me by any other person except where such collaboration has been authorised by the assessor concerned.
●
I understand that plagiarism is the presentation of the work, idea or creation of another person as though it is your own. Plagiarism occurs when the origin of the material used is not
appropriately cited. No part of this assessment is plagiarised.
Document title: VU21990_AE_Pro_2of3
Page 1 of 10
Resource ID: TBS_18_028_VU21990_AE_Pro_2of3 STUDENT NAME: YENENEW SHUMALEM MEKONEN
Student signature and Date
Document title: VU21990_AE_Pro_2of3
Page 2 of 10
Resource ID: TBS_18_028_VU21990_AE_Pro_2of3 STUDENT NAME: YENENEW SHUMALEM MEKONEN
Version:
1.0
Date created:
18 December 2018
Date modified:
15 January 2019
For queries, please contact:
Technology and Business Services SkillsPoint
Ultimo
© 2018 TAFE NSW, Sydney
RTO Provider Number 90003 | CRICOS Provider Code: 00591E
This assessment can be found in the: Learning Bank
The contents in this document is copyright © TAFE NSW 2018, and should not be reproduced without the permission of the TAFE NSW. Information contained in this document is correct at time of printing: 19 February
2020. For current information please refer to our website or your teacher as appropriate.
Document title: VU21990_AE_Pro_2of3
Page 3 of 10
Resource ID: TBS_18_028_VU21990_AE_Pro_2of3 STUDENT NAME: YENENEW SHUMALEM MEKONEN
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Assessment instructions
Table 1 Assessment instructions
Assessment details
Instructions
Assessment overview
The objective of this assessment is to assess your knowledge and performance to identify common and emerging cyber security attacks and techniques.
Assessment Event number
2 of 3
Instructions for this assessment
This is a project-based assessment and will be assessing you on your knowledge and performance of the unit.
This assessment is in two parts and includes an Assessment feedback form:
1.
Attacks and techniques presentation
2.
Assessment checklist
3.
Assessment feedback
Submission instructions
On completion of this assessment, you are required to upload it or hand
it to your assessor for marking. Save your files with the event name and your own name, for example: Event1_john_smith
.
Ensure you have written your name at the bottom of each page of your assessment.
Submit the following documents for each part:
●
Part 1
o
Presentation file
o
A screen recording or link to recording.
It is important that you keep a copy of all electronic and hardcopy assessments submitted to TAFE and complete the assessment declaration when submitting the assessment.
Check Assessment checklist to ensure that you’ve covered all the required tasks.
What do I need to do to
To achieve a satisfactory result for this assessment all questions must Document title: VU21990_AE_Pro_2of3
Page 4 of 10
Resource ID: TBS_18_028_VU21990_AE_Pro_2of3 STUDENT NAME: YENENEW SHUMALEM MEKONEN
achieve a satisfactory result?
be answered correctly.
What do I need to provide?
●
USB drive or other storage method to save work to
●
A personal computer with internet access
●
Screen recording software. Download using these instructions
(
e.g. https://obsproject.com/download
)
What will the assessor provide?
●
Access to the Learning Management System
●
Scenario documents as outlined in assessment
Due date and time allowed
Indicative time to complete:
Part 1: 3 hours
Assessment feedback, review or appeals
Appeals are addressed in accordance with Every Student’s Guide to Assessment.
Document title: VU21990_AE_Pro_2of3
Page 5 of 10
Resource ID: TBS_18_028_VU21990_AE_Pro_2of3 STUDENT NAME: YENENEW SHUMALEM MEKONEN
Specific task instructions
You are required to create and record a presentation based on this scenario
. Part 1: Attacks and techniques presentation Using the DataTrust presentation template
, create a presentation based on the scenario (minimum 10 minutes). Record your presentation using screen recording software – refer to these instructions
for help with screen recordings and video.
Your presentation must address the following headings and content:
1. Threats
Describe and provide a minimum of three examples for each of the following: ●
Threat actors ●
Threat vectors ●
Threat goals.
2. Current trends
Identify and describe trends in cyber attacks, including the impact of cyber threat vectors.
3. Untargeted and targeted attacks
List and provide at least one example for each of the categories of vulnerabilities used in:
●
untargeted cyber attacks
●
targeted cyber attacks.
4. Malware attacks
Demonstrate and describe how malware exploits un-patched systems. To do this you must use your existing antivirus package, or download and install an antivirus software solution of your
choice (many free or trial antivirus packages are available). You will also need to download the EICAR simulated virus file, which is available for download from https://www.eicar.org and place it in one of your user folders (Downloads/My Documents/etc.) Note: This is a simulated virus file, it will not actually infect or cause damage to your system.
You should run your antivirus solution to scan your system and provide appropriate description and screenshots to show:
●
how the antivirus solution scans the system
●
the detection of the EICAR ‘virus’ by your antivirus solution
●
a description of the file
Document title: VU21990_AE_Pro_2of3
Page 6 of 10
Resource ID: TBS_18_028_VU21990_AE_Pro_2of3 STUDENT NAME: YENENEW SHUMALEM MEKONEN
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
●
how the antivirus solution deals with the detected threat (quarantine/recommendations/etc.)
●
typical infection methods for ransomware style virus or malware.
5. Attacks against network perimeter and end users
Describe techniques used by attackers to infiltrate and escalate privileges. Include techniques that attack the perimeter as well as end users.
6. Wireless vulnerabilities
Describe one example of how wireless WPA2 can be hacked.
7. IoT security issues
1.
What is IoT? Describe at least three different examples of IoT devices.
2.
Demonstrate the use of any IoT device to perform a specific task of your choice (eg turn on a light globe with mobile app, or record talking to a smart speaker). Provide appropriate screenshots or recording if required. If you don’t have access of any IoT device then use Cisco
Packet Tracer v7.2 and complete the task by using a simulated IoT device. For Packet Tracer, log in to www.netacad.com
then scroll down to the Packet Tracer download link (currently in
the initial log in screen). 3.
Describe specific vulnerabilities of IoT devices including issues with: o
device used in the previous question
o
lack of updates
o
patching IoT devices.
Document title: VU21990_AE_Pro_2of3
Page 7 of 10
Resource ID: TBS_18_028_VU21990_AE_Pro_2of3 STUDENT NAME: YENENEW SHUMALEM MEKONEN
Part 2: Assessment checklist
The following checklist will be used by your assessor to mark your performance against the assessment criteria of your submitted project. Use this checklist to understand what skills and/or knowledge you need to demonstrate in your submission. All the criteria described in the Assessment Checklist must be met. The assessor may ask questions about the submission (if appropriate) directly after the task has been submitted.
TASK/STEP #
Instructions
S
U/S
Assessor Comments
Part 1.1
Presentation is created in presentation software with supplied DataTrust presentation template
. Screen recording software can be found with these instructions
.
Defines threat actors, threat vectors and threat goals.
Date of Observation:
Assessors are to record their observations in sufficient detail to demonstrate their judgement of the student’s performance against the criteria.
Part 1.2
Describes trends in cyber attacks.
Date of Observation:
Assessors are to record their observations in sufficient detail to demonstrate their judgement of the student’s performance against the criteria.
Part 1.3
Describes examples of untargeted and targeted cyber attacks.
Date of Observation:
Assessors are to record their observations in sufficient detail to demonstrate their judgement of the student’s performance against the criteria.
Part 1.4
Describes and demonstrates techniques used by malware to attack and infect systems.
Date of Observation:
Assessors are to record their observations in sufficient detail to demonstrate their judgement of the student’s performance against the Document title: VU21990_AE_Pro_2of3
Page 8 of 10
Resource ID: TBS_18_028_VU21990_AE_Pro_2of3 STUDENT NAME: YENENEW SHUMALEM MEKONEN
criteria.
Part 1.5
Describes and demonstrates techniques used by attackers to infiltrate and escalate privileges (including the perimeter and end users).
Date of Observation:
Assessors are to record their observations in sufficient detail to demonstrate their judgement of the student’s performance against the criteria.
Part 1.6
Describes and demonstrates how wireless WPA2 can be hacked.
Date of Observation:
Assessors are to record their observations in sufficient detail to demonstrate their judgement of the student’s performance against the criteria.
Part 1.7
Describes at least three different IoT devices, with examples.
Demonstrates the use of a consumer grade router as an IoT device.
Describes vulnerabilities of IoT devices.
Date of Observation:
Assessors are to record their observations in sufficient detail to demonstrate their judgement of the student’s performance against the criteria.
Document title: VU21990_AE_Pro_2of3
Page 9 of 10
Resource ID: TBS_18_028_VU21990_AE_Pro_2of3 STUDENT NAME: YENENEW SHUMALEM MEKONEN
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Assessment feedback
NOTE: This section must
have the assessor signature and student signature to complete the feedback.
Assessment outcome
☐
Satisfactory
☐
Unsatisfactory
Assessor feedback
☐
Was the assessment event successfully completed?
☐
If no, was the resubmission/re-assessment successfully completed?
☐
Was reasonable adjustment in place for this assessment event?
If yes, ensure it is detailed on the assessment document.
Comments:
Assessor name, signature and date:
Student acknowledgement of assessment outcome
Would you like to make any comments about this assessment?
Student name, signature and date
NOTE: Make sure you have written your name at the bottom of each page of your submission
before attaching the cover sheet and submitting to your assessor for marking.
Document title: VU21990_AE_Pro_2of3
Page 10 of 10
Resource ID: TBS_18_028_VU21990_AE_Pro_2of3 STUDENT NAME: YENENEW SHUMALEM MEKONEN