IT Executive at Lobak Biru BHD, A Finance-Related Company

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 5

Assignment SC015

ASSIGNMENT SC015
COMPUTER SCIENCE SESSION 2021/2022

GENERAL GUIDELINES

1. This assignment should be completed individually


2. Plagiarism, copying and cheating will not be tolerated, and
disciplinary action will be taken.
3. You will be interviewed (arranged by your lecturer) to check the
originality of your work.
4. Use the guidelines given to prepare your assignment.
5. This assignment contributes ten percent (10%) of the total marks
for this course.
6. Any inquiries should be directed to your lecturer either during
tutorials class or consultation hours.
7. DATELINE SUBMISSION : 31 OCTOBER 2021

Objectives of this assignment

● To provide students with an opportunity to find information and discuss


the latest computer security risk and associated security measures
introduced in the curriculum specification.
● To provide students with an opportunity to use the research resources.

Please note that this is an individual project. You are allowed to discuss with
your friends, but must ultimately do your own research, reading and write your
own assignment report.

Questions .

You are an IT Executive at Lobak Biru Bhd, a finance-related company. You are
asked to write a short article related to common cyber security risks, threats
and vulnerabilities faced by companies and how to overcome them for the
purpose of raising awareness about security threats. You need to determine the
types of threats that can occur to companies that run financial-related services
as well as what security measures need to be taken to counter them.

Instruction:
This task requires you to assess common security risks, threats and
vulnerabilities in corporate organizations and implement appropriate security
Computer Science 2021/2022
Assignment SC015

protection or a possible countermeasure and write a report.

To prepare your report, you should conduct your research using a variety of
sources and reference them.

What should you do now?


■ Start collecting and researching information
■ Think creatively.
■ Develop the report in Microsoft Word/Google Doc format
■ Look at the assessment rubric and the unit learning outcomes to ensure
that you understand what you are being assessed (and marked) on.
■ The problem-solving task should be between 400-500 words (not
including references)
■ Submit a soft copy of article/report in pdf format on or before 31 October
2021 .

You are given 1 (one) week to complete this assignment.

Report/Article Format
1.0 Introduction
2.0 Security risks, threats and vulnerabilities 1
Symptoms, Examples of effect or impact can occur.
Computer Science 2021/2022
Assignment SC015

Explain different ways to overcome security risks,threats and vulnerabilities


stated
3.0 Security risks, threats and vulnerabilities 2
Symptoms, Examples of effect or impact can occur.
Explain different ways to overcome security risks,threats and vulnerabilities
stated
4.0 Security risks, threats and vulnerabilities 3
Symptoms, Examples of effect or impact can occur.
Explain different ways to overcome security risks,threats and vulnerabilities
stated
5.0 Conclusion

Writing Format
■ Typeface - Times New Roman,Calibri
■ Font size- 12 pts
■ Line spacing – 1.5
■ Number of pages( page numbering ) - 3 to 10,including reference and
attachment.

Reference
(give at least three reference with APA style)

All references, citation, table and image format using APA style.

Alassafi, M.O., Hussain, R.K., Ghashgari, G., Walters, R.J. and Wills, G.B., 2017. Security in
organisations: governance, risks and vulnerabilities in moving to the cloud. In
Enterprise Security (pp. 241-258). Springer, Cham.
Computer Science 2021/2022
Assignment SC015
Allodi, L. and Massacci, F., 2017. Security Events and Vulnerability Data for Cybersecurity Risk
Estimation. Risk Analysis, 37(8), pp.1606-1627.

Tuna, G., Kogias, D.G., Gungor, V.C., Gezer, C., Ta?k?n, E. and Ayday, E., 2017. A survey on
information security threats and solutions for machine to machine (M2M)
communications. Journal of Parallel and Distributed Computing, 109, pp.142-
154.

Cybersecurity Malaysia. (2020). MyCERT-The Malaysian Computer Emergency Response


Team. Retrieved from https://www.cybersecurity.my/en/our_services/
mycert/main/detail/2328/ index.html

Cover page format

Computer Science 2021/2022


Assignment SC015

KOLEJ MATRIKULASI KELANTAN


KEMENTERIAN PENDIDIKAN MALAYSIA

SC015
COMPUTER SCIENCE 1
SEMESTER 1 SESSION 2021/2022

WRITTEN ASSIGNMENT

COMPUTER SECURITY RISK AND SECURITY MEASURES

Name :
Matric Number :
Tutorial Class :
Lecturer Name :

Computer Science 2021/2022

You might also like