IT Executive at Lobak Biru BHD, A Finance-Related Company
IT Executive at Lobak Biru BHD, A Finance-Related Company
IT Executive at Lobak Biru BHD, A Finance-Related Company
ASSIGNMENT SC015
COMPUTER SCIENCE SESSION 2021/2022
GENERAL GUIDELINES
Please note that this is an individual project. You are allowed to discuss with
your friends, but must ultimately do your own research, reading and write your
own assignment report.
Questions .
You are an IT Executive at Lobak Biru Bhd, a finance-related company. You are
asked to write a short article related to common cyber security risks, threats
and vulnerabilities faced by companies and how to overcome them for the
purpose of raising awareness about security threats. You need to determine the
types of threats that can occur to companies that run financial-related services
as well as what security measures need to be taken to counter them.
Instruction:
This task requires you to assess common security risks, threats and
vulnerabilities in corporate organizations and implement appropriate security
Computer Science 2021/2022
Assignment SC015
To prepare your report, you should conduct your research using a variety of
sources and reference them.
Report/Article Format
1.0 Introduction
2.0 Security risks, threats and vulnerabilities 1
Symptoms, Examples of effect or impact can occur.
Computer Science 2021/2022
Assignment SC015
Writing Format
■ Typeface - Times New Roman,Calibri
■ Font size- 12 pts
■ Line spacing – 1.5
■ Number of pages( page numbering ) - 3 to 10,including reference and
attachment.
Reference
(give at least three reference with APA style)
All references, citation, table and image format using APA style.
Alassafi, M.O., Hussain, R.K., Ghashgari, G., Walters, R.J. and Wills, G.B., 2017. Security in
organisations: governance, risks and vulnerabilities in moving to the cloud. In
Enterprise Security (pp. 241-258). Springer, Cham.
Computer Science 2021/2022
Assignment SC015
Allodi, L. and Massacci, F., 2017. Security Events and Vulnerability Data for Cybersecurity Risk
Estimation. Risk Analysis, 37(8), pp.1606-1627.
Tuna, G., Kogias, D.G., Gungor, V.C., Gezer, C., Ta?k?n, E. and Ayday, E., 2017. A survey on
information security threats and solutions for machine to machine (M2M)
communications. Journal of Parallel and Distributed Computing, 109, pp.142-
154.
SC015
COMPUTER SCIENCE 1
SEMESTER 1 SESSION 2021/2022
WRITTEN ASSIGNMENT
Name :
Matric Number :
Tutorial Class :
Lecturer Name :