Task Description: | In each tutorial from Week 2 to Week 12, students will work in groups to analyse and develop policies and practices related to security. These activities are designed to review the weekly lecture content. The assessment for this task has two components: a group-based tutorial task completion component and an individual quiz component.
During tutorials, students will:
* Complete tutorial tasks in groups (Week 2 to Week 11): As a group, you will be assessed on the completion and quality of the in-tutorial tasks. Each week's group task is worth 1% of the final grade. The tasks are designed to review lecture materials and apply them to practical scenarios.
* Complete short individual quizzes (Week 3 to Week 12): Individually, you will complete a short quiz at the end of each tutorial to test your personal understanding of the concepts discussed. Each weekly quiz is worth 2% of the final grade. The quizzes are to test comprehension and reinforce lecture learning. |
Task Description: |
Working as a group, you will engage in a multi-stage project to research, design, and write comprehensive cybersecurity policies for a small to medium enterprise (SME). You will create a case study, conduct a formal risk assessment, design an incident response plan, and develop a cohesive security policy, integrating advanced knowledge and industry-standard frameworks. Your group must critically analyse, reflect on, and synthesise complex information, research, and apply established theories, and demonstrate autonomy and expert judgement as practitioners. Individual grades will be calibrated based on each participant's contribution as evaluated through peer assessment. Project Components and Weighting: 1. Case Study Creation (5%) - due in week 8 * Develop a realistic and nuanced SME scenario, detailing the organisation’s business operations, IT infrastructure, and potential vulnerabilities.
* Include a description of the company’s size, industry, and typical workflows to contextualise security needs. * This component forms the foundation for the rest of the project. 2. Business Risk Assessment and Threat Analysis (10%) - in week 8 * Your task for this component has two sequential parts: a. Fill in the Template: Based on your case study from Component 1, you must first populate the 'Business Risk Assessment for Cybersecurity' template. This involves identifying and recording key assets, their value, potential vulnerabilities, threats, and any current controls. b. Conduct the Risk Assessment: Once the template is filled, you will use the data within it to conduct your formal risk assessment and threat analysis. Your analysis must include rigorous qualitative and quantitative evaluations to justify the risk ratings for each identified threat.
3. Incident Response Plan (10%) - in week 10 * Design a structured and adaptable incident response plan. 4. Developing a Comprehensive Security Policy (15%) - in week 12 * Utilise the findings from your risk assessment to construct a comprehensive and structured cybersecurity policy that addresses identified threats, vulnerabilities, and mitigation strategies. |