Potential threats and mitigation tools for ransomware (Assignment one)

Click here to order this assignment @Essaywriting.us.No Plagiarism.Written from scratch by professional writers.

Prepared by: Dr Wanod Kumar Moderated by: Dr Tony Jan July, 2018
Assessment Details and Submission Guidelines
Trimester T2 2018
Unit Code MN502
Unit Title Overview of Network Security
Assessment Type Individual Assessment
Assessment Title Potential threats and mitigation tools for ransomware (Assignment one)
Purpose of the
assessment (with
ULO Mapping)
Students should be able to demonstrate their achievements in the following
unit learning outcomes:
b. Analyse and discuss common emerging threats, attacks, mitigation
and countermeasures in networked information systems
Weight 15%
Total Marks 60
Word limit 1500 – 2000
Due Date W Friday-31/08/2018, 11:55 PM
Submission
Guidelines
 All work must be submitted on Moodle by the due date along with a
completed Assignment Cover Page.
 The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri
(Body) font and 2.54 cm margins on all four sides of your page with
appropriate section headings.
 Reference sources must be cited in the text of the report, and listed
appropriately at the end in a reference list using IEEE referencing style.
Extension  If an extension of time to submit work is required, a Special Consideration
Application must be submitted directly on AMS. You must submit this
application three working days prior to the due date of the assignment.
Further information is available at:
http://www.mit.edu.au/about-mit/institute-publications/policiesprocedures-and-guidelines/specialconsiderationdeferment
Academic
Misconduct
 Academic Misconduct is a serious offence. Depending on the seriousness of
the case, penalties can vary from a written warning or zero marks to
exclusion from the course or rescinding the degree. Students should make
themselves familiar with the full policy and procedure available at:
http://www.mit.edu.au/about-mit/institute-publications/policiesprocedures-and-guidelines/Plagiarism-Academic-Misconduct-PolicyProcedure.
For further information, please refer to the Academic Integrity
Section in your Unit Description.
MN502 Overview of Network Security Page 2 of 4
Prepared by: Dr Wanod Kumar Moderated by: Dr Tony Jan July, 2018
Assignment Description
The security remains a challenge in networked information systems. One of the fastest
evolving malware is ransomware. The ransomware embeds itself onto the computer in such
a manner that it cannot be segregated, and even rebooting causes the ransomware to launch
malicious code again. A ransomware continues to be a serious threat to the network users.
Assume you have an interview for the ransomware analyst position with Regal Security
Solutions company. You are supposed to be prepared about the ransomware, their types,
threats, and mitigation tools. In this context write a report including the following sections:
A. Introduction about ransomware and their impacts on the society
B. Discussion of any five variants of ransomware (Consider some recently developed
ransomware)
C. The working mechanism of ransomware
D. Potential threats posed by ransomware
E. Case study of at least one recent attack carried out by the ransomware
F. Recommendations on any two mitigation tools to tackle the ransomware attack and
discuss the effectiveness of the selected tools
G. Summary
H. References in IEEE Transactions on Networking style
Marking Criteria for the Assignment 1:
Marks are allocated as described in the following table.
Sections No. Description of the section Marks
Introduction Introduction about ransomware and their impacts on the
society
 Introduction about ransomware
 The impact of ransomware on the society
 The report outline
05
Variants of
Ransomware
Discuss any five variants of ransomware (Consider some
recently developed ransomware)
 Draw taxonomy
 Discuss the selected ransomware
10
Working
Mechanism
The working mechanism of ransomware
 Discuss the working mechanism of ransomware with
proper citation
05
Potential
Threats
Potential threats posed by ransomware
 System lockup
 Encrypting and deleting the files
10
MN502 Overview of Network Security Page 3 of 4
Prepared by: Dr Wanod Kumar Moderated by: Dr Tony Jan July, 2018
Recent
Attack
Case study of one recent attack carried out by the ransomware
during 2017-2018 period.
05
Mitigation
Tools
Recommend any two mitigation tools to tackle the
ransomware attacks and discuss the effectiveness of these
tools
 Discuss any two mitigation tools
 Discuss the effeteness of selected mitigation tools in
terms of response time and resolution time
15
Summary Summary
 Summarise the overall contributions of the report
05
References References
 Must consider at least five current references from
journal/conference papers and books.
 Must follow IEEE Transactions on Networking style
05
Total Marks 60
Example Marking Rubric for Assignment #: Total Marks 60
Grade
Mark
HD
80% +
D
70%-79%
CR
60%-69%
P
50%-59%
Fail
<50%
Excellent Very Good Good Satisfactory Unsatisfactory
Introduction
/5
Introduction is
very well
written with
very clear
background,
discussion
about the
impact of
ransomware
on the society,
and the report
outline
Introduction is
well written with
clear discussion
about the impact
of ransomware on
the society, and
the report outline
Introduction is
generally
presented in
good fashion,
however missing
one element
such as the
impact of
ransomware on
the society/ the
report outline
Introduction is
presented briefly
with some
relevance and
missing elements
such as the impact
of ransomware on
the society/ the
report outline
Poor
Introduction with
irrelevant details
Variants of
Ransomware
/10
In-depth and
very clear
discussion about
five variants of
recent
ransomware
Very clear
discussion about
five variants of
recent
ransomware
Generally good
discussion about
five variants
ransomware
Brief discussion
about some variants
of ransomware
Poor discussion
with irrelevant
information
Working
Mechanism
/5
A very detailed
and very clear
working
mechanism of
ransomware
Very clear working
mechanism of
ransomware
Generally good
discussion about
working
mechanism of
ransomware
Brief discussion
about working
mechanism of
ransomware
Poor discussion
with irrelevant
information
MN502 Overview of Network Security Page 4 of 4
Prepared by: Dr Wanod Kumar Moderated by: Dr Tony Jan July, 2018
Grade
Mark
HD
80% +
D
70%-79%
CR
60%-69%
P
50%-59%
Fail
<50%
Potential
Threats
/10
A very clear and
in-depth
discussion about
potential threats
Very clear
discussion about
potential threats
Generally good
discussion about
potential threats
Brief discussion
about the potential
threats
Poor discussion
about potential
threats with
irrelevant
information
Recent Attack
/5
A detailed and
very clear case
study about the
recent attack
from 2017-2018
period also
clearly citing the
source
Very clear case
study about the
recent attack from
2017-2018 period
Generally good
case study about
the recent attack
from 2017-2018
period
Brief discussion
about the recent
attack.
A discussion about
very old
ransomware
attack with
irrelevant
information
Mitigation
Tools
/15
An in-depth and
very clear
discussion about
Mitigation tools
and their
effectiveness
Very clear
discussion about
Mitigation tools
and their
effectiveness
Generally good
discussion about
Mitigation tools
Brief discussion
about Mitigation
tools
Irrelevant
discussion about
the mitigation
tools
Summary
/5
A section very
clearly
summarizing the
overall
contribution
A section clearly
summarizing the
overall
contribution
Generally good
summary of the
report
Brief summary of the
report with some
relevance
Summary not
relating to the
report
References
/5
Clear styles with
excellent source
of references.
Clear referencing/
style
Generally good
referencing/style
Unclear
referencing/style
Lacks consistency
with many errors.