Assignment title: Information
ISYS5005 Assignment 2 – S2 2016
VERSION CONTROL: ISYS5005 Assignment 1 v1.0 Updated 09/08/2016
Assignment 2
Due Date: Mon 17 Oct 2016 (As per Unit Guide)
Assignment 2 consists of a written report of your research and analysis of a security vulnerability of
your own choice. This is worth 35% of your unit grade. All assignments will be submitted via the
Blackboard system and will be scanned by the University plagiarism detection software TurnItIn.
The following information explains the assessment requirements and provides the guide to how the
assignment will be graded.
You are to attempt this assignment in pairs.
Tasks
In addition to your regular security duties, one of the roles of an InfoSec specialist is to
provide training and education to the rest of a team. To develop skills in this area, you will
choose security vulnerability, document it and provide a report to educate others about the
significance of this issue.
The main activities that you will undertake are as follows:
1. Research and discover a security vulnerability that has significant impact and is
reasonably widespread.
Things that are of low impact or very rare are not of interest here as we want to
highlight something that is an important issue. Details about things like impact
are commonly included in bug reports and CVE lists so this is a good starting
point.
For example, you may choose software vulnerability. The CVE resource we
discussed in class at the start of semester will give you lists of recent
vulnerabilities, for example https://www.exploit-db.com/ or
http://www.cvedetails.com would have details of recent software vulnerabilities.
You are advised not to choose anything too specific, as this will limit the amount
of material you will be able to find for discussion later.
On the other hand, you may be more interested in a system that you already
know and understand. For example, a ticketing system, or a website that is
reasonably widely used.
Or you may even consider non-software vulnerabilities, and research physical
security and perform a site-review. For this you could perform a survey of theISYS5005 Assignment 2 – S2 2016
VERSION CONTROL: ISYS5005 Assignment 1 v1.0 Updated 09/08/2016
access management system at your school, place of work, or other business
location. (NOTE: In order to avoid drawing suspicion, you should first ask for
permission to perform this survey beforehand. You should not enter any
restricted areas unless you are escorted or have explicit permission.) Observe
building entrances and interior doors and note any key card readers or other
controls that may be present. Note any areas that appear to be lacking access
controls and document the kind of access controls in use.
2. Explain and document the source of this vulnerability and the causes in your own
words. (2 page roughly). A copy of a CVE report is not acceptable.
3. Identify a system or systems where this issue exists "in the wild". That is, you must
find a vulnerable system that you can document.
4. Identify suitable controls or mitigations that you may employ to prevent the issue.
The above are the basic requirements. Once these are complete then you may consider
working on the advanced requirement to provide a demonstration of the vulnerability that
you have documented.
To submit:
Submit a SINGLE document with numbered sections reflecting the work for points shown
below. As a rough guide for word counts, around 1500 words for Section 1, 500 for Section 2
and around 1000 words for Section 3. You should not exceed these word counts by more
than 10%.
Mandatory Requirements
1. Explanation and documentation of vulnerability
2. Existence of the vulnerability in production systems. Discuss how widespread
it is, and any condition required for exploit
3. Mitigation and prevention strategies for the exploit (this should be more than
simply "patch the software". You should refer to your explanation of the
vulnerability to explain how and why the mitigations are suitable.
Advanced requirement
4. Demonstration of the exploit in action. If this is a software vulnerability you
may demonstrate it in class or prepare a screen capture of the software in
action. If it is a physical or other vulnerability that cannot be demonstrated in
person, then prepare a brief presentation, or photographs or screen captures
to submit along with the main report.ISYS5005 Assignment 2 – S2 2016
VERSION CONTROL: ISYS5005 Assignment 1 v1.0 Updated 09/08/2016
To ensure that suitable topics are chosen, you must discuss your plans with your tutor BEFORE you
may proceed with the assignment. It is expected that you will also obtain feedback while you are still
working on the assignment so that we may guide you.
General mark allocation:
All sections must be professionally presented, written in your own words and properly reference any
sources that were used. Areas of spelling, grammar and presentation are incorporated into all
components and are thus not shown as separate items in the table. The breakdown below is
indicative of the content that is expected and is a guide rather than a comprehensive list of
requirements. For further information you may demonstrate your work to your tutor in class to
obtain ongoing feedback.
Marks will also be deducted where correct referencing is not used. Plagiarism (presenting other
people's work and ideas as your own) will result in a zero mark. You MUST cite all material that is not
your own work.
Mandatory Requirements
Explanation and documentation of vulnerability.
-Sensible choice in terms of impact/severity
-Documentation in own words
-Shows understanding of root causes
35
Existence in production systems
-Evidence that vulnerability exists in real systems
-Documentation/statistics
-Adequate methodology for proof
15
Mitigation
-Suitable controls
-Identify fixes for root cause
30
Advanced Requirement
Demonstration
-Screen capture/Presentation/Software demo as
appropriate
-Evidence of understanding
20