Assignment title: Information
Description Marks
out of
Weighting Due
date
Assignment 4 Report and Presentation based on
CASE STUDY: PEOPLESHARZ.COM
(A fictitious analysis of a security breach)
Length: 3000 words approx. plus Appendices
100 50% 24th
October
2016
This assignment assesses your understanding in relation to the following three course
objectives:
1. analyse information security vulnerabilities and threats and determine appropriate controls
that can be applied to mitigate the potential risks
2. explain why continual improvement is necessary to maintain reasonably secure
information systems and IT infrastructure and to describe the role of disaster recovery and
business continuity plans in recovering information and operational systems when systems
and hardware fail
4. demonstrate an ability to communicate effectively both written and orally about the
management of information security in organisations.
This assignment assesses the following graduate skills: Problem Solving, Academic &
Professional Literacy and Oral and Written Communication at level 2.
This assignment relates to the topics covered in modules 1 to 10. This assignment can be
completed by teams of two students or as an individual assignment. Details regarding the
allocation of students to teams will be provided on the course study desk. Each student team
will be expected to work collaboratively as a team in developing and discussing their
approach to assignment 4 case study and the required Security report and presentation.
Regular participation in Assignment discussion forum each week from Monday 5th
September until the due date for Assignment submission is expected. Each team member or if
a student is completing this assignment as an individual will be required to keep a journal of
their activities and progress related to completing this assignment. A journal will form part of
the assessment for this assignment. In date order clearly list the following:
date of research activity/discussion
topics researched or discussed
time duration of activity.
Submit this journal for each team member or as an individual if you completing this on your
own as an appendix to the assignment report. Any reference to web pages and on line
resources such as white papers, blogs, wikis etc. should be listed at the end of the journal.
Regular participation on the discussion forums dedicated for this assessment is highly
recommended and can assist greatly with the completion of this assessment item. Also
note that you are expected to do research outside of the course materials provided.
Note carefully University policy on Academic Misconduct such as plagiarism, collusion
and cheating. If any of these occur they will be found and dealt with by the USQ
Academic Integrity Procedures. If proven Academic Misconduct may result in failure
of an individual assessment, the entire course or exclusion from a University
program or programs.CaseStudy: PEOPLESHARZ.COM (A fictitious analysis of a security
breach)
Background:
PeopleSharz is an Internet Start-up founded in late 2012 riding on the Social Media boom of the late
2000s. Established by former university colleagues Mark Bukerzerg (current CEO) and Peter Tweet
(CTO), the company in early 2015 had over 1.2M signed-up users from across the Globe. While in the
scheme of things, the user base numbers seem good, both Mark and Peter know, that to achieve a
critical mass of users that will establish PeopleSharz as a "player" in the Social Media space, they will
need to reach numbers upwards of 100M users.
Internet start-ups are springing up all the time – weekly, thousands of new Social Media applications
are released on the Internet and while PeopleSharz has established a strong presence and following,
the company is continually innovating and responding to user requirements, industry trends and
competitive challenges. Mark and Peter's 20 person Development Workshop based in Sydney's
upcoming Technology Hub, Redfern, is a busy and dynamic environment.
PeopleSharz is aiming to become financially self-sufficient by the end of 2016 at the latest. It is at this
time that their venture capital funds will be exhausted but they estimate, once they hit the 50M user
mark, and have deployed into production their new advertising revenue model, (both aggressively
targeted for October, 2016), they will have positive financial results.
April 21st, 2016: Major New Media News Site Headlines: "New Start-up PeopleSharz Hacked – User
Passwords Dumped on Pastebin".
Waking up to news overnight that their site has been hacked and that the hacker has posted all their
client details, including passwords on Pastebin has shocked Mark and Peter. Time is of an essence so
an emergency teleconference is organised between Mark, Peter and Phil Jones, (the Technical Support
Manager at HotHost1 – a cloud services company where the PeopleSharz environment is hosted).
The teleconference firstly confirmed that the information posted on Pastebin was in fact real.
PeopleSharz seemingly has been hacked. From then on, the teleconference degenerated into blame
games between PeopleSharz and the hosting provider HotHost1– each side blaming the other for the
incident and each putting the onus of an incident response on the other's shoulders - each side stating
that they had no experience with security incident response and it was not their fault nor
responsibility. BUT, all did agree that something had to happen quickly!
April 21st, 2016, 9:45am: Offices of HackStop Consulting
A quiet morning for you on April 21st, 2016 until 9:45am when a call reaches your desk. As a Senior
IT Security Consultant at HackStop Consulting, you've had calls like this many times. It's time to get
your game on again! Time to visit the offices of PeopleSharz. Their CEO, CTO and a Manager from
their hosting provider HotHost1 are desperate to meet with you.
Your Task
On return from your meeting, it's time to quickly put together a proposed plan of work and a response
for PeopleSharz. Given the nature of your assignment with PeopleSharz, an urgent response and
work-plan is required that outlines your approach and methodologies to:
(1) Assessing what went wrong – how might the hacker have compromised the PeopleSharz
environment and stolen the user information?
(2) How does PeopleSharz ensure it does not happen again?
At present, no other assumptions need to be made about the actual security issues/breach. This
assignment is focused upon seeing if you, the student has built up an awareness of how security in
Internet Websites can be assessed and analysed to assist businesses in improving their overall security
position.By being able to outline how you would go about reviewing the security breach outlined in the
PeopleSharz case study and making recommendations on improving security practices and the
appropriate controls that need to be put place to reduce the risks to an acceptable level, the markers
will be able to assess your level of knowledge learned in this course and the additional research you
have undertaken to complete this Assignment.
Any information not provided in the case study may be assumed, but make sure that your
assumptions are stated and that the assumptions are plausible.
**** NB; Importantly and in addition to your own study and research, there will be two specific
discussion forum threads on the assignment discussion forum where you can ask questions of the
main players in the case study scenario:
1. Mark Bukerzerg and/or Peter Tweet (PeopleSharz)
2. Phil Jones (HotHost1)
By actively participating in the forum discussions for this assignment, you will gain valuable
information and insight into this case study that will be regarded highly by the markers.
(Note: Any questions which are not considered to be appropriate or professional for the purpose of
this assessment may not be answered)
Deliverables
The success of your engagement is based upon two deliverables:
(1) Development of an Incident Response Work-plan
(2) A business proposal to PeopleSharz Management in the form of a presentation that outlines how
the organisation should be better focusing on Information Security.
In detail:
(1) Incident Response Work-plan report (WORD Document):
The work plan should be included in a professionally presented document of no more than 10 pages
and be structured to show how each phase of work is to be undertaken. Your work-plan must include
the following at a minimum:
* Executive Summary: half-page brief outlining purpose; scope, expectations and outcomes of
the proposed plan of work. (250 words)
Structured Incident Response work plan for each section includes:
* Background and problem analysis - What went wrong? How might a hacker have
compromised the PeopleSharz web site environment and stolen user information ? (approx. 500
words)
* Threat analysis -What is to be investigated and tested, how it will be done, what sort of
potential issues you are looking for and deliverables PeopleSharz and/or HotHost1 can expect for
each phase of work – (eg; the "deliverable" for the phase of work could potentially be a report
containing the results of a vulnerability assessment test on the PeopleSharz server(s)). (approx. 1000
words)
* Dependencies and critical success factors to the job, such as key stakeholders in this
security breach - people to be interviewed or whose involvement in that phase of work is required.
(Remember, you don't always get free-rein access to systems and other information and because time
is of importance, you won't get a long time to master the environment. But, as you know, you cannot
also always believe everything you are told). What is key to getting this job done efficiently and what
support do you need to get this done, (from PeopleSharz and also the hosting provider). (approx. 500
words)
* Set of recommendations for improving PeopleSharz's current security practices and
ensuring that an appropriate set of controls are put in place (approx. 750 words)* Reference list of key sources in particular technical references which support your approach
(Not counted in word count)
Note in this report and in the accompanying presentation you are encouraged to make
use of appropriate Figures and Tables to emphasise the key points that you are trying
make
* A journal of each team member's (for students completing this assignment individually –
your) activities in participating and contributing to the completion of the work plan report and
presentation.
(2) Developing a Securer Environment for PeopleSharz for the Future (POWERPOINT):
Your presentation should be created as if it were an actual presentation you were doing for a real
client in relation to your proposed work plan including a set of recommendations and should contain
the following at a minimum:
* 1 Slide for an Introduction outlining your team or yourself and the organisation you work for
* 2-3 Slides covering the Background and problem analysis: A brief summary of key problems
and issues which might have led to PeopleSharz's web server being hacked and customer information
being compromised and where PeopleSharz is today in regards to security practices in their
organisation and controls in place for their web servers.
* 2-3 Slides covering the Threat Analysis: A summary of how the threat analysis will be
conducted, what are likely to be the major threats and associated vulnerabilities found and the
proposed actions to reduce the risks associated with these threats and specific vulnerabilities in their
web servers to an acceptable level.
* 2 Slides covering Dependencies and critical success factors to the job: i.e. what is key to
getting this job done efficiently and what support do you need to get this done, (e.g. internal business
stakeholders, developers etc.)
* 2 Slides covering your proposed Set of recommendations for improving security practices at
PeopleSharz and ensuring appropriate controls are in place in relation to their web site which is core
to their business
[The following is also to be included. While not part of a "standard" Industry business presentation, it
is there to allow teaching staff to gauge what level of research has been undertaken].
* 1 Slide acknowledging the key authoritative reference sources which underpin the research
you have conducted and your approach in the proposed incident response work plan report.
------------------
Report and Presentation Format:
* MS WORD and PowerPoint respectively (or a web-based presentation as an alternative to
PowerPoint for (2) of the assignment deliverables) must be used. NB; For the presentation, you are
asked to include a Word document (or utilise the notes section of PowerPoint) to detail the length of
time expected to be spent on each slide (page) and the details of what you would expect to discuss for
each slide with the audience.
* This assignment is focused upon seeing if as a student in this course you have built up an
awareness of how security in an environment should be set up and operated. By being able to outline
how you would review and test the security of the fictional organisation, PeopleSharz, through
assessment of the basics such as good policies, standards, procedures and controls in place, in addition
to detection of incidents, the markers will be able to assess your level of knowledge learned from the
course content and from your own additional research in relation to this case study.