Assignment title: Management


SIT384 Data Analytics For Cyber Security Assignment 1 Trimester 1, 2017 Objectives • To work e↵ectively in a small team. • To demonstrate the ability to research. • To apply proper techniques to address a given security threat. • To communicate with peers in a professional manner. Due Date: 2pm, Friday, March 31, 2017 Each assignment submission consists of three parts (30 marks in total): • Report file in PDF format. • 20 plain text files. • Presentation file in PowerPoint (.ppt or .pptx) format. – For on-campus students: Week 5–6 during normal tutorial time to do the oral presentation. Please indicate your preferred time to your tutor. – For o↵-campus students: Voice record embedded to PPT file is required. Submission instructions: You must submit an electronic copy of all your assignment files via CloudDeakin. You must include both your report, files containing 10 phishing messages and 10 non-phishing messages and demo presentation file. Assignments will not be accepted through any other manner. Students should note that this means that email and paper based submissions will ordinarily be rejected. Copying, Plagiarism Notice The University's policy on plagiarism can be viewed online at http://www.deakin.edu.au/students/ study-support/referencing/plagiarism 1Problem Statement Passive penetration attacks with social engineering elements is a serious security threat to corporate environment. Malicious attackers gather information of targeted victims and email the victims with messages appearing as job seeking or professional events. Upon satisfactory completion of this assignment you will be able to conduct basic level research in IT security, analyze gathered information, and communicate your findings. This is a group task. Each group must consist of two students from the same campus; each group will submit one report, and each member of the group will receive the same mark. Students are encouraged to form groups by themselves. The planning report should be approximately 2,000–2,500 words (excluding Appendix) and must include: • description of social engineering strategy used to engage the targeted victim, • a detailed analysis of the attacking environment, • and hypotheses/approaches for addressing security threats. Your report should consist of the following chapters: 1. A proper title which matches the contents of your report. 2. Your names and Deakin student numbers in the author line. 3. An executive summary which summarizes your findings. (You may find hints on writing good executive summaries from http://unilearning.uow.edu.au/report/4bi1.html.) 4. An introduction chapter which introduces each group member, briefly explains the process of passive penetration attacks via social engineering, the technical setup for your demo and an overview of your phishing and non-phishing messages. 5. An attack planning chapter which outlines the process of a social engineering attack. The details of gathered information should include the keywords, word frequency and other relevant information that are extracted from Dr. Jun Zhang's published papers (https://scholar.google.com.au/ citations?user=QmsjV8QAAAAJ&hl=en). That is, your targeted victim is Dr. Jun Zhang. You should explain four strategies in details on how you would use the gathered information to draft 10 phishing messages and 10 non-phishing messages. 6. A technical demonstration chapter which consists of fully explained screenshots when a successful attack is conducted. 7. A self evaluation chapter for group work. This evaluation must be conducted by following the guideline in the rubrics in terms of group members' participation, communication, feedback and cooperation. And the members of each group must agree on the proposed marks. You must complete this self evaluation in the report with your group member prior to the submission deadline. Student groups with only one member receive zero mark for this part. Moreover, the 10 phishing messages (message only, no email header or attachment) should be stored in the 10 TXT files each of which is named as "[student-id]-01-phishing.txt", "[student-id]-02-phishing.txt" and so on. Similarly, the 10 non-phishing messages should be stored in the TXT files each of which is named as "[student-id]-01-np.txt", "[student-id]-02-np.txt" and so on. Additionally, on-campus student groups will present your findings during your weekly practical class in week 5 or week 6. (The exact time is arranged by your practical tutor on the basis of first-come-firstserve.) O↵-campus student groups need to submit powerpoint presentation with voice embedded by the due date with the report. 2Facets Proficient (above 80%) Average (60-79%) Satisfactory (50-59%) Below Expectation (0-50%) Score Problem Definition Demonstrate the ability to construct a clear and insightful problem statement with evidence of all relevant contextual factors. Demonstrate the ability to construct a problem statement with evidence of most relevant contextual factors, and problem statement is adequately detailed. Begin to demonstrate the ability to construct a problem statement with evidence of most relevant contextual factors, but problem statement is superficial. Demonstrate a limited ability in identifying a problem statement or related contextual factors. out of 2 marks Strategy Identification Identify four approaches for generating phishing messages that closely targets the victim. Identify four approaches for generating phishing email, only some of which closely target the victim. Identify only a single approach for generating phishing messages that targets the victim. Identify one or more approaches for generating phishing messages that do not closely target the victim. out of 10 marks Analysis in Technical Demonstration Analyze and create information/data to fill studentidentified gaps or extend knowledge. Analyze and create information/data to fill knowledge gaps stated by others. Analyze and synthesize information/data to reorganize existing knowledge in standard formats. That is, ask relevant, researchable questions emerging from the research. Fail to analyze and to synthesize information/data to reproduce existing knowledge in prescribed formats. out of 3 marks Supply with phishing and nonphishing messages Supply with 10 phishing and 10 non-phishing messages as required, and the quality of these messages is great. Supply with 10 phishing and 10 non-phishing messages as required, and the quality of these messages is fair. Supply with 10 phishing and 10 non-phishing messages as required, and the quality of these messages is poor. Fail to supply with 10 phishing and 10 non-phishing messages as required. out of 5 marks Group work (must be agreed by group members and written in self evaluation in the report) Group member participated fully; Group member listened carefully to each others' ideas; Group member o↵ered detailed, constructive feedback when appropriate; Group member treated others respectfully and shared the workload fairly. Group member participated most of the time and was on task most of the time; Group member usually listened to others' ideas; Group member o↵ered constructive feedback when appropriate; Group member usually treated others respectfully and shared the workload fairly. Group member participated but wasted time regularly or was rarely on task; Group member sometimes did not listen to others' ideas; Group member occasionally o↵ered constructive feedback, but sometimes the comments were inappropriate or not useful; Group member sometimes treated others disrespectfully or did not share the workload fairly. Group member did not participate, wasted time, or worked on unrelated material; Group member did not listen to others and often interrupted them; Group member did not o↵er constructive or useful feedback; Group member often treated others disrespectfully or did not share the workload fairly. out of 5 marks Group Demonstration The entire demo is clear, delivered on time, correct and covers all major findings of the report. The entire demo is clear, but there are some mistakes. The structure of the demo is clear. But many parts of the presentation are not clear enough and/or contain major flows or mistakes. The demo has no clear structure. The presenter fails to deliver meaningful messages to the audience. out of 5 marks Table 1: SIT384 Assignment 1 Rubrics 3