Assignment title: Information


ITSC311 – Assignment specification | V1.0 Page 1 of 13 Assignment specification Qualification Faculty of Information Technology Bachelor of Science in Information Technology Module code ITSC311 Module name Social Practices and Security Semester 1/2017 Year 2017 Module lead Joseph William Internal moderator Alice Zifunzi Copy-editor Chantal Joseph Educational advisor N/A Assignment title Assignment Total mark allocation 160 Issue date 6 February 2017 Submission date 03 – 07 April 2017 Instructions to the student  Remember to keep a copy of all submitted assignments.  All work must be typed.  Please note that you will be evaluated on your writing skills in all your assignments.  All work must be submitted through Turnitin1 and the full Originality Report must be submitted with the final assignment.  Negative marking will be applied if you are found guilty of plagiarism, poor writing skills or if you have applied incorrect or insufficient referencing. (See the table at the end of this document where the application of negative marking is explained.)  Each assignment must include a cover page, table of contents and full bibliography, based on the Harvard Referencing Style as applied at CTI Education Group.  Use the cover sheet template2 for the assignment. This is available from your lecturer.  Students are not allowed to offer their work for sale or to purchase the work of other students. This includes the use of professional assignment writers and websites, such as Essay Box. If this should happen, CTI Education Group reserves the right not to accept future submissions from a student. Assignment format Students must follow the generic requirements when writing and submitting assignments as follows:  Use standard Arial, font size 10.  Include page numbers.  Include a title page.  Print submissions on both sides of the page.  Write no more than the maximum word limit.  Ensure any diagrams, screen shots and PowerPoint presentations fit correctly on the page and are referenced.  Include a table of contents.  Use accurate Harvard referencing throughout the assignment. 1 Refer to the CTI Plagiarism Policy, which is available from your lecturer. 2 Available on myLMS.ITSC311 – Assignment specification | V1.0 Page 2 of 13  Include a bibliography based on Harvard Referencing System at the end of the assignment.  Include completed Assignment Front Cover Sheet and Statement and Confirmation of Own Work (available on myLMS).  Check spelling, grammar and punctuation.  Run the assignment through Turnitin software.  Students must keep copies of all submitted work. Essential embedded knowledge and skills required of students  Report-writing skills  Ability to analyse scenarios/case studies  Understanding of subject field concepts and definitions  Ability to apply theoretical knowledge to propose solutions to real-world problems  Referencing skills (Harvard Referencing Method) Resource requirements  A device with Internet access for research  A desktop or PC for typing assignments  Access to a library or resource centre  Prescribed reading resources Delivery requirements (evidence to be presented by students)  A typed assignment3  A Turnitin Originality Report Minimum reference requirements (At least five references for first year, ten references for second year and fifteen references for third year) Additional reading is required to complete this assignment successfully. You need to include the following additional information sources:  Printed textbooks/e-books  Printed/online journal articles  Periodical articles (e.g. business magazine articles)  Information or articles from relevant websites  Other information sources, e.g. geographic information (maps), census reports, interviews, etc. Note  It is crucial that students reference all consulted information sources, by means of intext referencing and a bibliography, according to the Harvard referencing style.  Negative marking will be applied if a student commits plagiarism (i.e. using information from information sources without acknowledgement and reference to the original source).  In such cases, negative marking, also known as ‘penalty scoring’, refers to the practice of subtracting marks for insufficient/incorrect referencing.  Consult the table at the end of this document, which outlines how negative marking will be applied as well as the way in which it will affect your assignment mark. 3 Refer to the CTI Conditions of Enrolment for more guidance (available on myLMS).ITSC311 – Assignment specification | V1.0 Page 3 of 13 Useful websites 12manage: a knowledge network about management [Online] Available at: http://www.12manage.com/ A database that includes articles as well as dictionary and encyclopaedia entries relevant to the management sciences. Academic Journals [Online] Available at: http://www.academicjournals.org/all_articles Academic Journals is a broad-based publisher of peer-reviewed openaccess journals. Bookboon [Online] Available at: http://bookboon.com/ An online book publishing company that provides students with free access to e-books in a wide variety of subject fields, including Marketing and Human Resources Management. Business Open Learning Archive (BOLA) [Online] Available at: http://business.highbeam.com/137662/article- 1G1-54905587/bola-business-open-learning-archive A database, created by Brunel University (Business Division), containing newspaper, magazine and journal articles related to business studies. Emerald Journals [Online] Available at: http://www.emeraldgrouppublishing.com/products/journals/index.htm An online database of journal and e-journal articles, published by Emerald Group Publishing, on a wide variety of subjects as related to the management sciences, including Marketing, Human Resources Management, Accounting, Finance, Economics, Business Management and Business Strategy. EBSCOhost [Online] Available at: https://www.ebscohost.com/ A research database containing online information resources, including 375 full-text and secondary databases. The Free Management Library: Online Integrated Library for Personal, Professional and Organizational Development [Online] Available at: http://managementhelp.org/ An online library containing information on topics related to business, management and organisational development; each topic has additional recommended books in the library. Google Books [Online] Available at: https://books.google.co.za/ A Google service that searches the full text of books and magazines that Google has converted into digital format, stored on its (digital) database.ITSC311 – Assignment specification | V1.0 Page 4 of 13 Useful websites Google Scholar [Online] Available at: http://scholar.google.co.za/ A search engine that indexes the full text of scholarly (scientific) literature pertaining to a variety of disciplines and in different formats, including online journals and scholarly textbooks. JURN [Online] Available at: http://www.jurn.org/#gsc.tab=0&gsc.q=commerce&gsc.sort= JURN is a unique search-engine primarily dedicated to indexing free and ‘open-access’ e-journals in the arts and humanities. It is a ‘full text finder’ that harnesses all the power of Google to search across quality open access content. NetMBA: a business knowledge centre [Online] Available at: http://www.netmba.com/ Articles in the subject fields related to Business Administration, including both elementary and advanced topics as well as frameworks and theories involved in solving challenging problems. Oxford University Press Journals [Online] Available at: http://www.oxfordjournals.org/en/ Oxford University Press (OUP) publishes the journals and delivers this research to the widest possible audience. ProvenModels [Online] Available at: http://www.provenmodels.com/page/about A web-based library of management models aimed at graduates, executives and management consultants. A word of caution Information available on the World Wide Web (WWW) is not necessarily reliable or of a high academic standard. Therefore, it is essential that you verify online information by comparing such to information in reliable information sources, such as accredited (academic) journals and relevant textbooks written by subject experts.ITSC311 – Assignment specification | V1.0 Page 5 of 13 Assessment criteria assessed The following criteria are assessed in this assignment: LO2 Summarise principles of security Question no. 2.1 Describe the categories of threats 2.1.a 2.2 Describe the sources of attacks 2.1.b LO3 Evaluate legal and ethical issues Question no. 3.1 Describe the law and ethics 2.2.a 3.2 Identify laws relevant to information security 2.2.b 3.3 Identify ethical concepts in IT 2.2.c LO4 Apply, describe, discuss and explain the three steps involved in risk management Question no. 4.1 Describe risk management 1.1.a 4.2 Describe risk identification N/A 4.3 Describe risk control N/A LO5 Apply the three steps involved in risk management to a case study Question no. 5.1 Identify resources and their vulnerabilities 1.1.a 5.2 Apply risk control strategies to mitigate risks 1.1.a LO6 Design a blueprint for a case study, and include continuity in the design Question no. 6.1 Identify the considerations to be taken into account when creating a security blueprint 2.1.c, 2.1.d 6.2 Identify the components of a blueprint 1.1.b 6.3 Describe business continuity strategies N/A 6.4 Explain different ways of recovering from a disaster N/A 6.5 Explain the use of digital forensics in identifying how attacks on assets occur N/A LO7 Critique security technology that is available on the market Question no. 7.3 Describe the functions of firewalls 2.1.b LO8 Assess new technologies Question no. 8.3 Explain the functions of Intrusion Detection and Prevention Systems (IDPSs) 2.1.b LO9 Evaluate cryptography and justify the use for it today Question no. 9.1 Explain how cryptography is used in access control 3.1.a 9.2 Describe asymmetric, symmetric and hybrid cryptographic methods 3.1.b, 3.1.c 9.3 Apply cryptographic methods to secure information 3.1.dITSC311 – Assignment specification | V1.0 Page 6 of 13 Question 1 50 marks Scenario Study the scenario and complete the questions that follow: Mobile devices in the workplace cause more security breaches, say firms The 750 IT and security professionals surveyed by Dimensional Research on behalf of Check Point cited significant security concerns about the loss of sensitive information stored on employee mobile devices, including corporate email (79%), customer data (47%) and network login credentials (38%). The use of personal mobile devices, such as smartphones and tables, is proliferating in the workplace. While businesses are steadily accepting this trend, IT administrators struggle with securing the abundance of devices and operating systems, while also protecting their organization against data loss and the rise in mobile threats, Check Point observed. A full 94% of respondents said their firm has seen a marked increase in the number of personal mobile devices connecting to the corporate network, with 78% of respondents seeing the number of devices more than double in the last two years. Apple (30%) and BlackBerry (29%) were the most common types of mobile devices connecting to corporate networks, followed by Android (21%). Nearly half of respondents believe that Android devices pose a larger security risk to the mobile enterprise than other devices. Personal and corporate-owned mobile devices store and access a variety of sensitive information, including email (79%), customer data (47%) and login credentials (38%) for internal databases or business applications. A full 62% of respondents believe the lack of security awareness among employees is the greatest factor impacting mobile data – followed by mobile web browsing (61%), insecure Wi-Fi connectivity (59%), lost or stolen devices (58%), and malicious mobile application downloads (57%). Surprisingly, a full 72% of survey participants said that careless employees pose a greater security risk to the organization than hackers (28%). “Employee awareness is going to be key for IT professionals moving forward”, said Scott Emo, head of endpoint product marketing at Check Point. “This might mean not just the one security class that employees take when they come into the corporation, but it means ongoing training for employees to increase awareness that these mobile devices have confidential corporate information on them”, Emo told Infosecurity. Emo recommended that companies put in place policies to ensure that the mobile device has a password securing it, that sensitive content is encrypted, that there is a capability to wipe the device if it is lost or stolen, and that security patches are kept up to date on the devices.ITSC311 – Assignment specification | V1.0 Page 7 of 13 “The consumerization of IT is here to stay. It is a problem that IT professionals have to deal with. It is not going away; it is only increasing. It appears that education is going to be a key over the next few years in minimizing the risk that corporations have from this new way of getting corporate data”, he concluded. Source: http://www.infosecurity-magazine.com/news/mobile-devices-in-the-workplace-cause-more/ 1.1 As a newly appointed IT Security analyst, you have been called upon to analyse the scenario. a. Perform a risk assessment for the usage of mobile devices in the workplace, by constructing a table detailing the vulnerabilities, associated threats and risks that need to be understood when dealing with mobile devices in the workplace. (25 marks) b. Suppose you work for an organisation called Code Developers. Develop an Issue Specific Security Policy (ISSP) for the use of mobile devices in the organisation. Include the following headings (topics): i. Statement of policy (5 marks) ii. Applicability (4 marks) iii. Responsibilities (4 marks) iv. Policy and usage of equipment (4 marks) v. Access control (8 marks)ITSC311 – Assignment specification | V1.0 Page 8 of 13 Question 2 80 marks Scenario Study the scenario and complete the questions that follow: The speed of technological change is leaving gaping holes in highly sensitive company IT infrastructure. These vulnerabilities are being targeted by cybercriminals at an increasing rate as South Africa is starting to feel the heat from attackers across the globe. It was revealed at the 2015 Security Summit, in Johannesburg, that South Africa is the most attacked country on the African continent over the past six weeks. Vernon Fryer, Chief Technology Security Officer at Vodacom, presented alarming statistics from the Vodacom Cyber Intelligence Centre revealing a 150% increase in the number of DDoS attacks in the last 18 months in Africa. These attacks occur where multiple compromised systems, usually infected with a Trojan, are used to target a single system causing valuable downtime to assets like websites. Symantec’s Antonio Forzieri says that one in 214 emails sent in South Africa last year was a spear fishing attack. Don’t let the exotic naming fool you. These attacks can cause serious personal distress, financial loss and are achieved by the simple click of a malicious link in an email. Interestingly, the effectiveness of a spear fishing attack rises from three to 70% when private personal info is included. “Most times this information is accessed easily online or hacked through open source websites,” says Ignus Swart from the Council for Scientific and Industrial Research. It is very unfortunate that businesses in South Africa won't take a new local data privacy law seriously until there’s a high-profile hacking breach in the country. This is according to Nader Henein, who is the Regional Director for Product Security at BlackBerry in the Middle East and Africa. This law restricts how companies handle personal data to safeguard individuals from security breaches. The law is intended to close the gap between South Africa and the likes of Europe with regard to data privacy laws. However, Fin24 has previously reported on how adoption of the law is sluggish among local companies. According to research from Trustwave, 51% of South African companies have not made a significant effort to comply with the legislation. And BlackBerry’s Henein, who is in Johannesburg for this week’s IDC CIO Summit, told Fin24 that full adoption of the new law could only be spurred on by public hack attacks. He said that the likes of big banks in the country are currently adopting the law but other businesses still have a way to go. “Breaches are not yet very public,” Henein told Fin24. “It's not going to really grab hold with a lot of companies until you start seeing companies getting fined.” And then it starts ringing true with members of the board and the C-level,” he said. South Africa is still in the process of appointing a regulator to look over the implementation of this new law. But once a regulator is established, companies that experience cyber breaches could face heavy fines.ITSC311 – Assignment specification | V1.0 Page 9 of 13 Custodians of breached data could face a R10m fine or a 10 year jail term. Just five data breaches were registered in South Africa in 2015 but this figure may not show the whole picture, says digital security services company Gemalto. The company has released its Breach Level Index which shows that, globally, 3.6 billion data records have been exposed since 2013. These data breaches are focused on gaining access to personal information that can be sold illicitly for financial gain, said the company. “Because breaches can have high impact on brand reputation, many companies are still tempted not to disclose these as they are not legally required to,” said Cosser. “Based on the above, the need for greater regulation in South Africa has never been clearer – as per trends being seen in the rest of the world,” Cosser added. Companies in SA that do get hacked risk being unaware of it. Just 38% of South African companies have organisational measures in place to prevent unauthorised data loss, according to information security company Trustwave. Source: http://www.fin24.com/Tech/Multimedia/Data-security-yet-to-grab-hold-in-SA-20150324 2.1 According to the article, Africa has seen a 150% increase in the number of DDoS attacks in the last 18 months, and South Africa is the most attacked country on the African continent. a. What is a Distributed Denial of Service (DDoS) attack? In your answer, also explain how is it conducted and how it differs from a Denial of Service (DoS) attack. (9 marks) b. How can you prevent or stop a DDoS attack? Highlight the steps that should be followed in such an event. (15 marks) c. You have been hired as a security specialist by an organisation that has fallen prey to a recent cyber-attack. When analysing the organisation’s systems, you realise that the company does not have a defence strategy in place to prevent unauthorised access to its systems. Describe and analyse two commonly used security strategies. In your answer, also explain the practical implementation of each strategy. (25 marks) d. In what ways are these strategies similar and different from one another? What is their relationship? (6 marks)ITSC311 – Assignment specification | V1.0 Page 10 of 13 2.2 South Africa has implemented a number of data protection laws to protect users from unlawful use of their personal information. a. What is the name of the law being referred to in the above article? (2 marks) b. Describe, in detail, what this law entails. In your answer, also highlight when it was passed into law, what its objective is and why it is important that all organisations adopt the law. (15 marks) c. Evaluate eight principles that are embodied in this law which security personnel should know. (8 marks)ITSC311 – Assignment specification | V1.0 Page 11 of 13 Question 3 30 marks Scenario Study the scenario and complete the questions that follow: James and Ruth want to transmit sensitive business data over the Internet. They are concerned that, in the event of an intrusion by hackers into the system, an outsider may have access to the company’s confidential information. This would be detrimental to the success of the business. James recently learnt that it is possible to encrypt data with a single key; he would need to send the single key to Ruth as well, so that she can decrypt the message. He asks one of the security personnel for advice and is advised to use encryption to hide this information so that if a hacker intercepts this information, he/she will not be able to read its contents. James is also advised to use two different keys – one to encrypt the information and the other for Ruth to access the information. Ruth will have to do the same when she wants to reply to James’s message. The above example highlights at least one obvious concern James must have about the public key he used to encrypt the message, that is – he cannot know with certainty that the key he used for encryption actually belonged to Ruth. It is possible that another party monitoring the communication channel between James and Ruth substituted a different key. Source: William, J., 2016 3.1 Trust is very important when you buy anything online. Due diligence must be taken to establish whether the person or organisation you are doing business with is really who they say they are. Public key infrastructure was implemented to protect the transmission and reception of information. a. What is the name of the encryption method that James and Ruth are using? (2 marks) b. Ruth is still concerned that the communication between her and James is not secure. She feels that there is still a chance that someone could be intercepting/ monitoring their communication. She would prefer a method that allows her to be completely sure that the message she receives is truly from James. Suggest a solution to Ruth. (2 marks) c. Explain to Ruth, in detail, how this implementation (specified in ‘b’ above) really works and how it assures her that the message has not been tampered with. (7 marks) d. Briefly describe each of the components of the solution you specified above. (10 marks)ITSC311 – Assignment specification | V1.0 Page 12 of 13 e. James has sent the following message to Ruth: “QUICKLY SELL YOUR VODAFONE SHARES.” What will the encrypted message be if James had used the following? i. Caesar Cipher with a left key of 5 (3 marks) ii. Transposition Cipher with keyword JAVA and a key of 3421 (6 marks) You have now reached the end of this assignment. Please ensure that you have answered all the required questions before submitting your assignment to your lecturer and ensure that you have adhered to all the instructions within this assignment.ITSC311 – Assignment specification | V1.0 Page 13 of 13 Negative marking Third-year students  A minimum of 15 additional information sources must be consulted and correctly cited.  If no additional information sources have been used, a full 15% must be deducted.  Deduct 1% per missing resource of the required 15. For example: o If only five resources cited, deduct 10% o If only three resources cited, deduct 12%  Markers must interpret the Turnitin Report to determine actual Overall Similarity Index percentage.  Markers to apply the penalties for Category A for insufficient sources and incorrect referencing style.  Markers to apply the penalties/actions for Category B for plagiarism. Category A Minimum reference requirements Deduction of final mark No additional information sources have been used or referenced 15% Category B: Interpretation of Turnitin report Students may not have more than a 15% Overall Similarity Index on Turnitin, after analysis of the report. Interpretation of Turnitin Originality Report Lecturer to capture the following 1. Original Overall Similarity Index (percentage) of Turnitin report 2. Overall Similarity Index (percentage) after lecturer analysis of Turnitin report (to determine legitimate plagiarism) Penalties Action a. Less than 15% of the body of assessment (based on Point 2 above) No action. Mark according to memorandum b. More than 15% of the body of assessment and first offence (based on Point 2 above) Award 0% for the assignment c. If more than 70% of the body of assessment Award 0% and conduct disciplinary hearing