CTEC5802 - Cyber Threat Intelligence - De Montfort University
Learning outcome 1: Demonstrate an in-depth knowledge, understanding and critical awareness of the cyber threats domain.
Learning outcome 2: Critically analyse and correlate breach information, risk assessment and make preventative recommendations.
Learning outcome 3: Explain and demonstrate understanding of the psychological motivations of the threat actors.
Learning outcome 4: Demonstrate an awareness of developing standards and relate research on security policy formulation.
Questions to be undertaken:
The assignment is to test the understanding of the materials and content from the module. The approach is to use a well-documented in the Internet in the Internet the Staysure Limited case study and consolidate learning through an application of the approaches learned in the module to the case study examination and solving.
Stage 1: Staysure Limited Case Study Articulation
Question 1 Summarise the Staysure Limited case study, citing explicitly the source references and description of the case available in the Internet. (>500 words)
Question 2 Produce a high-level security architecture for the Staysure Limited case study (schemes/diagrams and narrative), citing the source references.
Stage 2 Threat Analysis and Risk Assessment of the Staysure Limited Case Study
Question 3 Produce a risk assessment of the architecture and system, covering all of the assets, vulnerabilities, threat sources and threat actors, citing the source references when needed. (>500 words)
Question 4 Write a short summary report making recommendations that would have prevented the breach, citing the source references. (>500 words)
Stage 3 Psychological Motivations and Insider Threat in the Staysure Limited Case Study
Question 5 Exploring the key psychological motivations that could be used to explain the attack for the Staysure Limited case study. Discuss how aspects of Insider Threat could be used to explore/explain this attack for the Staysure Limited case study, citing the source references. Include the possible Insider Threat ‘type' that could be at work giving a clear rationale for this choice. (>500 words)
Stage 4 Security Assurance Architecture of the Staysure Limited Case Study
Question 6 Design a security assurance architecture of the Staysure Limited case study that would have prevented the data breach, citing the source references. Explain your architecture and its components. (>500 words)
Question 7 Present a set of information security policies covering the system of the Staysure Limited case study, to include overall security policies, citing the source references. Please note that you cannot copy-paste policies presented in the class but need to create your own ones as a policy designer in this case. (>500 words)
Referencing style - Harvard
Attachment:- Cyber Threat Intelligence.rar