Recent orders

Cyber Security Assignment ( Auditing)

Exercise 2: Auditing
Mark: 30%
This is the second exercise that makes up the Portfolio of CO4610.
A. Briefly explain the use of Windows Registry and demonstrate how the registry can be analysed using
RegShot.
Your discussion should show understanding of regedit and the structure of the registry. For the
demonstration, you are required to do the following:
i. Install RegShot on a Windows machine. You are strongly advised to use a virtual machine (VM)
as you may not be able to undo any registry changes you make. You can use a university provided
VM or one on your personal PC.
ii. Take a snapshot of the system’s registry.
iii. Perform some system changes or install a new software. That is, carry out any activity that will
cause some registry entries.
iv. Take a second snapshot of the registry. This must be done after (iii) above.
v. Compare the two snapshots and briefly discuss your findings. Use screenshots to document this
exercise.
B. On a Linux VM, create a log file in /var/log with your J number (e.g., J12345.log) that collects all
security related logs. Set logrotate to rotate all logs, including the new log, every hour. Compress
the rotated new log and change its permission to 0700. Document and discuss the process you have
taken using some screenshots.

Note: This will require you to create a logrotate configuration file for the new log. Remember that
the options in this log-specific configuration file override the global configuration options which are
contained in logrotate.conf. Refer to the lecture note or read online to remind yourself the
directories where relevant .conf files are stored.
______________________________________________________

Cyber Security Assignment ( Speaking Cyber)

Exercise 1: Speaking Cyber
Mark: 25%
In 2016, a group of hackers known as the Hacking Team got hacked by a self-described black hat hacker. The
hacker subsequently dumped their findings and also explained how the hack happened. It was alleged that
“Hacking Team was a company that helped governments hack and spy on journalists, activists, political
opposition, and other threats to their power”. Read about ‘How Hacking Team got hacked’ and address the
following:
A. Briefly summarise what happened. Find out what you can on the actors, including the attacker and the
target(s), and possible motivations.
B. Identify and explain at least three cybersecurity terminologies from (A) above. Where the term was used,
define the term, describe in what context it was used, and give some details. E.g., if “attack vector” is
mentioned, then what is ‘attack vector’, what was the attack vector used and what did it achieve?
It is expected that you will use published materials like online articles, books, journals, conference papers,
news articles etc. and these should be properly referenced. You may want to start from here and here.
Note: You can use any format of your choice. For example, you may address (A) and (B) separately, in
separate sections, or together. So, whether you choose to cover both parts together or separately, the most
important thing is that the report shows your understanding of what happened, the actors, possible
motivations and terminology identification and explanation.

Cover Letter / Proposal (Communication Through Writing)

Task 1: Communication Through Writing

Today’s digital business environment is global, fast paced, and highly competitive. As a business professional, it is imperative you communicate effectively throughout your daily activities. In this task, you are asked to demonstrate your proficiency in communicating as a business professional.

REQUIREMENTS
Your submission must be your original work. No more than a combined total of 30% of the submission and no more than a 10% match to any one individual source can be directly quoted or closely paraphrased from sources, even if cited correctly. An originality report is provided when you submit your task that can be used as a guide.

You must use the rubric to direct the creation of your submission because it provides detailed criteria that will be used to evaluate your work. Each requirement below may be evaluated by more than one rubric aspect. The rubric aspect titles may contain hyperlinks to relevant portions of the course.

A. Write a cover letter (suggested length of 1 page) for a job you applied for online, using business writing techniques to justify why you should be hired. (You may use “Cover Letter Guidelines” as a reference in the web links below.)

Note: Consider the following questions when composing your cover letter:

• Why is this position of interest to you?

• What qualifies you for this position?

• Why are you a good fit for this specific position?

• Why are you a good fit for the company as a whole?

B. Create a business-to-business sales meeting invitation in the form of an email (suggested length of 1 page) for your hypothetical company’s clients.

Note: Consider the following questions about this meeting when composing your invitation:

• What is the purpose?

• Why should the client be present?

• What is the format (e.g., video chat, in-person, phone conference)?

C. Write an essay (suggested length of 1–2 pages) explaining the importance of incorporating cultural sensitivity when interacting with international clients.

D. Acknowledge sources, using in-text citations and references, for content that is quoted, paraphrased, or summarized.

E. Demonstrate professional communication in the content and presentation of your submission.