Professional Documents
Culture Documents
Assessment 2
Submission Details
• This is an individual assessment.
• You must submit your answers in a word or pdf format on the Turnitin link available on the
Moodle.
• The assessment carries 30% weightage and is marked out of 30.
• Your answers should not be more than 500 and not less than 300 words per question.
• Your similarity index should be less than 30%.
• The deadline to submit your work is by Friday week 8, 5 PM.
After submitting the report, in week 9, each student will have a 3-5-minute interview with the
lecturer in which needs to explain the findings of the report and demonstrate understanding of the
content. In addition to the criteria stated in the assessment briefing for evaluation of the written
report, the final mark also depends on the performance of the student in the interview.
Given the competitive nature of the automobile industry, and situated within a complex and
dynamic external environment, Anzaw requires their production lines to be optimised continuously
through the use of the latest cutting-edge hardware and software technology systems. In turn, these
systems need to deliver not only high levels of work-flow but also high levels of information
security. Information security is increasingly important as the company’s technological vision and
goals now extend to their automobiles through technological innovation and breakthroughs
associated with using the Internet of Things (IoT). Indeed, Anzaw currently feels it is vulnerable
to several types of malicious cyberattacks that aim to capture valuable business information in
order to sell such information in the black market. Despite these dangers, the management at
Anzaw has had little time to focus on areas of information security vulnerability. Therefore, they
have hired you as an independent information security consultant to advise them on various aspects
of information security issues and vulnerabilities.
Figure 1: Infrastructure of Anzaw Pty Ltd
Assuming the role of an independent information security consultant, use information given in the
case study to answer the following questions.
1. Discuss the existing security landscape pertaining to information systems of Anzaw Pty Ltd,
including common vulnerabilities, potential threats, and possible repercussions of a security
breach.
(Note: general descriptions/definitions about vulnerabilities and threats will receive no marks.
You must:
i. explain where exactly in the given case and network topology you found the vulnerabilities/threats
ii. what are the consequences of each identified vulnerability/threat)
(10 marks)
3. Analyse and explain various security technologies, scanning and probing tools that Anzaw
Pty Ltd should use to master the best practices in protecting information.
(Note: general descriptions/definitions about security technologies, scanning and probing tools will receive
no marks.
For each selected item, you must explain:
i. the reasons for choosing it,
ii. how should it be deployed and integrated considering the given network architecture and topology,
iii. how would it help to implement best practices for protecting information.)
(10 marks)