This is a Pass task, so you MUST complete the task and submit the evidence of your work to Ontrack. Before attempting this task, please complete all Ontrack tasks required for the first three weeks. You
must complete and submit your work for all pass tasks; if you aim higher grade towards your final
score, please submit your work for the higher level tasks. Please ensure that you have submitted the
tasks before you proceed. Please note that the original due date specified in the unit guide is March 30 which is Easter Friday. The updated due date will be Wed April 4. Submit the following files to Ontrack:
A PDF file as the research report listing all group members details (full names, student IDs, and
email address)
A text file containing the URL link to your video and in what format the video is created. Assignement 1 is a group task. Students should form the group of their own. Each group consists of
three students maximum, but you may choose to work by yourself. The group leader is responsible for
submitting the assignment together with the group members’ details. Each complete submission should
include two items:
1. The first item is a research report of 3,000 words written by team members. 2. The second item is a text file containing the URL link to a 5 minute (maximum) video made by
team members. Please note: Team work is strongly recommended for this work! Each submission will be assessed
by its quality alone. Write a formal document (3,000 words minimum) based on your research on vulnerabilities
discovered in 2017. 1. You should find three vulnerabilities in three severity levels — one in Medium, one in High and one
in Critical. 2. Derive their CVSS 3.0 Base scores using the algorithm, and validate your calculation results by
comparing yours and the ones produced by the online calculator. 3. Compare the three vulnerabilities with our examples (Spectre, Meltdown, EternalBlue), list the
SIT704 Advanced Topics in Digital Security
Pass Task 4.1: Assignment 1 Submission
Overview
Instructions
Part I: Research Report
similarities and differences. 4. Calculate the CVSS Temporal and Environmental scores of your 3 vulnerabilities by using the
online calculator https://www.first.org/cvss/calculator/3.0. (Assume that your IT infrastructure is
used in an SME environment with less than 50 employees.)
5. Set up a mitigation strategy based on your calculation results obtained in Step 4, and prioritize
your countermeasures. 6. Demonstrate the exploitation of one of the vulnerabilities you identified. 7. Draw conclusions of your findings and elaborate the impact of your work. Submit a PDF file of your report to Ontrack. Prepare a video demonstration of the identified vulnerability. In this video, you should explain what the
vulnerbility is, how this vulnerability can be exploited, and how this vulnerability can be patched. In the
video, you should have the voice recorded that clearly explains the demo. The video should be stored
in the Deakin University’s one drive. Note that it is your responsibility to make sure that the video is clear and the voice is clearly audible and
understandable. Further, ensure that the link provided is working properly, and your supervisor can
access them. Submit a text file containing the URL link to your video and in what format the video is created. The qualtiy of your work will be assessed on the basis of the following criteria:
Part II: 5 minute Video Presentation
Evaluation criteria
版权所有:编程辅导网 2021 All Rights Reserved 联系方式:QQ:99515681 微信:codinghelp 电子信箱:99515681@qq.com
免责声明:本站部分内容从网络整理而来,只供参考!如有版权问题可联系本站删除。