Country : India
Assignment Task
 


Overview
Technological security leaves major gaps that people like Kevin can help us close. Read this book and you may finally realise that we all need to turn to the Mitnick's among us for guidance. — (Mitnick 2002)
This unit has been designed to acclimatise you, as managers and business professionals, to the contemporary security environment we all find ourselves in. This first of two project based assignments will give you the opportunity to analyse and report on the motivations and techniques of hackers by drawing on real world examples. In doing so, you will therefore demonstrate your ability to think like a hacker.
Details
For this assignment, you will write a report that unpacks the characteristics of hackers and hacking. You will support your conclusions and observations with broader reading.
Report details
There are four distinct parts you will need to respond to in your report:
1. Mitnick’s motivation: Motivations for hacking and social engineering In the preface of his book, The Art of deception: controlling the human element of security (https://ebookcentral.proquest.com/lib/swin/detail.action?docID=140243) , Mitnick (2002) identifies his motivations for hacking and social engineering. Describe these motivations and cite examples mentioned in the book. For additional credit, research news reports of Kevin Mitnick and assess whether you think Mitnick is telling the truth.
2. Description of techniques: Analysis of case studies for the Mitnick text As you work your way through the book, analyse the stories and scenarios and break them down into different categories of social engineering, hacking, crime and deception. For each term and technique used (and for activities that are not classified by the authors as social engineering) write a concise definition, a summary, one or two examples and how the technique differs from other techniques. Please note: Where appropriate, supplement your descriptions of each technique with citations of other sources e.g. news reports, blogs, web pages and other published material.
3. Classification of techniques: Create a visualisation of a tree-based hierarchy Construct a tree-based hierarchy of social engineering, criminal and deceptive techniques. Ensure your tree-based hierarchy clearly shows which sub-techniques form part of the range of techniques. For example, if you were analysing the sky and constructed a tree to describe it, your diagram could look like 'Figure 1: Tree-based hierarchy exemplar'. For the purpose of this assignment, each node in your diagram will correspond with your description and examples of each technique.

4. Description and classification of motivations: Research your own hacking case and create a visualisation for motivation and goals Search the internet for stories of other hackers (malicious and benevolent) and construct a tree showing their motivations and goals. Some obvious categories could be vanity, curiosity, greed, compulsion, employment, boredom and/or malice. Use your diagram to group and classify these motivations and others you see fit.
Report structure
This first project-based assignment will be submitted as a report (2000 words), using a well-supported word processing format or PDF. You must include a full list of the references you have used in this report in the Swinburne Harvard style. Quotations should be avoided as much as possible. Please note that the reference list is not included in the word count.
Supporting resources The Student Hub has Study resources (https://portal.swinburneonline.edu.au/studyresources) that will assist you with both research and referencing.
Criteria
1. Describe?and cite examples of Mitnick’s motivations for hacking and social engineering. 2. Concise definition and examples of hacking or social engineering technique?. 3. Tree-based hierarchy of social engineering, criminal and deceptive techniques, showing clearly which sub-techniques form part of the range of techniques.?? 4. Group and classify motivations and goals by constructing a tree. 5. Report structure, tone and clarity of writing.

 

    


This Management Assignment has been solved by our Management Experts at UniLearnO. Our Assignment Writing Experts are efficient to provide a fresh solution to this question. We are serving more than 10000+Students in Australia, UK & US by helping them to score HD in their academics. Our Experts are well trained to follow all marking rubrics & referencing style.
    
Be it a used or new solution, the quality of the work submitted by our assignment Experts remains unhampered. You may continue to expect the same or even better quality with the used and new assignment solution files respectively. There’s one thing to be noticed that you could choose one between the two and acquire an HD either way. You could choose a new assignment solution file to get yourself an exclusive, plagiarism (with free Turnitin file), expert quality assignment or order an old solution file that was considered worthy of the highest distinction.

  • Uploaded By : Roman
  • Posted on : November 03rd, 2019
  • Downloads : 196

Whatsapp Tap to ChatGet instant assistance