ISYS1002: Cyber Security ASSIGNMENT 2.
Topic

ISYS1002: Cyber Security ASSIGNMENT 2

Subject

Data Analysis and IT

Date

28th Jun 2025

Pages

2

ISYS1002-Assignment-2

ISYS1002: Cyber Security ASSIGNMENT 2

Table of Content

Insert your table of content here

Executive Summary

(Also called - Abstract or Synopsis)

It is a short, concise summary of the report which provides the reader with a succinct overview of the report.

Length - approximately 200-250 words.

Introduction

The aims of your report (what you intend to cover) – purpose, background & scope

(Approximately 100 words)

Task 1: BOYD Risk Assessment

This section contains a discussion of Task 1 (Approximately 1000-1200 words). As the per the Assignment document Task 1 guideline, this section should cover details about threats, vulnerability, TVA, qualitative risk, recommend controls and cost benefits analysis. You should subsections such as:

Objective/Purpose of BYOD Risk assessment

Critical Asset Identification (from Ass1)

Threats and Vulnerabilities identification and TVA analysis.

Discuss risk appetite

Discuss about existing control

Discuss Likelihood and impact (rating table with some explanation of rating)

Complete risk registry (risk ranking) for risk ranking

Discuss proposed Controls

Complete cost benefit analysis

Etc.

Task 2: Anti- Phishing Guideline

This section contains discussion of Task 2 (Approx. 600-800 words). You should have sub sections as the per the

Assignment document Task 2 guideline such as:

Definition and description of characteristics of phishing attacks

Representative real word examples of phishing attack incidents

Instructions for phishing attack handling for scu students

Instructions for phishing handling for SCU IT admin

Etc.

Task 3: Ethics and Legal Issues

This section contains a discussion of Task 3 (approximately 400-500 words). You should have sub-sections as per the assignment document Task 3 guideline, such as:

Briefly define and discuss laws and ethics in the context of cyber security

Explain the consequence(s) for non-compliance of information privacy requirements.

Discuss impacts for non-ethical behaviour

Discuss what SCU should do to prevent from unethical and illegal behaviour

Etc.

Conclusions

Should relate to the aims you outlined in the Introduction.

Brief summary of the main findings outlined in your report.

(Approximately 100-150 words)

List of References

Starts on New page.

Referencing style – Harvard/APA

Appendices (Optional)

Starts on New page

Additional/supplementary material – relevant to your report but too detailed or bulky to include in the main report.

Each appendix should be labelled (e.g., Appendix B) and must be referred to by this label from within the report.

Glossary of Terms (Optional)

This is a list of terms, with definitions, relevant to your report. Starts on new page