TEC108: Cyber Security Assessment 2 Cyber Ethics Report
Data Analysis and IT
22nd Jan 2026
3
|
Subject Code: |
TEC108 |
|
Subject Name |
Cyber Security |
|
Assessment Title: |
Cyber Ethics Report |
|
Assessment Type |
Report |
|
Length |
1000 words |
|
Weighting |
40% |
|
Total marks |
40 |
|
Submission |
MyKBS |
|
Due Date |
Week 9 |
Your Task
For this assessment, you are required to complete an individual task. You are expected to write a report of 1000 words, focusing on the scenario and situation provided below. Your report should effectively address the five questions provided, ensuring that you draw connections to the concepts covered in class and the learning outcomes of LO3 and LO4.
LO3: Analyse risk mitigation strategies that address cyber security vulnerabilities and threats.
LO4: Describe privacy, legal, ethical and security issues and solutions related to the IT infrastructure and use of technologies in organisations.
Assessment Description
Situation:
Mark, a cybersecurity analyst at DCS Inc., has a significant role in protecting the company's information assets. During routine security assessments, he uncovers a significant vulnerability in the network infrastructure. Exploiting this vulnerability could have severe consequences, exposing sensitive customer data and putting valuable intellectual property at risk. The urgency to address the issue becomes paramount.
Situation:
Mark, a cybersecurity analyst at DCS Inc., has a significant role in protecting the company's information assets. During routine security assessments, he uncovers a significant vulnerability in the network infrastructure. Exploiting this vulnerability could have severe consequences, exposing sensitive customer data and putting valuable intellectual property at risk. The urgency to address the issue becomes paramount.
Ethical Dilemma:
Mark faces an ethical dilemma regarding the appropriate course of action. On one hand, he recognises the importance of promptly addressing the vulnerability to protect the company's assets, maintain customer privacy, and safeguard intellectual property. Ignoring the issue could lead to devastating outcomes, including data breaches, financial losses, and damage to the company's reputation. On the other hand, Mark must carefully consider the implications of disclosing the vulnerability.
The decision to disclose the vulnerability involves navigating a complex landscape. Mark must consider the potential operational disruptions that disclosure may cause. Addressing the vulnerability could require immediate actions that may impact critical systems and processes. Additionally, compliance with data protection regulations and other legal requirements must be considered to avoid potential legal consequences.
Additionally, Mark must weigh the impact of disclosure on the company's reputation and public perception. Transparency and responsible disclosure are critical, but Mark must balance them with the potential negative consequences, such as reputational damage and loss of customer trust. Finding the right balance between transparency and protecting the company's interests becomes crucial.
In summary, Mark faces an ethical dilemma in determining the best course of action regarding the vulnerability. He must weigh the urgency to address the issue against the potential impact of disclosure, considering operational disruptions, legal obligations, and the company's reputation. By carefully evaluating these factors, Mark can navigate this ethical dilemma while mitigating risk and protecting the organisation's interests.
Assessment Instructions
a) Read the situation and scenario on the previous page.
b) Answer and address the five (5) questions listed below.
c) Include at least five (5) references throughout your report.
d) Refer to the assessment marking guide to assist you in completing all the assessment criteria.
e) Submit your assignment to MyKBS (Moodle Assignment) once you have completed your report.
Your report must answer the following questions
1. What risks and consequences could result from the identified network infrastructure vulnerability? (100 words)
2. What strategies would you recommend to mitigate the vulnerability and prevent data breaches? (100 words)
3. What ethical considerations arise when deciding whether to disclose the vulnerability? (Hint: stakeholder impact, legal obligations, and reputation). (300 words)
4. Explain the role of transparency, responsible disclosure, and informed consent in handling cybersecurity vulnerabilities.? (200 words)
5. Describe the relevant legal and regulatory requirements for the vulnerability. Identify privacy, legal, and security issues. (300 words).
Important study information
Academic Integrity and Conduct Policy
https://www.kbs.edu.au/admissions/forms-and-policies
KBS values academic integrity. All students must understand the meaning and consequences of cheating, plagiarism and other academic offences under the Academic Integrity and Conduct Policy.
Please read the policy to learn the answers to these questions:
• What is academic integrity and misconduct?
• What are the penalties for academic misconduct?
• How can I appeal my grade?.
Late submission of assignments (within the Assessment Policy)
https://www.kbs.edu.au/admissions/forms-and-policies
Length Limits for Assessments
Penalties may be applied for assessment submissions that exceed prescribed limits.
Study Assistance
Students may seek study assistance from their local Academic Learning Advisor or refer to the resources on the MyKBS Academic Success Centre page. Further details can be accessed at https://elearning.kbs.edu.au/course/view.php?id=1481
Submission Requirements
All assessments including draft copies must be written and submitted in English. The use of translation tools is not permitted.
Assessment Rubric
|
Marking Criteria and % allocation |
High Distinction (85-100%) |
Distinction (75-84%) |
Credit (65 74%) |
Pass (50-64%) |
Fail (0-49%) |
|
Risks and Consequences (10%) _____ 4 marks |
Risks and consequences are correct and exceptional, and provide an outstanding level of specificity and accuracy. An excellent connection to the concepts covered in class is made. |
isks and consequences are correct and comprehensive, and provide a high level of specificity and accuracy. A strong connection to the concepts covered in class is made. |
Risks and consequences are correct and relevant, but could be more detailed or specific. A clear connection to the concepts covered in class is made, but it could be more explicit or detailed. |
Risks and consequences are correct, but basic or superficial. Some connection to the concepts covered in class is made, but it is weak or unclear. |
Risks and consequences are incorrect, incomplete or missing. No connection to the concepts covered in class is made. |
|
Mitigation Strategies (10%) _____ 4 marks |
Mitigation strategies are correct and exceptional, and provide an outstanding level of specificity and accuracy. Explanation or justification is provided for the findings or recommendations, and show a mastery of the best practices and solutions for cyber security. An excellent connection to the concepts covered in class is made. |
Mitigation strategies are correct and comprehensive, and provide a high level of specificity and accuracy. Explanation or justification is provided for the findings or recommendations, and show a strong understanding of the best practices and solutions for cyber security. A strong connection to the concepts covered in class is made. |
Mitigation strategies are correct and relevant, but could be more detailed or specific. Explanation or justification is provided for the findings or recommendations, but could be more extensive or critical. A clear connection to the concepts covered in class is made, but it could be more explicit or detailed. |
Mitigation strategies are correct, but basic or superficial. Some explanation or justification is provided for the findings or recommendations, but it is limited or unclear. Some connection to the concepts covered in class is made, but it is weak or unclear. |
Mitigation strategies are incorrect, incomplete or missing. No explanation or justification is provided for the findings or recommendations. No connection to the concepts covered in class is made. |
|
Ethical Considerations (30%) _____ 12 marks |
Ethical considerations are correct and exceptional, and provide an outstanding level of specificity and accuracy. Explanation or justification is provided for the findings or recommendations, and show a mastery of the ethical dilemmas and principles involved in cyber security. An excellent connection to the concepts covered in class is made. |
Ethical considerations are correct and comprehensive, and provide a high level of specificity and accuracy. Explanation or justification is provided or the findings or recommendations, and show a strong understanding of the ethical dilemmas and principles involved in cyber security. A strong connection to the concepts covered in class is made. |
Ethical considerations are correct and relevant, but could be more detailed or specific. Explanation or justification is provided for the findings or recommendations, but could be more extensive or critical. A clear connection to the concepts covered in class is made, but it could be more explicit or detailed. |
Ethical considerations are correct, but basic or superficial. Some explanation or justification is provided for the findings or recommendations, but it is limited or unclear. Some connection to the concepts covered in class is made, but it is weak or unclear. |
Ethical considerations are incorrect, incomplete or missing. No explanation or justification is provided for the findings or recommendations. No connection to the concepts covered in class is made. |
|
Transparency and Collaboration (10%) _____ 4 marks |
Transparency and collaboration are correct and exceptional, and provide an outstanding level of specificity and accuracy. Explanation or justification is provided for the findings or recommendations, and show a mastery of the role and importance of these principles in cyber security. An excellent connection to the concepts covered in class is made. |
Transparency and collaboration are correct and comprehensive, and provide a high level of specificity and accuracy. Explanation or justification is provided for the findings or recommendations, and show a strong understanding of the role and importance of these principles in cyber security. A strong connection to the concepts covered in class is made. |
Transparency and collaboration are correct and relevant, but could be more detailed or specific. Explanation or justification is provided for the findings or recommendations, but could be more extensive or critical. A clear connection to the concepts covered in class is made, but it could be more explicit or detailed. |
Transparency and collaboration are correct, but basic or superficial. Some explanation or justification is provided for the findings or recommendations, but it is limited or unclear. Some connection to the concepts covered in class is made, but it is weak or unclear. |
Transparency and collaboration are incorrect, incomplete or missing. No explanation or justification is provided for the findings or recommendations. No connection to the concepts covered in class is made |
|
Legal and Regulatory Requirements (30%) _____ 12 marks |
Legal and regulatory requirements are correct and exceptional, and provide an outstanding level of specificity and accuracy. Explanation or justification is provided for the findings or recommendations, and show a mastery of the privacy, legal, and security issues and solutions involved in yber security. An excellent connection to the concepts covered in class is made. |
Legal and regulatory requirements are correct and comprehensive, and provide a high level of specificity and accuracy. Explanation or justification is provided for the findings or recommendations, and show a strong understanding of the privacy, legal, and security issues and solutions involved in cyber security. A strong connection to the concepts covered in class is made. |
Legal and regulatory requirements are correct and relevant, but could be more detailed or specific. Explanation or justification is provided for the findings or recommendations, but could be more extensive or critical. A clear connection to the concepts covered in class is made, but it could be more explicit or detailed. |
Legal and regulatory requirements are correct, but basic or superficial. Some explanation or justification is provided for the findings or recommendations, but it is limited or unclear. Some connection to the concepts covered in class is made, but it is weak or unclear. |
Legal and regulatory requirements are incorrect, incomplete or missing. No explanation or justification is provided for the findings or recommendations. No connection to the concepts covered in class is made. |
|
References (10%) _____ 4 marks |
References are outstanding, relevant and properly cited, and demonstrate a comprehensive research on the topic from multiple angles or domains. |
References are plentiful, relevant and properly cited, and include a variety of sources from different perspectives or disciplines. |
References are adequate, relevant and properly cited, but could be more diverse or current. |
Some references are provided, but they are insufficient, outdated or not properly cited. |
No references are provided, or they are inappropriate or unreliable. |