MIS311 Cyber security Case Study Report and Presentation

Subject Code and TitleMIS311 Cyber security
AssessmentCase Study Report and Presentation: Recommendation of Solutions Report
Length2500 words (+/- 10%)
Learning OutcomesThe Subject Learning Outcomes demonstrated by successful completion of the task below include:

Investigate and analyse the tenets of cyber security

Identify and communicate a range of threats and vulnerabilities to informational assets

Recommend and justify robust solutions to identified threats and vulnerabilities to cyber security

Develop own professional practice and ethical standards around security issues and implementation of solutions
SubmissionDue by 11:55pm AEST/AEDT Sunday end of Module 5.2
Total Marks100 marks

Assessment Task

This assessment addresses control measures that might be used to mitigate against the threats identified. Cybersecurity controls can be technical, training, physical barriers, policy changes, etc. In your group, write a 2500-word report to Worthy College management that focuses on:

  1. Technical solutions in mitigating against recognised threats and enhancing security
  2. The human factor and a robust company-wide policy framework

Please refer to the Instructions for details on how to complete this task.


Following the report you drafted for Assessment 2 Part A, you — as a group — are now required to propose and discuss specific solutions to address the identified vulnerabilities in Worthy College’s IT infrastructure and operation. The mitigations in this report are being suggested to the business as a plan for the future, they are not yet approved or adopted by the business.


  • Read MIS311 Assessment 2 Part A Brief document again.
  • Review your Assessment 2 Part A submission, especially the vulnerabilities identified.
  • You, as a group, are required to submit a 2500-word report to the managers, who do not have a technical background.
  • Your report must be related to the case study and is NOT a general discussion on cybersecurity. Statements that are not relevant to the business report will not attract marks. It is a report to the business following Part A.
  • Ensure that the recommendations made in the report are specific, actionable, and based on the case study.
  • Note that Assessment 2 Part B is not a general discussion on cybersecurity. It is a report to the business following Part A.
  • Structure of the group report:
    • Title Page: Subject code, subject name, assessment number, report title, word count (actual), student name, student ID, Torrens’s email address, learning facilitator’s name, and enrolled program (e.g., Bachelor of Business Information Systems). The title page has no page number.
    • The Table of Contents: It should list the report topics using decimal notation. It needs to include the main headings and subheadings with corresponding page numbers, using a format that makes the hierarchy of topics clear. Create the Table of Contents using Microsoft Word’s Table of Contents auto-generator rather than manually typing it out. The table of contents starts on a new page.
    • Executive Summary (approx. 100 words): This should be a short summary of what was done in the report but written as if to the CEO or board members. It is best written after the rest of the report and should be in the past tense. Often upper management only read the executive summary and so it must be a short overview of what was found and presented in the rest of the report. Long-winded, vague discussions about the importance of cybersecurity in today’s world etc. will NOT be accepted.
    • Body of the report (approx. 2300 words): This is an outline of the structure of the report, but do NOT use generic words such as ‘Body of the reports’ as section headings. Create meaningful headings and subheadings that reflect the topic and content of your report. The body of your report must address the following tasks:
  1. Identify two more vulnerabilities that you “discovered later”. Don’t go into deep details about these two vulnerabilities.
  2. Update the Table of Threads from Assessment 2 Part A with two extra vulnerabilities (Note: Now the Table of Threads includes eight vulnerabilities in total).
  3. Create a Table of Solutions and clearly summarise the cybersecurity control suggestions for all identified vulnerabilities. The resulting table should be short and easy to read as a presentation to management. Make sure to include all eight threats and vulnerabilities in the table with useful headings, including the cybersecurity control techniques. This table will be presented to the business as a recommended future plan.
  • Conclusion (approx. 100 words): It briefly states the purpose of the report and the key issues investigated. It is crucial to state major findings based on your research and analysis. Only major findings are needed, and they only need to be covered briefly in the conclusion.
  • Reference list
  • All referenced material must be properly cited and referenced, including academic sources, books, magazine sources, web sources, images and any other material that is not your work.
  • It is expected that students perform additional research and provide a minimum of five additional references in the field of cybersecurity.
  • At least two of the references MUST be of academic quality (peer-reviewed journal or conference articles).
  • All references should accompany DOI or URL.
  • Appendix (if required)
  • Report format and layout
    • The report should use font Arial or Calibri 11 point, should be line spaced at 1.5 for ease of reading and page numbers on the bottom of each page.
    • Diagrams and tables must carry the appropriate captioning (numbering, name, and resource).
    • If diagrams or tables are used, please follow APA 7th edition referencing guide.
    • Due attention should be given to pagination to avoid loss of meaning and continuity by unnecessarily splitting information over two pages.
  • Peer evaluation
    • Group participation will constitute the final 15% of the mark for Assessment 2 Part B.
    • Each student will download the Assessment 2 Group Participation Matrix document from Assessment 2 section.
    • Each student will evaluate the other members’ contributions using a “Group Participation Score (from 1 to 5)” according to the “Peer Evaluation Grading Scheme”.
    • The Group Participation Matrix document needs to be submitted by each student individually via the Assessment 2 Part B – Peer Evaluation submission link at the same time as the group report submission.
    • The Facilitator will use the average “Group Participation Score” for each member to determine the weighted “Teamwork” criterion in the marking rubric for this assessment.
    • All peer evaluation submissions are confidential and should not be viewed by other team members.
  • Assessment rubric

You are strongly advised to read the rubric which is an evaluation guide with criteria for grading the assignment. This will give them a clear picture of what a successful report looks like.


It is essential that you use appropriate APA style for citing and referencing research. Please see more information on referencing in the Academic Skills webpage.

Submission Instructions

Group submission

Each team will submit ONE Microsoft Word document. Any other formats will not be accepted. Submit this assessment via the Assessment link in the main navigation menu in Blackboard. The Learning Facilitator will provide feedback via the Grade Centre in the LMS portal. Feedback can be viewed in My Grades.

Peer Evaluation – Individual Submission

Each individual student is to submit ONE completed Assessment 2 Group Participation Matrix document in the Peer Evaluation submission link. Please submit a peer review correctly, as no submission may result in zero grading for this assessment criteria.

Academic Integrity

All students are responsible for ensuring that all work submitted is their own and is appropriately referenced and academically written according to the Academic Writing Guide. Students also need to have read and be aware of Torrens University Australia Academic Integrity Policy and Procedure and subsequent penalties for academic misconduct. These are viewable online.

Students also must keep a copy of all submitted material and any assessment drafts.

Special Consideration

To apply for special consideration for a modification to an assessment or exam due to unexpected or extenuating circumstances, please consult the Assessment Policy for Higher Education Coursework and ELICOS and, if applicable to your circumstance, submit a completed Application for Assessment Special Consideration Form to your Learning Facilitator.