ITT450_Case study_COVID19.pdf (1)

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 3

ITT450: Information & Network Security

COVID-19

Coronavirus disease (COVID-19) is an infectious disease caused by a newly discovered


coronavirus. According to the World Health Organization (WHO), most people infected with
the COVID-19 virus will experience mild to moderate respiratory illness and recover without
requiring special treatment. The COVID-19 can be spread from person to person. However,
the virus seems to be spreading easily and sustainability in the community (“community
spread”) in some affected geographic areas. In the digital environment, the coronavirus’s
infection has similarities with logic bomb infection which the destruction will happen after 14
days affected. By referring to this current issue, students need to investigate, how the
COVID-19 similar to the digital virus infections as the following:

1) Pick one affected country by COVID -19. Study the spreading methods of COVID -19 in
the selected country and translate it into pseudocode. (20 marks)

2) Find the similarities in destructive impacts between COVID-19 and the logic bomb. (10
marks)

3) List out the target of attacks and identify the characteristics of devices that prone to be
compromised by the attacks. (10 marks)

4) Based on your answers in 2, draft out a guideline to the user to prevent this kind of attack.
(30 Marks)

5) Please suggest protection methods and how to deal with the attacks when compromised.
(30 marks)

Note:

Please REFER to the given RUBRIC as a GUIDELINE to answer ALL questions.

Case Study Page 1


ITT450: Information & Network Security

Criteria Excellent Good Satisfactory Poor Score


(8 – 10) (5 – 7) (3 – 4) (0 – 2)
1 Explanation of the Thoroughly researched and Satisfactorily researched Partially researched and Insufficiently researched
spreading method explained the spreading and explained the explained the spreading and explained the
(10 marks) method spreading method method spreading method

Translation of the The pseudocode of The pseudocode of The pseudocode of The pseudocode of
spreading method to spreading method is spreading method is spreading method is spreading method is
pseudocode thoroughly and very well satisfactorily translated partially translated insufficiently translated
(10 marks) translated

2 Similarities in Thoroughly identified and Satisfactorily identified and Partially identified and Insufficiently identified
destructive impacts explained the similarities in explained the similarities in explained the similarities and explained the
between COVID-19 and destructive impact between destructive impact between in destructive impact similarities in destructive
the logic bomb COVID-19 and logic bomb COVID-19 and logic bomb between COVID-19 and impact between COVID-
(10 marks) – at least 3 similarities – at least 2 similarities logic bomb – at least 1 19 and logic bomb – 1
similarity similarity
3 Target of attacks and Thoroughly identified and Satisfactorily identified and identified and listed the Insufficiently researched
characteristics of listed the target of attacks listed the target of attacks target of attacks and and identified the target
devices that prone to be and characteristics of and characteristics of characteristics of devices of attacks and
compromised by the devices that prone to be devices that prone to be that prone to be characteristics of devices
attacks compromised by the compromised by the compromised by the that prone to be
(10 marks) attacks – at least 3 targets attacks – at least 2 targets attacks – at least 1 target compromised by the
and 3 characteristics and 2 characteristics and 1 characteristic attacks –1 target and 1
characteristic

Case Study Page 2


ITT450: Information & Network Security

Criteria Excellent Good Satisfactory Poor Score


(25 – 30) (20 – 24) (10 – 19) (0 – 9)
4 Guideline to the user Thoroughly drafted and Satisfactorily drafted and Partially drafted and Insufficiently drafted
to prevent this kind of explained the guideline explained the guideline explained the guideline and explained the
attack to the user to prevent to the user to prevent to the user to prevent guideline to the user to
(30 marks) this kind of attack – at this kind of attack – at this kind of attack – at prevent this kind of
least 3 key points of least 2 key points of least 1 key point of attack – 1 key point of
guideline guideline guideline guideline

5 Protection method Thoroughly identified Satisfactorily identified Partially identified and Insufficiently identified
and action taken deal and explained the and explained the explained the and explained the
with the attacks when protection method and protection method and protection method and protection method and
compromised action taken deal with action taken deal with action taken deal with action taken deal with
(30 marks) the attacks when the attacks when the attacks when the attacks when
compromised – at least compromised – at least compromised – at least compromised – at
3 protection methods 2 protection methods 1 protection method least 1 protection
and 3 actions taken and 2 actions taken and 1 action taken method and 1 action
taken

TOTAL

Case Study Page 3

You might also like