MIS607 Cybersecurity Threat Model Report

MIS607 Cybersecurity Threat Model Report
ASSESSMENT 2 BRIEF
Subject Code and TitleMIS607 Cybersecurity
AssessmentThreat Model Report
Individual/GroupIndividual
Length1500 words (+/- 10%)
Learning OutcomesThe Subject Learning Outcomes demonstrated by successful completion of the task below include: Explore and articulate cyber trends, threats and staying safe in cyberspace, plus protecting personal and company data.Analyse issues associated with organisational data networks and security to recommend practical solutions towards their resolution.Evaluate and communicate relevant technical and ethical considerations related to the design, deployment and/or the uses of secure technologies within various organisational contexts.
Submission  Due by 11.55 pm AEST Sunday end of Module 4.1
Weighting30%
Total Marks100 marks

Task Summary

The goal of assessment 2 (A2) is to identify threats/vulnerabilities in the case scenario described in the associated file, Assessment Initial Case Scenario.docx. Not all threats/vulnerabilities you “discover” are in the initial case scenario. The scenario discusses some elements of the business that are needing mitigation, but you will need to also “discover” other threats/vulnerabilities.

The word count for this assessment is 1,500 words (±10%), not counting tables or figures. Tables and figures must be captioned (labelled) and referred to by caption (note that publishers do not guarantee tables and figures to be placed the same order or location as in your article). Caution: Items without a caption may be treated as if they are not in the report.

Be careful not to use up word count discussing cybersecurity basics. This is not an exercise in summarising your class notes, and such material will not count towards marks.

The report will not be marked without an Academic Integrity Declaration (see below).

DFD Requirements

The DFD must relate to the business described in the initial case scenario. Remember, the DFD is the first step in the risk analysis, but it is not the main output of the assessment. The main output is the categorised threats, see below.

For the DFD, you need at least a context diagram and a level-0 diagram. You can include further levels if you feel they are needed to show a threat boundary, but this is not necessary. The level-0 diagram (and further level diagrams, if needed) must not break the rules for proper DFD formation. And the DFDs (excluding the context diagram) must have labelled threat boundaries.

You must use the symbol convention shown in classes:

Threat Discovery

The main output of A2 should be a set of no less than 10 threats or vulnerabilities that need mitigation in the organisation. You will discover these with the help of the DFD and the threat boundaries.

The main threat for this assessment resembles a real-world attack. You need to develop a brief, factual overview of the real-world attack (web links can count as references here since the attack might not yet be covered academically). You are required to reference suggested mitigations, or costs in the real-world attack, this will help enormously with both A2 and A3 and will be taken into consideration when marking. Note carefully that any explanation of the real-world case is based on real information/data, not speculation or simulated “discovery”.

It is important to understand that you need to “discover” additional threats/vulnerabilities on the associated initial case scenario. The scenario is only an initial assessment of the organisation. Your “discovery” can be simulated, based on your simulated investigation.

Obviously, you must cover the main threats already identified in the scenario, but other threats/vulnerabilities should be “discovered” by you.

Inform the reader about what discovery techniques were used. In dot points inform the audience…..who you talked to, questions you asked – but keep this very brief…8-10 dot points max.

Imagine yourself as a consultant called in to work inside the business to discover threats.

For this assignment, business acumen and business logic in approaching threats is what is required of you.

STRIDE methodology will be used for the reports. Note carefully that the DFD itself is not the main output of the assignment. The main result of the report is a set of threats or vulnerabilities. Important points are:

  • Try to map these threats/vulnerabilities as best you can against threat boundaries;
  • and categorize them as best you can against STRIDE categories. The STRIDE categories are not the threats.

Do not be concerned if the threats you discover do not fit all STRIDE categories. In a full, real-world assessment with hundreds of threats, this would be the case, but with around 10 threats this will probably not be possible. Try to cover at least three.

You can make assumptions, but the report is written from the point of view of a consultant who has made “discoveries” from their investigations. In the simulation you may gather needed information from stakeholders. Assessment markers are aware that the technical information “discovered” by you might not be 100% accurate in all details. However, your discoveries should be somewhat realistic.

Reference Requirement

For A2 the requirement is a minimum of 3 references overall. You can have as many references as you like, but a minimum of 3.

At least one of the references needs to be a reference to a peer reviewed journal or conference article. (This will change for A3.)

Report Structure & Format

The report should have the following heading structure.

·        Title Page

With subject code and name, assignment title, student’s name, student number, and lecturer’s

name. Also include AI declaration.

·        Executive Summary

This should be written after the report and should briefly summarise what you did and what you found. It should be capable of being read by management generally, even those with relatively little IS experience.

·        Body of the Report

DFD

threat discovery

threat list and STRIDE categorisation

·        Conclusion

Summarise major findings or recommendations that the report puts forward.

·        References

Use only APA style for citing and referencing. Please see more information on referencing

·        Appendix

An appendix is not necessary but place it here if you intend to use one.

The report should use Arial or Calibri fonts, 11 point. It should be line spaced at 1.5 for ease of reading, and have page numbers on the bottom of each page.

Possible Later A2 Remediation

If you do not perform so well with A2 (less than 60%), you will need to fix issues noted in A2 and include this in appendix in your A3. There will be no marks for the remediation of A2.

Academic Integrity Declaration

The following must be included in the report. The report will be marked late until it is included.

I declare that, except where I have referenced, the work I am submitting for this assessment task is my own work. I have read and am aware of the Torrens University Australia Academic Integrity Policy and Procedure viewable online at.

I am aware that I need to keep a copy of all submitted material and their drafts, and I will do so accordingly.

Submission Instructions

Submit Assessment 2 via the Assessment link in the main navigation menu in MIS607 Cybersecurity. The Learning Facilitator will provide feedback via the Grade Centre in the LMS portal. Feedback can be viewed in My Grades. Any uploaded files must be in Word (.doc or .docx) format.

Tips:

You are advised to read the case study, several times. Then read through this brief and note requirements. You can also to read the rubric.

Discovery techniques can include interview, questionnaire, observation, documentation. You may have others. So, to “discover” vulnerabilities you can use one of these techniques.

Leading into A3, try to concentrate on threats with corresponding controls, e.g.

  • week passwords: password policy and/or 2 factor,
  • Fire: fire alarms and extinguishers and/or fire insurance,
  • Theft: CCTV system.

Assessment Rubric

CriteriaRatingsPts
Citation practice and  
engagement with relevant 
literature Cited material and 
citations related to 
      
report APA citation style,20 Pts High Distinction15-19 Pts Distinction13-14 Pts Credit11-12 Pts Pass0-10 Pts NN 
At least one peer- reviewed article,All elements met well. Also, peer-reviewed articles of good quality. Citations are relevant to the articleAlmost all elements inMost elements metAbout half theLess than half the20 pts
3 or more references,Correct citation, correctcontent. More than one citation. Citation relates to the main topic of the article, not just a side issue.evidence elements metelements 
referencing,  
Peer-reviewed 
citation(s) used more 
than once. 
DFD and Threat Boundaries Diagrams related to  
20 Pts High Distinction All elements met well. At the highest level, DFD should be a close representation of the case business, and threat boundaries should be high quality with recognised threats against boundaries.15-19 Pts Distinction Almost all elements in evidence    
case scenario13-14 Pts11-12 Pts0-10 Pts 
All data flows start or end in a processAt least context diagram and level-0 diagramProperly recognisedCredit Most elements metPass About half the elements metNN Less than half the elements  20 pts
 
entities, data stores, 
CriteriaRatingsPts
data flows and processes All elements appropriately named, including data flowsVerbs used in processes (not in context diagram)Threat boundaries namedThreat boundaries make sense  
Threat Discovery At least 10 threats clearly identifiedReal-world attack in the case scenario timeline and brief explaination,Real-world attack covered in the threat list,Threats mapped against STRIDE categoriesThreats cover vulnerabilities in management, operational, and technical processes.                 35 pts
35 Pts High Distinction All elements met well. Also, threat list is very clear and easy to read for all, including stakeholders with little cybersecurity experience26-34 Pts Distinction Almost all elements in evidence22-25 Pts Credit Most elements met19-21 Pts Pass About half the elements met0-18 Pts NN Less than half the elements
 
CriteriaRatingsPts
Overall threat “discovery” techniques explained well, with a few discussed in more detail. Threats make sense in the case scenario (e.g. appropriate for the size of the organisation)List of threats  
Communication &  
Presentation Writing is persuasive, 
logical and 
communicates meaning 
clearly. 
      
Uses appropriate15 Pts12-14 Pts10-11 Pts8-9 Pts0-7 Pts 
vocabulary consistently. Spelling and punctuation completely accurate. Consistently integratesHigh Distinction All elements met well. Full marks requires exceptionally clear communication.Distinction Almost all elements in evidenceCredit Most elements metPass About half the elements metNN Less than half the elements  15 pts
 
research and ideas from 
relevant and 
appropriate sources 
Consistently uses 
accurate references, 
CriteriaRatingsPts
appropriately positioned. Executive summary is appropriate for a business report, is in past tense, summarises what has been done, and is not a mere covering of basic theory from classesDemonstration of topics and principles acquired from course material; use of relevant theories, concepts and frameworks to support analysis; own input, insight and interpretation.  
Basic formatting and  
submission requirements Captioning of all figures, 
10 Pts8-9 Pts6-7 Pts4-5 Pts0-3 Pts 
etc. and referred to only by caption Format of Word fileCorrect file submission and Word formatHigh Distinction All elements met well. Layout very clear and tidyDistinction Almost all elements in evidenceCredit Most elements metPass About half the elements metNN Less than half the elements  10 pts
 
Page numbers 
CriteriaRatingsPts
Correct Title PageCorrect Heading Structure  
Total points: 100
Order Now

Get expert help for MIS607 Cybersecurity Threat Model Report and many more. 24X7 help, plag free solution. Order online now!

Universal Assignment (March 8, 2026) MIS607 Cybersecurity Threat Model Report. Retrieved from https://universalassignment.com/mis607-cybersecurity-threat-model-report/.
"MIS607 Cybersecurity Threat Model Report." Universal Assignment - March 8, 2026, https://universalassignment.com/mis607-cybersecurity-threat-model-report/
Universal Assignment February 2, 2023 MIS607 Cybersecurity Threat Model Report., viewed March 8, 2026,<https://universalassignment.com/mis607-cybersecurity-threat-model-report/>
Universal Assignment - MIS607 Cybersecurity Threat Model Report. [Internet]. [Accessed March 8, 2026]. Available from: https://universalassignment.com/mis607-cybersecurity-threat-model-report/
"MIS607 Cybersecurity Threat Model Report." Universal Assignment - Accessed March 8, 2026. https://universalassignment.com/mis607-cybersecurity-threat-model-report/
"MIS607 Cybersecurity Threat Model Report." Universal Assignment [Online]. Available: https://universalassignment.com/mis607-cybersecurity-threat-model-report/. [Accessed: March 8, 2026]

Please note along with our service, we will provide you with the following deliverables:

Please do not hesitate to put forward any queries regarding the service provision.

We look forward to having you on board with us.

Most Frequent Questions & Answers

Universal Assignment Services is the best place to get help in your all kind of assignment help. We have 172+ experts available, who can help you to get HD+ grades. We also provide Free Plag report, Free Revisions,Best Price in the industry guaranteed.

We provide all kinds of assignmednt help, Report writing, Essay Writing, Dissertations, Thesis writing, Research Proposal, Research Report, Home work help, Question Answers help, Case studies, mathematical and Statistical tasks, Website development, Android application, Resume/CV writing, SOP(Statement of Purpose) Writing, Blog/Article, Poster making and so on.

We are available round the clock, 24X7, 365 days. You can appach us to our Whatsapp number +1 (613)778 8542 or email to info@universalassignment.com . We provide Free revision policy, if you need and revisions to be done on the task, we will do the same for you as soon as possible.

We provide services mainly to all major institutes and Universities in Australia, Canada, China, Malaysia, India, South Africa, New Zealand, Singapore, the United Arab Emirates, the United Kingdom, and the United States.

We provide lucrative discounts from 28% to 70% as per the wordcount, Technicality, Deadline and the number of your previous assignments done with us.

After your assignment request our team will check and update you the best suitable service for you alongwith the charges for the task. After confirmation and payment team will start the work and provide the task as per the deadline.

Yes, we will provide Plagirism free task and a free turnitin report along with the task without any extra cost.

No, if the main requirement is same, you don’t have to pay any additional amount. But it there is a additional requirement, then you have to pay the balance amount in order to get the revised solution.

The Fees are as minimum as $10 per page(1 page=250 words) and in case of a big task, we provide huge discounts.

We accept all the major Credit and Debit Cards for the payment. We do accept Paypal also.

Popular Assignments

Assignment Quantitative CASP RCT Checklist

CASP Randomised Controlled Trial Standard Checklist:11 questions to help you make sense of a randomised controlled trial (RCT)Main issues for consideration: Several aspects need to be considered when appraising arandomised controlled trial:Is the basic study design valid for a randomisedcontrolled trial? (Section A)Was the study methodologically sound? (Section B)What are

Read More »

Assignment Qualitative CASP Qualitative Checklist

CASP Checklist: 10 questions to help you make sense of a Qualitative researchHow to use this appraisal tool: Three broad issues need to be considered when appraising a qualitative study:Are the results of the study valid? (Section A)What are the results? (Section B)Will the results help locally? (Section C) The

Read More »

Assignment Topics

PS3002 Assignment TopicsDear studentsPlease choose one of the topics below. Please note that if you are repeating this subject, you cannot choose the same topic that you did previously in this subject.patellar tendinopathyinstability of the lumbar spinehamstring strainperoneal tendinopathyhip – labral tear.hip osteoarthritispatellofemoral instabilityankylosing spondylitisanterior cruciate ligament rupture (conservative management)quadriceps

Read More »

Assessment 2 – Report

Assessment 2 – Report (1200 words, 30%)PurposeTo demonstrate an understanding of the purpose and application of evidence-based dietary advice and guidelinesLearning objectives1.Review and analyse the role and function of macronutrients, micronutrients and functional components of food in maintaining health2.Understand digestion, absorption and metabolism of food in the human body and

Read More »

Assessment 2 – Individual Case Study Analysis Report

Southern Cross Institute,Level 2, 1-3 Fitzwilliam Street, PARRAMATTA NSW 2150 & Level 1, 37 George Street PARRAMATTA NSW 2150Tel: +61 2 9066 6902 Website: www.sci.edu.auTEQSA Provider No: PRV14353 CRICOS Provider No: 04078ªPage 1 of 16HRM201 Human Resources ManagementSemester 1, 2026Assessment 2 – Individual Case Study Analysis ReportSubmission Deadline: This Week,

Read More »

ASSESSMENT 2 BRIEF HPSYSD101 The Evolution of Psychology

HPSYSD101_Assessment 2_20240603 Page 1 of 7ASSESSMENT 2 BRIEFSubject Code and TitleHPSYSD101 The Evolution of PsychologyAssessment TaskAnnotated BibliographyIndividual/GroupIndividualLength2,000 words (+/- 10%)Learning OutcomesThe Subject Learning Outcomes demonstrated by successful completion of the task below include:b) Examine the significant figures, events and ideas present in the history of psychology.c) Identify and relate the

Read More »

Assessment 1 – Individual Case Study Analysis Report

HOS203 Contemporary Accommodation ManagementSemester 1, 2026Assessment 1 – Individual Case Study Analysis Report (10%)Submission Deadline: This Week, at 11:59 pm (Week 4)Overview of this AssignmentFor this assessment, students are required to analyse an assigned case study about hospitality industry relevant regulations and/or operational and accreditation failures of a hospitality organisation.

Read More »

Assessment Brief PBHL1003FOUNDATIONS OF HEALTH AND HEALTH CARE SYSTEMS

Assessment BriefPBHL1003FOUNDATIONS OF HEALTH AND HEALTH CARE SYSTEMSTitleAssessment 2 TypeEssay Due DateWeek 6 Monday 14 April 2025, 11:59pm AEST Length1000 words Weighting60% Academic IntegrityNO AI SubmissionUse Word Document – submit to Blackboard / Assessments Tasks & Submission / Assessment 2 Unit Learning OutcomesThis assessment task maps to the following Unit

Read More »

Assignment 4 – Intersection Upgrades and Interchange Station Design

CIVL5550: Civil Infrastructure DesignAssignment 4 – Intersection Upgrades and Interchange Station DesignDue: This WeekSubmission Instructions:1.Submit a report of approximately 10 pages, covering the following:Part 1: Intersection Upgrade Design•Propose upgrade schemes for two sign-controlled intersections and one signalized intersection•Use SIDRA to evaluate the performance of both the original and upgraded intersections•Use

Read More »

Assessment Brief 1

1 of 14Assessment Brief 1Assessment DetailsUnit Code Title NURS2018 Building Healthy Communities through Impactful PartnershipsAssessment Title A1: Foundations of Community Health Promotions ProjectAssessment Type ProjectDue Date Week 4, Monday, 22nd of September 2025, 11:59pm AESTWeight 40%Length / Duration 1200 wordsIndividual / Group IndividualUnit Learning Outcomes(ULOS)This assessment evaluates your achievement of

Read More »

Assignment 1 – Digital Stopwatch

Assignment 1 – Digital StopwatchThis assessment is an individual assignment. For this assignment, you are going to implement the functionality for a simple stopwatch interface as shown above. The interface itself is already provided as a Logisim file named main.circ . Your assignment must be built using this file as

Read More »

Assessment Background Country Profile

BackgroundCountry ProfileKiribati is an island nation situated in the central Pacific Ocean, consisting of 33 atolls2 and reef islands spread out over an area roughly the size of India (see Figure 1).i Yet, Kiribati is also one of the world’s smallest and most isolated country. A summary of Kiribati’s key

Read More »

Assessment 3: PHAR2001 INTRODUCTORY PHARMACOLOGY

PHAR2001 INTRODUCTORY PHARMACOLOGYAssessment 3: Case StudyASSESSMENT 1 BRIEFAssessment Summary Assessment titleAssessment 3: Case study Due DateThursday Week 6, 17 April at 11:59 Length•The suggested number of words (not a word limit) for the individual questions within the case study is as indicated at the end of each individual question. Weighting50%

Read More »

Assessment Module 1 Healthcare Systems Handout

Module 1Healthcare Systems HandoutGroup AgendasHealth Professionals: You got into health to help people. However, as an owner and operator of a multidisciplinary practice, you need to see many patients to cover the cost of equipment, technology, office and consumables, and pay your staff. The Medicare benefit doesn’t cover the rising

Read More »

Assessment 2 – Case study analysis 

Assessment 2 – Case study analysis  Description  Case study analysis  Value  40%  Length  1000 words  Learning Outcomes  1, 2, 3, 4, 5, 6, 7  Due Date  Sunday Week 9 by 23:59 (ACST)  Task Overview  In this assessment, you will choose ONE case study presenting a patient’s medical history, symptoms, and relevant test

Read More »

Assessment NURS2018: BUILDING HEALTH COMMUNITIES

NURS2018: BUILDING HEALTHCOMMUNITIES THROUGH IMPACTFULPARTNERSHIPSAssessment 1 Template: Foundation of Community Health Promotion projectOverall word count excluding the template wording (63 words) and reference list:Introduction to health issue:The case study, increase breast screening in Muslim women living in Broadmeadows,Melbourne, focuses on addressing the low participation rates in breast cancer screening amongMuslim

Read More »

Assessment EGB272: Traffic and Transport Engineering (2025-s1)

EGB272: Traffic and Transport Engineering (2025-s1)ashish.bhaskar@qut.edu.auPage 1 of 8Assessment 1A (15%) Cover PageIndividual component: 5%Group component: 10%You are expected to submit two separate submissions:Individual Submission (5%): Each student must submit their own individual report. Details of the individual report are provided in Section 3.1, and the marking rubric is in

Read More »

Assessment 3 – Essay: Assessment 3 Essay rubric

Unit: NUR5327 – Management and leadership in healthcare practice – S1 2025 | 27 May 2025Assessment 3 – Essay: Assessment 3 Essay rubricLearning Objective 5:Differentiate drivers forchange and proactively leadhealth professionalresponses to changing anddynamic environmentsFails toidentify aclear plannedchange ordoes not linkit to thestrategic plan.0 to 7 pointsIdentifies aplannedchange, butthe link

Read More »

Assessment 2 – Case study analysis 

Assessment 2 – Case study analysis  Description  Case study analysis  Value  40%  Length  1000 words  Learning Outcomes  1, 2, 3, 4, 5, 6, 7  Due Date  Sunday Week 9 by 23:59 (ACST)  Task Overview  In this assessment, you will choose ONE case study presenting a patient’s medical history, symptoms, and relevant test

Read More »

Assessment 1 PPMP20009 (Leading Lean Projects)

Term 1, 2025PPMP20009 (Leading Lean Projects)1Assessment 1 – DescriptionAssessment title Case study reportAssessment weight 40% of the unit marksReport length 3000 wordsMaximum 8 pages excluding references and appendicesReport format MS Word or PDFSubmission type IndividualSubmission due by Friday, Week 6Assessment objectiveThe purpose of this assessment item is to help you

Read More »

Assignment Maternity – Paramedic Management

Title-Maternity – Paramedic ManagementCase Study – Home Birth Learning outcomes1. Understand the pathophysiology and prehospital management of a specific obstetric condition.2. Develop a management plan for a maternity patient.3. Examine models of care available for maternity patients.4. interpret evidence that supports paramedic care of the maternity patient and neonate.5. Demonstrate

Read More »

Assignment Guidelines for Cabinet Submissions

Guidelines for Cabinet SubmissionsGENERALThe purpose of a Cabinet submission is to obtain Cabinet’s approval for a course of action. Ministers may not have extensive technical knowledge of the subject matter -and may have competing calls on their time. It is, therefore, important that Cabinet submissions are presented in a consistent

Read More »

Assignment Secondary research structure

Dissertation – Secondary Research – Possible Structure and Content GuideA front cover stating: student name, module title, module code, Title of project moduleleader, supervising tutor and word count.Abstract (optional and does not contribute to your word count)This should be an overview of the aim of the critical review, the methodology

Read More »

Assignment E-Business and E-Marketing

Module HandbookFaculty of Business, Computing and DigitalIndustriesSchool of Business(On-campus)E-Business and E-MarketingModule.2025-26􀀀Contents Module Handbook 1Contents 2Module Introduction 3Module Leader Welcome 3Module Guide 5Module Code and Title 5Module Leader Contact Details and Availability 5Module Team Tutors Contact Details and Availability 5Module Teaching 5Module Intended Learning Outcomes 5Summary of Content 6Assessment and Deadlines

Read More »

Assignment II: Computational Fluid Dynamics (CFD) Analysis of

CRICOS Provider 00025B • TEQSA PRV12080 1MECH3780: Computational MechanicsAssignment II: Computational Fluid Dynamics (CFD) Analysis ofGeneralised Cardiovascular Medical DevicesIntroduction:In this assignment, you will develop your CFD capability by analysing a benchmark casefrom a validation study sponsored by the U.S. Food & Drug Administration (FDA) and fundedby the FDA’s Critical Path

Read More »

LCRM301 Researching criminology

LCRM301 Researching criminology Worksheet 1 This worksheet will be disseminated to students in Week 3 and will assist them in the planning and development of the second assessment task: literature review. PART 1: Refining your topic The topic I am interested in is: I am interested in this topic because:

Read More »

ASSESSMENT TASK 2 – COURT APPLICATION

APPENDIX B: ASSESSMENT TASK 2 – COURT APPLICATION (30% OF FINAL MARK)General informationThis Assessment task is worth 30 marks of your final mark.The task is either making (Applicant) or opposing (Respondent) an application before the Supreme Court in your respective state based on a fact scenario, which will be uploaded

Read More »

Can't Find Your Assignment?