Highlights
Assignment Overview:
This assessment requires you to analyse an authentic computer security issue and write a report about it. The assessment will equip you to apply basic security concepts by analysing real-world scenarios and advance your knowledge of the importance of cyber security issues.
Situation:
A malicious software (malware) named Triton targeted critical infrastructures and made headlines towards the end of 2017. This attack was reported to have shut down middle eastern oil and gas companies. However, it also affected a few other geographic regions. The attack targeted a specific component (safety instrumented systems (SIS) controller) of a product from Schneider Electric, thus having the potential of causing malfunction to the safety control system, potentially leading to catastrophic consequences. In 2020, Cybersecurity & Infrastructure Security Agency (CISA) - the United States federal agency, released an advisory alerting the US critical infrastructure to follow the mitigations recommended by Schneider Electric.
Task:
Your task is to analyse the Triton malware through exhaustive research and discuss details around this software in the form of a technical report. Assume that your target audience has very little/no understanding of cyber security (novice end-users). Explain and graphically depict all the following components of Triton in your report:
Task a - First section
- Walk through how the Triton malware operates when an incident occurs.
- Clearly represent each stage of the Triton operation with supportive discussions and graphical images such as flow charts and diagrams.
- Include:
i. an overview of Triton malware.
ii. a discussion on the stealth of Triton, including its different stages and variants (if known).
iii. other name(s), if any, given to Triton.
iv. details about the ‘indicators of compromise’ (IOCs) relevant to Triton malware.
Task b - Second section
- Choose one real-life incident where Triton successfully infiltrated an organisation.
- Examine and explain your chosen incident while addressing the following questions:
i. When did the attack occur, and what circumstances led to the successful intrusion into the target organisation’s network? How did Triton successfully infiltrate this
organisation?
This CSI1101 - IT Assignment has been solved by our IT experts at My Uni Paper. Our Assignment Writing Experts are efficient to provide a fresh solution to this question. We are serving more than 10000+ Students in Australia, UK & US by helping them to score HD in their academics. Our Experts are well trained to follow all marking rubrics & referencing style.
Be it a used or new solution, the quality of the work submitted by our assignment experts remains unhampered. You may continue to expect the same or even better quality with the used and new assignment solution files respectively. There’s one thing to be noticed that you could choose one between the two and acquire an HD either way. You could choose a new assignment solution file to get yourself an exclusive, plagiarism (with free Turnitin file), expert quality assignment or order an old solution file that was considered worthy of the highest distinction.
© Copyright 2026 My Uni Papers – Student Hustle Made Hassle Free. All rights reserved.