Highlights
Tasks
Task 1: Background
Summarise the following media articles to no more than 500 words to capture the most important information being reported related to the incident. This summary is meant to be the “Background” section of this report,
Task 2: Potential Security Issues
ECU is not very different from ANU and is a potential target for a similar kind of attack as described in the above articles. A popular approach for exploiting vulnerabilities is through social engineering. Identify potential avenues by which users of ECU’s IT systems/infrastructure could be exploited through social engineering. You are not required to interview any ECU staff, or conduct any social engineering yourself. Instead, only use information that are publicly available. This is what a potential attacker would also do in the first place.
Start by identifying the users (i.e. types of users, not individual persons) of ECU’s IT systems/infrastructure, then what value these users have in gaining access. This will enable you to think about how social engineering could be conducted against these users, and also techniques that would be most effective.
You must describe the types of social engineering attacks you would use by referencing relevant literature.
Ensure you explain the assumptions you have made to support your answers.
Task 3: Mitigation Strategies
This section should focus on how to prevent the social engineering attacks that you have identified above. Your solutions and mitigation strategies should encompass three aspects:
People (things related to how people can be exploited and to mitigate this),
Process (things related to processes in the university from an operational point of view),
Technology (technical solutions or controls).
Requirements
Write an academic report of publishable standard of 2500 words. The breakdown of words per section is indicated below within the required structure. You must only use the following report structure. A 10% (plus or minus) words variation is allowed per section.
Report structure:
Introduction
Background
Potential Security Issues
Mitigation Strategies
Conclusion
References
This Report Writing Assessment has been solved by our Report Writing experts at My Uni Paper. Our Assignment Writing Experts are efficient to provide a fresh solution to this question. We are serving more than 10000+ Students in Australia, UK & US by helping them to score HD in their academics. Our Experts are well trained to follow all marking rubrics & referencing style.
Be it a used or new solution, the quality of the work submitted by our assignment experts remains unhampered. You may continue to expect the same or even better quality with the used and new assignment solution files respectively. There’s one thing to be noticed that you could choose one between the two and acquire an HD either way. You could choose a new assignment solution file to get yourself an exclusive, plagiarism (with free Turnitin file), expert quality assignment or order an old solution file that was considered worthy of the highest distinction.
© Copyright 2026 My Uni Papers – Student Hustle Made Hassle Free. All rights reserved.