Assessment item 2
ack to top
Research Report task
Value: 15%
Due Date: 24-Aug-2018
Return Date: 14-Sep-2018
Length:
Submission method options: Alternative submission method
Task
ack to top
Part A: 10 Marks
1. Search the web for news on computer security
eaches that occu
ed during January-August 2018. Research one such reported incident. Prepare a report focusing on the following issues:
· What the problem was;
· How and why it occu
ed;
· What could have been done to prevent it?
Length: Around 900 words (Excluding references)
Part B: 10 Marks
Research the WannaCry and the Petya cyber-attacks and prepare a report comparing the two, focusing on the following issues:
· What the problem was;
· The scope of the attack;
· Operational details of the attack;
· What could have been done to prevent the attack?
Length: Around 900 words (Excluding references)
Rationale
ack to top
This assessment task will assess the following learning outcome/s:
· be able to justify security goals and the importance of maintaining the secure computing environment against digital threats.
· be able to explain the fundamental concepts of cryptographic algorithms.
· be able to examine malicious activities that may affect the security of a computer program and justify the choice of various controls to mitigate threats.
· be able to compare and contrast the security mechanisms of a trusted operating system with those used in a general purpose operating system.
Marking criteria and standards
ack to top
Assessment criteria
PART A : 10 marks
Assessable Components
HD
100% - 85%
DI
84% - 75%
CR
74% - 65%
PS
64% - 50%
FL
49% - 0
Search the web for news on computer security
eaches that occu
ed during January-August 2018. Research one such reported incident. Prepare a report focusing on the following issues:
· What the problem was;
· How and why it occu
ed;
· What could have been done to prevent it?
1. The comprehensive report addressing all criteria. Evidence of in-depth research.
(Value: 95%)
2. Referenced a wide range of appropriate sources.
Referencing style co
ectly used.
(Value: 5%)
1. The comprehensive report addressing all criteria. Evidence of in-depth research. Minor omissions only.
(Value: 95%)
2. Referenced a range of appropriate sources.
Referencing style co
ectly used. Minor e
ors only.
(Value: 5%)
1. Mostly well-researched and well-presented report addressing all criteria. Some omissions.
(Value: 95%)
2. Referenced a range of appropriate sources.
Referencing style co
ectly used. Some e
ors and omissions.
(Value: 5%)
1. The partially complete report addressing most of the criteria. Evidence of research. Some omissions.
(Value: 95%)
2. Referenced some appropriate sources.
Referencing style mostly co
ectly used. Some e
ors and omissions.
(Value: 5%)
1. Major omissions or inco
ect answers(Value: 95%)
2. Either no evidence of literature being consulted or cited references i
elevant to the assignment set.
Major e
ors in referencing style.
(Value: 5%)
Possible marks
10.0 – 8.5
8.4-7.5
7.49 – 6.5
6.49 –5.0
4.99 – 0
PART B: 10 marks
Research the WannaCry and the Petya cyber-attacks and prepare a report comparing the two, focusing on the following issues:
· What the problem was;
· The scope of the attack;
· Operational details of the attack;
· What could have been done to prevent the attack?
1. The comprehensive report addressing all criteria. Evidence of in-depth research.
(Value: 95%)
2. Referenced a wide range of appropriate sources.
Referencing style co
ectly used.
(Value: 5%)
1. The comprehensive report addressing all criteria. Evidence of in-depth research. Minor omissions only.
(Value: 95%)
2. Referenced a range of appropriate sources.
Referencing style co
ectly used. Minor e
ors only.
(Value: 5%)
1. Mostly well-researched and well-presented report addressing all criteria. Some omissions.
(Value: 95%)
2. Referenced a range of appropriate sources.
Referencing style co
ectly used. Some e
ors and omissions.
(Value: 5%)
1. The partially complete report addressing most of the criteria. Evidence of research. Some omissions.
(Value: 95%)
2. Referenced some appropriate sources.
Referencing style mostly co
ectly used. Some e
ors and omissions.
(Value: 5%)
1. Major omissions or inco
ect answers.
(Value: 95%)
2. Either no evidence of literature being consulted or cited references i
elevant to the assignment set.
Major e
ors in referencing style.
(Value: 5%)
Possible marks
10.0 – 8.5
8.4-7.5
XXXXXXXXXX
XXXXXXXXXX
XXXXXXXXXX
Presentation
ack to top
· Assessment MUST be submitted as ONE MS Word file via Turnitin. Please do not submit *.zip or *.rar or multiple files. Assessments may be marked and feedback may be generated using MS Word-based tool. Reports that are submitted in PDF format will be re-formatted to Word format in order to be marked. Allowances will not be made for any loss of information, diagrams or images as a result of the re-formatting.
· Your answers to the questions should be precise but complete and informative.
· Each question should be answered individually with the co
esponding label to indicate the tasks completed e.g. Task 1 a.
· APA reference style must be used throughout the document, with the Reference list not counted in the page limit. APA referencing guide can be found in http:
student.csu.edu.au/study
eferencing-at-csu
· A cover page must be included and should contain relevant identifying information (Student name, Student ID#, Subject Code, Subject name, Session and Assessment Number).