Coursework Main Sit Question Paper Year Long 2022/2023
Module Code: CC4004NI Module Title: Cybersecurity Fundamentals Module Leader: Mr Monil Adhikari (Islington College) |
Coursework Type: Individual Coursework Weight: This coursework accounts for 50% of the overall module grades. Submission Date: 22nd August 2023 Coursework given 5th July 2023 out: Submission Submit the following to the Islington College’s RTE Instructions: department before the due date: • A report (document) in .pdf format in the Google Classroom or through any medium which the RTE department specifies. London Metropolitan University and Islington College Warning: takes plagiarism very seriously. Offenders will be dealt with sternly. |
© London Metropolitan University
1
PLAGIARISM
You are reminded that there exist regulations concerning plagiarism. Extracts from these regulations are printed overleaf. Please sign below to say that you have read and understand these extracts:
Extracts from University Regulations on Cheating, Plagiarism and Collusion
Section 2.3: “The following broad types of offence can be identified and are provided as indicative examples ….
(i) Cheating: including taking unauthorised material into an examination; consulting unauthorised material outside the examination hall during the examination; obtaining an unseen examination paper in advance of the examination; copying from another examinee; using an unauthorised calculator during the examination or storing unauthorised material in the memory of a programmable calculator which is taken into the examination; copying coursework.
(ii) Falsifying data in experimental results.
(iii) Personation, where a substitute takes an examination or test on behalf of the candidate. Both candidate and substitute may be guilty of an offence under these Regulations.
(iv) Bribery or attempted bribery of a person thought to have some influence on the candidate’s assessment.
(v) Collusion to present joint work as the work solely of one individual.
(vi) Plagiarism, where the work or ideas of another are presented as the candidate’s own.
(vii) Other conduct calculated to secure an advantage on assessment. (viii) Assisting in any of the above.
Some notes on what this means for students:
1. Copying another student’s work is an offence, whether from a copy on paper or from a computer file, and in whatever form the intellectual property being copied takes, including text, mathematical notation, and computer programs.
2. Taking extracts from published sources without attribution is an offence. To quote ideas, sometimes using extracts, is generally to be encouraged. Quoting ideas is achieved by stating an author’s argument and attributing it, perhaps by quoting, immediately in the text, his or her name and year of publication, e.g. “e = mc2(Einstein 1905)”. A reference section at the end of your work should then list all such references
2
in alphabetical order of authors’ surnames. (There are variations on this referencing system which your tutors may prefer you to use.) If you wish to quote a paragraph or so from published work then indent the quotation on both left and right margins, using an italic font where practicable, and introduce the quotation with an attribution.
School of Computing, FLSC
3
Coursework – Cybersecurity Fundamentals (50% of the overall module grade)
Brief:
The coursework assignment for Cybersecurity Fundamentals involves researching into an area of cyber security, and the area of focus for this assignment is, what circumstances or vulnerabilities allowed an APT attack to take place.
The focus of the assignment will be the Advanced Persistent Threat (APT) Your report must be around 3000 words.
References are not included in the word count. You must reference your work using the Harvard Referencing System, there should be at least one reference per paragraph and the work must be original and your own work. Please be aware of the university’s policy on plagiarism.
YOU MUST DISCUSS YOUR ASSIGNMENT A MODULE TUTOR BEFORE YOU START YOUR ASSIGNMENT.
YOUR REPORT MUST BE STRUCTURED USING THE FOLLOWING HEADINGS FAILURE TO FOLLOW THIS WILL RESULT IN THE LOSS OF MARKS:
Introduction (10 marks)
Write an introduction.
Your introduction should cover:
• A brief overview of the APT attack, this should include the name of the company, what and when it happened.
• You should explain what you are going to write about in your report, so this should be a very short summary of all the sections in your report.
SECTION 1: Research into the theft of personal data (30 marks)
This section needs to cover in detail the research that you have done into the ransomware attack on any company of your choosing given that you provide evidence of the respective company announcing in official communication medium of their breach.
Your research section should cover:
• What are the facts of the APT attack, when did it happen, why was the company targeted?
• What affect did it have on customers?
• How was the APT deployed on the system?
• What errors did the company make that lead to the ransomware attack?
4
SECTION 2: Personal data loss in a cyber-attack (20 Marks)
Research and present your findings on which national and international governing bodies will investigate these APT’s and issues on personal data losses, while imposing fines.
This section should cover:
• Under your researched national and international governing bodies, what does a company have to do when it learns it has been the victim of a cyber-attack? • What fine could those governing bodies impose on the company?
SECTION 3: Chief Information Security Officer (30 Marks)
In this section you are to take on the role of the Chief Information Security officer for the company you have researched.
For this section you need to write about:
• How you would have prevented this cyber-attack from taking place? • What preventative measures would you have put in place to prevent it from happening, for example, a password policy?
• Now that the cyber-attack has happened what measures should you take for it not to happen again?
Conclusion and References (10 Marks)
The conclusion is a summary of the key areas of your report, you should not introduce any new ideas or add any new information.
Your conclusion should include:
• A short summary of what are the main findings of your research, i.e., the key issues you wrote about.
• A short summary of what you learned about the governing bodies and the cyber-attack.
5
Report Structure for Coursework (Cybersecurity Fundamentals):
1. Cover Page (Module Name, Module Code, Title of the report, Student’s name, Semester, Submitted To, Submission Date, Word Count)
2. Table of Contents (Auto generated) (Structure of the report) 3. Table of Figures (Auto generated) (Lists the images within the report) 4. Abstract
5. Introduction (Introduction to the topic, technical terminologies used in the report, Aim and Objectives of this coursework, report structure) 6. Section 1
7. Section 2
8. Section 3
9. Conclusion
10.References (Auto generated)
11.Appendices
Referencing
Referencing is very important in that you are acknowledging and attributing the work of others. If you do not properly reference your work, then you run the risk of plagiarism – i.e. taking credit for the work or ideas of others by presenting them as your own. It is easy to detect plagiarism! Therefore, you will need to attribute the work or ideas of others by citing the source in the body of your report. There are many referencing formats that you can use, such as for example, the Harvard APA.
As a simple example, using Harvard referencing for a book reference, in the body of the report you cite as follows:
Symmetric encryption is also commonly known as conventional encryption or single-key encryption (Stallings, 2006).
And in your bibliography section you list your reference as follows:
Stallings, J. (2006). Cryptography and Network Security (4th ed.): Principles and Practice. USA: Prentice Hall.
6
Marking Breakdown for Coursework | |
Criteria | Total Marks |
01.Introduction | 10 |
02.Section 1 | 30 |
03.Section 2 | 20 |
04.Section 3 | 30 |
05.Conclusion and references | 10 |
Total: | 100 |
7
At BWER Company, we prioritize quality and precision, delivering high-performance weighbridge systems to meet the diverse needs of Iraq’s industries.
Enhance your industrial operations with BWER weighbridges, designed for exceptional accuracy and durability to support Iraq’s growing infrastructure and logistics sectors.
latwe2