A. Essay Questions |
Able to apply theories and concepts to analyse IT security implications |
Demonstrates comprehensive understanding of the relevant IT security perspectives. Correct application of the theories and concepts through indepth discussion, providing highly relevant real world examples. |
Demonstrated clear understanding of the relevant IT security perspectives. Correct application of the theories and mostly comprehensive analysis with suitable examples. |
Correct application of the IT Security perspective and mostly comprehensive analysis with suitable examples. |
Mostly correct application of the IT security perspective; includes reasonable level of analysis. Some omission. |
Major omissions in the application of the IT security concepts and the analysis. |
Demonstrates application of research skills through the critical analysis and evaluation of relevant literature |
Literature and sources presented is evidence of high level application of research skills; with comprehensive and critical appraisal of the literature and discussion of theory supported by sources in addition to those recommended in the course content. Referencing style has no mistakes. |
Clear evidence of research relevant to the subject; able to critically appraise the literature and theory gained from a variety of sources. Referencing style correctly used. |
Clear evidence of research relevant to the subject; uses indicative texts identified. Referencing style correctly used. Minor omissions only. |
Some evidence of research. Some mistake in referencing style. |
Either no evidence of literature being consulted or cited references irrelevant to the assignment set. |
Written communication is scholarly in tone and purpose, and conforms to scholarly writing requirements. |
The tone and style is exemplary, and is appropriate to the content of the scholarly review. |
Mostly Fluent writing style appropriate for the assignment with accurate grammar and spelling. |
Mostly fluent writing style appropriate for the assignment with mostly accurate grammar and spelling. Minor omissions only. |
Writing stylenot alwaysfluent or wellorganised andgrammar andspelling containerrors. |
Writing stylenot fluent orwell organisedand manygrammatical andspellingmistakes. |
B. Hands-on Task |
1. |
The task was appropriately completed, as is evident from the two screenshots. |
The task was appropriately completed, as is evident from the two screenshots. Minor omissions only. |
The task was mostly appropriately completed, as is evident from the screenshots. Some omissions. |
The task was rightly done. Some evidences have been provided. |
Little or no evidences of the task being appropriately done. |
2. |
Able to apply theories and concepts to analyse IT security implications |
Demonstrates comprehensive understanding of the relevant IT security perspectives. Correct application of the theories and concepts through indepth discussion. |
Demonstrated clear understanding of the relevant IT security perspectives. Correct application of the theories and mostly comprehensive analysis. |
Correct application of the IT Security perspective and mostly comprehensive analysis. |
Mostly correct application of the IT security perspective; includes reasonable level of analysis. Some omission. |
Major omissions in the application of the IT security concepts and the analysis. |
Written communication is scholarly in tone and purpose, and conforms to scholarly writing requirements. |
The tone and style is exemplary, and is appropriate to the content of the scholarly review. |
Mostly Fluent writing style appropriate for the assignment with accurate grammar and spelling. |
Mostly fluent writing style appropriate for the assignment with mostly accurate grammar and spelling. Minor omissions only. |
Writing stylenot alwaysfluent or wellorganised andgrammar andspelling containerrors. |
Writing stylenot fluent orwell organisedand manygrammatical andspellingmistakes. |