Assessment item 2
backto top
Research Report task
Value:15%
Due Date:24-Aug-2018
Return Date:14-Sep-2018
Length:
Submission method options:Alternative submission method
Task
backto top
Part A: 10 Marks
1. Search the web for news on computer security breaches that occurred during January-August 2018. Research one such reported incident. Prepare a report focusing on the following issues:
•What the problem was;•How and why it occurred;•What could have been done to preventit.
Length:Around 900 words (Excluding references)
Part B: 10 Marks
Research theWannaCryand thePetyacyber-attacks and prepare a report comparing the two, focusing on the following issues:
•What the problem was;•Scope of the attack;•Operational details of the attack;•What could have been done to prevent theattack.
Length:Around 900 words (Excluding references)
Rationale
backto top
This assessment task will assess the following learning outcome/s:
•beable to justify security goals and the importance of maintaining the secure computing environment against digital threats.•beable to explain the fundamental concepts of cryptographic algorithms.•beable to examine malicious activities that may affect the security of a computer program and justify the choice of various controls to mitigate threats.•beable to compare and contrast the security mechanisms of a trusted operating system with those used in a general purpose operating system.
Marking criteria and standards
backto top
Assessment criteria
|
PART A : 10 marks
|
Assessable Components
|
HD
100% - 85%
|
DI
84% - 75%
|
CR
74% - 65%
|
PS
64% - 50%
|
FL
49% - 0
|
Search the web for news on computer security breaches that occurred during January-August 2018. Research one such reported incident. Prepare a report focusing on the following issues: •What the problem was;•How and why it occurred;•What could have been done to preventit. |
1. Comprehensive report addressing all criteria. Evidence of in-depth research. (Value: 95%)
2. Referenced a wide range of appropriate sources.
Referencing style correctly used. (Value: 5%)
|
1. Comprehensive report addressing all criteria. Evidence of in-depth research. Minor omissions only. (Value: 95%)
2. Referenced a range of appropriate sources.
Referencing style correctly used. Minor errors only. (Value: 5%)
|
1.Mostly well-researched and well-presentedreport addressing all criteria.Some omissions. (Value: 95%)
2. Referenced a range of appropriate sources.
Referencing style correctly used. Some errors and omissions. (Value: 5%)
|
1. Partially complete report addressing most of the criteria. Evidence of research. Some omissions. (Value: 95%)
2. Referenced some appropriate sources.
Referencing style mostly correctly used. Some errors and omissions. (Value: 5%)
|
1. Major omissions or incorrect answers.(Value: 95%)
2. Either no evidence of literature being consulted or cited references irrelevant to the assignment set.
Major errors in referencing style. (Value: 5%)
|
Possible marks
|
10.0 – 8.5
|
8.4-7.5
|
7.49 – 6.5
|
6.49 –5.0
|
4.99 – 0
|
PART B: 10 marks
|
Research theWannaCryand thePetyacyber-attacks and prepare a report comparing the two, focusing on the following issues: •What the problemwas;•Scope of the attack;•Operational details of the attack;•What could have been done to prevent theattack. |
1. Comprehensive report addressing all criteria. Evidence of in-depth research. (Value: 95%)
2. Referenced a wide range of appropriatesources.
Referencing style correctly used. (Value: 5%)
|
1. Comprehensive report addressing all criteria. Evidence of in-depth research. Minor omissions only. (Value: 95%)
2. Referenced a range ofappropriate sources.
Referencing style correctly used. Minor errors only. (Value: 5%)
|
1. Mostly well-researched and well-presented report addressing all criteria. Some omissions. (Value: 95%)
2. Referenced a range ofappropriate sources.
Referencing style correctly used. Some errors and omissions. (Value: 5%)
|
1. Partially complete report addressing most of the criteria. Evidence of research. Some omissions. (Value: 95%)
2. Referenced someappropriate sources.
Referencing style mostly correctly used. Some errors and omissions. (Value: 5%)
|
1. Major omissions or incorrect answers. (Value: 95%)
2. Either no evidence of literature being consulted or citedreferences irrelevantto the assignment set.
Major errors in referencing style. (Value: 5%)
|
Possible marks
|
10.0 – 8.5
|
8.4-7.5
|
7.49-6.5
|
6.49-5.0
|
4.99 - 0
|
Presentation
backto top
•Assessment MUST be submitted as ONE MS Word file viaTurnitin. Please donot submit*.zip or *.raror multiple files. Assessments may be marked and feedback may be generated using a MS Word based tool. Reports that are submitted in PDF format will be re-formatted to Word format in order to be marked. Allowances will not be made for any loss of information, diagrams or images as a result of the re-formatting.•Your answers to the questions should be precise but completeand informative.•Each question should be answered individually with the correspondinglabel toindicate the tasks completed e.g. Task 1 a.•APA reference style must be used throughout the document, withthe Referencelist not counted in the page limit. APA referencing guide can be found inhttp://student.csu.edu.au/study/referencing-at-csu•A cover page must be includedand shouldcontain relevantidentifying information (Student name, Student ID#, Subject Code, Subject name, Session and Assessment Number).