| | | |
TASK DESCRIPTION: |
Students will work in groups to design an ICT solution for an organisational scenario that captures a particular cybersecurity threat to the organisation. For the project's design, students will produce requirements, design artefacts, and test scenarios. This assignment will enable students to work as a team to complete the design phase of an ICT solution to a known cybersecurity threat by following an industry-like development plan. Week of distribution and due date: The project topics will be shared with the students during the week 2 workshop. The design document will be due in week 7.
|
TASK LENGTH: |
A design document with approximately 3 high-level use-cases, depending on the topic of the project. |
DUE DATE: | Week 7 |
WEIGHT: | 20 % |
|
CRITERION # | CRITERION | MEASURES INTENDED LEARNING OUTCOME |
| | | 1 | Analyse a modern-day cybersecurity threat or a problem with limited solutions in place. | LO1, LO2 | 2 | Complete a project plan document with requirements specifications, and use case. | LO1, LO2 | 3 | Produce a project design document with industry-standard design artefacts | LO2 | 4 | Produce a test plan document with 2 test scenarios per use case | LO2 |
|
|
|
Assessment Task 4: Digital Forensic Tools Survey |
TASK DESCRIPTION: | Students will work in groups to evaluate 3 current state-of-the-art digital forensics tools and toolkits. The outcome of this assignment will be a 4-page survey that (1) explains the feature set of each tool; (2) provides a tool comparison matrix; and (3) identify specialised cybersecurity use cases for each tool; This assignment will enable students to develop the knowledge of current industry-applied digital forensics tools; moreover, the understanding of unique situations and scenarios in cybersecurity domain for which specialised tools and protocols are required. Week of distribution and due date: The assignment will be available in week 5 on MyLO. The survey report will be due in week 9.
|
TASK LENGTH: | |
DUE DATE: | Week 10 |
WEIGHT: | 15 % |
|
CRITERION # | CRITERION | MEASURES INTENDED LEARNING OUTCOME |
| | | 1 | Provide evaluation of 3 industry-proven digital forensics toolkits | LO3, LO4 | 2 |
Develop a comparison matrix with a complete feature set of tools covering all 5-steps of digital investigation | LO4 | 3 | Identify specialised and unique use cases for each tool under evaluation | LO3, LO4 |
|
|
|
Assessment Task 5: Forensics toolkit assignment |
TASK DESCRIPTION: |
This is an individual assessment in which students will apply their skills in using Access Data's forensic tools including Imager, Registry Viewer, and FTK. The assignment will enable students to apply digital forensics principles and techniques to a variety of eForensics artefacts. The assignment will be submitted as a Word document which will reflect the outcomes of the steps taken by the students during the investigation process. Week of distribution and due date: The assignment will become available in week 8. The investigation process will take place during the eForensic tutorials in weeks #8, #10, and #12. The outcome of each tutorial will be submitted as a component of the assessment. The final component of the assessment must be submitted on MyLO by the end of week 12.
|
TASK LENGTH: | ~6 hrs. 2 hrs per module covering evidence acquisition, analysis, and reporting |
DUE DATE: | Week 12 |
WEIGHT: | 25 % |
|
CRITERION # | CRITERION | MEASURES INTENDED LEARNING OUTCOME |
| | | 1 | Acquire eForensic artefacts with forensic integrity intact | LO4, LO5 | 2 | Investigation and evaluation of the key eForensic artefacts | LO5 | 3 | Report key eForensics artefacts post-investigation | LO4, LO5 |
|
|
|
Assessment Task 6: Cybersecurity Project Implementation |
TASK DESCRIPTION: |
Students will work in groups to develop an ICT solution for an organisational scenario that demonstrates a particular cybersecurity threat to the organisation and implements preventive measures. For the development of the solution, students will follow the project plan, design specifications and test scenarios. For the submission along with the project repository, students will submit the post-implementation analysis to address the technical and non-technical aspects of the project. The technical aspects include implementation challenges, limitations and test outcomes. The non-technical aspects address the social, legal, and economic factors associated with the project. This assignment will enable students to work as a team to produce an ICT solution to a known cybersecurity threat by following an industry-like development plan.
Week of distribution and due date: The assignment specification will be shared with the students in week 6. The project repository with the video demonstration and post-implementation analysis report is due in week 13.
|