| | |
| | | | | CRITERION # | CRITERION | MEASURES INTENDED LEARNING OUTCOME(S) |
| | | 1 | Answer questions correctly on the cybersecurity planning and modern-day cybersecurity topics based on provided information and discussions during the sessions | LO1 | 2 | Answer questions correctly on principles of digital forensics and its scope within cybersecurity based on provided information and discussions during the sessions | LO3, LO5 | 3 | Answer questions correctly on vulnerability analysis in the light of preventive measures based on provided information and discussions during the sessions | LO2 |
|
| | Assessment Task 3: Cybersecurity Project Implementation | Task Description: | Students will work in groups to design and develop an ICT solution that illustrates a specific cybersecurity threat to modern-day organisations and implements preventive measures. For the project's planning and design phase, students will create a scope of work, high-level requirements, design artifacts, and testing scenarios.
During the development phase, students will adhere to the project plan, implement the solution, and demonstrate the test cases. Upon submission, along with the project repository, students will provide a post-implementation critique addressing both technical and non-technical aspects of the project.
Technical aspects encompass a critical analysis of the implementation, its limitations, and test outcomes. Non-technical aspects cover social, legal, and economic factors related to the solution. This assignment will enable students to work as a team, producing an ICT solution to a recognised cybersecurity threat, following an industry-like development plan.
This assessment consists of both group and individual tasks.
The topics for the projects will be posted on MyLO during Week #3. The project design, which is worth 10%, is due in Week #8. The solution and critique, worth 15%, is due after Week #13. Throughout the semester, each team must attend two mandatory consultation meetings. The first meeting will occur during the design phase (Week #3 to Week #7), and the second during the solution phase (Week #9 to Week #13). Progress will be evaluated during these sessions, and feedback will be given. These consultation meetings, combined, will account for 5%. | Task Length: | An ICT solution with approximately 3 high-level use-cases, depending on the topic of the project. | Due Date: | Refer to Assessment Description | Weight: | 30 % | | CRITERION # | CRITERION | MEASURES INTENDED LEARNING OUTCOME(S) | | | | 1 | Evaluate known measures and solutions to the cybersecurity threat | LO1 | 2 | Incorporate the latest ICT practices and standards during the project design and solution phases | LO2 | 3 | Develop a solution as per the project plan and design document. | LO2 | 4 | Report the analysis of the test results, critique the solution's technical and non-technical aspects. | LO1, LO2 | 5 | Complete a project plan document with scope of work and high-level requirements | LO2 |
|
|
| Assessment Task 4: Forensics toolkit assignment | Task Description: | In this assessment, students will apply their digital forensics skills through the use of Access Data's forensic tools, such as Imager, Registry Viewer, and FTK. The assignment aims to allow students to apply digital forensics principles and techniques to various eForensic artefacts, including files, registry keys, logs, images, messages, and timestamps.
The assignment is divided into five parts. The first three parts, each worth 5%, are to be completed in Weeks #5, #7, and #9 tutorials respectively. The fourth part is a comprehensive digital forensics investigation test, covering all eForensic steps. This part is to be completed during the Week #10 tutorial within a 2-hour timeframe. | Task Length: | ~6 hrs. 2 hrs per module covering evidence acquisition, analysis, and reporting | Due Date: | Refer to Assessment Description | Weight: | 35 % | | CRITERION # | CRITERION | MEASURES INTENDED LEARNING OUTCOME(S) | | | | 1 | Acquire eForensic artefacts with forensic integrity intact | LO4, LO5 | 2 | Investigation and evaluation of the key eForensic artefacts | LO5 | 3 | Report key eForensics artefacts post-investigation | LO4, LO5 |
|
| |
| | | | | | | |
|
| |
| |