| | | |
|
CRITERION # | CRITERION | MEASURES INTENDED LEARNING OUTCOME(S) |
| | | 1 | Analyse modern-day cybersecurity vulnerabilities. | LO1 | 2 |
Complete a vulnerability analysis report with identified vulnerability in the code and its implications, security patch design for each weakness identified | LO2 | 3 | Critique the presented solution under the light of latest software vulnerability listings such as CWE-25 and OWASP top 10 where applicable. | LO2 | 4 | Design, develop and test source code as a solution for the identified weakness | LO2 | 5 | Report the analysis of the test results and map the identified weaknesses to overall vulnerabilities presented in the application | LO1, LO2 |
|
|
|
Assessment Task 3: Cybersecurity planning, incident response, and Vulnerability Assessment quiz |
Task Description: |
This individual assessment includes three in-semester quizzes. Each quiz is worth 5% of your grade and consists of 10 multiple-choice questions. They must be completed in one attempt and within a 30-minute timeframe. Students have one week to complete each quiz. The first quiz, covering cybersecurity planning, will be due during Week #2. The second quiz, which covers incident response and principles of digital forensics, is due during Week #5. The third quiz, focusing on vulnerability analysis, is due in Week #12. |
Task Length: | |
Due Date: | Refer to Assessment Description |
Weight: | 15 % |
|
CRITERION # | CRITERION | MEASURES INTENDED LEARNING OUTCOME(S) |
| | | 1 | Answer questions correctly on the cybersecurity planning and modern-day cybersecurity topics based on provided information and discussions during the sessions | LO1 | 2 |
Answer questions correctly on incident response planning and principles of digital forensics based on provided information and discussions during the sessions | LO1, LO4 | 3 | Answer questions correctly on vulnerability analysis based on provided information and discussions during the sessions | LO2 |
|
|
|
Assessment Task 4: Forensic Toolkit (FTK) assignment |
Task Description: | In this assessment, students will apply their digital forensics skills through the use of Access Data's forensic tools, such as Imager, Registry Viewer, and FTK. The assignment aims to allow students to apply digital forensics principles and techniques to various eForensic artifacts, including files, registry keys, logs, images, messages, and timestamps.
The assignment is divided into five parts. The first three parts, each worth 5%, are to be completed in Weeks #5, #7, and #9 tutorials respectively. The fourth part is a comprehensive digital forensics investigation test, covering all eForensic steps. This part is to be completed during the Week #10 tutorial within a 2-hour timeframe. The final part is a post-investigation follow-up report, which reflects the outcomes of the investigation process. The report is due within 24 hrs of the Week #10 tutorial. |
Task Length: | ~6 hrs. (2 hrs. each for Imager, Registry viewer, and Forensic toolkit modules) |
Due Date: | Refer to Assessment Description |
Weight: | 40 % |
|
CRITERION # | CRITERION | MEASURES INTENDED LEARNING OUTCOME(S) |
| | | 1 | Acquire eForensic artefacts with forensic integrity intact | LO3, LO4 | 2 | Investigation and evaluation of the key eForensic artefacts | LO4 | 3 | Report key eForensics artefacts post-investigation | LO3, LO4 |
|
|
|