| | |
| | | | | CRITERION # | CRITERION | MEASURES INTENDED LEARNING OUTCOME(S) |
| | | 1 | Answer questions correctly on the cybersecurity planning and modern-day cybersecurity topics based on provided information and discussions during the sessions | LO1 | 2 | Answer questions correctly on principles of digital forensics and its scope within cybersecurity based on provided information and discussions during the sessions | LO3, LO5 | 3 | Answer questions correctly on vulnerability analysis in the light of preventive measures based on provided information and discussions during the sessions | LO2 |
|
| | Assessment Task 3: Cybersecurity Project | Task Description: | Students will collaborate in groups to design and develop an ICT solution that addresses a specific cybersecurity threat prevalent in modern-day organisations. The project involves planning and designing the solution, implementing it, and evaluating its effectiveness.
During the planning and design phase, students will create a comprehensive scope of work, define high-level requirements, design artefacts, and outline testing scenarios.
In the development phase, students will adhere to the project plan, implement the solution, and execute test cases. Upon submission, students will provide a post-implementation critique that addresses both technical and non-technical aspects of the project.
Technical aspects include a critical analysis of the implementation, its limitations, and test outcomes. Non-technical aspects encompass social, legal, and economic factors related to the solution. This assignment will allow students to work as a team, develop an ICT solution to a recognised cybersecurity threat, and follow an industry-like development plan.
The assessment comprises both group and individual tasks.
Project topics will be posted on MyLO during Week #3. The project design, worth 10%, is due in Week #8. The solution and critique, worth 15%, are due after Week #13. Throughout the semester, each team must attend two mandatory consultation meetings. The first meeting will occur during the design phase (Week #3 to Week #7), and the second during the solution phase (Week #9 to Week #13). During these sessions, progress will be evaluated, and feedback will be provided. These consultation meetings, combined, will account for 5%. | Task Length: | An ICT solution with approximately 3 high-level use-cases, depending on the topic of the project. | Due Date: | Refer to Assessment Description | Weight: | 30 % | | CRITERION # | CRITERION | MEASURES INTENDED LEARNING OUTCOME(S) | | | | 1 | Evaluate known measures and solutions to the cybersecurity threat | LO1 | 2 | Incorporate the latest ICT practices and standards during the project design and solution phases | LO2 | 3 | Develop a solution as per the project plan and design document. | LO2 | 4 | Report the analysis of the test results, critique the solution's technical and non-technical aspects. | LO1, LO2 | 5 | Complete a project plan document with scope of work and high-level requirements | LO2 |
|
| | Assessment Task 4: eForensics Assignment | Task Description: | In this assessment, students will apply their digital forensics skills by using a set of digital forensic tools cohesively. The assignment aims to allow students to apply digital forensics principles and techniques to various eForensic artefacts, such as files, registry keys, logs, images, messages, and timestamps.
The assignment is divided into five parts. The first four parts, each worth 5%, are to be completed in Weeks #5, #7, #8, and #10 tutorials, respectively. The fifth part is a comprehensive digital forensics investigation test. This part is to be completed during the Week #11 tutorial within a 2-hour timeframe. | Task Length: | ~6 hrs. 2 hrs per module covering evidence acquisition, analysis, and reporting | Due Date: | Refer to Assessment Description | Weight: | 35 % | | CRITERION # | CRITERION | MEASURES INTENDED LEARNING OUTCOME(S) | | | | 1 | Acquire eForensic artefacts with forensic integrity intact | LO4, LO5 | 2 | Investigation and evaluation of the key eForensic artefacts | LO5 | 3 | Report key eForensics artefacts post-investigation | LO4, LO5 |
|
| |
| | | | | | | |
|
| |
| |