| | | |
|
CRITERION # | CRITERION | MEASURES INTENDED LEARNING OUTCOME(S) |
| | | 1 | Analyse modern-day cybersecurity vulnerabilities. | LO1 | 2 |
Complete a vulnerability analysis report with identified vulnerability in the code and its implications, security patch design for each weakness identified | LO2 | 3 | Critique the presented solution under the light of latest software vulnerability listings such as CWE-25 and OWASP top 10 where applicable. | LO2 | 4 | Design, develop and test source code as a solution for the identified weakness | LO2 | 5 | Report the analysis of the test results and map the identified weaknesses to overall vulnerabilities presented in the application | LO1, LO2 |
|
|
|
Assessment Task 3: Cybersecurity planning, incident response, and Vulnerability Assessment quiz |
Task Description: |
This individual assessment comprises three in-semester quizzes, each worth 5% of your grade. Each quiz comprises 20 multiple-choice questions and must be completed in a single attempt within a 30-minute timeframe. Students have one week to complete each quiz.
The first quiz, covering cybersecurity planning, is due in Week #2. The second quiz, covering incident response and principles of digital forensics, is due during Week #5. The third quiz, focusing on vulnerability analysis, is due in Week #12. |
Task Length: | |
Due Date: | Refer to Assessment Description |
Weight: | 15 % |
|
CRITERION # | CRITERION | MEASURES INTENDED LEARNING OUTCOME(S) |
| | | 1 | Answer questions correctly on the cybersecurity planning and modern-day cybersecurity topics based on provided information and discussions during the sessions | LO1 | 2 |
Answer questions correctly on incident response planning and principles of digital forensics based on provided information and discussions during the sessions | LO1, LO4 | 3 | Answer questions correctly on vulnerability analysis based on provided information and discussions during the sessions | LO2 |
|
|
|
Assessment Task 4: eForensics |
Task Description: | In this assessment, students will apply their digital forensics skills by using digital forensic forensic tools cohesively. The assignment aims to enable students to apply digital forensics principles and techniques to various eForensic artefacts, such as files, registry keys, logs, images, messages, and timestamps.
The assignment is divided into six parts. The first four parts, each worth 5%, are to be completed in Weeks #5, #7, #8, and #10, respectively. The fifth part is a comprehensive digital forensics investigation test that covers eForensic steps. This part is to be completed during the Week #11 tutorial within a 2-hour timeframe. The final part is a post-investigation follow-up report that reflects the outcomes of the investigation process. The report is due after Week #13. |
Task Length: | ~6 hrs. (2 hrs. each for Imager, Registry viewer, and Forensic toolkit modules) |
Due Date: | Refer to Assessment Description |
Weight: | 40 % |
|
CRITERION # | CRITERION | MEASURES INTENDED LEARNING OUTCOME(S) |
| | | 1 | Acquire eForensic artefacts with forensic integrity intact | LO3, LO4 | 2 | Investigation and evaluation of the key eForensic artefacts | LO4 | 3 | Report key eForensics artefacts post-investigation | LO3, LO4 |
|
|
|