| | | | | | | CRITERION # | CRITERION | MEASURES INTENDED LEARNING OUTCOME(S) | | | | 1 | Analyse a cybersecurity concept to uncover potential vulnerabilities, threats, or challenges associated with its implementation or operation | LO1, LO2, LO4 | 2 | Create a set of cybersecurity educational flashcards | LO1, LO2, LO4 | 3 | Review a set of flashcards to improve the representation of cybersecurity keypoints | LO1, LO2, LO4 |
|
| | | Assessment Task 3: Tutorial Demonstrations and Quizzes | Task Description: |
In each tutorial from Week 2 to Week 12, students will work in groups to analyse and develop policies and practices related to security. These activities are designed to review the weekly lecture content. The assessment for this task has two components: a group-based tutorial task completion component and an individual quiz component.
During tutorials, students will: * Complete tutorial tasks in groups (Week 2 to Week 11): As a group, you will be assessed on the completion and quality of the in-tutorial tasks. Each week's group task is worth 1% of the final grade. The tasks are designed to review lecture materials and apply them to practical scenarios.
* Complete short individual quizzes (Week 3 to Week 12): Individually, you will complete a short quiz at the end of each tutorial to test your personal understanding of the concepts discussed. Each weekly quiz is worth 2% of the final grade. The quizzes are to test comprehension and reinforce lecture learning. | Task Length: | 10 tutorials and 10 quizzes | Due Date: | Refer to Assessment Description | Weight: | 30 % | | | CRITERION # | CRITERION | MEASURES INTENDED LEARNING OUTCOME(S) | | | | 1 | Explain business needs with respect to security | LO2 | 2 | Write security policies relevant to business needs | LO3 | 3 | Research and explain ethical, privacy and legal issues involved in cybersecurity research | LO1, LO4 |
|
| | | Assessment Task 4: Group Project | Task Description: |
This is a collaborative group project where you will apply theoretical knowledge and practical skills to develop comprehensive cybersecurity policies for a small to medium-sized enterprise (SME). The project is structured into four components submitted across the semester. Your group will create a realistic SME case study, conduct a detailed risk assessment, design an incident response plan, and finally, draft a formal cybersecurity policy. Your group will be required to analyse and evaluate information to complete project activities, analyse and transmit solutions to unpredictable and sometimes complex problems, and demonstrate autonomy and well-developed judgement in your self-directed group work. A group mark will be assigned, but individual grades will be adjusted based on each member's contribution, as measured through peer assessment.
Project Components and Weighting: 1. Case Study Creation (5%) - due in week 8
* Develop a realistic SME scenario, detailing the organisation’s business operations, IT infrastructure, and potential vulnerabilities. * This component forms the foundation for the rest of the project. 2. Risk Assessment and Threat Analysis (10%) - due in week 8 * Identify and analyse potential cybersecurity threats and risks specific to the SME. * Classify risks based on likelihood and impact using appropriate frameworks. 3. Incident Response Plan (10%) - due in week 10 * Design a structured plan to respond to cybersecurity incidents, including detection, containment, mitigation, communication, and post-incident review. * Address roles and responsibilities, escalation procedures, and coordination with external stakeholders (e.g., regulators, law enforcement). * Incorporate lessons learned from real-world breaches or industry best practices.
4. Developing a Comprehensive Security Policy (15%) - due in week 12 * Draft a security policy for the SME that aligns with the case study and threat assessment. * Ensure the policy addresses confidentiality, integrity, and availability of information, and includes guidelines for employees, IT systems, and third-party interactions. | Task Length: | | Due Date: | Refer to Assessment Description | Weight: | 40 % | | | CRITERION # | CRITERION | MEASURES INTENDED LEARNING OUTCOME(S) | | | | 1 | Analyse business needs with respect to security | LO2 | 2 | Draft a coherent cybersecurity policy according to business requirements | LO3 | 3 | Identify and justify cybersecurity controls to mitigate key risks | LO2 | 4 | Explain and integrate the fundamental ethical, privacy, and legal considerations into the policy documentation | LO1, LO4 |
|
| | |
| | | | | | | |
|
| |
| |