CC4004NI Cybersecurity Fundamentals Islington College

https%3A%2F%2Fdrive.google

Coursework Main Sit Question Paper Year Long 2022/2023 

Module Code:  CC4004NI Module Title:  Cybersecurity Fundamentals Module Leader:  Mr Monil Adhikari (Islington College)
Coursework Type:  Individual Coursework Weight: This coursework accounts for 50%of the overall module    grades. Submission Date: 22ndAugust 2023 Coursework given  5thJuly 2023 out: Submission  Submit the following to the Islington College’s RTE  Instructions: department before the due date: • A report (document) in .pdf format in the Google  Classroom or through any medium which the RTE  department specifies. London Metropolitan University and Islington College  Warning: takes plagiarism very seriously. Offenders will be dealt  with sternly.

© London Metropolitan University

PLAGIARISM 

You are reminded that there exist regulations concerning plagiarism. Extracts from these  regulations are printed overleaf. Please sign below to say that you have read and  understand these extracts: 

Extracts from UniversityRegulations on Cheating, Plagiarism and Collusion 

Section 2.3: “The following broad types of offence can be identified and are  provided as indicative examples …. 

(i) Cheating: including taking unauthorised material into an examination;  consulting unauthorised material outside the examination hall during the  examination; obtaining an unseen examination paper in advance of the  examination; copying from another examinee; using an unauthorised calculator  during the examination or storing unauthorised material in the memory of a  programmable calculator which is taken into the examination; copying  coursework. 

(ii) Falsifying data in experimental results. 

(iii) Personation, where a substitute takes an examination or test on behalf of the  candidate. Both candidate and substitute may be guilty of an offence under  these Regulations. 

(iv) Bribery or attempted bribery of a person thought to have some influence on the  candidate’s assessment. 

(v) Collusion to present joint work as the work solely of one individual. 

(vi) Plagiarism, where the work or ideas of another are presented as the candidate’s  own. 

(vii) Other conduct calculated to secure an advantage on assessment. (viii) Assisting in any of the above. 

Some notes on what this means for students: 

1.Copying another student’s work is an offence, whether from a copy on paper or  from a computer file, and in whatever form the intellectual property being copied takes,  including text, mathematical notation, and computer programs. 

2.Taking extracts from published sources without attributionis an offence. To  quote ideas, sometimes using extracts, is generally to be encouraged. Quoting ideas  is achieved by stating an author’s argument and attributing it, perhaps by quoting,  immediately in the text, his or her name and year of publication, e.g. “e = mc2(Einstein  1905)”. A referencesection at the end of your work should then list all such references 

in alphabetical order of authors’ surnames. (There are variations on this referencing  system which your tutors may prefer you to use.) If you wish to quote a paragraph or  so from published work then indent the quotation on both left and right margins, using  an italic font where practicable, and introduce the quotation with an attribution. 

School of Computing, FLSC

Coursework – Cybersecurity Fundamentals (50% of the overall module grade) 

Brief: 

The coursework assignment for Cybersecurity Fundamentals involves researching  into an area of cyber security, and the area of focus for this assignment is, what  circumstances or vulnerabilities allowed an APTattack to take place. 

The focus of the assignment will be the Advanced Persistent Threat (APT)Your report must be around 3000 words. 

References are not included in the word count. You must reference your work using  the Harvard Referencing System, there should be at least one reference per  paragraph and the work must be original and your own work. Please be aware of the  university’s policy on plagiarism

YOU MUST DISCUSS YOUR ASSIGNMENT A MODULE TUTOR BEFORE YOU  START YOUR ASSIGNMENT. 

YOUR REPORT MUST BE STRUCTURED USING THE FOLLOWING HEADINGS  FAILURE TO FOLLOW THIS WILL RESULT IN THE LOSS OF MARKS: 

Introduction (10 marks) 

Write an introduction. 

Your introduction should cover: 

• A brief overview of the APT attack, this should include the name of the  company, what and when it happened. 

• You should explain what you are going to write about in your report, so this  should be a very short summary of all the sections in your report. 

SECTION 1: Research into the theft of personal data (30 marks) 

This section needs to cover in detail the research that you have done into the  ransomware attack on any company of your choosing given that you provide evidence  of the respective company announcing in official communication medium of their  breach. 

Your research section should cover: 

• What are the facts of the APT attack, when did it happen, why was the company targeted? 

• What affect did it have on customers? 

• How was the APT deployed on the system? 

• What errors did the company make that lead to the ransomware attack?

SECTION 2: Personal data loss in a cyber-attack (20 Marks) 

Research and present your findings on which national and international governing  bodies will investigate these APT’s and issues on personal data losses, while imposing  fines. 

This section should cover: 

• Under your researched national and international governing bodies, what does  a company have to do when it learns it has been the victim of a cyber-attack? • What fine could those governing bodies impose on the company? 

SECTION 3: Chief Information Security Officer (30 Marks) 

In this section you are to take on the role of the Chief Information Security officer for  the company you have researched.  

For this section you need to write about: 

• How you would have prevented this cyber-attack from taking place?  • What preventative measures would you have put in place to prevent it from  happening, for example, a password policy? 

• Now that the cyber-attack has happened what measures should you take for it  not to happen again? 

Conclusion and References (10 Marks) 

The conclusion is a summary of the key areas of your report, you should not introduce  any new ideas or add any new information.  

Your conclusion should include: 

• A short summary of what are the main findings of your research, i.e., the key  issues you wrote about. 

• A short summary of what you learned about the governing bodies and the  cyber-attack.

ReportStructurefor Coursework (Cybersecurity Fundamentals): 

1. Cover Page(Module Name, Module Code, Title of the report, Student’s name,  Semester, Submitted To, Submission Date, Word Count) 

2. Table of Contents(Auto generated) (Structure of the report) 3. Table of Figures(Auto generated) (Lists the images within the report) 4. Abstract 

5. Introduction(Introduction to the topic, technical terminologies used in the  report, Aim and Objectives of this coursework, report structure) 6. Section 1 

7. Section 2 

8. Section 3 

9. Conclusion 

10.References(Auto generated) 

11.Appendices 

Referencing 

Referencing is very important in that you are acknowledging and attributing the  work of others. If you do not properly reference your work, then you run the risk of  plagiarism – i.e. taking credit for the work or ideas of others by presenting them as  your own. It is easy to detect plagiarism! Therefore, you will need to attribute the  work or ideas of others by citing the source in the body of your report. There are  many referencing formats that you can use, such as for example, the Harvard APA.  

As a simple example, using Harvard referencing for a bookreference, in the bodyof the report you cite as follows: 

Symmetric encryption is also commonly known as conventional encryption or  single-key encryption (Stallings, 2006).  

And in your bibliographysection you list your reference as follows: 

Stallings, J. (2006). Cryptography and Network Security (4th ed.): Principles and  Practice.USA: Prentice Hall.

Marking Breakdown for Coursework
Criteria  Total Marks
01.Introduction  10
02.Section 1  30
03.Section 2  20
04.Section 3  30
05.Conclusion and references  10
Total:  100

7

Leave a Reply

Your email address will not be published. Required fields are marked *