Student Intranet: IT Support Pages

Download as pdf or txt
Download as pdf or txt
You are on page 1of 4

COMP1427 Cyber Security (RESIT) Header ID

(2020/21)
Module Leader Release Date Deadline Date
Dr Diane Gan Wednesday 25/05/2021 Friday 16/07/2021
This coursework will be marked anonymously
YOU MUST NOT PUT ANY INDICATION OF YOUR IDENTITY IN YOUR
SUBMISSION
This coursework should take an average student who is up-to-date with tutorial work
approximately 20 hours

Feedback and grades are normally made available within 15 working days of the coursework
deadline
Learning Outcomes:
A Understand the security needs of networks, users and applications.
B Demonstrate an appreciation of security threats, the need to achieve an appropriate level of
security while allowing legitimate access.
D Show an awareness of the methodologies and software tools typically used by hackers.

Plagiarism is presenting somebody else's work as your own. It includes: copying


information directly from the Web or books without referencing the material; submitting
joint coursework as an individual effort; copying another student's coursework; stealing
coursework from another student and submitting it as your own work. Suspected
plagiarism will be investigated and if found to have occurred will be dealt with according
to the procedures set down by the University. Please see your student handbook for further
details of what is / isn't plagiarism. Details are also on the Student Intranet.

All material copied or amended from any source (e.g. internet, books) must be
referenced correctly according to the reference style you are using.

Your work will be submitted for electronic plagiarism checking. Any attempt to
bypass our plagiarism detection systems will be treated as a severe Assessment
Offence.

Coursework Submission Requirements

• An electronic copy of your work for this coursework must be fully uploaded by
midnight on the Deadline Date of Friday 16/07/2021 using the link on Moodle for the
resit coursework for COMP1427.
• For this coursework you must submit a single Acrobat PDF document.
In general, any text in the document must not be an image (ie must not be scanned)
and would normally be generated from other documents (eg MS Office using "Save As
.. PDF"). More details are on the IT Support pages .
• Make sure that any files you upload are virus-free and not protected by a password or
corrupted otherwise they will be treated as null submissions.
• Your work will be marked online and comments on your work and a provisional grade
will be available from the Coursework page on Moodle. A news item will be posted
when the comments are available, and also when the grade is available in BannerWeb.
• You must NOT submit a paper copy of this coursework.
• All courseworks must be submitted as above. Under no circumstances can they be
accepted by academic staff

The University website has details of the current Coursework Regulations, including details
of penalties for late submission, procedures for Extenuating Circumstances, and penalties for
Assessment Offences. See http://www2.gre.ac.uk/current-students/regs

Detailed Specification

Resit Coursework Specification


This is an individual coursework.
NB - Upload an electronic copy before the deadline (midnight). Do not try to upload five minutes
before the deadline, as the server gets very busy at that time and you may miss the deadline.

Part 1 (40 marks)


The diagram below illustrates a typical network which contains a DMZ (demilitarised zone) for a
Web server, email server, VPN server and a remote access server (RAS), etc. It also has a number of
internal networks. Note that the links between these networks are not necessarily complete in the
diagram and are assumed to be present and correct. It is not part of this answer to discuss the network
links. Identify the different traffic on this network and where each is going within this network.

WITHOUT CUTTING AND PASTING FROM ANY SOURCE, discuss IN YOUR OWN
WORDS (from a security point of view) the reasons why this network has been laid out as shown
in the diagram below.

Max word length – 1,500 words

NB - Please note that this is NOT a network course, so an in-depth technical view is NOT required.

Part 2 (50 marks)


WITHOUT CUTTING AND PASTING FROM ANY SOURCE, discuss IN YOUR OWN
WORDS a number of security issues that relate specifically to the network shown below. Include
current security threats in each case. You should include references in or after each paragraph to
show where you got any information that you use in your report. The maximum word length should
be less than 2,500 words

Part 3 - Report Writing - (10 marks)


Completeness and organisation - grammar, syntax and spelling follow acceptable practice for
English-language formal writing – presentation of the report

Deliverables
• This report does NOT require any cutting and pasting from the Internet, as the
views expressed should be entirely your own.
• A well structured report, which addresses all the issues above.
• The report should be structured logically – as above.
• A bibliography of your research source material (not included in the word count) should be
appended to the end of the report.
• Any material copied or amended from other sources, such as the Internet or books, must
be in italics and contained within quotation marks. A reference to the source should be
included directly after the material and included in your bibliography, so that this material
is clearly identified.
• However, material cut and pasted will be disregarded and will NOT carry any
marks what so ever. The views expressed should be entirely your own.
• All research carried out MUST be written up IN YOUR OWN WORDS AND a reference
placed immediately after the text.

Marking Scheme
Marks will be awarded for:-
• good report writing (including good use of English and correct grammar) and good report
structure (as specified in the guidelines)

• completeness

• coherent conclusion showing an understanding of the concepts and issues

• please note that Wikipedia or Google are NOT an acceptable references

Grading Criteria

80-100 Exceptional Sophisticated and comprehensive knowledge of the subject area. Systematic
understanding of knowledge, and a critical awareness of current problems and/or
new insights, much of which is at, or informed by, the forefront of their academic
discipline or area of professional practice. Ability in the appropriate use of the
relevant literature, theory, methodologies, practices, or tools to analyse and
synthesise at M level. No cutting and pasting at all

70-79 Excellent An excellent report which covers every aspect of the specification (Part 1 and
Part 2) with no cutting and pasting at all. References are present to indicate
where the research for the report has come from.

60-69 Very Good A very good report, which is well written and covers every aspect of the
specification. References are present to indicate where the research for the
report has come from – no cutting and pasting at all

50-59 Good A reasonable report which covers every aspect of the specification - correctly
referenced – no cutting and pasting at all

30-59 Fail Unconvincing report which does not cover all aspects of the specification –
some referencing present – some cutting and pasting which is not referenced

0-29 Fail Poorly written report - essential elements missing or not applicable to the given
scenario – contains mainly material cut and pasted from the Internet (with or
without references)

Any material cut and pasted from the Internet will be disregarded and
will NOT be marked.
ALL coursework will be run through the plagiarism system and marks
will be deducted for any material cut and pasted, including previous
students’ work.

You might also like