Information Cyber Security 800 Assignment

Download as pdf or txt
Download as pdf or txt
You are on page 1of 3

INFORMATION & CYBER SECURITY 800

ASSIGNMENT COVER SHEET


Name & Surname: ______________________ ITS No: _________________________
Qualification: __________________ Year: _______ Module Name: ____________________
Assignment Due Date: _______________
Date submitted: __________ Semester: _______________

MARK EXAMINER’S MODERATOR’S


ASSESSMENT CRITERIA REMARKS
ALLOCATION MARK MARKS
MARKS FOR CONTENT
QUESTION ONE 60
QUESTION TWO 40
TOTAL 100
MARKS FOR TECHNICAL ASPECTS
EXAMINER’S COMMENTS

MODERATOR’S COMMENTS

Name of the Examiner : __________________ Name of the Moderator: __________________


Signature of Examiner: __________________ Signature of Moderator: __________________
Date : ___________________ Date: _______________ _____
NB: 1. Correct referencing is important

The purpose of an assignment is to ensure that the Student is able to:

• Use methods of enquiry and research in a disciplined field.


• Interpret and evaluate text.
• Have a sound understanding of key principles and theories, rules and awareness.
• Solve unfamiliar problems using correct procedures as well as investigate and critically analyze
information and report thereof.
• Present and communicate information reliably and coherently.
Instructions and guidelines for writing assignments

1. Use the correct cover page provided by the institution.


2. All essay type assignments must include the following:
2.1. Table of contents
2.2. Introduction
2.3. Main body with subheadings
2.4. Conclusions and recommendations
2.5. Bibliography
3. The length of the entire assignment must have minimum of 5 pages. Typed with font size 12
Calibri
4. The quality of work submitted is more important than the number of assigned pages.
5. Copying is a serious offence which attracts a severe penalty and must be avoided at all costs. If
any student transgresses this rule, the lecturer will retain the assignments and ask the affected
students to resubmit a new assignment which will be capped at 50%.
6. Use the Harvard referencing method.
7. Please note that these guidelines are not applicable to quantitative subjects like Accounting
and Statistics.

Question One (60 marks)

1.1 Discuss encryption and decryption processes in information security (10 marks)
1.2 Mention and describe five (5) cyber security attacks that have happened recently (provide
proper citations) (10 marks)
1.3 Discuss how the attacks mentioned in 1.2 could have been avoided (10 marks)
1.4 Write short notes on Public Key Infrastructure, highlighting its importance to
organisations and its pros and cons. (10 marks)
1.5 Briefly explain cryptography. Explain various algorithms of cryptography giving
examples of their applications (10 marks)
1.6 Identify a company of your choice and explain in detail how cryptography can enhance
their security posture (10 marks)

Question Two (40 marks)

2.1 In your own understanding, explain the concept of Block chain? Discuss benefits of Block
chain to the cyber security ecosystem (10 marks)

2.2 Mention and describe 5 block chain applications in security (10 marks)

2.3 Explain five (5) types of software risks in the Fourth Industrial Revolution (10 marks)

2.4 Discuss how the risks in 2.3 can be mitigated (10 marks)

You might also like