SlideShare a Scribd company logo
1 of 6
10/31/19 MOD006610: Computer Security | Anglia Ruskin
University Library
MOD006610: Computer Security
( Academic year 2019/20 )
Computer Security
View Online
10 items
Getting Certified
Website | Recommended Reading
Top Down Network Designing
Webpage | Recommended Reading
Cryptography and network security: principles and practice -
William Stallings, Mohit P.
Tahiliani, 2014
Book | Essential Reading
Learning PowerShell - Jonathan Hassell, 2017, ©2017
Book | Essential Reading
Hackers fool AI
Webpage | Background Reading | Bit of fun but shows how far
we are ahead of our
computer friends!
Cybercrime Cashouts: video and info
Webpage | Recommended Reading | Some great information.
Does have some tech
terms so be prepared to do some research!
Hacking Health: Security in Healthcare IT Systems
Webpage | Recommended Reading | Health care blackbox and
whitebox testing and
ideas
Bullet-Proof Credit Card Processing
Webpage | Recommended Reading | Logic from the speaker is
sound and work listening
too.
A Statistical Approach to Measuring User Authenticity
Webpage | Recommended Reading | Head of linkedin gives a
thought to user
authenticity
Computer SecurityFundamentals
Webpage | Essential Reading
1/1
http://readinglists.anglia.ac.uk/items/38ccdb91-3715-48c7-
9e53-5d23cccbc85a
http://readinglists.anglia.ac.uk/items/bd95c432-6127-4c6d-
b88c-a3fbd1ea4305
http://readinglists.anglia.ac.uk/items/c9d45817-6cda-493a-9bf9-
05dc4540eeb6
http://readinglists.anglia.ac.uk/items/05d7c2d9-208c-4b95-
99ba-8b6a40518136
http://readinglists.anglia.ac.uk/items/9D34452A-6C13-56A3-
4E4D-E7583BB8E65D
http://readinglists.anglia.ac.uk/items/1C431A4A-04BC-DC52-
63DF-80D8FA31E106
http://readinglists.anglia.ac.uk/items/FC507A8E-CDE9-1CF4-
69D8-2AD98277BBFB
http://readinglists.anglia.ac.uk/items/C06820B8-7BC4-24D9-
3858-CC6682F48D76
http://readinglists.anglia.ac.uk/items/3F4922F7-DE77-78AE-
CE68-D68DBA230F7F
http://readinglists.anglia.ac.uk/items/058CDDBC-028F-81F9-
82F1-43851C3978D2
Assessment Description
Question 1: Hackers Causing Trouble (40% Total)
You have just started a job as a security analyst. You have been
asked to compare and contrast the different types of
attacks/vulnerabilities a hacker could use against your client’s
system.
The client’s system:
· Is a virtualised environment, that uses the latest version of
windows server as its base?
· Is forward facing (has access to the internet and must have
this) and does not sit behind a proxy/web server.
· Is frequently attacked by automated and targeted hack
attempts.
Questions:
· Compare and contrast attacks that could be used against
windows server 2019 (15%)
· What software-based mitigation techniques, could be used to
help combat these attacks (15%)
· What add-ons could be attached to the network to help combat
these vulnerabilities (10%)
Question 2: Cryptography (40% Total)
Your boss has also asked you to produce another report, where
if you are responsible for safeguarding and protecting sensitive
and personal information. what type of encryption should be
used when storing and transferring sensitive client data.
In the context of the above scenario, you should produce a
briefing report that
· Outlines the risks of handling this sort of sensitive data. This
could refer to current laws/case law and processes that you
should be aware of (10 marks)
· Explains how a security model, such as CIA/AAA, can infer
trust in data handling (10 marks)
· Uses examples to compare and contrast symmetric encryption
with asymmetric encryption (10 marks)
· Recommends and justifies an encryption algorithm for
transferring client data over the internet and the storage of that
data when it is not in use (10 marks)
Quality of Referencing (10% Total)
You are expected to thoroughly and accurately reference your
report using the Harvard referencing style. The report should
contain in-text Harvard references.
Marks will be deducted for
· Lack of referencing in the text
· Divergence from Harvard referencing style
Report Presentation and Layout (10 marks)
You are expected to compile a well-constructed, formal written
report of no more than 2,000 words. Up to 10 marks are
available for the presentation and layout of the report. The
report should:
· Be a formal report, written in the third person
· Have all figures and tables correctly labelled and referenced
· Be presented in a structured and meaningful way, with
consideration for grammar, punctuation and spelling throughout,
including the minimum components:
· Cover Page to include:
· Module Title
· Course Code
· Your Student ID
· Date of Submission
· Table of Contents
· Body of your report (2,000-word guide)
· Any supporting diagrams and tables
· Harvard reference style used correctly
· An appendix if necessary
The student will automatically be awarded a fail if:
· The report is not submitted within University agreed
timescales
· The content of the report is meaningless in terms of the
assignment
· The work is not the work of the author and is presented as
such
Intended learning outcomes for the assessment
· Knowledge and Understanding: Analyse the motives, origins
and techniques used by attackers of network-based information
systems and evaluate the role of cryptography.
· Knowledge and Understanding: Compare and contrast the use
of cryptographic techniques for ensuring the confidentiality,
integrity and availability of information systems.
· Intellectual, practical, affective and transferable
skills: Critically appraise the security of a system in terms of
the principles of confidentiality, integrity availability and non-
repudiation.
Other skills and competencies
Through this module you will get a general idea on the different
technology that can be used by hackers to compromise a system
and the tools available to protect against them.
This is a very practical module so you are expected to be
familiar and comfortable with computers and using new tools.
Marking scheme, criteria or rubric
Mark scheme is shown above, beside each question.
Links to Supporting Materials
You should use all the material available in Canvas as well as
the resources found in the Reading List. For the references you
can use the digital library. Don't forget to use the appropriate
Harvard Referencing style.
Assessment Literacy
This assessment counts towards the final mark of the module.
Please review any feedback you received on degree, before this
course has started. Focus on formative and submissive feedback
from assignments that are similar to this one and try to improve
your submission by correcting the mistakes you made in those
previous modules.
You are expected to demonstrate a clear understanding of the
topics reviewed during the lectures. More importantly you are
expected to create a document of high quality. Pay special
attention to the critical analysis of the information you review
and make sure the referencing style is correct. It is
recommended that you attend the workshops organised by Study
Skills Plus related to Critical Analysis, Academic Writing and
Referencing.
For more information on how to write a technical report please
check this Lynda.com (Links to an external site.) tutorial.

More Related Content

Similar to 103119 MOD006610 Computer Security Anglia Ruskin Universi.docx

CIS 558 Success Begins / snaptutorial.com
CIS 558 Success Begins / snaptutorial.comCIS 558 Success Begins / snaptutorial.com
CIS 558 Success Begins / snaptutorial.comRobinson075
 
Cis 558 Technology levels--snaptutorial.com
Cis 558 Technology levels--snaptutorial.comCis 558 Technology levels--snaptutorial.com
Cis 558 Technology levels--snaptutorial.comsholingarjosh63
 
Cis 558 Enthusiastic Study / snaptutorial.com
Cis 558 Enthusiastic Study / snaptutorial.comCis 558 Enthusiastic Study / snaptutorial.com
Cis 558 Enthusiastic Study / snaptutorial.comStephenson06
 
Running Header LEARNING RESOURCE1 NETFLIX4LEARNING RESO.docx
Running Header LEARNING RESOURCE1 NETFLIX4LEARNING RESO.docxRunning Header LEARNING RESOURCE1 NETFLIX4LEARNING RESO.docx
Running Header LEARNING RESOURCE1 NETFLIX4LEARNING RESO.docxanhlodge
 
CIS 558 Education Organization / snaptutorial.com
CIS 558 Education Organization / snaptutorial.comCIS 558 Education Organization / snaptutorial.com
CIS 558 Education Organization / snaptutorial.comMcdonaldRyan39
 
Strayer cis-417-week-8-assignment-4-data
Strayer cis-417-week-8-assignment-4-dataStrayer cis-417-week-8-assignment-4-data
Strayer cis-417-week-8-assignment-4-datainfinityend3
 
Cis 558 Effective Communication-snaptutorial.com
Cis 558  Effective Communication-snaptutorial.comCis 558  Effective Communication-snaptutorial.com
Cis 558 Effective Communication-snaptutorial.comjhonklinz11
 
Cis 558 Exceptional Education-snaptutorial.com
Cis 558 Exceptional Education-snaptutorial.comCis 558 Exceptional Education-snaptutorial.com
Cis 558 Exceptional Education-snaptutorial.comrobertleses9
 
CIS 558 Enhance teaching / snaptutorial.com
CIS 558 Enhance teaching / snaptutorial.comCIS 558 Enhance teaching / snaptutorial.com
CIS 558 Enhance teaching / snaptutorial.comdonaldzs56
 
Cmgt 582 Effective Communication / snaptutorial.com
Cmgt 582  Effective Communication / snaptutorial.comCmgt 582  Effective Communication / snaptutorial.com
Cmgt 582 Effective Communication / snaptutorial.comHarrisGeorg12
 
Assignment02 question file s1 2017
Assignment02 question file s1 2017Assignment02 question file s1 2017
Assignment02 question file s1 2017Sandeep Ratnam
 
Executive Proposal ProjectThe purpose of this project is to evalua.docx
Executive Proposal ProjectThe purpose of this project is to evalua.docxExecutive Proposal ProjectThe purpose of this project is to evalua.docx
Executive Proposal ProjectThe purpose of this project is to evalua.docxrhetttrevannion
 
Assignment 1 Designing Compliance within the LAN-to-WAN DomainN.docx
Assignment 1 Designing Compliance within the LAN-to-WAN DomainN.docxAssignment 1 Designing Compliance within the LAN-to-WAN DomainN.docx
Assignment 1 Designing Compliance within the LAN-to-WAN DomainN.docxcarlibradley31429
 
Cis 558 Education Specialist-snaptutorial.com
Cis 558 Education Specialist-snaptutorial.comCis 558 Education Specialist-snaptutorial.com
Cis 558 Education Specialist-snaptutorial.comrobertlesew96
 
IntroductionThis is an individual project. Each student must comp.docx
IntroductionThis is an individual project.  Each student must comp.docxIntroductionThis is an individual project.  Each student must comp.docx
IntroductionThis is an individual project. Each student must comp.docxmariuse18nolet
 
Get help with SWE4202 Computing Infrastructure Assignment
Get help with SWE4202 Computing Infrastructure AssignmentGet help with SWE4202 Computing Infrastructure Assignment
Get help with SWE4202 Computing Infrastructure AssignmentAaravSunak
 
The comparison of written and mediaCompare and contrast simila.docx
The comparison of written and mediaCompare and contrast simila.docxThe comparison of written and mediaCompare and contrast simila.docx
The comparison of written and mediaCompare and contrast simila.docxmehek4
 
CIS 341 Success Begins / snaptutorial.com
CIS 341 Success Begins / snaptutorial.comCIS 341 Success Begins / snaptutorial.com
CIS 341 Success Begins / snaptutorial.comRobinson070
 
Cis 341 Technology levels--snaptutorial.com
Cis 341 Technology levels--snaptutorial.comCis 341 Technology levels--snaptutorial.com
Cis 341 Technology levels--snaptutorial.comsholingarjosh56
 
Cis 341 Enthusiastic Study - snaptutorial.com
Cis 341 Enthusiastic Study - snaptutorial.comCis 341 Enthusiastic Study - snaptutorial.com
Cis 341 Enthusiastic Study - snaptutorial.comGeorgeDixon100
 

Similar to 103119 MOD006610 Computer Security Anglia Ruskin Universi.docx (20)

CIS 558 Success Begins / snaptutorial.com
CIS 558 Success Begins / snaptutorial.comCIS 558 Success Begins / snaptutorial.com
CIS 558 Success Begins / snaptutorial.com
 
Cis 558 Technology levels--snaptutorial.com
Cis 558 Technology levels--snaptutorial.comCis 558 Technology levels--snaptutorial.com
Cis 558 Technology levels--snaptutorial.com
 
Cis 558 Enthusiastic Study / snaptutorial.com
Cis 558 Enthusiastic Study / snaptutorial.comCis 558 Enthusiastic Study / snaptutorial.com
Cis 558 Enthusiastic Study / snaptutorial.com
 
Running Header LEARNING RESOURCE1 NETFLIX4LEARNING RESO.docx
Running Header LEARNING RESOURCE1 NETFLIX4LEARNING RESO.docxRunning Header LEARNING RESOURCE1 NETFLIX4LEARNING RESO.docx
Running Header LEARNING RESOURCE1 NETFLIX4LEARNING RESO.docx
 
CIS 558 Education Organization / snaptutorial.com
CIS 558 Education Organization / snaptutorial.comCIS 558 Education Organization / snaptutorial.com
CIS 558 Education Organization / snaptutorial.com
 
Strayer cis-417-week-8-assignment-4-data
Strayer cis-417-week-8-assignment-4-dataStrayer cis-417-week-8-assignment-4-data
Strayer cis-417-week-8-assignment-4-data
 
Cis 558 Effective Communication-snaptutorial.com
Cis 558  Effective Communication-snaptutorial.comCis 558  Effective Communication-snaptutorial.com
Cis 558 Effective Communication-snaptutorial.com
 
Cis 558 Exceptional Education-snaptutorial.com
Cis 558 Exceptional Education-snaptutorial.comCis 558 Exceptional Education-snaptutorial.com
Cis 558 Exceptional Education-snaptutorial.com
 
CIS 558 Enhance teaching / snaptutorial.com
CIS 558 Enhance teaching / snaptutorial.comCIS 558 Enhance teaching / snaptutorial.com
CIS 558 Enhance teaching / snaptutorial.com
 
Cmgt 582 Effective Communication / snaptutorial.com
Cmgt 582  Effective Communication / snaptutorial.comCmgt 582  Effective Communication / snaptutorial.com
Cmgt 582 Effective Communication / snaptutorial.com
 
Assignment02 question file s1 2017
Assignment02 question file s1 2017Assignment02 question file s1 2017
Assignment02 question file s1 2017
 
Executive Proposal ProjectThe purpose of this project is to evalua.docx
Executive Proposal ProjectThe purpose of this project is to evalua.docxExecutive Proposal ProjectThe purpose of this project is to evalua.docx
Executive Proposal ProjectThe purpose of this project is to evalua.docx
 
Assignment 1 Designing Compliance within the LAN-to-WAN DomainN.docx
Assignment 1 Designing Compliance within the LAN-to-WAN DomainN.docxAssignment 1 Designing Compliance within the LAN-to-WAN DomainN.docx
Assignment 1 Designing Compliance within the LAN-to-WAN DomainN.docx
 
Cis 558 Education Specialist-snaptutorial.com
Cis 558 Education Specialist-snaptutorial.comCis 558 Education Specialist-snaptutorial.com
Cis 558 Education Specialist-snaptutorial.com
 
IntroductionThis is an individual project. Each student must comp.docx
IntroductionThis is an individual project.  Each student must comp.docxIntroductionThis is an individual project.  Each student must comp.docx
IntroductionThis is an individual project. Each student must comp.docx
 
Get help with SWE4202 Computing Infrastructure Assignment
Get help with SWE4202 Computing Infrastructure AssignmentGet help with SWE4202 Computing Infrastructure Assignment
Get help with SWE4202 Computing Infrastructure Assignment
 
The comparison of written and mediaCompare and contrast simila.docx
The comparison of written and mediaCompare and contrast simila.docxThe comparison of written and mediaCompare and contrast simila.docx
The comparison of written and mediaCompare and contrast simila.docx
 
CIS 341 Success Begins / snaptutorial.com
CIS 341 Success Begins / snaptutorial.comCIS 341 Success Begins / snaptutorial.com
CIS 341 Success Begins / snaptutorial.com
 
Cis 341 Technology levels--snaptutorial.com
Cis 341 Technology levels--snaptutorial.comCis 341 Technology levels--snaptutorial.com
Cis 341 Technology levels--snaptutorial.com
 
Cis 341 Enthusiastic Study - snaptutorial.com
Cis 341 Enthusiastic Study - snaptutorial.comCis 341 Enthusiastic Study - snaptutorial.com
Cis 341 Enthusiastic Study - snaptutorial.com
 

More from herminaprocter

2. Framework Graphic  Candidates will create a graphic that re.docx
2. Framework Graphic  Candidates will create a graphic that re.docx2. Framework Graphic  Candidates will create a graphic that re.docx
2. Framework Graphic  Candidates will create a graphic that re.docxherminaprocter
 
2. Research Article Review – Read one (1) research articles on T.docx
2. Research Article Review – Read one (1) research articles on T.docx2. Research Article Review – Read one (1) research articles on T.docx
2. Research Article Review – Read one (1) research articles on T.docxherminaprocter
 
2) In examining Document 4 and Document 6, how did the.docx
2) In examining Document 4 and Document 6, how did the.docx2) In examining Document 4 and Document 6, how did the.docx
2) In examining Document 4 and Document 6, how did the.docxherminaprocter
 
2-3 pages in length (including exhibits, tables and appendices.docx
2-3 pages in length (including exhibits, tables and appendices.docx2-3 pages in length (including exhibits, tables and appendices.docx
2-3 pages in length (including exhibits, tables and appendices.docxherminaprocter
 
2. Sandra is a parent who believes that play is just entertainment f.docx
2. Sandra is a parent who believes that play is just entertainment f.docx2. Sandra is a parent who believes that play is just entertainment f.docx
2. Sandra is a parent who believes that play is just entertainment f.docxherminaprocter
 
2.2 Discussion What Is LeadershipGetting StartedR.docx
2.2 Discussion What Is LeadershipGetting StartedR.docx2.2 Discussion What Is LeadershipGetting StartedR.docx
2.2 Discussion What Is LeadershipGetting StartedR.docxherminaprocter
 
2.  You are a member of the Human Resource Department of a medium-si.docx
2.  You are a member of the Human Resource Department of a medium-si.docx2.  You are a member of the Human Resource Department of a medium-si.docx
2.  You are a member of the Human Resource Department of a medium-si.docxherminaprocter
 
2.1.  What is Strategic Human Resource Management Differentiate bet.docx
2.1.  What is Strategic Human Resource Management Differentiate bet.docx2.1.  What is Strategic Human Resource Management Differentiate bet.docx
2.1.  What is Strategic Human Resource Management Differentiate bet.docxherminaprocter
 
2,___Use of no less than six slides and no more than seven .docx
2,___Use of no less than six slides and no more than seven .docx2,___Use of no less than six slides and no more than seven .docx
2,___Use of no less than six slides and no more than seven .docxherminaprocter
 
2. Multicultural Interview Paper Students may begin this.docx
2. Multicultural Interview Paper Students may begin this.docx2. Multicultural Interview Paper Students may begin this.docx
2. Multicultural Interview Paper Students may begin this.docxherminaprocter
 
2-4A summary of your findings regarding sexual orientation and.docx
2-4A summary of your findings regarding sexual orientation and.docx2-4A summary of your findings regarding sexual orientation and.docx
2-4A summary of your findings regarding sexual orientation and.docxherminaprocter
 
2- to 4A description of the services in your local communi.docx
2- to 4A description of the services in your local communi.docx2- to 4A description of the services in your local communi.docx
2- to 4A description of the services in your local communi.docxherminaprocter
 
2  or more paragraphAs previously noted, the Brocks have some of.docx
2  or more paragraphAs previously noted, the Brocks have some of.docx2  or more paragraphAs previously noted, the Brocks have some of.docx
2  or more paragraphAs previously noted, the Brocks have some of.docxherminaprocter
 
2-1 IntroductionUber Technologies Inc. (Uber) is a tech startu.docx
2-1 IntroductionUber Technologies Inc. (Uber) is a tech startu.docx2-1 IntroductionUber Technologies Inc. (Uber) is a tech startu.docx
2-1 IntroductionUber Technologies Inc. (Uber) is a tech startu.docxherminaprocter
 
2 postsRe Topic 2 DQ 1Social determinants of health are fac.docx
2 postsRe Topic 2 DQ 1Social determinants of health are fac.docx2 postsRe Topic 2 DQ 1Social determinants of health are fac.docx
2 postsRe Topic 2 DQ 1Social determinants of health are fac.docxherminaprocter
 
2 peer responses due in 4 hoursMALEETAS POSTWorld War .docx
2 peer responses due in 4 hoursMALEETAS POSTWorld War .docx2 peer responses due in 4 hoursMALEETAS POSTWorld War .docx
2 peer responses due in 4 hoursMALEETAS POSTWorld War .docxherminaprocter
 
2 Pages for 4 questions below1) Some say that analytics in gener.docx
2 Pages for 4 questions below1) Some say that analytics in gener.docx2 Pages for 4 questions below1) Some say that analytics in gener.docx
2 Pages for 4 questions below1) Some say that analytics in gener.docxherminaprocter
 
2 Ethics Session 1.pptxEthics in Engineering Pra.docx
2 Ethics Session 1.pptxEthics in Engineering Pra.docx2 Ethics Session 1.pptxEthics in Engineering Pra.docx
2 Ethics Session 1.pptxEthics in Engineering Pra.docxherminaprocter
 
2 1 5L e a r n I n g o b j e c t I v e sC H A P T E R.docx
2 1 5L e a r n I n g  o b j e c t I v e sC H A P T E R.docx2 1 5L e a r n I n g  o b j e c t I v e sC H A P T E R.docx
2 1 5L e a r n I n g o b j e c t I v e sC H A P T E R.docxherminaprocter
 
2 Requirements Elicitation A Survey of Techniques, Ap.docx
2  Requirements Elicitation  A Survey of Techniques, Ap.docx2  Requirements Elicitation  A Survey of Techniques, Ap.docx
2 Requirements Elicitation A Survey of Techniques, Ap.docxherminaprocter
 

More from herminaprocter (20)

2. Framework Graphic  Candidates will create a graphic that re.docx
2. Framework Graphic  Candidates will create a graphic that re.docx2. Framework Graphic  Candidates will create a graphic that re.docx
2. Framework Graphic  Candidates will create a graphic that re.docx
 
2. Research Article Review – Read one (1) research articles on T.docx
2. Research Article Review – Read one (1) research articles on T.docx2. Research Article Review – Read one (1) research articles on T.docx
2. Research Article Review – Read one (1) research articles on T.docx
 
2) In examining Document 4 and Document 6, how did the.docx
2) In examining Document 4 and Document 6, how did the.docx2) In examining Document 4 and Document 6, how did the.docx
2) In examining Document 4 and Document 6, how did the.docx
 
2-3 pages in length (including exhibits, tables and appendices.docx
2-3 pages in length (including exhibits, tables and appendices.docx2-3 pages in length (including exhibits, tables and appendices.docx
2-3 pages in length (including exhibits, tables and appendices.docx
 
2. Sandra is a parent who believes that play is just entertainment f.docx
2. Sandra is a parent who believes that play is just entertainment f.docx2. Sandra is a parent who believes that play is just entertainment f.docx
2. Sandra is a parent who believes that play is just entertainment f.docx
 
2.2 Discussion What Is LeadershipGetting StartedR.docx
2.2 Discussion What Is LeadershipGetting StartedR.docx2.2 Discussion What Is LeadershipGetting StartedR.docx
2.2 Discussion What Is LeadershipGetting StartedR.docx
 
2.  You are a member of the Human Resource Department of a medium-si.docx
2.  You are a member of the Human Resource Department of a medium-si.docx2.  You are a member of the Human Resource Department of a medium-si.docx
2.  You are a member of the Human Resource Department of a medium-si.docx
 
2.1.  What is Strategic Human Resource Management Differentiate bet.docx
2.1.  What is Strategic Human Resource Management Differentiate bet.docx2.1.  What is Strategic Human Resource Management Differentiate bet.docx
2.1.  What is Strategic Human Resource Management Differentiate bet.docx
 
2,___Use of no less than six slides and no more than seven .docx
2,___Use of no less than six slides and no more than seven .docx2,___Use of no less than six slides and no more than seven .docx
2,___Use of no less than six slides and no more than seven .docx
 
2. Multicultural Interview Paper Students may begin this.docx
2. Multicultural Interview Paper Students may begin this.docx2. Multicultural Interview Paper Students may begin this.docx
2. Multicultural Interview Paper Students may begin this.docx
 
2-4A summary of your findings regarding sexual orientation and.docx
2-4A summary of your findings regarding sexual orientation and.docx2-4A summary of your findings regarding sexual orientation and.docx
2-4A summary of your findings regarding sexual orientation and.docx
 
2- to 4A description of the services in your local communi.docx
2- to 4A description of the services in your local communi.docx2- to 4A description of the services in your local communi.docx
2- to 4A description of the services in your local communi.docx
 
2  or more paragraphAs previously noted, the Brocks have some of.docx
2  or more paragraphAs previously noted, the Brocks have some of.docx2  or more paragraphAs previously noted, the Brocks have some of.docx
2  or more paragraphAs previously noted, the Brocks have some of.docx
 
2-1 IntroductionUber Technologies Inc. (Uber) is a tech startu.docx
2-1 IntroductionUber Technologies Inc. (Uber) is a tech startu.docx2-1 IntroductionUber Technologies Inc. (Uber) is a tech startu.docx
2-1 IntroductionUber Technologies Inc. (Uber) is a tech startu.docx
 
2 postsRe Topic 2 DQ 1Social determinants of health are fac.docx
2 postsRe Topic 2 DQ 1Social determinants of health are fac.docx2 postsRe Topic 2 DQ 1Social determinants of health are fac.docx
2 postsRe Topic 2 DQ 1Social determinants of health are fac.docx
 
2 peer responses due in 4 hoursMALEETAS POSTWorld War .docx
2 peer responses due in 4 hoursMALEETAS POSTWorld War .docx2 peer responses due in 4 hoursMALEETAS POSTWorld War .docx
2 peer responses due in 4 hoursMALEETAS POSTWorld War .docx
 
2 Pages for 4 questions below1) Some say that analytics in gener.docx
2 Pages for 4 questions below1) Some say that analytics in gener.docx2 Pages for 4 questions below1) Some say that analytics in gener.docx
2 Pages for 4 questions below1) Some say that analytics in gener.docx
 
2 Ethics Session 1.pptxEthics in Engineering Pra.docx
2 Ethics Session 1.pptxEthics in Engineering Pra.docx2 Ethics Session 1.pptxEthics in Engineering Pra.docx
2 Ethics Session 1.pptxEthics in Engineering Pra.docx
 
2 1 5L e a r n I n g o b j e c t I v e sC H A P T E R.docx
2 1 5L e a r n I n g  o b j e c t I v e sC H A P T E R.docx2 1 5L e a r n I n g  o b j e c t I v e sC H A P T E R.docx
2 1 5L e a r n I n g o b j e c t I v e sC H A P T E R.docx
 
2 Requirements Elicitation A Survey of Techniques, Ap.docx
2  Requirements Elicitation  A Survey of Techniques, Ap.docx2  Requirements Elicitation  A Survey of Techniques, Ap.docx
2 Requirements Elicitation A Survey of Techniques, Ap.docx
 

Recently uploaded

Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxUnboundStockton
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.arsicmarija21
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupJonathanParaisoCruz
 

Recently uploaded (20)

Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docx
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized Group
 

103119 MOD006610 Computer Security Anglia Ruskin Universi.docx

  • 1. 10/31/19 MOD006610: Computer Security | Anglia Ruskin University Library MOD006610: Computer Security ( Academic year 2019/20 ) Computer Security View Online 10 items Getting Certified Website | Recommended Reading Top Down Network Designing Webpage | Recommended Reading Cryptography and network security: principles and practice - William Stallings, Mohit P. Tahiliani, 2014 Book | Essential Reading Learning PowerShell - Jonathan Hassell, 2017, ©2017 Book | Essential Reading Hackers fool AI Webpage | Background Reading | Bit of fun but shows how far we are ahead of our computer friends!
  • 2. Cybercrime Cashouts: video and info Webpage | Recommended Reading | Some great information. Does have some tech terms so be prepared to do some research! Hacking Health: Security in Healthcare IT Systems Webpage | Recommended Reading | Health care blackbox and whitebox testing and ideas Bullet-Proof Credit Card Processing Webpage | Recommended Reading | Logic from the speaker is sound and work listening too. A Statistical Approach to Measuring User Authenticity Webpage | Recommended Reading | Head of linkedin gives a thought to user authenticity Computer SecurityFundamentals Webpage | Essential Reading 1/1 http://readinglists.anglia.ac.uk/items/38ccdb91-3715-48c7- 9e53-5d23cccbc85a http://readinglists.anglia.ac.uk/items/bd95c432-6127-4c6d- b88c-a3fbd1ea4305 http://readinglists.anglia.ac.uk/items/c9d45817-6cda-493a-9bf9- 05dc4540eeb6
  • 3. http://readinglists.anglia.ac.uk/items/05d7c2d9-208c-4b95- 99ba-8b6a40518136 http://readinglists.anglia.ac.uk/items/9D34452A-6C13-56A3- 4E4D-E7583BB8E65D http://readinglists.anglia.ac.uk/items/1C431A4A-04BC-DC52- 63DF-80D8FA31E106 http://readinglists.anglia.ac.uk/items/FC507A8E-CDE9-1CF4- 69D8-2AD98277BBFB http://readinglists.anglia.ac.uk/items/C06820B8-7BC4-24D9- 3858-CC6682F48D76 http://readinglists.anglia.ac.uk/items/3F4922F7-DE77-78AE- CE68-D68DBA230F7F http://readinglists.anglia.ac.uk/items/058CDDBC-028F-81F9- 82F1-43851C3978D2 Assessment Description Question 1: Hackers Causing Trouble (40% Total) You have just started a job as a security analyst. You have been asked to compare and contrast the different types of attacks/vulnerabilities a hacker could use against your client’s system. The client’s system: · Is a virtualised environment, that uses the latest version of windows server as its base? · Is forward facing (has access to the internet and must have this) and does not sit behind a proxy/web server. · Is frequently attacked by automated and targeted hack attempts. Questions: · Compare and contrast attacks that could be used against windows server 2019 (15%) · What software-based mitigation techniques, could be used to help combat these attacks (15%) · What add-ons could be attached to the network to help combat these vulnerabilities (10%) Question 2: Cryptography (40% Total)
  • 4. Your boss has also asked you to produce another report, where if you are responsible for safeguarding and protecting sensitive and personal information. what type of encryption should be used when storing and transferring sensitive client data. In the context of the above scenario, you should produce a briefing report that · Outlines the risks of handling this sort of sensitive data. This could refer to current laws/case law and processes that you should be aware of (10 marks) · Explains how a security model, such as CIA/AAA, can infer trust in data handling (10 marks) · Uses examples to compare and contrast symmetric encryption with asymmetric encryption (10 marks) · Recommends and justifies an encryption algorithm for transferring client data over the internet and the storage of that data when it is not in use (10 marks) Quality of Referencing (10% Total) You are expected to thoroughly and accurately reference your report using the Harvard referencing style. The report should contain in-text Harvard references. Marks will be deducted for · Lack of referencing in the text · Divergence from Harvard referencing style Report Presentation and Layout (10 marks) You are expected to compile a well-constructed, formal written report of no more than 2,000 words. Up to 10 marks are available for the presentation and layout of the report. The report should: · Be a formal report, written in the third person · Have all figures and tables correctly labelled and referenced · Be presented in a structured and meaningful way, with consideration for grammar, punctuation and spelling throughout, including the minimum components: · Cover Page to include: · Module Title · Course Code
  • 5. · Your Student ID · Date of Submission · Table of Contents · Body of your report (2,000-word guide) · Any supporting diagrams and tables · Harvard reference style used correctly · An appendix if necessary The student will automatically be awarded a fail if: · The report is not submitted within University agreed timescales · The content of the report is meaningless in terms of the assignment · The work is not the work of the author and is presented as such Intended learning outcomes for the assessment · Knowledge and Understanding: Analyse the motives, origins and techniques used by attackers of network-based information systems and evaluate the role of cryptography. · Knowledge and Understanding: Compare and contrast the use of cryptographic techniques for ensuring the confidentiality, integrity and availability of information systems. · Intellectual, practical, affective and transferable skills: Critically appraise the security of a system in terms of the principles of confidentiality, integrity availability and non- repudiation. Other skills and competencies Through this module you will get a general idea on the different technology that can be used by hackers to compromise a system and the tools available to protect against them. This is a very practical module so you are expected to be familiar and comfortable with computers and using new tools. Marking scheme, criteria or rubric Mark scheme is shown above, beside each question. Links to Supporting Materials You should use all the material available in Canvas as well as the resources found in the Reading List. For the references you
  • 6. can use the digital library. Don't forget to use the appropriate Harvard Referencing style. Assessment Literacy This assessment counts towards the final mark of the module. Please review any feedback you received on degree, before this course has started. Focus on formative and submissive feedback from assignments that are similar to this one and try to improve your submission by correcting the mistakes you made in those previous modules. You are expected to demonstrate a clear understanding of the topics reviewed during the lectures. More importantly you are expected to create a document of high quality. Pay special attention to the critical analysis of the information you review and make sure the referencing style is correct. It is recommended that you attend the workshops organised by Study Skills Plus related to Critical Analysis, Academic Writing and Referencing. For more information on how to write a technical report please check this Lynda.com (Links to an external site.) tutorial.