2. Cybercrime Cashouts: video and info
Webpage | Recommended Reading | Some great information.
Does have some tech
terms so be prepared to do some research!
Hacking Health: Security in Healthcare IT Systems
Webpage | Recommended Reading | Health care blackbox and
whitebox testing and
ideas
Bullet-Proof Credit Card Processing
Webpage | Recommended Reading | Logic from the speaker is
sound and work listening
too.
A Statistical Approach to Measuring User Authenticity
Webpage | Recommended Reading | Head of linkedin gives a
thought to user
authenticity
Computer SecurityFundamentals
Webpage | Essential Reading
1/1
http://readinglists.anglia.ac.uk/items/38ccdb91-3715-48c7-
9e53-5d23cccbc85a
http://readinglists.anglia.ac.uk/items/bd95c432-6127-4c6d-
b88c-a3fbd1ea4305
http://readinglists.anglia.ac.uk/items/c9d45817-6cda-493a-9bf9-
05dc4540eeb6
4. Your boss has also asked you to produce another report, where
if you are responsible for safeguarding and protecting sensitive
and personal information. what type of encryption should be
used when storing and transferring sensitive client data.
In the context of the above scenario, you should produce a
briefing report that
· Outlines the risks of handling this sort of sensitive data. This
could refer to current laws/case law and processes that you
should be aware of (10 marks)
· Explains how a security model, such as CIA/AAA, can infer
trust in data handling (10 marks)
· Uses examples to compare and contrast symmetric encryption
with asymmetric encryption (10 marks)
· Recommends and justifies an encryption algorithm for
transferring client data over the internet and the storage of that
data when it is not in use (10 marks)
Quality of Referencing (10% Total)
You are expected to thoroughly and accurately reference your
report using the Harvard referencing style. The report should
contain in-text Harvard references.
Marks will be deducted for
· Lack of referencing in the text
· Divergence from Harvard referencing style
Report Presentation and Layout (10 marks)
You are expected to compile a well-constructed, formal written
report of no more than 2,000 words. Up to 10 marks are
available for the presentation and layout of the report. The
report should:
· Be a formal report, written in the third person
· Have all figures and tables correctly labelled and referenced
· Be presented in a structured and meaningful way, with
consideration for grammar, punctuation and spelling throughout,
including the minimum components:
· Cover Page to include:
· Module Title
· Course Code
5. · Your Student ID
· Date of Submission
· Table of Contents
· Body of your report (2,000-word guide)
· Any supporting diagrams and tables
· Harvard reference style used correctly
· An appendix if necessary
The student will automatically be awarded a fail if:
· The report is not submitted within University agreed
timescales
· The content of the report is meaningless in terms of the
assignment
· The work is not the work of the author and is presented as
such
Intended learning outcomes for the assessment
· Knowledge and Understanding: Analyse the motives, origins
and techniques used by attackers of network-based information
systems and evaluate the role of cryptography.
· Knowledge and Understanding: Compare and contrast the use
of cryptographic techniques for ensuring the confidentiality,
integrity and availability of information systems.
· Intellectual, practical, affective and transferable
skills: Critically appraise the security of a system in terms of
the principles of confidentiality, integrity availability and non-
repudiation.
Other skills and competencies
Through this module you will get a general idea on the different
technology that can be used by hackers to compromise a system
and the tools available to protect against them.
This is a very practical module so you are expected to be
familiar and comfortable with computers and using new tools.
Marking scheme, criteria or rubric
Mark scheme is shown above, beside each question.
Links to Supporting Materials
You should use all the material available in Canvas as well as
the resources found in the Reading List. For the references you
6. can use the digital library. Don't forget to use the appropriate
Harvard Referencing style.
Assessment Literacy
This assessment counts towards the final mark of the module.
Please review any feedback you received on degree, before this
course has started. Focus on formative and submissive feedback
from assignments that are similar to this one and try to improve
your submission by correcting the mistakes you made in those
previous modules.
You are expected to demonstrate a clear understanding of the
topics reviewed during the lectures. More importantly you are
expected to create a document of high quality. Pay special
attention to the critical analysis of the information you review
and make sure the referencing style is correct. It is
recommended that you attend the workshops organised by Study
Skills Plus related to Critical Analysis, Academic Writing and
Referencing.
For more information on how to write a technical report please
check this Lynda.com (Links to an external site.) tutorial.