Uploaded by Auwal Zakari

CSM203 Project Guidelines ver2

advertisement
INTERNATIONAL ADVANCED DIPLOMA IN NETWORK & COMPUTER SECURITY
SYSTEM INTRUSION AND COMPUTER FORENSICS (CSM203)
PROJECT GUIDELINES
Student declaration:
I declare that:

I understand what is meant by plagiarism

The implication of plagiarism has been explained to me by my institution

This project is all my own work and I have acknowledged any use of the
published and unpublished works of other people.
Student’s signature:…………………………….
Date:………………………
Total number of pages including this cover page
Submission Date
Students’ ID
Student’s Full Name
Lecturer’s Name
Due Date
Class Code
OFFICIAL USE ONLY
Marker’s comments
Marker’s name
Initial marks awarded
Penalty on late submission
/100
Final marks awarded
/100
CSM203 PROJECT GUIDELINES
Page 1 of 8
Name of Student
: ___________________________________________________
Student ID
: ____________________________________________________
Module Code
: CSM203
CSM203 PROJECT GUIDELINES
Page 2 of 8
Instructions to Students:
1.
Complete the cover sheet (page1), which forms the first page of your project.
submission.
2.
The assessment criteria includes:
(a)
Content of Work. This includes the amount of research done to provide
accurate and credible information necessary for this project.
(b)
Creativity, Originality and Style of Work. This refers to the uniqueness and
artistic element of the final project.
(c)
Presentation of the Final Project. This refers to the clarity, organization and
final project.
3.
Independent research on the relevant topic area is encouraged. Work that
demonstrates an in-depth analysis of the question and that provides a coherent answer
will be awarded a higher grade compared to that which simply regurgitates answers
from the texts.
4.
The word limit for this project is at least 20 pages.
5.
A minimum of three (3) references from academic journals are required aside from
the textbook of the course.
6.
The document must include page number; use Times New Roman Font (Size 12) with
top, bottom margins of 1” and right, left margins of 1.25” and with ‘Justify’
alignment.
CSM203 PROJECT GUIDELINES
Page 3 of 8
7.
The project should be organized as follows:

Cover Page. (found on the first page of this questions paper)

Table of Contents.

Main body of the project. (This should observe the given word count limit)

References: Example:

Berko, R., Rosenfeld, L., and Samovar, L. (1997), Connecting,
Harcourt Brace & Company, USA.
Complete the mark criteria list with your name and id and submit it together in your
project.
8.
Projects must be presented in hard copy with CD well secured in the hardcopy. The
CD should contain the following documents: Softcopy of the project that is submitted
and the plagiarism report. Retain a photocopy of your course project.
9.
Complete your project and hand it in by: 12th Lesson.
10.
Lecturer has the discretion of applying a penalty of 20% for late submission.
11.
'For Singapore & IGC student, submission of CW will be accepted by lecturer in soft
copy. CW file name must save in this format: Module Code_Student ID_PROJ
(e.g. CSM203_<Student ID>_PROJ). CW submitted with incorrect file name will
not be marked and graded.'
CSM203 PROJECT GUIDELINES
Page 4 of 8
PROJECT QUESTIONS:
Question 1 – [total of 50 Marks] Vulnerability / Penetration Testing
Note: This question does not require Turnitin
Additional task to this question.
Setup 2 machine. One as the victim machine and the other as the vulnerability / penetration
testing machine.
Select 5 vulnerability / penetration testing tools. You are to produce a technical report (using
case study) to show the use of the tools
Your technical would be in the following structure.
Tool 1
-Description of the tool
[2 Marks]
-Case is which the tools would be useful in an incident
[3 Marks]
-The use of the tool (with screen capture). Identify the step and evidence to the incident
above.
[5 Marks]
Tool 2
-Description of the tool
[2 Marks]
-Case is which the tools would be useful in an incident
[3 Marks]
-The use of the tool (with screen capture). Identify the step and evidence to the incident
above.
[5 Marks]
Tool 3
-Description of the tool
[2 Marks]
-Case is which the tools would be useful in an incident
[3 Marks]
-The use of the tool (with screen capture). Identify the step and evidence to the incident
above.
[5 Marks]
Tool 4
CSM203 PROJECT GUIDELINES
Page 5 of 8
-Description of the tool
[2 Marks]
-Case is which the tools would be useful in an incident
[3 Marks]
-The use of the tool (with screen capture). Identify the step and evidence to the incident
above.
[5 Marks]
Tool 5
-Description of the tool
[2 Marks]
-Case is which the tools would be useful in an incident
[3 Marks]
-The use of the tool (with screen capture). Identify the step and evidence to the incident
above.
[5 Marks]
You are to prepare slides for your presentation. The total slides should be about 10 slides.
Recommendation of presentation slides
Slide 1 – Introduction (Name & Student ID)
Slide 2 – Description of Tool 1
Slide 3 – Case Study for this tool
Slide 4 – Proof of Concept
Slide 5 – Description of Tool 2
Slide 6 – Case Study for this tool
Slide 7 - Proof of Concept
Slide 8 – Description of Tool 3
Slide 9 - Case Study for this tool
Slide 10 - Proof of Concept
Slide 11 - Description of Tool 4
Slide 12 - Case Study for this tool
Slide 13 - Proof of Concept
Slide 14 - Description of Tool 5
Slide 15 - Case Study for this tool
Slide 16 - Proof of Concept
Slide 17 - Question & Answer
Slide 18 – Thank You note
Question 2 – [total of 40 Marks] Intrusion/Incident Detection and Digital Forensic
Note: This question does not require Turnitin
Select 4 forensic tools. You produce a technical report (using a case study) to show the use of
the tools.
You may re-use the case-study that you have built in question 2 or the victim machine in the
previous question for your forensic purpose.
CSM203 PROJECT GUIDELINES
Page 6 of 8
Your technical report would be in the following structure.
Tool 1
-Description of the tool
[2 Marks]
-Case is which the tool would be useful in an incident
[3 Marks]
-The use of the tool (with screen capture). Identify the step and evidence to the incident
above.
[5 Marks]
Tool 2
-Description of the tool
[2 Marks]
-Case is which the tool would be useful in an incident
[3 Marks]
-The use of the tool (with screen capture). Identify the step and evidence to the incident
above.
[5 Marks]
Tool 3
-Description of the tool
[2 Marks]
-Case is which the tool would be useful in an incident
[3 Marks]
-The use of the tool (with screen capture). Identify the step and evidence to the incident
above.
[5 Marks]
Tool 4
-Description of the tool
[2 Marks]
-Case is which the tool would be useful in an incident
[3 Marks]
-The use of the tool (with screen capture). Identify the step and evidence to the incident
above.
[5 Marks]
You are to prepare slides for your presentation. The total slides should be about 10 slides.
Recommendation of presentation slides
Slide 1 – Introduction (Name & Student ID)
Slide 2 – Description of Tool 1
Slide 3 – Case Study for this tool
Slide 4 – Proof of Concept
Slide 5 – Description of Tool 2
Slide 6 – Case Study for this tool
Slide 7 - Proof of Concept
Slide 8 - Description of Tool 3
Slide 9 - Case Study for this tool
Slide 10 - Proof of Concept
CSM203 PROJECT GUIDELINES
Page 7 of 8
Slide 11 - Description of Tool 4
Slide 12 - Case Study for this tool
Slide 13 - Proof of Concept
Slide 14 – Question & Answer
Slide 15 – Thank You note
Question 3 – [Total of 10 Marks] Viva and Presentation
On the last lesson, your lecturer will allocate you 1 of the above question as you
viva/presentation topic. Once assigned the topic, you are not allowed to change the
viva/presentation topic.
Submission will only be allowed after presentation.
References
At the end of your report, provide proper reference using Harvard referencing.
Note: Google is not a reference and Wiki referencing is NOT allowed
-- END OF PROJECT--
CSM203 PROJECT GUIDELINES
Page 8 of 8
Download