INTERNATIONAL ADVANCED DIPLOMA IN NETWORK & COMPUTER SECURITY SYSTEM INTRUSION AND COMPUTER FORENSICS (CSM203) PROJECT GUIDELINES Student declaration: I declare that: I understand what is meant by plagiarism The implication of plagiarism has been explained to me by my institution This project is all my own work and I have acknowledged any use of the published and unpublished works of other people. Student’s signature:……………………………. Date:……………………… Total number of pages including this cover page Submission Date Students’ ID Student’s Full Name Lecturer’s Name Due Date Class Code OFFICIAL USE ONLY Marker’s comments Marker’s name Initial marks awarded Penalty on late submission /100 Final marks awarded /100 CSM203 PROJECT GUIDELINES Page 1 of 8 Name of Student : ___________________________________________________ Student ID : ____________________________________________________ Module Code : CSM203 CSM203 PROJECT GUIDELINES Page 2 of 8 Instructions to Students: 1. Complete the cover sheet (page1), which forms the first page of your project. submission. 2. The assessment criteria includes: (a) Content of Work. This includes the amount of research done to provide accurate and credible information necessary for this project. (b) Creativity, Originality and Style of Work. This refers to the uniqueness and artistic element of the final project. (c) Presentation of the Final Project. This refers to the clarity, organization and final project. 3. Independent research on the relevant topic area is encouraged. Work that demonstrates an in-depth analysis of the question and that provides a coherent answer will be awarded a higher grade compared to that which simply regurgitates answers from the texts. 4. The word limit for this project is at least 20 pages. 5. A minimum of three (3) references from academic journals are required aside from the textbook of the course. 6. The document must include page number; use Times New Roman Font (Size 12) with top, bottom margins of 1” and right, left margins of 1.25” and with ‘Justify’ alignment. CSM203 PROJECT GUIDELINES Page 3 of 8 7. The project should be organized as follows: Cover Page. (found on the first page of this questions paper) Table of Contents. Main body of the project. (This should observe the given word count limit) References: Example: Berko, R., Rosenfeld, L., and Samovar, L. (1997), Connecting, Harcourt Brace & Company, USA. Complete the mark criteria list with your name and id and submit it together in your project. 8. Projects must be presented in hard copy with CD well secured in the hardcopy. The CD should contain the following documents: Softcopy of the project that is submitted and the plagiarism report. Retain a photocopy of your course project. 9. Complete your project and hand it in by: 12th Lesson. 10. Lecturer has the discretion of applying a penalty of 20% for late submission. 11. 'For Singapore & IGC student, submission of CW will be accepted by lecturer in soft copy. CW file name must save in this format: Module Code_Student ID_PROJ (e.g. CSM203_<Student ID>_PROJ). CW submitted with incorrect file name will not be marked and graded.' CSM203 PROJECT GUIDELINES Page 4 of 8 PROJECT QUESTIONS: Question 1 – [total of 50 Marks] Vulnerability / Penetration Testing Note: This question does not require Turnitin Additional task to this question. Setup 2 machine. One as the victim machine and the other as the vulnerability / penetration testing machine. Select 5 vulnerability / penetration testing tools. You are to produce a technical report (using case study) to show the use of the tools Your technical would be in the following structure. Tool 1 -Description of the tool [2 Marks] -Case is which the tools would be useful in an incident [3 Marks] -The use of the tool (with screen capture). Identify the step and evidence to the incident above. [5 Marks] Tool 2 -Description of the tool [2 Marks] -Case is which the tools would be useful in an incident [3 Marks] -The use of the tool (with screen capture). Identify the step and evidence to the incident above. [5 Marks] Tool 3 -Description of the tool [2 Marks] -Case is which the tools would be useful in an incident [3 Marks] -The use of the tool (with screen capture). Identify the step and evidence to the incident above. [5 Marks] Tool 4 CSM203 PROJECT GUIDELINES Page 5 of 8 -Description of the tool [2 Marks] -Case is which the tools would be useful in an incident [3 Marks] -The use of the tool (with screen capture). Identify the step and evidence to the incident above. [5 Marks] Tool 5 -Description of the tool [2 Marks] -Case is which the tools would be useful in an incident [3 Marks] -The use of the tool (with screen capture). Identify the step and evidence to the incident above. [5 Marks] You are to prepare slides for your presentation. The total slides should be about 10 slides. Recommendation of presentation slides Slide 1 – Introduction (Name & Student ID) Slide 2 – Description of Tool 1 Slide 3 – Case Study for this tool Slide 4 – Proof of Concept Slide 5 – Description of Tool 2 Slide 6 – Case Study for this tool Slide 7 - Proof of Concept Slide 8 – Description of Tool 3 Slide 9 - Case Study for this tool Slide 10 - Proof of Concept Slide 11 - Description of Tool 4 Slide 12 - Case Study for this tool Slide 13 - Proof of Concept Slide 14 - Description of Tool 5 Slide 15 - Case Study for this tool Slide 16 - Proof of Concept Slide 17 - Question & Answer Slide 18 – Thank You note Question 2 – [total of 40 Marks] Intrusion/Incident Detection and Digital Forensic Note: This question does not require Turnitin Select 4 forensic tools. You produce a technical report (using a case study) to show the use of the tools. You may re-use the case-study that you have built in question 2 or the victim machine in the previous question for your forensic purpose. CSM203 PROJECT GUIDELINES Page 6 of 8 Your technical report would be in the following structure. Tool 1 -Description of the tool [2 Marks] -Case is which the tool would be useful in an incident [3 Marks] -The use of the tool (with screen capture). Identify the step and evidence to the incident above. [5 Marks] Tool 2 -Description of the tool [2 Marks] -Case is which the tool would be useful in an incident [3 Marks] -The use of the tool (with screen capture). Identify the step and evidence to the incident above. [5 Marks] Tool 3 -Description of the tool [2 Marks] -Case is which the tool would be useful in an incident [3 Marks] -The use of the tool (with screen capture). Identify the step and evidence to the incident above. [5 Marks] Tool 4 -Description of the tool [2 Marks] -Case is which the tool would be useful in an incident [3 Marks] -The use of the tool (with screen capture). Identify the step and evidence to the incident above. [5 Marks] You are to prepare slides for your presentation. The total slides should be about 10 slides. Recommendation of presentation slides Slide 1 – Introduction (Name & Student ID) Slide 2 – Description of Tool 1 Slide 3 – Case Study for this tool Slide 4 – Proof of Concept Slide 5 – Description of Tool 2 Slide 6 – Case Study for this tool Slide 7 - Proof of Concept Slide 8 - Description of Tool 3 Slide 9 - Case Study for this tool Slide 10 - Proof of Concept CSM203 PROJECT GUIDELINES Page 7 of 8 Slide 11 - Description of Tool 4 Slide 12 - Case Study for this tool Slide 13 - Proof of Concept Slide 14 – Question & Answer Slide 15 – Thank You note Question 3 – [Total of 10 Marks] Viva and Presentation On the last lesson, your lecturer will allocate you 1 of the above question as you viva/presentation topic. Once assigned the topic, you are not allowed to change the viva/presentation topic. Submission will only be allowed after presentation. References At the end of your report, provide proper reference using Harvard referencing. Note: Google is not a reference and Wiki referencing is NOT allowed -- END OF PROJECT-- CSM203 PROJECT GUIDELINES Page 8 of 8