Uploaded by Abdul Wahab Naveed Khurram

DTS L5 Cyber Security and Networks Assignment May 23 studnet copy

advertisement
BPP Coursework Cover Sheet
Please use the table below as your cover sheet for the 1st page of the submission. The sheet should
be before the cover/title page of your submission.
Programme
BSc Digital and Technology Solutions
Module name
Cyber Security and Infrastructure
Schedule Term
Student Reference Number (SRN)
Report/Assignment Title
Assess your company security: Reducing IT Risk
Date of Submission
(Please attach the confirmation of any
extension received)
Declaration of Original Work:
I hereby declare that I have read and understood BPP’s regulations on plagiarism and that this is my
original work, researched, undertaken, completed and submitted in accordance with the requirements
of BPP School of Business and Technology.
The word count, excluding contents table, bibliography and appendices, is ___ words.
Student Reference Number:
Date:
By submitting this coursework you agree to all rules and regulations of BPP regarding assessments
and awards for programmes. Please note, submission is your declaration you are fit to sit.
BPP University reserves the right to use all submitted work for educational purposes and may
request that work be published for a wider audience.
BPP School of Business and Technology
BSc (Hons) Digital and Technology
Solutions
Cyber Security and Infrastructure
Assess your company security: Reducing IT Risk
Coursework Assessment Brief
Submission deadline: On the hub
Submission mode: Turnitin online access
1. Assessment Brief
This assessment brief gives you an overview of the formative and summative assessments that are
part of this module. The learning outcomes below will be tested in the assessment contained in this
brief.
1.1. Module Learning Outcomes (LOs)
1. Examine the importance of networking in managing cyber security within the workplace
2. Distinguish the available defence mechanisms for cyber security attacks within a working
environment
3. Appraise the cyber security risks for a given context
1.2. Assessment Overview
For this report we you will examine the corporate network you use on a day-by-day basis. You will be
writing a report that may be delivered to your line managers explaining how your network is used,
the possible IT risks and remediations that may be used to reduce you company’s cyber risk.
NOTE: for several sections of this assignment, you are being asked to assess and document risks you
find within your corporation’s network. Your company may not allow you to do this for security
reasons. In this eventuality, you are to assume the networks and security of a peer-level
organisation.
2. Assessment Structure/Guidance
2.1. Formative Assessment
For the formative assignment hand-in, you are to complete a draft of Part 1 and Part 2 Section A1
(detailed below) not exceeding 1000 words. You should also submit a plan for the remainder of the
essay.
2.2. Summative Assessment
For the completed summative assignment, you are to complete the full assignment updating any
work in line with recommendations made on the formative assignment hand-in by your tutor.
Part 1
Business Context
As a part of this risk assessment, you need to provide a context statement explaining your
organisation and what business sector your organisation operates in. If you are using a pseudonym,
you should introduce it here.
(250 words, Covering LO 1)
Part 2
Assets
As part of any risk or security assessment, you first need to understand what IT systems are being
used for by your organisation and how they are being used. Your corporate network is used for
many different systems including communicating with clients and co-workers in multiple different
ways, sales, internet, intranet and extranet, file storage, applications as well as a myriad of other
functions unique to the company you work for.
From a functionality perspective, detail your IT assets, by examining the networking systems you and
your organisation use on a day-by-day basis. List and describe the Network systems, Operating
systems and Applications. Explain for each, where appropriate, protocols and technologies, and how
they are used.
(750 words, Covering LO 1)
Part 3
RISK
As Level 5 apprenticeship students you are working for some the best companies in the world.
However, because they are the best, they are prime targets for cyber-attack for a great number of
reasons. For the following questions, develop a report for your workplace (and specifically for your
line manager) assessing your own company for cyber threats and vulnerabilities. NOTE: Be aware,
however, not to give any information about specific technical weaknesses that could be used to
leverage a functional attack on your company’s infrastructure and other IT systems.
A: Based on your Context statement (part 1) justify and differentiate the two most dangerous threat
actors that would be interested in attacking your organisation. For each type of threat actor,
examine what they would be interested in accomplishing and why.
B: Based on the assets (part 2): appraise the technical risks to endpoints and IT infrastructure, with
examples of vulnerabilities, weaknesses and their effects using the CIA (Confidentiality, Integrity and
Availability) triad. Note we are asking you to identify known vulnerabilities of assets and not the
specific vulnerabilities of your workplace.
(750 words, Covering LO 3)
Part 4
Minimise the RISK
Based on the assets from part 2 and the risks from part 3: Explain and differentiate between the
operational and managerial controls that could be used to mitigate and remediate the identified
vulnerabilities, weaknesses and risks above, and how they would be implemented.
(750 words, Covering LO 2)
All sections
Research and referencing
Your report should include a list of references used to develop the report and research to support
the suggested systems. The list should use only the Harvard Referencing System as highlighted in the
General Assessment Guidance section of this document. All the figures/tables used in the report
must have captions and, wherever needed, properly referenced, and explained in your submission.
Submission Structure
Your report should be structured according to the following:








Front cover
Table of Contents
Part 1
Part 2
Part 3
Part 4
References
Appendix (as required, please note that work in an appendix is NOT marked and is for
information only)
Formative Submission deadline: Written assessment to be submitted by Please see the hub in to
the Turnitin Dropbox available on the Module page in the Hub.
Summative Submission deadline: Written assessment to be submitted by Please see the hub in to
the Turnitin Dropbox available on the Module page in the Hub.
Please note: ensure you read the general assessment guidance at the end of this document.
2.3. Assessment Criteria
Level 5
Knowledge and Understanding
Criterion
0-29%
Fail
30-39%
Low Fail
40-49%
Pass
50-59%
Examine the
importance of
networking in
managing cyber
security within
the workplace
(25%) Part 2
Inadequate
information base.
Inadequate
networking in
managing cyber
security within the
workplace.
Limited knowledge
base; limited
understanding of
networking in
managing cyber
security within the
workplace
Satisfactory and often
implicit knowledge base
with some omissions
and/or lack of theory
networking in managing
cyber security within the
workplace
Good and increasingly
explicit knowledge base
that begins to explore
and analyse the theory
and ethical issues of
networking in
managing cyber
security within the
workplace
Very good knowledge
base; explores and
explicitly analyses of
networking in
managing cyber
security within the
workplace, its theory
and ethical issues with
some originality, detail
and autonomy.
Excellent knowledge
base, exploring and
analysing the
networking in
managing cyber
security within the
workplace, its theory
and ethical issues with
considerable originality
and autonomy
Outstanding
information base
exploring and
analysing the
discipline, its theory
and ethical issues with
clear originality and
autonomy.
Distinguish the
available
defence
mechanisms for
cyber security
attacks within a
working
environment
(25%) Part 4
Inadequate with
Significant gaps in
the understanding of
the practices related
to the defence
mechanisms for
cyber security attacks
within a working
environment
indicated
Limited with unclear
and/or precise
understanding of the
thoughts and practices
related to the required
defence mechanisms
for cyber security
attacks within a
working environment
indicated.
Satisfactory introduction
to a basic appreciation of a
wider field with some
clarity and precision to the
thoughts and practices
related to the required
defence mechanisms for
cyber security attacks
within a working
environment indicated
Good knowledge base;
Very good appreciation
of and explicit links to a
wider field.
Excellent and clear
understanding of, and
explicit links to, some
aspects of a wider field.
Thorough and deep
knowledge and
understanding of the
topic and explicit
evidence of the wider
contexts of the topic.
Some appreciation of a
basic wider field with
clarity and precision to
the thoughts and
practices related to the
required defence
mechanisms for cyber
security attacks within
a working environment
indicated
60-69%
Emerging application of
thoughts and practices
at the forefront of the
defence mechanisms
for cyber security
attacks within a
working environment
70-79%
Application of current
and emerging thoughts
and practices from the
defence mechanisms
for cyber security
attacks within a
working environment
80-100%
Outstanding and
detailed usage of
recent emerging
thought and/or
practices from a range
of appropriate
disciplines
Cognitive Skills
Criterion
0-29%
Fail
30-39%
Low Fail
40-49%
Pass
50-59%
Appraise the
cyber security
risks for a given
context
(25%) Part 3
Inadequate with
Significant gaps in
the understanding of
the practices related
to the Appraising the
cyber security risks
for a given context
indicated
Limited with unclear
and/or precise
understanding of the
thoughts and practices
related to the required
Appraising the cyber
security risks for a
given context
indicated.
Satisfactory introduction
to a basic appreciation of a
wider field with some
clarity and precision to the
thoughts and practices
related to the required
Appraising the cyber
security risks for a given
context indicated
Good knowledge base;
Context
Statement
(10%) Part 1
Inadequate
academic/intellectual
skills and major
difficulty with
structure/expression.
Wholly imitative and
descriptive.
Inadequate
practical/professional
skills
Limited
academic/intellectual
skills. Still mainly
imitative and
descriptive.
Satisfactory academic/
intellectual skills with some
difficulties. Largely
imitative and descriptive.
Some difficulty with
structure and accuracy in
expression but developing
practical/professional
skills.
Good
academic/intellectual
skills with few
difficulties. Largely
original work with
some evidence of
reflection and critique.
Structure and accuracy
in expression beginning
to emerge.
Very good
academic/intellectual
skills. Original work
with personal reflection
and broad evidencebased critique. Solid
structure and accuracy
in expression.
Practical/professional
skills evident.
Excellent
academic/intellectual
skills. Wholly original
work with good
reflection and solid,
well-reasoned
judgements forming
from evidence-based
critique. Consistent
structure and accuracy
in expression.
Practical/professional
skills established.
Outstanding
academic/intellectual
skills. Demonstrates
intellectual originality
and imagination.
Academic skills
Report writing
(10%)
Inadequate
academic/intellectual
skills and major
difficulty with
structure/expression.
Wholly imitative and
descriptive.
Inadequate
practical/professional
skills
Limited
academic/intellectual
skills. Still mainly
imitative and
descriptive.
Satisfactory academic/
intellectual skills with some
difficulties. Largely
imitative and descriptive.
Some difficulty with
structure and accuracy in
expression but developing
practical/professional
skills.
Good
academic/intellectual
skills with few
difficulties. Largely
original work with
some evidence of
reflection and critique.
Structure and accuracy
in expression beginning
to emerge.
Very good
academic/intellectual
skills. Original work
with personal reflection
and broad evidencebased critique. Solid
structure and accuracy
in expression.
Practical/professional
skills evident.
Excellent
academic/intellectual
skills. Wholly original
work with good
reflection and solid,
well-reasoned
judgements forming
from evidence-based
critique. Consistent
structure and accuracy
in expression.
Practical/professional
skills established.
Outstanding
academic/intellectual
skills. Demonstrates
intellectual originality
and imagination.
Some appreciation of a
basic wider field with
clarity and precision to
the thoughts and
practices related to the
required Appraising the
cyber security risks for
a given context
indicated
60-69%
Very good appreciation
of and explicit links to a
wider field.
Emerging application of
thoughts and practices
at the forefront of
Appraising the cyber
security risks for a given
context
70-79%
Excellent and clear
understanding of, and
explicit links to, some
aspects of a wider field.
Application of current
and emerging thoughts
and practices from
Appraising the cyber
security risks for a given
context
80-100%
Thorough and deep
knowledge and
understanding of the
topic and explicit
evidence of the wider
contexts of the topic.
Outstanding and
detailed usage of
recent emerging
thought and/or
practices from a range
of appropriate
disciplines
Criterion
Referencing
(5%)
0-29%
Fail
30-39%
Low Fail
40-49%
Pass
Inadequate
references with
numerous errors and
omissions
Limited references and
notes with
inconsistencies, errors
or omissions.
Satisfactory references
and notes but may contain
inconsistencies, errors or
omissions.
50-59%
Good references and
notes with minor or
insignificant errors or
omissions.
60-69%
Very good and full and
appropriate references
and notes with minor
or insignificant errors
70-79%
Excellent with precise,
full and appropriate
references and notes.
80-100%
Outstanding with
precise, full and
appropriate references
and notes at a high
standard.
General Assessment Guidance

Late submissions will not be marked unless an approved extension has been granted
through the formal extension request process.

All coursework must be submitted via TurnitIn only.

Only submissions made via the specified mode will be accepted and hard copies or
any other digital form of submissions (like via email or pen drive etc.) will not be accepted.

Please use English (UK) as your language in the submission.

Do not put your name or contact details anywhere on your submission. You should
only put your student registration number (SRN) which will ensure your submission is
recognised in the marking process.

Please ensure your student registration number is on your front cover sheet

You should include a completed copy of the Assignment Cover sheet. Any
submission without this completed Assignment Coversheet may be
considered invalid and not marked.
Word count

Assignments that exceed the word count will have all words over the maximum limit
discounted and will not be taken into consideration when assigning a grade.

There is no 10% allowance above the word count. The limit is the word count as
stated in the assignment brief.

You may submit work that is less than the word count, but you are advised that
anything substantially short of the word count is an indication that you haven’t completed
the full requirements of the task to the depth required for a pass.

You must specify total word count on the front page of your report.
Not included in the word count
The cover sheet
The appendix
Numerical tables
Reference list
Text in diagrams
Contents page
List of figures
Executive summary (where required)
Included in the word count
Headings and sub-headings
Text based tables
In-text citations
In-text citations for diagrams and charts
Tables

Tables should be used appropriately and as a way of categorising and displaying
information in an easy to look up format.

Tables should be appropriately labelled, with a descriptive legend.

All text-based tables should be created in word and not imported as jpegs or other
file types into the document.

Tables presented in the body of the assignment should not include excessive
amounts of text.
Diagrams & Charts

All charts and diagrams must be labelled correctly. E.g. Figure 1, with a descriptive
legend.

Diagrams and charts can be imported as other file types and embedded into the
document or created within word.

Students misusing charts, diagrams, tables and embedded files to avoid being
detected in the word count will be subject to investigation in accordance with the Academic
Malpractice procedure.
Referencing

You are required to use only Harvard Referencing System in your submission. Any
content which is already published by other author(s) and is not referenced will be
considered as a case of plagiarism.

The BPP library has created two training videos to support referencing and the use of
the software Zotero.
You can access these materials by following this link https://bpp.libguides.com/technology

Referencing forms part of the assessment criteria and any referencing not in the
Harvard convention will be assessed as inaccurate.

All content derived from the work of others whether summarised, paraphrased must
be referenced correctly using the Harvard Referencing System. This includes diagrams,
charts and tables copied from others.

Footnotes should not be used.

Anything that is not referenced that is not your original work will be regarded as
plagiarism.
 The School of Technology has a strict policy regarding authenticity of assessments. In
proven instances of plagiarism or collusion, severe punishment will be imposed on
offenders. You are advised to read the rules and regulations regarding plagiarism and
collusion in the GARs and MOPP which are available on Hub in the help and support
section.
Academic Skills/Report Writing
 This includes the overall structure of the written work, but more than that, it is the
ability to synthesise information, present a well-founded and justified argument. The
highest marks go to those who critically evaluate and present original ideas. It also includes
the form in which the arguments are expressed.
 Unless the assessment specifically asks them to reflect on their own experiences, the
default expectation is that academic reports should be written in the third person.
 Arguments should be made from a neutral perspective whenever possible, not based on
an individual’s opinions.
The referencing marks are for the use of referencing, not just the accuracy of Harvard

style. Every point has an accurate and relevant citation, the grading criteria specifies
“accurate” – this would be peer review papers, textbooks and such. Not blogs, not
Wikipedia. References need to be as close to the original source as possible. It may be
suitable to use product documentation, if this is included there needs to be an awareness of
the bias of the source.

Academic Skills are relative to the level of study, the module learning outcomes can be
used to guide expectations.
Appendix
Items in the appendix of themselves do not contribute towards the final grade.
The appendix is for look up items only to support arguments in the main body of the
assignment.

Appropriate use of an appendix that is well structured and provides relevant
supporting documentation will be assessed as part of the presentation and structure criteria
within marking guides but the content itself will not be marked.


Submission and Results

Please note the following:

Submit your summative submission work in the links on the summative submission
page on the Hub. Please double check you are submitting to the correct link.

Please submit your formative submission to the links on the formative submission
page on the Hub.

If, for any reason, you submit in the wrong link, your submission will not be marked.

Ensure that you submit your coursework on time. In line with University
regulations, late submissions will not be marked, you will therefore be awarded zero.

Please take note of your Paper ID. You will need this in any queries about your
submission or your mark.

Turnitin may take up to 48 hours to calculate similarity. If you upload a draft file to
check similarity, please ensure you do this more than 48 hours before the deadline, so you
have time to upload a final copy.

The coursework logged in the system at the closing time on the due date will be
marked – no exceptions.

You can also use the Test Link to check similarity.

If you cannot see or cannot access the link you need, please complete an Online
Query Form, which can be accessed here

You can access your feedback once results have been posted. Please go back to the
link where you submitted and click the blue pen icon.

You will be emailed your final results each term, on the date advised to you at the
beginning of that term.
Programme specific guidance

You are required to achieve minimum 40% overall to pass this module
BPP Coursework Cover Sheet
Please use the table below as your cover sheet for the 1st page of the submission. The sheet should
be before the cover/title page of your submission.
BSc Hons Digital Technology Solutions Integrated Degree
Apprenticeship
Programme
Module name
Schedule Term
Student Reference Number (SRN)
Report/Assignment Title
Date of Submission
(Please attach the confirmation of any
extension received)
Declaration of Original Work:
I hereby declare that I have read and understood BPP’s regulations on plagiarism and that this is my
original work, researched, undertaken, completed and submitted in accordance with the requirements
of BPP School of Technology.
The word count, excluding contents table, bibliography and appendices, is ___ words.
Student Reference Number:
Date:
By submitting this coursework you agree to all rules and regulations of BPP regarding assessments
and awards for programmes. Please note, submission is your declaration you are fit to sit.
BPP University reserves the right to use all submitted work for educational purposes and may
request that work be published for a wider audience.
BPP School of Technology
Download