diff --git a/CW/A152_CW_May21.docx b/CW/A152_CW_May21.docx new file mode 100644 index 0000000..53b7b7d Binary files /dev/null and b/CW/A152_CW_May21.docx differ diff --git a/CW/Coursework.html b/CW/Coursework.html new file mode 100644 index 0000000..ce322b4 --- /dev/null +++ b/CW/Coursework.html @@ -0,0 +1,407 @@ + + + +
+ + + + + + + + + + + + + + + + + + + + + + +Via: Learning Platform
+Marks release expected: None
+Feedback Method: Written Feedback via LMS
+ +Word limit: 1500
+ +The assessment requires students to individually produce a security +assessment of an organisation. The output will be in the form of a +report of approximately 1500 words.
+The submission deadline is 14/12/2020
+Code Monsters, is an SME that creates and publishes computer games. +The organisation has a company website with forums, live chat that +allows the users of its games to interact with each other and the Code +Monsters staff. Recently the forum section of the website has been +suffering problems, with user messages being deleted or altered.
+The organisation has also noticed an increase in emails being +received. Which their spam filter is struggling to contain.
+The organisation is also undertaking a review of its password policy. +The current policy is that passwords should be between 8-16 Characters +long, and include a combination of letters, numbers and symbols. For +security, the system requires a password change for all users once a +month.
+You have been asked to develop a report on the security of the +organisation above. All of the information you require about the +organisation is given in the "Scenario" section, although you are +expected to do some research on cyber security issues that might +relate to the organisation.
+This report should be written at a high level, suitable for a +non-technical management audience. Your report should focus on two +selected aspects of your choice, one each of:
+Foe each aspect, select ONE factor (for example, Phishing, or a +specific Web vulnerability) that is a threat to the organisation, and give details of: + - What the Threat is + - How the threat occurs + - Examples of the Threat in the Real world + - Suggestions to mitigate the threat.
+Should introduce the subject, and provide context to the issues + discussed in the report
+Introduction to Cyber Security, what are the key threats, and + how are they relevant to the organisation
+Should include details of: + - What the Threat is + - How the threat occurs + - Examples of the Threat in the Real world + - Suggestions to mitigate the threat.
+Human Factors Threat (30%)
+Conclusions (10%)
+Grade | +Element | +
---|---|
0-39 | +Work mainly incomplete and /or weaknesses in most areas | +
40-49 | +Most elements completed; weaknesses outweigh strengths | +
50-59 | +Most elements are strong, minor weaknesses | +
60-69 | +Strengths in all elements | +
70+ | +work exceeds the standard expected | +
80+ | +All work substantially exceeds the standard expected | +