diff --git a/CW/A152_CW_May21.docx b/CW/A152_CW_May21.docx new file mode 100644 index 0000000..53b7b7d Binary files /dev/null and b/CW/A152_CW_May21.docx differ diff --git a/CW/Coursework.html b/CW/Coursework.html new file mode 100644 index 0000000..ce322b4 --- /dev/null +++ b/CW/Coursework.html @@ -0,0 +1,407 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + Coursework Template + + + + +
+
+ +
+ This document is for Coventry University students for + their own use in completing their assessed work for + this module and should not be passed to third parties + or posted on any website. Any infringements of this + rule should be reported to + facultyregistry.eec@coventry.ac.uk. +
+
+
+ + +
+ +
+ + +
+ +
+
+

Faculty of engineering, Environment and Computing

+
+
+ + +
+
+

Module: A152-CEM Introduction to Cyber Security

+
Assignment Brief
+
+
+ + +
+
+
+
Module Title:
+ Introduction to Cyber Security +
+
+
Group / Indivudual
+ + Individual + +
+
+
Cohort
+ Sept-Dec +
+
+
Module Code
+ A152-CEM +
+
+ +
+
+
Coursework Title
+ +
+
+
Handout Date
+ None +
+
+ +
+
+
Lecturer
+ Dan Goldsmith +
+
+
Due Date and Time
+ 13th December +
+
+ +
+
+
Estimated Time (hrs)
+ 20 Hours +
+
+
Coursework Type
+ Report +
+
+
Credits of Assessment
+ 10 +
+
+ + +
+ +
+
Submission Arrangements
+

Via: Learning Platform

+

Marks release expected: None

+

Feedback Method: Written Feedback via LMS

+ +

Word limit: 1500

+ +
+
+
+ + +
+ +
+

Module Learning Outcomes Assessed

+ +
    + + +
  • 1. Identify a range of cyber security threats faced by individuals and organisations.
  • + + + +
  • 2. Evaluate prevention, identification and mitigation methods appropriate to a variety of security scenarios
  • + + + +
  • 3. Demonstrate an understanding of the legal and ethical issues surrounding cyber security
  • + + +
+
+
+ +
+ +
+

Task and Mark Distribution

+

Assessment Brief

+

The assessment requires students to individually produce a security +assessment of an organisation. The output will be in the form of a +report of approximately 1500 words.

+

The submission deadline is 14/12/2020

+

Scenario

+

Code Monsters, is an SME that creates and publishes computer games. +The organisation has a company website with forums, live chat that +allows the users of its games to interact with each other and the Code +Monsters staff. Recently the forum section of the website has been +suffering problems, with user messages being deleted or altered.

+

The organisation has also noticed an increase in emails being +received. Which their spam filter is struggling to contain.

+

The organisation is also undertaking a review of its password policy. +The current policy is that passwords should be between 8-16 Characters +long, and include a combination of letters, numbers and symbols. For +security, the system requires a password change for all users once a +month.

+

Tasks

+

You have been asked to develop a report on the security of the +organisation above. All of the information you require about the +organisation is given in the "Scenario" section, although you are +expected to do some research on cyber security issues that might +relate to the organisation.

+

This report should be written at a high level, suitable for a +non-technical management audience. Your report should focus on two +selected aspects of your choice, one each of:

+
    +
  • A Technical aspect to security (such as how do we secure data, + recommendations for security software)
  • +
  • A Human Aspect to security (what issues do the staff face, how can + we protect against them)
  • +
+

Foe each aspect, select ONE factor (for example, Phishing, or a +specific Web vulnerability) that is a threat to the organisation, and give details of: + - What the Threat is + - How the threat occurs + - Examples of the Threat in the Real world + - Suggestions to mitigate the threat.

+

Marking Scheme

+

Report Contents (90%)

+
    +
  • Introduction (10%)
  • +
+

Should introduce the subject, and provide context to the issues + discussed in the report

+
    +
  • Background Research (10%)
  • +
+

Introduction to Cyber Security, what are the key threats, and + how are they relevant to the organisation

+
    +
  • Technical Threat (30%)
  • +
+

Should include details of: + - What the Threat is + - How the threat occurs + - Examples of the Threat in the Real world + - Suggestions to mitigate the threat.

+
    +
  • +

    Human Factors Threat (30%)

    +
      +
    • What the Threat is
    • +
    • How the threat occurs
    • +
    • Examples of the Threat in the Real world
    • +
    • Suggestions to mitigate the threat.
    • +
    +
  • +
  • +

    Conclusions (10%)

    +
  • +
+

Report Structure (10%)

+
    +
  • Appropriate structure, use of diagrams and referencing
  • +
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
GradeElement
0-39Work mainly incomplete and /or weaknesses in most areas
40-49Most elements completed; weaknesses outweigh strengths
50-59Most elements are strong, minor weaknesses
60-69Strengths in all elements
70+work exceeds the standard expected
80+All work substantially exceeds the standard expected
+
+
+ + +
+ +
+

Notes:

+
    +
  1. You are expected to use the Coventry University Harvard Referencing Style. For support and + advice on this students can contact Centre + for Academic Writing (CAW).
  2. +
  3. Please notify your registry course support team and module leader for disability support.
  4. +
  5. Any student requiring an extension or deferral should follow the university process as outlined + here. +
  6. +
  7. The University cannot take responsibility for any coursework lost or corrupted on disks, laptops + or personal computer. Students should therefore regularly back-up any work and are advised to + save it on the University system.
  8. +
  9. If there are technical or performance issues that prevent students submitting coursework through + the online coursework submission system on the day of a coursework deadline, an appropriate + extension to the coursework submission deadline will be agreed. This extension will normally be + 24 hours or the next working day if the deadline falls on a Friday or over the weekend period. + This will be communicated via your Module Leader.
  10. +
  11. Collusion between students (where sections of your work are similar to the work submitted + by + other students in this or previous module cohorts) is taken extremely seriously and will be + reported to the academic conduct panel. This applies to both courseworks and exam answers.
  12. +
  13. A marked difference between your writing style, knowledge and skill level demonstrated in class + discussion, any test conditions and that demonstrated in a coursework assignment may result in + you having to undertake a Viva Voce in order to prove the coursework assignment is entirely your + own work.
  14. +
  15. If you make use of the services of a proof reader in your work you must keep your + original + version and make it available as a demonstration of your written efforts.
  16. +
  17. You must not submit work for assessment that you have already submitted (partially or in full), + either for your current course or for another qualification of this university, unless this is + specifically provided for in your assignment brief or specific course or module information. + Where earlier work by you is citable, ie. it has already been published/submitted, you must + reference it clearly. Identical pieces of work submitted concurrently will also be considered to be self-plagiarism.
  18. +
+ +
+
+ +
+ + + + + + + + + + \ No newline at end of file diff --git a/CW/Coursework.md b/CW/Coursework.md index 5d04836..a2731e7 100644 --- a/CW/Coursework.md +++ b/CW/Coursework.md @@ -1,63 +1,50 @@ --- -title: Introduction to Cyber Security -subtitle: Coursework +template: coursework/CourseworkBrief.jinja2 +module_title: Introduction to Cyber Security +module_code: A152-CEM +module_leader: Dan Goldsmith + +cohort: Resit / Deferral +handout: +due: 5th July 2021 + +title: "" +type: Report +group: False +effort: 20 Hours +percentage: 100% + + +credits: 10 +submit_via: "Learning Platform" +feedback_date: +feedback_method: "Written Feedback via LMS" +wordlimit: 1500 +short: A report on aspects of cyber security +ilos: + - 1. Identify a range of cyber security threats faced by individuals + and organisations. + - 2. Evaluate prevention, identification and mitigation methods + appropriate to a variety of security scenarios + - 3. Demonstrate an understanding of the legal and ethical issues + surrounding cyber security + --- -# Overview +# Task and Mark Distribution + ## Assessment Brief -The assessment requires students to individually produce a security -assessment of an organisation. The output will be in the form of a +The assessment requires students to **individually** produce a security +assessment of common threats to an organisation. The output will be in the form of a report of approximately 1500 words. -The submission deadline is 16/4/2020 - - -## Learning Outcomes - - 1. Identify a range of cyber security threats faced by individuals - and organisations. - 2. Evaluate prevention, identification and mitigation methods - appropriate to a variety of security scenarios - 3. Demonstrate an understanding of the legal and ethical issues - surrounding cyber security - - -# Coursework - -## Scenario - -The Cirrus Cybernetic Corporation is an organisation that develops -next generation robotics. - -The organisation has several hundred employees, and includes departments for: - - Management - - HR - - Accounting - - Maintenance - -The organisation has a Website, showing company information, and -providing "Chat" and Forums for Customers to ask questions. - -There is also a staff Portal accessible VIA the web interface. The -staff portal allows authenticated staff members to search and display -customer account information. Access to the staff area is through a -single sign on system (IE the staff member has the same Username and -password for their Desktop PC and the Intranet) - -Recently there was a web security incident, where an attacker was able -to access the organisation database. The initial analysis of the -attack suggests that it was launched from somewhere inside the company -network. ## Tasks -You have been asked to develop a report on the security of the -organisation above. All of the information you require about the -organisation is given in the "Scenario" section, although you are -expected to do some research on cyber security issues that might -relate to the organisation. +For this coursework, you will need to provide a written report on **TWO** of these topics, +and how they could effect a business, or the people working within it. This report should be written at a high level, suitable for a non-technical management audience. Your report should focus on two @@ -70,11 +57,16 @@ selected aspects of your choice, one each of: Foe each aspect, select *ONE* factor (for example, Phishing, or a specific Web vulnerability) that is a threat to the organisation, and give details of: + - What the Threat is - How the threat occurs - Examples of the Threat in the Real world - Suggestions to mitigate the threat. +You are expected to do some research on cyber security issues that might +relate to an organisation, and use them to contextualise the issues you have discussed. + + ## Marking Scheme ### Report Contents (90%) @@ -118,3 +110,4 @@ specific Web vulnerability) that is a threat to the organisation, and give detai | 70+ | work exceeds the standard expected | | 80+ | All work substantially exceeds the standard expected | + diff --git a/labs/Session1_Introduction/IntroSlides.md b/labs/Session1_Introduction/IntroSlides.md index 7f6cc23..363ff6e 100644 --- a/labs/Session1_Introduction/IntroSlides.md +++ b/labs/Session1_Introduction/IntroSlides.md @@ -20,7 +20,7 @@ email: 'aa9863@coventry.ac.uk' ## Course Team - Dan Goldsmith (aa9863@coventry.ac.uk) - - James Shuttleworth (csx239@coventry.ac.uk) + ## About Dan @@ -30,12 +30,6 @@ email: 'aa9863@coventry.ac.uk' - Reverse Engineering - Malware and Exploit Development. -## About James - - Not a hacker in the modern sense of the word. Prefer's the term - "spicy computer scientist." - - Absolutely a hacker in the old sense of the word. Someone who - likes to make computers do interesting things. - # How will you be taught? ## No Lectures diff --git a/labs/Session1_Introduction/Lab1.md b/labs/Session1_Introduction/Lab1.md index a95db43..28016de 100644 --- a/labs/Session1_Introduction/Lab1.md +++ b/labs/Session1_Introduction/Lab1.md @@ -12,7 +12,7 @@ In this lab we are going to take a closer look at these factors. ## Scenario > You have just got a new job as Junior Security Analyst -> as the Shinra Electric Power compmany. Your role is to help the +> as the Shinra Electric Power company. Your role is to help the > organisation understand and mitigate cyber security threats to its > infrastructure.