diff --git a/.gitignore b/.gitignore index 364125f..80292fe 100644 --- a/.gitignore +++ b/.gitignore @@ -1,3 +1,4 @@ env site -*~ \ No newline at end of file +*~ +.cache \ No newline at end of file diff --git a/docs/assessment/ExampleCW.html b/docs/assessment/ExampleCW.html deleted file mode 100644 index a3dcfbf..0000000 --- a/docs/assessment/ExampleCW.html +++ /dev/null @@ -1,397 +0,0 @@ - - - - - - - - - - - - - - - - - - - - 245CT CW 1: Vulnerability Report - - - - -
-
- -
- This document is for Coventry University students for - their own use in completing their assessed work for - this module and should not be passed to third parties - or posted on any website. Any infringements of this - rule should be reported to - facultyregistry.eec@coventry.ac.uk. -
-
-
- - -
- -
- - -
- Cov Uni Logo -
-
-

Faculty of engineering, Environment and Computing

-
-
- - -
-
-

Module: 245CT Ethical Hacking 1

-
Assignment Brief
-
-
- - -
-
-
-
Module Title:
- Ethical Hacking 1 -
-
-
Group / Indivudual
- - Individual - -
-
-
Cohort
- Jan -
-
-
Module Code
- 245CT -
-
- -
-
-
Coursework Title
- CW 1: Vulnerability Report -
-
-
Handout Date
- 25/1/2021 -
-
- -
-
-
Lecturer
- Dan Goldsmith -
-
-
Due Date and Time
- 4/3/2021 -
-
- -
-
-
Estimated Time (hrs)
- 20 Hours -
-
-
Coursework Type
- Report -
-
- - -
% of Module Mark
- 40% - -
-
- - -
- -
-
Submission Arrangements
-

Via: Moodle

-

Marks release expected: None

-

Feedback Method: Individual Feedback Via Turnitin / Aula

- -

Word limit: 2000

- -
-
-
- - -
- -
-

Module Learning Outcomes Assessed

-
    - -
  • 1. Describe and demonstrate the aspects of penetration testing and vulnerability assessment relating to technical implementation, common practices, legality and ethics
  • - -
  • 2. Identify, describe and compare a range of different types of digital security threat and indicate how they are exploited and mitigated
  • - -
  • 3. Use appropriate tools to discover the structure of a network and the characteristics of the devices connected to it
  • - -
-
-
- -
- -
-

Task and Mark Distribution

-

There are many aspects to Ethical Hacking. Aside from the obvious technical -skills, you will also be required to report on penetration tests.

-

The ability to report your findings, contextualise threats within the wider -cyber security field, and reflect upon the process is a key skill. -In this coursework, you are required to write a report on the topics studied -during the lab sessions for the module.

-

Report Requirements

-

You will need to produce a report on TWO of the weekly topics. This can -include

-
    -
  • Reconnaissance
  • -
  • Privilege Escalation
  • -
  • Any of the Web vulnerabilities (for example XSS or SQLi).
  • -
-

Topic Discussion

-

For each of the topics you need to write a technical discussion of the topic -including:

-
    -
  1. Introduction to the topic: What it is, and why it is of interest in Cyber security
  2. -
  3. Discussion of this topic including:
      -
    • Technical / Practical implementation of the topic (How does this work)
    • -
    • Example of the topic in the "Real world"
    • -
    • Discussion of the topic in the wider security context (What does it mean - in terms of security, how common is it, how "dangerous" is the vulnerability)
    • -
    -
  4. -
  5. Considerations for mitigating this problem in general.
  6. -
  7. Social, Legal and Ethical considerations with this particular topic
  8. -
-

Marking Scheme

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ElementMarks Available
Introduction / Conclusions10
Topic 140
(Consisting of)
- Technical Implementation(10)
- Context / Example(15)
- Legal and Ethical Considerations(5)
- Mitigation(10)
Topic 240
(Marks as Topic 1)
Report Structure10
-

Suggested Report Structure

-

The recommended structure for the report is

-
    -
  1. Introduction
  2. -
  3. Discussion of topic 1 (see above)
  4. -
  5. Discussion of topic 2 (see above)
  6. -
  7. Summary
  8. -
  9. References
  10. -
-

IMPORTANT NOTE / TIP FOR SUCCESS:

-

Remember, this assignment is intended to assess your wider understanding of the -subject.

-

The bulk of the marks are awarded for the discussion element (rather -than the technical aspects). Rather than focus purely on the technical aspects -(the how), you are expected to examine WHAT this means in terms of security, and -the legal and ethical context. In many of these topics there is no clear cut -answer, so remember to strengthen your argument with relevant citations from -appropriate sources.

-

Marking Matrix

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
GradeMarkDescription
No submission0No work submitted
Fail0-25Clear failure demonstrating little understanding of relevant theories, concepts and issues. Minimal evidence of research and use of established methodologies and incomplete knowledge of the area. Serious and fundamental errors and aspects missing. No evidence of research.
Near Fail25-39Very limited understanding of relevant theories, concepts and. Little evidence of research and use of established methodologies. Some relevant material will be present. Deficiencies evident in analysis. Fundamental errors and some misunderstanding likely to be present.
Pass40-49Meets the learning outcomes with a basic understanding of relevant theories, concepts and issues.. Demonstrates an understanding of knowledge and subject-specific theories sufficient to deal with concepts. Assessment may be incomplete and with some errors. Research scope sufficient to evidence use of some established methodologies. Some irrelevant material likely to be present
2:250-59Good understanding of relevant theories, concepts and issues with some critical analysis. Research undertaken accurately using established methodologies, enquiry beyond that recommended may be present. Some errors may be present and some inclusion of irrelevant material. Good understanding, with evidence of breadth and depth, of knowledge and subject-specific theories with indications of originality and autonomy
2:160-69Very good work demonstrating strong understanding of theories, concepts and issues with clear critical analysis. Thorough research, using established methodologies accurately, beyond the recommended minimum with little, if any, irrelevant material present. Very good understanding, evidencing breadth and depth, of knowledge and subject-specific theories with some originality and autonomy.
First70-79Excellent work with clear evidence of understanding, creativity and critical/analytical skills. Thorough research well beyond the minimum recommended using methodologies beyond the usual range. Excellent understanding of knowledge and subject-specific theories with evidence of considerable originality and autonomy.
Outstanding80-90Outstanding work with high degree of understanding, creativity and critical/analytical skills. Outstanding understanding of knowledge and subject-specific theories. Evidence of outstanding research well beyond minimum recommended using a range of methodologies. Demonstrates creative flair, originality and autonomy.
Exceptional90-100Exceptional work with very high degree of understanding, creativity and critical/analytic skills. Evidence of exceptional research well beyond minimum recommended using a range of methodologies. . Exceptional understanding of knowledge and subject-specific theories. Demonstrates creative flair, a high degree of originality and autonomy.
-
-
- - -
- -
-

Notes:

-
    -
  1. 1. You are expected to use the Coventry University APA style for referencing For support and - advice on this students can contact Centre - for Academic Writing (CAW).
  2. -
  3. Please notify your registry course support team and module leader for disability support.
  4. -
  5. Any student requiring an extension or deferral should follow the - university process as outlined here. -
  6. -
  7. The University cannot take responsibility for any coursework lost or corrupted on disks, laptops - or personal computer. Students should therefore regularly back-up any work and are advised to - save it on the University system.
  8. -
  9. If there are technical or performance issues that prevent students submitting coursework through - the online coursework submission system on the day of a coursework deadline, an appropriate - extension to the coursework submission deadline will be agreed. This extension will normally be - 24 hours or the next working day if the deadline falls on a Friday or over the weekend period. - This will be communicated via your Module Leader.
  10. - -
  11. You are encouraged to check the origianlty of your work by using the draft Turnitin links on Aula
  12. -
  13. Collusion between students (where sections of your work are similar to the work submitted - by - other students in this or previous module cohorts) is taken extremely seriously and will be - reported to the academic conduct panel. This applies to both courseworks and exam answers.
  14. -
  15. A marked difference between your writing style, knowledge and skill level demonstrated in class - discussion, any test conditions and that demonstrated in a coursework assignment may result in - you having to undertake a Viva Voce in order to prove the coursework assignment is entirely your - own work.
  16. -
  17. If you make use of the services of a proof reader in your work you must keep your - original - version and make it available as a demonstration of your written efforts. Also, please read the univeristy Proof reading policy
  18. -
  19. You must not submit work for assessment that you have already submitted (partially or in full), - either for your current course or for another qualification of this university, unless this is - specifically provided for in your assignment brief or specific course or module information. - Where earlier work by you is citable, ie. it has already been published/submitted, you must - reference it clearly. Identical pieces of work submitted concurrently will also be considered to be self-plagiarism.
  20. -
- -
-
- -
- - - - - - - - - - \ No newline at end of file diff --git a/docs/assessment/ExampleCW.md b/docs/assessment/ExampleCW.md deleted file mode 100644 index ecb3d18..0000000 --- a/docs/assessment/ExampleCW.md +++ /dev/null @@ -1,126 +0,0 @@ ---- -#remarkable.exe .\Report.md -t coursework/CourseworkBrief.jinja2 -o Report.html -# Template Stuff -#template: coursework/CourseworkBrief.jinja2 - -# For MK Docs -template: coursework.html -rendername: assessment/ExampleCW.html -# Fields for the coursework -module_title: "Ethical Hacking 1" -module_code: 245CT -module_leader: Dan Goldsmith - -cohort: Jan -handout: 25/1/2021 -due: 4/3/2021 - -title: "CW 1: Vulnerability Report" -type: Report -group: false -effort: 20 Hours -percentage: 40% - -submit_via: Moodle -feedback_date: -feedback_method: Individual Feedback Via Turnitin / Aula - - -wordlimit: 2000 -short: Vulnerability Assessment Report -ilos: - - 1. Describe and demonstrate the aspects of penetration testing and - vulnerability assessment relating to technical implementation, common - practices, legality and ethics - - 2. Identify, describe and compare a range of different types of digital - security threat and indicate how they are exploited and mitigated - - 3. Use appropriate tools to discover the structure of a network and the - characteristics of the devices connected to it ---- - -# Task and Mark Distribution - -There are many aspects to Ethical Hacking. Aside from the obvious technical -skills, you will also be required to report on penetration tests. - -The ability to report your findings, contextualise threats within the wider -cyber security field, and reflect upon the process is a key skill. -In this coursework, you are required to write a report on the topics studied -during the lab sessions for the module. - -## Report Requirements - -You will need to produce a report on **TWO** of the weekly topics. This can -include - - - Reconnaissance - - Privilege Escalation - - Any of the Web vulnerabilities (for example XSS or SQLi). - -## Topic Discussion - -For each of the topics you need to write a technical discussion of the topic -including: - - 1. Introduction to the topic: What it is, and why it is of interest in Cyber security - 2. Discussion of this topic including: - - Technical / Practical implementation of the topic (How does this work) - - Example of the topic in the "Real world" - - Discussion of the topic in the wider security context (What does it mean - in terms of security, how common is it, how "dangerous" is the vulnerability) - 3. Considerations for mitigating this problem in general. - 4. Social, Legal and Ethical considerations with this particular topic - -## Marking Scheme - -| Element | Marks Available | -| ---------------------------------- | --------------- | -| **Introduction / Conclusions** | **10** | -| **Topic 1** | **40** | -| (Consisting of) | | -| - Technical Implementation | (10) | -| - Context / Example | (15) | -| - Legal and Ethical Considerations | (5) | -| - Mitigation | (10) | -| **Topic 2** | **40** | -| (Marks as Topic 1) | | -| **Report Structure** | 10 | - - -## Suggested Report Structure - -The recommended structure for the report is - - 1. Introduction - 2. Discussion of topic 1 (see above) - 3. Discussion of topic 2 (see above) - 4. Summary - 5. References - -## IMPORTANT NOTE / TIP FOR SUCCESS: - -Remember, this assignment is intended to assess your wider understanding of the -subject. - -The bulk of the marks are awarded for the discussion element (rather -than the technical aspects). Rather than focus purely on the technical aspects -(the how), you are expected to examine WHAT this means in terms of security, and -the legal and ethical context. In many of these topics there is no clear cut -answer, so remember to strengthen your argument with relevant citations from -appropriate sources. - - -## Marking Matrix - -| Grade | Mark | Description | -|----------------------|---------|---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------| -| No submission | 0 | No work submitted | -| Fail | 0-25 | Clear failure demonstrating little understanding of relevant theories, concepts and issues. Minimal evidence of research and use of established methodologies and incomplete knowledge of the area. Serious and fundamental errors and aspects missing. No evidence of research. | -| Near Fail | 25-39 | Very limited understanding of relevant theories, concepts and. Little evidence of research and use of established methodologies. Some relevant material will be present. Deficiencies evident in analysis. Fundamental errors and some misunderstanding likely to be present. | -| Pass | 40-49 | Meets the learning outcomes with a basic understanding of relevant theories, concepts and issues.. Demonstrates an understanding of knowledge and subject-specific theories sufficient to deal with concepts. Assessment may be incomplete and with some errors. Research scope sufficient to evidence use of some established methodologies. Some irrelevant material likely to be present | -| 2:2 | 50-59 | Good understanding of relevant theories, concepts and issues with some critical analysis. Research undertaken accurately using established methodologies, enquiry beyond that recommended may be present. Some errors may be present and some inclusion of irrelevant material. Good understanding, with evidence of breadth and depth, of knowledge and subject-specific theories with indications of originality and autonomy | -| 2:1 | 60-69 | Very good work demonstrating strong understanding of theories, concepts and issues with clear critical analysis. Thorough research, using established methodologies accurately, beyond the recommended minimum with little, if any, irrelevant material present. Very good understanding, evidencing breadth and depth, of knowledge and subject-specific theories with some originality and autonomy. | -| First | 70-79 | Excellent work with clear evidence of understanding, creativity and critical/analytical skills. Thorough research well beyond the minimum recommended using methodologies beyond the usual range. Excellent understanding of knowledge and subject-specific theories with evidence of considerable originality and autonomy. | -| Outstanding | 80-90 | Outstanding work with high degree of understanding, creativity and critical/analytical skills. Outstanding understanding of knowledge and subject-specific theories. Evidence of outstanding research well beyond minimum recommended using a range of methodologies. Demonstrates creative flair, originality and autonomy. | -| Exceptional | 90-100 | Exceptional work with very high degree of understanding, creativity and critical/analytic skills. Evidence of exceptional research well beyond minimum recommended using a range of methodologies. . Exceptional understanding of knowledge and subject-specific theories. Demonstrates creative flair, a high degree of originality and autonomy. | -| | | | diff --git a/docs/assessment/assessment.md b/docs/assessment/assessment.md deleted file mode 100644 index 64a7ea4..0000000 --- a/docs/assessment/assessment.md +++ /dev/null @@ -1,15 +0,0 @@ ---- -title: Assessment ---- - - -This module is assessed through **100% coursework**. - -To pass the module you must get a score of 40% or greater. - -| Component | Description | Learning Outcomes | Submission Date | -| --------- | -------------- | ----------------- | --------------- | -| CW | Security Audit | 1, 2, 3, 4 | Week 11 | - - -CW: Web application security audit. The report will be up to 2000 words. diff --git a/docs/assessment/buildAssessment.ps1 b/docs/assessment/buildAssessment.ps1 deleted file mode 100644 index 46343a2..0000000 --- a/docs/assessment/buildAssessment.ps1 +++ /dev/null @@ -1,5 +0,0 @@ -param( - [Parameter(Mandatory=$true)][string]$i -) - -remarkable -t coursework/CourseworkBrief.jinja2 $i \ No newline at end of file