RECENT ASSIGNMENT

Tweet Share WhatsApp Share
GET ANSWERS / LIVE CHAT


Assignment - 2
Value: 20%
Due date: 21-Aug-2015
Return date: 11-Sep-2015
Submission method options
Alternative submission method
Task
Part A : 30 Marks
Answer the following questions :
1. Search the web for news on computer security breaches that occurred during April-August 2015. Research one such reported incident. Prepare a report focusing on what the problem was, how and why it occurred and what are the possible solutions. - 15 Marks
Length: Around 800 words

2. Explain why asynchronous I/O activity is a problem with many memory protection schemes, including base/bounds and paging. Suggest a solution to the problem. - 15 Marks

Length: Around 600 words

Part B : 20 Marks
1. Research the 2011 Sony PlayStation Network outage case on the web and prepare a report focusing on the following questions:
• What was the problem?
• Who were affected and how?
• How was the attack carried out?
• What could have been done to prevent the attack?

Length: Around 900 words

Rationale
This assessment task is based on the following topics discussed in the subject: the overview of Information security fundamentals, security threats, cryptography, malicious software and its countermeasures, operating system security and software security .
The assessment task is aligned with the following learning outcomes of the subject:
On successful completion of this subject, students will
• be able to justify security goals and the importance of maintaining the secure computing environment against digital threats;
• be able to explain the fundamental concepts of cryptographic algorithms;
• be able to examine malicious activities that may affect the security of a computer program and justify the choice of various controls to mitigate threats.
• be able to compare and contrast the security mechanisms of a trusted operating system with those used in a general purpose operating system;
Marking criteria
Assessment criteria
PART A : 30 marks
Assessable Components HD
100% - 85% DI
84% - 75% CR
74% - 65% PS
64% - 50% FL
49% - 0
Q.1 (15 marks)
Search the web for news on computer security breaches that occurred during April-August 2015. Research one such reported incident. Prepare a report focusing on what the problem was, how and why it occurred and what are the possible solutions.
1. Comprehensive report addressing all criteria. Evidence of in-depth research.
(Value: 95%)
2. Referenced a wide range of appropriate sources.
Referencing style correctly used.
(Value: 5%)
1. Comprehensive report addressing all criteria. Evidence of in-depth research. Minor omissions only.
(Value: 95%)
2. Referenced a range of appropriate sources. Referencing style correctly used. Minor errors only.
(Value: 5%)
1. Mostly well-researched and well-presented report addressing all criteria. Some omissions.
(Value: 95%)
2. Referenced a range of appropriate sources.
Referencing style correctly used. Some errors and omissions.
(Value: 5%)
1. Partially complete report addressing most of the criteria. Evidence of research. Some omissions.
(Value: 95%)
2. Referenced some appropriate sources.
Referencing style mostly correctly used. Some errors and omissions.
(Value: 5%)
1. Major omissions or incorrect answers.
(Value: 95%)
2. Either no evidence of literature being consulted or cited references irrelevant to the assignment set. Major errors in referencing style.
(Value: 5%)
Possible marks 15.0 – 12.75 12.6 – 11.25 11.10 – 9.75 9.60 – 7.5 7.35 – 0
Q.2 (15 marks)
Explain why asynchronous I/O activity is a problem with many memory protection schemes, including base/bounds and paging. Suggest a solution to the problem.
1. Correct and in depth explanation of the problem.

Viable solution provided with complete details.
(Value: 95%)

2. Supporting reference/(s); fluent writing style appropriate to assignment with proper in text citation.
(Value: 5%) 1. Comprehensive and correct explanation of the problem.
Viable solution provided with complete details.
Very minor omissions only.
(Value: 95%)

2. Supporting reference/(s); fluent writing style appropriate to assignment with proper in text citation.
(Value: 5%) 1. Correct explanation of the problem with some details.
Viable solution provided.

Some omissions.
(Value: 95%)

2. Supporting reference/(s); fluent writing style appropriate to assignment with proper in text citation. Minor omissions.
(Value: 5%) 1. Mostly correct explanation and solution.

Minor errors.
(Value: 95%)
2. Supporting reference/(s); writing style appropriate to assignment with proper in text citation. Some omissions.
(Value: 5%) 1. Major omissions or incorrect answers.
(Value: 95%)
2. Either no evidence of literature being consulted or cited references irrelevant to the assessment set. Major errors in referencing style.
(Value: 5%)

Possible marks 15.0 – 12.75 12.6 – 11.25 11.10 – 9.75 9.60 – 7.5 7.35 – 0
PART B: 20 marks
Q.1 (20 marks)

Research the 2011 Sony PlayStation Network outage case on the web and prepare a report focusing on the following questions:
• What was the problem?
• Who were affected and how?
• How was the attack carried out?
• What could have been done to prevent the attack? 1. Comprehensive report addressing all criteria. Evidence of in-depth research.
(Value: 95%)
2. Referenced a wide range of appropriate sources.
Referencing style correctly used.
(Value: 5%)

1. Comprehensive report addressing all criteria. Evidence of in-depth research. Minor omissions only.
(Value: 95%)

2. Referenced a range of appropriate sources. Referencing style correctly used. Minor errors only.
(Value: 5%)
1. Mostly well-researched and well-presented report addressing all criteria. Some omissions.
(Value: 95%)

2. Referenced a range of appropriate sources.

Referencing style correctly used. Some errors and omissions.
(Value: 5%)
1. Partially complete report addressing most of the criteria. Evidence of research. Some omissions.
(Value: 95%)

2. Referenced some appropriate sources.

Referencing style mostly correctly used. Some errors and omissions.
(Value: 5%)
1. Major omissions or incorrect answers.
(Value: 95%)

2. Either no evidence of literature being consulted or cited references irrelevant to the assignment set. Major errors in referencing style.
(Value: 5%)
Possible marks 20.0 – 17 16.9 – 15 14.9 – 13 12.9 – 10 9.4 – 0

Presentation
• You are recommended to write the answers in a word document and submit it via Turnitin. You can also submit your document in pdf format as well.
• Your answers to the questions should be precise but complete and informative.
• Each question should be answered individually with the corresponding label to indicate the tasks completed e.g. Task 1 a.
• APA reference style must be used throughout the document with the bibliography not counted in the page limit. APA referencing guide can be found in http://student.csu.edu.au/study/referencing-at-csu
• A cover page must be included and should contain relevant identifying information.
Se this book for atleast two refrences.
• Security in Computing, Fourth Edition
• By: Charles P.Pfleeger Consulting Group Pfleeger; Shari LawrenceRAND Corporation Pfleeger
• Publisher: Prentice Hall
• Pub. Date: October 13, 2006
• Print ISBN-10: 0-13-239077-9
• Print ISBN-13: 978-0-13-239077-4
• Pages in Print Edition: 880
• Subscriber Rating: [4 Ratings] Subscriber Reviews



GET ANSWERS / LIVE CHAT