The Blog

Cyber Operations Assignment Briefing Sheet

Cyber Operations Assignment Briefing Sheet

Assignment Briefing Sheet (2020/21 Academic Year) Section A: Assignment title, important dates and weighting Assignment title:7COM1069 REF/DEF 2 AssignmentGroup or individual: Individual Module title: Cyber OperationsModule code:7COM1068 Module leader: Stilianos Vidalis Moderator’s initials: Submission deadline:28.06.2021 23:50Target date for return of marked assignment:02.07.2021 You are expected to spend about15hours to complete this assignment to a satisfactory standard. This assignment is worth50%of the overall assessment for this module. Section B: Student(s) to complete Student ID numberYear Code Notes for students For undergraduate modules, a score above 40% represent a pass performance at honours level. For postgraduate modules, a score of 50% or above represents a pass mark. Late submission of any item of coursework for each day or part thereof (or for hard copy submission only, working day or part thereof) for up to five days after the published deadline, coursework relating to modules at Levels 0, 4, 5, 6 submitted late (including deferred coursework, but with the exception of referred coursework), will have the numeric grade reduced by 10 grade points until or unless the numeric grade reaches or is 40. Where the numeric grade awarded for the assessment is less than 40, no lateness penalty will be applied.

See another question tackled by our nursing writing experts on Member’s Performance Shortcomings N890

Late submission of referred coursework will automatically be awarded a grade of zero (0). Coursework (including deferred coursework) submitted later than five days (five working days in the case of hard copy submission) after the published deadline will be awarded a grade of zero (0). Regulations governing assessment offences including Plagiarism and Collusion are available from https://www.herts.ac.uk/about-us/governance/university-policies-and-regulations-uprs/uprs (please refer to UPR AS14) Guidance on avoiding plagiarism can be found here: https://herts.instructure.com/courses/61421/pages/referencing-avoiding-plagiarism?module_item_id=779436 Modules may have several components of assessment and may require a pass in all elements. For further details, please consult the relevant Module Handbook (available on Studynet/Canvas, under Module Information) or ask the Module Leader. Assignment Briefing Sheet (2020/21 Academic Year) This Assignment assesses the following module Learning Outcomes (from Definitive Module Document):Develop a deep and systematic understanding and knowledge of Information Environments in terms of deterrence, detection, protection and reaction to access, Critically reflect on the implementation and management of offensive Cyber Operations at all levels, Design and undertake substantial investigations under the context of situational awareness, Demonstrate self-direction and creativity in designing and developing a cyber defence environmentAssignment Brief: This is an individual assessment. It is expected that the report will be in the region of 1500 words.You are expected to conduct an analysis of the network packet capture that will be made available to you, using Wireshark. You are required to present your findings in a factual manner to convince decision makers of a large corporation on business strategies.The capture file will be made available to you through Canvas. You will have to use Wireshark from your own device.The deadline is on the 28.06.2021 by electronic submission via Canvas.Please see the table underneath for the expected structure of the report and for the breakdown of the mark allocation. Although there are no allocated marks for references and bibliography you are expected to use appropriate peer reviewed sources for supporting your arguments, and an appropriate referencing style as per the University regulations.Assignment 2 Structure and Criteria Mark Available Statistical analysis (network boundaries, active nodes, external sources, type of traffic and protocols) 20 Activity narrative and attack identification (of one attacker) 20 Attack explanation (of one attacker) 10 Total 50Submission Requirements: You are required to submit a PDF report using the submission link provided on Canvas. You are expected to demonstrate an insight into the implications of the problem introduced in each task by using clear and concise arguments. The report should be well written, showing good skills in creativity and design. Sentences should be of an appropriate length and the writing style should be brief but informative. Remember, cyber operators report on facts and avoid comments and generalisations!Marks awarded for:Please see last page for what the assessors will be looking for in your reports. A rubric will be provided on Canvas.Type of Feedback to be given for this assignment:In-course formative feedback and individual personalised summative feedback. Formative feedback will be given for assignment through Canvas and during the scheduled sessions as per the module delivery plan. Individual personalised summative feedback will be given through Canvas for the final submission. Every week, Review & Reflection questions related to the assessment activities will be posted on Canvas. These questions will help you to reflect on the activities you will be undertaking as part of the assessed work for the module, self-assess your work as you progress through the module and help you understand the subject better.Feedback is not just the marks and the commentary at the end of the module – it is also the regular verbal advice about your work as you undertake the scheduled activities. If you fail to participate to the scheduled sessions and you fail to engage with the class and with the instructors, you will not receive feedback. Overall Grade Description The follow descriptions provide the characteristics that would define achievement at the stated levels. CriteriaFail (< 40)Marginal Fail (40 – 49)Pass (50 – 59)Good (60 – 69)Excellent (>70)No statistical analysis (or analysis is wrong). No attack identification. No attack explanation. Very week report structure. Lack of originality.Statistical analysis is undertaken but it may contain mistakes. One attack has been identified. Vague explanation of one attack. Report structure is not appropriate.Complete statistical analysis. One attack is clearly identified and explained but link with the pcap file is weak.Very good level of knowledge & understanding is demonstrated. Complete statistical analysis. Report provides complete identification of one attack and comprehensive explanation. Link with pcap file and evidence of the analysis are very strong. Analysis may contain some errors.High academic learning ability achieved with excellent understanding of the various attacks, demonstrating professionalism and methodological thinking in conducting the analysis. Highly developed piece of work. No errors.

Is this the question you were looking for? If so, place your order here to get started!