7:50 • Search
< BIS3004 Assessment Br…
3
4APIC co—
Task-3, Discuss with clear demonstration, how the steganography and access control techniques that you conducted in Task-1 and Task-2, respectively, can achieve confidentiality, integrity, and availability (CIA). You have to provide justification during your discussion.
Submission 1. You have to submit a report in word format file include your answers for Task-1, Task-2 and Task-3 with the required screenshots for Task-1 and Task-2. You have to include cover page that include group student ID and full name. 2. You have also to submit the created audio file that embedded your group information text file for Task-1 (make sure to use: security as passphrase) The two files must be submitted separately not in single compress file.
Marking Information: The applied project will be marked out of 100 and will be weighted 30% of the total unit rnark.
Marking Criteria
Not satisfactory (0-49%) of the criterion rnark)
Satisfactory (50-64%) of the criterion mark
Good (65-74%) of the criterion mark
Very Good (75-84%) of the criterion rnark
Excellent (85-100%) of the criterion mark
Audio the Lack of evidence of using Audio file not includes Audio file includes Audio file includes Audio file correctly embedded text fiie the Steghide for the embedded test file text file but with text file but didn’t includes group details. irrelevant information include all the group io mark) Satuedgiaonfoi, gersaupbhryn wiitohnno to student group. information.
Stegae;osgarry Screenshot (15 mark)
Lack of evidence of understanding of the process of Steganography with no screenshot
Screenshot is provided with not complete or not using Steghide.
Screenshot is provided using Steghide with settings errors
Screenshot is provided using Steghide with some incorrect settings.
Screenshot is provided using Steghide with correct result.
Directory creation (15 mark)
Lack of evidence of understanding the Linux cornmands for directory creation and access.
Very brief demonstration of using Linux commands for directory creation and access.
Evidence of good understanding and demonstration of using Linux commands for directory creation and access.
Very clear understanding and demonstration of using Linux commands for directory creation and access.
Excellent understanding and demonstration of using Linux commands for directory creation and access.
Users creation (15 mark)
Lack of evidence of understanding of the process of users creation and required permission
Very brief demonstration of using Linux commands for users creation and required permission
Evidence of good understanding and demonstration of using Linux commands for users creation and required permission
Very clear understanding and demonstration of using Linux commands for users creation and required permission
Excellent understanding and demonstration of using Linux commands for users and required permission
Group creation (15 mark)
Lack of evidence of understanding of the cPrre’a7i sonclatngcrl euqP. e d permission
Very brief demonstration of using Linux commands for group creation and required permission
Evidence of good understanding and demonstration of using Linux commands for group creation and required permission
Very clear understanding and demonstration of using Linux commands for group creation and required permission
Excellent understanding and demonstration of using Linux commands for group creation and required permission
Sydney
Ynneapidollege.edd.e.
40 API C
Achieving CIA in Steganography (15 marks)
Poor discussion with rrelevant information.
Brief discussion about achieving CIA in Steganography with imited demonstration and justification.
Dashboard Calendar
Generally good discussion about achieving CIA in Steganography with good demonstration and justification.
To Do
Very clear discussion of achieving CIA in Steganography with clear demonstration and justification.
Notifications
A very detailed and very clear discussion of achieving CIA in Steganography with very good demonstration and ustification.
r2)
Inbox