Written Assignment
How-To Guide
The Written Assignment represents 60% of the overall course grade.
Instructions
The Written Assignment essay should be completed at the conclusion of the course, once all sessions have been completed. The submission date is approximately two weeks after the final session of the course; please check the course details for the exact date.
The goal of the essay is to demonstrate how you are thinking about putting course concepts, models, tools and practices in your own context to demonstrate the course learning outcomes:
- Demonstrate an understanding of and apply key (fundamental) concepts and principles in network application and mobile
- Identify security threats to, and weaknesses of, network solutions and deployments— both external and
- Demonstrate an understanding of the evolution of the internet, cryptography and authentication.
- Analyse the capabilities of network protection, threat remediation solutions and managing
- Define and enforce risk assessment, compliance, auditing and policy
- Demonstrate an understanding of the fundamental concepts of penetration testing and ethical
- Demonstrate an understanding of the concepts of digital forensics and opensource intelligence.
The essay should contain approximately 3,000 words. The title is “Applying Cybersecurity Principles in My Personal and Professional Life”.
Taking six of the topics you have studied in the course, discuss how you have applied or plan to apply the principles in your personal or professional digital life. How are you using the principles you have learned about to practically secure your devices/data or minimise the impact of an attack? If you do suffer an attack, how is the impact minimised? How do you plan to expand on your learning and stay up to date with new threats?
- ThreatLandscape
- Cryptography
- Passwords &Authentication
- Malware
- Networking &Communications
- Network, Application & MobileSecurity
- Risk Management
- Introduction To PenetrationTesting
- DigitalForensics
- Open-Source Intelligence (OSINT) & SocialEngineering
- Business Continuity & DisasterRecovery
- Compliance, Certifications &Resources
How You Will Be Assessed
The following rubric describes how the essay will be assessed:
1.Demonstrate an understanding of and apply key (fundamental) concepts and principles in network application and mobile security. | 2. Show clear understanding of how to minimise cyber security risk in a professional or personal environment. | 3. Show clear understanding of how to minimise the impact of a cyber security attack in a professional or personal environment. | 4. Demonstrate reflection on own experience, practice and planned professional development as a result of this course | |
Distinction | Demonstrates strong ability to insightfully apply cybersecurity fundamentals of real-life contexts, with an excellent level of detail and originality. | Demonstrates strong ability to apply learning from the course to anticipate and counter problems and optimise results. Plans are actionable, refined, detailed and appropriate. | Demonstrates strong ability to apply learning from the course to anticipate and counter problems and optimise results. | Very insightful and informed throughout, original, personalised and with excellent use of relevant examples. |
Merit | Able to apply cyber security fundamentals to real life contexts in a relevant way, and with a good level of analysis. | Able to apply learning from course analytically and suggest and describe actions to address a range of anticipated problems. | Able to apply learning from course analytically and suggest and describe actions to address a range of anticipated problems. | A very good level of reflection on own personal traits and patterns of behaviour. |
Pass | Adequate use of cyber security fundamentals in description of scenarios, with some good analysis. | Makes adequate use of course learning to describe an approach to cybersecurity that is generally effective. | Makes adequate use of course learning to describe an approach to cybersecurity that is generally effective. | A very good level of reflection on own personal traits and patterns of behaviour. |
Unsatisfactory | Response is partial or tangential.
Requires greater depth, level of detail and discussion. |
Inadequate application of course learning in discussing practical issues. | Inadequate application of course learning in anticipating issues. | Lacks level of detail required. Tends towards surface description and may lack originality. |
Clear fail | Little evidence of knowledge of cyber security fundamentals. | Little evidence of ability to apply key course concepts in practice. | Little evidence of ability to apply key course concepts in practice. | Very little evidence of self-reflection discernible in the response. |