Write My Paper Button

WhatsApp Widget

Cyber Security and Analytics | My Assignment Tutor

T1 2021 Assignment 1 Details and Submission GuidelinesUnit CodeMN623 – T1 2021Unit TitleCyber Security and AnalyticsAssessment TypeIndividual AssignmentAssessment TitleImplementation and evaluation of penetration testing toolsPurpose of the assessment (with ULO Mapping)This assignment assesses the following Unit Learning Outcomes; students should be able to demonstrate their achievements in them. b. Implement and evaluate security testing tools … Continue reading “Cyber Security and Analytics | My Assignment Tutor”

T1 2021 Assignment 1 Details and Submission GuidelinesUnit CodeMN623 – T1 2021Unit TitleCyber Security and AnalyticsAssessment TypeIndividual AssignmentAssessment TitleImplementation and evaluation of penetration testing toolsPurpose of the assessment (with ULO Mapping)This assignment assesses the following Unit Learning Outcomes; students should be able to demonstrate their achievements in them. b. Implement and evaluate security testing tools in a realistic computing environmentWeightAssignment 1a – 5% Assignment 1b – 10%Total MarksAssignment 1a – 20 Marks Assignment 1b – 55 MarksWord limitNot applicableDue DateAssignment 1a- Week 3, Sunday 11:55 pm, 11th April 2021 Assignment 1b- Week 7, Tuesday 11:55 pm, 4th May 2021Submission GuidelinesSubmit Assignment 1a in a word document in week 3. Submit Assignment 1b as a word document containing only video link in week 7. All work must be submitted on Moodle by the due date (week 3 for Assignment 1a and Week 7 for Assignment 1b) along with a completed Assignment Cover Page. The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body) font and 2 cm margins on all four sides of your page with appropriate section headings. Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using IEEE Transactions on Networking referencing style. Students must ensure before submission of final version of the assignment that the similarity percentage as computed by Turnitin has to be less than 10%. Assignments with more than 10% similarity may not be considered for marking.ExtensionIf an extension of time to submit work is required, a Special Consideration Application must be submitted directly through AMS. You must submit this application within three working days of the assessment due date.Academic MisconductAcademic Misconduct is a serious offence. Depending on the seriousness of the case, penalties can vary from a written warning or zero marks to exclusion from the course or rescinding the degree. Students should make themselves familiar with the full policy and procedure available athttps://www.mit.edu.au/about– mit/institute-publications/policies-procedures-and- guidelines/AcademicIntegrityPolicyAndProcedure, For further information, please refer to the Academic Integrity Section in your Unit Description. Dr Dr. Dr Deepani Guruge Purpose of the Assignment: The Assignment 1 focuses on implementing and evaluating security testing tools in a realistic computing environment. It helps the students to learn how to perform hacking/penetration testing. The students will demonstrate how a target system works, the weaknesses in the system, how to exploit those weaknesses and hack the system, and how to secure the system from the discussed weaknesses. By doing this assignment, students will learn to evaluate and applies contemporary intelligent cyber security solutions for enterprise use which will definitely act as a stimulus for work integrating learning. By the end of the assignment, the students will have a strong base and a good understanding of hacking/penetration testing, so they can be able to combine the techniques learnt and tailor them to suit different scenarios. This assignment will be a stepping stone for the students to be work force ready for the booming cyber security industry. Assignment Structure and submission guidelines: Assignment 1 being formative assessment is divided into two parts. In the first part – Assignment 1a, focuses on importance of penetration testing, industry leading tools used for penetration testing and review a minimum of 3 security testing tools. Justify why you choose to explore the 2 security testing tools you will be implementing in Assignment 1B after reviewing a minimum of 3 security testing tools; that is marked for 5% of the total marks and the second part is an extension of first part along with understanding and implementation of security tools covering the remaining 10% of the total marks. In the second part- Assignment 1b, the students are required to demonstrate building a Software Test platform, explore, implement and evaluate 2 security tools. Students have to submit the first part by the Week 3. Once the first part is marked and a constructive feedback is provided, the responses to the comments/feedback has to be tabulated and appended to Assignment 1b that would be submitted in video presentation by the Week 7. You have to write a report for Assignment 1a. For Assignment 1b, a video presentation is required. Assignment 1 b Specifications and Submission Guidelines Length of Video: The total length of the video presentation should not be more than 9 minutes (marks would be deducted for over-length presentation). You may use any of the available open source software for making video presentation. Submission Guidelines: Name your video with your student number and name.Upload Video on yourYouTube accountCopy the Video Link to a file(word document)andUpload the word document with only the video link in the Assignment 1b into the MOODLE To upload on YouTube, you must create your account on YouTube. If you have a google account (Gmail), you already have one on YouTube. Videos must be of one of the following formats: .MOV, .MPEG4, MP4, .AVI, .WMV, .MPEGPS, .FLV, .3GPP, and .WebM. Once you have an account, to upload your video, click on the ‘upload’ button located at the top right-hand corner of your youtube.com webpage. To keep your uploaded video unsearchable by people so that random people cannot view your video(s), you have to select the privacy mode from the drop-down menu on the upload screen to be ‘Unlisted’. This way, your video is viewable by only those who have got the URL of your video. Make sure you copy and paste your video URL in the file submitted on MOODLE for your marker to be able to watch and mark it. Note: Marks will be awarded based on the sophistication of security testing tools implementation and the difficulties in regards to the demonstration explored. Steps required to submit Assignment 1B Please note that you need to submit only one video link (the Video URL/link) in a .DOC (Word Document) file and upload on MOODLE as the requirement of Assignment 1B. The total length of the video presentation should not be more than 9 minutes. The Video presentation contents in the Video URL/Link must contain the following steps: Step 1: Q5) Addressing the feedback provided in Part 1 (Assignment 1a) of the assignment; use .PPT (PowerPoint Presentation) file. Step 2: Q6) The students will implement and demonstrate how a target system works, the weaknesses in the system, how to exploit those weaknesses and hack the system using the 2 security testing tools you choose.; use live working on a Software Test Platform to demonstrate these 2 security testing tools. Step 3: Q7) Evaluate the two implemented security testing tools. use .PPT (PowerPoint Presentation) file. Step 4: The video presentation should end with last slide with use of .PPT (PowerPoint Presentation) file, and you need to put 10 references in total as requirement of the Assignment 1. Assignment 1a Questions to be addressed Describe the importance of penetration testing? 5 Marks There are several security testing tools available in the market. Present the industry leading tools used for penetration testing? 5 Marks You have to review a minimum of 3 security testing tools. Justify why you choose to explore the 2 security testing tools, you will be implementing in Assignment 1B after reviewing a minimum of 3 security testing tools? 5 + 3 Marks = 8 Marks References 2 Marks 7) Evaluate the two implemented security testing tools.8 Marks8) References2 Marks Assignment 1B Questions to be addressed in Video Presentation Addressing the feedback provided in Part 1 (Assignment 1a) of the assignment 5 Marks The students will implement and demonstrate building a Software Test platform, the weaknesses in the system, how to exploit those weaknesses and hack the system using the 2 security testing tools you choose. 10 + 10 + 10 Marks = 30 Marks 9)Demo and Viva will be conducted in week 6 and week 7 lab classes. 10 Marks Marking criteria: QuestionsDescriptionMarksAssignment 1a ReferencingDescribe the importance of penetration testing? Present the industry leading tools used for penetration testing? You have to review a minimum of 3 security testing tools. Justify why you choose to explore the 2 security testing tools you will be implementing in Assignment 1B after reviewing a minimum of 3 security testing tools? Follow IEEE Transactions on Networking reference style (should have both in-text citation and reference list) Minimum of 5 references for this Assignment 1a (2 marks).5 Marks 5 Marks 8 Marks 2 MarksAssignment 1b ReferencingAddressing the feedback provided in Part 1 (Assignment 1a) of the assignment The students will implement and demonstrate building a Software Test platform, the weaknesses in the system, how to exploit those weaknesses and hack the system using the 2 security testing tools you choose. Evaluate the two implemented security testing tools. You need to put 10 references in total as requirement of the Assignment 1. Note: The literature review should have minimum of ten journal/ conference papers (No blogs or Wikipedia to be considered) is required for both parts of Assignment 1. The reference papers used in this assignment need to focus on the recent research (last 2-5 years), but will also include older, more foundational papers for certain topics.5 Marks 30 Marks 8 Marks2 MarksAssignment 1b Demo and VivaStudents remaining absent for Demo and Viva will lose 40% of the scored marks. Demo and Viva will be conducted in week 6 and week 7 lab classes.10 MarksTotal Marks (Assignment 1a + Assignment 1b)75 Marks Marking Rubric GradesHDDCreditPN (fail)Assignment 1aAll the points are pertinent and covered in detail and provide good summary of the literature and activity performed in the assessment.Mostly points are pertinent and covered in detail and provide good summary of the literature and activity performed in the assessment.Many points are pertinent and covered in detail and provide summary of the literature and activity performed in the assessment.Few points are pertinent and covered in detail and provide outline of the literature and activity performed in the assessment.Many points are not pertinent and not clear and summary is not provided for the activity.Assignment 1bDemonstrated excellent ability to think critically and sourced reference materials appropriatelyDemonstrated good ability to think critically and but did not sourced reference materials appropriatelyDemonstrated ability to think critically and did not sourced reference materials appropriatelyDemonstrated ability to think critically and but did not sourced reference materials appropriatelyDid not demonstrated ability to think critically and but did not sourced reference materials appropriatelyAssignment 1a + Assignment 1bAll elements are present and very well integratedComponents with good cohesionComponents presented are mostly well integratedMost components are presentNot adequately presentedDemo and Viva VoceUnderstanding is clear and easy to follow with strong argumentsGood Consistent logical and convincing argumentsSome consistent logical and convincing argumentsAdequate cohesion and not satisfactoryArgument is confused and disjointedIEEE Reference styleClearly and completely followed IEEE style for citation (within) and references (at theend of) the document, number of citation is not accounted for.Minor in- corrections but followed IEEE style for citation (within) and references (at the end of) the document, number of citation is not accounted for.Some in- corrections but followed IEEE style for citation (within) and references (at the end of) the document, number of citation is not accounted forMany in- corrections and not followed IEEE style for citation (within) and references (at the end of) the document, number of citation is not accounted forNo Referencing/ citation present at all

CLAIM YOUR 30% OFF TODAY

X
Don`t copy text!
WeCreativez WhatsApp Support
Our customer support team is here to answer your questions. Ask us anything!
???? Hi, how can I help?