CMP71001: Cybersecurity S2/2018
Student:
Criteria | Marks | Mark break down |
Mark Received |
Feedback | Note to the student | Note to the marker |
Task1 | 12 | partial marks of 0.5(s) can be given to incomplete but correct answers |
||||
Identify the most critical components of the university’s information system – the critical information assets |
3 | Access control is a critical component of any information system. WFA can help to identify the most critical component. If you don’t use WFA, provide arguments to justify your choice of the critical components. |
||||
Identify what threats the BYOD policy may bring to the identified critical assets |
3 | Do not bring in any threats. Think about BYOD policy. | ||||
Identify potential vulnerabilities of each asset against the identified threats |
3 | Use TVA worksheet to document this process. | ||||
Assess the risk to the university’s information system. |
3 | You can use either quantitative or qualitative risk assessment method. |
||||
Task 2 | 10 | |||||
Clearly explains the working principle of the certificate-based authentication. |
3 | |||||
Compare and contrast the certificate based authentication and password-based authentication. |
3 | |||||
Correctly identify and highlight the useful features of the certificate-based authentication for BYOD policy. |
3 | |||||
Quality of references | 1 | Reference from reputable sources e.g. textbook, research papers, technical reports. |
||||
Task 3 | 8 | |||||
Correctly identify the characteristics of a Spam and Spamming act. |
2 | |||||
Provide three representative examples of Spams |
3 | |||||
Spam handling instruction | 3 | |||||
Total | 30 | 0 | ||||
General feedback: |
Assignment-2 Marking Guide
The post Access control is a critical appeared first on My Assignment Tutor.
-
- Assignment status: Resolved by our Writing Team
- Source@PrimeWritersBay.com
Comments
Post a Comment