COM 645 Network Security Assignment 1 Brief
COM 645 Network Security Assignment 1 Brief
Module title
COM645 Network Security
Cohort
Issue date
Module learning Critically analyse security threats in the digital world within a
outcomes professional and ethical context.
Model and design a range of modern symmetric and asymmetric
encryption problems
appropriate to modern communication systems
Apply a range of security tools and algorithms related to computer
security.
Design and synthesise security protocols and algorithms.
Critically analyse ethical issues relating to privacy and anonymity in
today’s digital society.
Justify the selection of appropriate standards in the context creating
appropriate security
Weighting 40%
Submission instructions You will work on this assignment individually and submit your IEEE-
formatted report in a single file to Moodle. On submission, a Turnitin check
will be performed automatically and unusually high levels of similarity will be
flagged to the marker. By submitting this work, you confirm that you have
read, understand and accept the university’s regulations regarding plagiarism
and agree to be dealt with accordingly if any such situation should arise.
Task details and For this assignment you are to write a report on the topic of Computer
instructions Security, you will draw upon the practical work in class and your own
research.
You are to come up with a subtitle for this report, more guidance will be given
in class.
Your paper should discuss the essential problems in around the topic you have
chosen, followed by a discussion of possible technologies that might help
overcome them. Good papers will then draw these threads together into a
coherent strategy for future technological deployment in these areas.
The final report should be 2500 words (±10%) and presented in IEEE journal
paper style (template on Moodle). Marks will be deducted for reports that are
too short, too long or in the wrong format. Final reports are to be submitted
by uploading through the Moodle link given.
Conclusions
Following this discussion, your paper must offer sensible conclusions in at
least three respects, the first two based on the discussion in the main body of
the paper, the third being reflective:
1. What is the most realistic effects of the issue your paper is discussing
(Perhaps the clearest, most coherent, or the one on which a majority
might agree?)
2. How likely is the issue(s), as determined in (1), to happen?
3. What are the limitations of your own discussions in this paper? What
assumptions have you made? What areas have you not considered?
(You will have been forced, by the word limit, to omit much
discussion; you are not at fault for this but what else should ideally
Late submissions All required work must be submitted, in full and as directed and described, by
the due time and date, to achieve marks reflecting its full worth. Work
submitted after the due time and date, but within one calendar week, will be
capped at 40%. Work more than a week late will not be marked and will be
entered as 0%.
Guidance
This will require careful planning and structuring of your work together with
efficient use of academic/scientific language.
Note the requirement for both IEEE paper formatting and referencing.
Marking criteria See the attached marking criteria for individual assessment details.
Feedback policy Individual feedback will be given through Moodle within three weeks of each
submission date.
Marking and All work is fully-marked by the module leader or a team associate. A
moderation policy representative sample of work from each cohort will be second-marked to
ensure quality and consistency.
General General discussion of drivers Insufficient general A reasonable general A good, relevant general A very good, relevant general A professional, academic
technological and obstacles to the security. discussion or insufficient discussion, relevant for the discussion, with sound discussion, with complete treatment of the general topic.
discussion and Discuss credibility of claims depth. Insufficient or most part, with some awareness and application of awareness and strong
critical analysis and counter-claims inappropriate critical awareness and application of critical analysis and evaluation application of critical
analysis and evaluation critical analysis and analysis and evaluation
evaluation
Mediating between Considering different No consideration of Limited consideration of Reasonable discussion of Sound discussion of Good discussion of conflicting
conflicting arguments and points of view. conflicting opinions. conflicting opinions and no conflicting opinions but limited conflicting opinions and opinions and mediation.
opinions Seeking balance based on mediation. mediation. reasonable mediation
evidence.
Wider social Consider impact beyond the Insufficient general A reasonable general A good, relevant general A very good, relevant general A professional, academic
impact and critical mere technological: Social, discussion or insufficient discussion, relevant for the discussion, with sound discussion, with complete treatment of the general topic.
analysis ethical, moral, legal, political, depth. Insufficient or most part, with some awareness and application of awareness and strong
environmental, economic. inappropriate critical awareness and application of critical analysis and evaluation application of critical
analysis and evaluation critical analysis and analysis and evaluation
evaluation
Conclusions: Logical conclusions to be Insufficient conclusions or Some appropriate Sound conclusions are drawn Sound conclusions are drawn Conclusions are logically
drawn from the body of the mainly non-sequiturs conclusions are drawn and demonstrated by clear complete.
discussion. drawn. argument
Reference base Provide a suitable set of Inadequate or Adequate reference base in Sound reference base in terms Good reference base in terms Excellent reference base in
verifiable sources to support inappropriate reference terms of size and focus. of size and focus. (Informal of size and focus. (Informal terms of size and focus.
your discussion base (Informal guide: 15+ credible guide: 20+ credible and varied guide: 30+ credible and (Informal guide: 40+ credible
references) references) varied references) and varied references)