0% found this document useful (0 votes)
158 views

COM 645 Network Security Assignment 1 Brief

This document provides instructions for an assignment on network security. Students are asked to write a report on a computer security topic of their choosing. The report must be in IEEE journal paper format, between 2500 words with a 10% word limit, and discuss security problems, technologies, and a strategy for future deployment. It also provides guidance on references, late submissions, marking criteria, and support.
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
158 views

COM 645 Network Security Assignment 1 Brief

This document provides instructions for an assignment on network security. Students are asked to write a report on a computer security topic of their choosing. The report must be in IEEE journal paper format, between 2500 words with a 10% word limit, and discuss security problems, technologies, and a strategy for future deployment. It also provides guidance on references, late submissions, marking criteria, and support.
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

Faculty of Arts, Science and Technology

COM645 NETWORK SECURITY


ASSIGNMENT 1: COURSEWORK

Module title
COM645 Network Security

Assessment title Computer Security:

Cohort

Module leader Nigel Houlden

Issue date

Submission dates 29/04/2024 by 10.30AM

Module learning  Critically analyse security threats in the digital world within a
outcomes professional and ethical context.
 Model and design a range of modern symmetric and asymmetric
encryption problems
 appropriate to modern communication systems
 Apply a range of security tools and algorithms related to computer
security.
 Design and synthesise security protocols and algorithms.
 Critically analyse ethical issues relating to privacy and anonymity in
today’s digital society.
 Justify the selection of appropriate standards in the context creating
appropriate security

Weighting 40%

Submission instructions You will work on this assignment individually and submit your IEEE-
formatted report in a single file to Moodle. On submission, a Turnitin check
will be performed automatically and unusually high levels of similarity will be
flagged to the marker. By submitting this work, you confirm that you have
read, understand and accept the university’s regulations regarding plagiarism
and agree to be dealt with accordingly if any such situation should arise.

Task details and For this assignment you are to write a report on the topic of Computer
instructions Security, you will draw upon the practical work in class and your own
research.
You are to come up with a subtitle for this report, more guidance will be given
in class.

COM645 Network Security, 2021-22 Trimester 1 1


Computer Security is more complex than ever, prioritising user needs/access
against security whilst moving a business forward is no easy task.
The purpose of this assignment is to research and write a paper into current
and emerging security technologies or issues that a security specialist should
be aware of.
Topics to choose from:
 Security attacks, services and mechanisms
 Information warfare model of security
 Cryptographic Techniques: Encryption: symmetric and asymmetric
encryption; principles of cryptanalysis; message confidentiality; mes-
sage authentication (including digital signatures).
 Security in wireless environments.
 System Security: Firewalls and intrusion detection systems.
 Specific threats on end-systems: viruses, worms, Trojan horses, etc.;
stack overflow. Code signing and software security models
 Computer systems forensics
 Software security.
You may also propose your own topic, but this must be confirmed with your
lecturer.

Your paper should discuss the essential problems in around the topic you have
chosen, followed by a discussion of possible technologies that might help
overcome them. Good papers will then draw these threads together into a
coherent strategy for future technological deployment in these areas.

The final report should be 2500 words (±10%) and presented in IEEE journal
paper style (template on Moodle). Marks will be deducted for reports that are
too short, too long or in the wrong format. Final reports are to be submitted
by uploading through the Moodle link given.

Wider Social Impact


Although your paper will have a technological focus, there are wider aspects
to consider as well. What will be the social, ethical, moral, legal, political,
environmental, demographic and economic impact of the security happening
(or not happening)?

Conclusions
Following this discussion, your paper must offer sensible conclusions in at
least three respects, the first two based on the discussion in the main body of
the paper, the third being reflective:
1. What is the most realistic effects of the issue your paper is discussing
(Perhaps the clearest, most coherent, or the one on which a majority
might agree?)
2. How likely is the issue(s), as determined in (1), to happen?
3. What are the limitations of your own discussions in this paper? What
assumptions have you made? What areas have you not considered?
(You will have been forced, by the word limit, to omit much
discussion; you are not at fault for this but what else should ideally

COM645 Network Security, 2021-22 Trimester 1 2


have been included?)
4.
References
Your article must be supported by an appropriate reference base (cited list of
references in IEEE format) of publicly available and credible sources.
References do not count towards the 3,000 word count.

Late submissions All required work must be submitted, in full and as directed and described, by
the due time and date, to achieve marks reflecting its full worth. Work
submitted after the due time and date, but within one calendar week, will be
capped at 40%. Work more than a week late will not be marked and will be
entered as 0%.

Guidance
This will require careful planning and structuring of your work together with
efficient use of academic/scientific language.
Note the requirement for both IEEE paper formatting and referencing.

Marking criteria See the attached marking criteria for individual assessment details.

Feedback policy Individual feedback will be given through Moodle within three weeks of each
submission date.

Support arrangements Speak to your tutor.

Marking and All work is fully-marked by the module leader or a team associate. A
moderation policy representative sample of work from each cohort will be second-marked to
ensure quality and consistency.

COM645 Network Security, 2021-22 Trimester 1 3


MARKING CRITERIA
The following table documents indicative marking criteria for this assignment: For this ‘article of 3,000 words’, a range of +/- 10% is tolerated before penalties are applied. References do NOT count
in the word count.
ELEMENT ASSESSMENT TASK <40% (R): 40%+ (C): 50%+ (B): 60%+ (B+): 70%+ (A):

General General discussion of drivers Insufficient general A reasonable general A good, relevant general A very good, relevant general A professional, academic
technological and obstacles to the security. discussion or insufficient discussion, relevant for the discussion, with sound discussion, with complete treatment of the general topic.
discussion and Discuss credibility of claims depth. Insufficient or most part, with some awareness and application of awareness and strong
critical analysis and counter-claims inappropriate critical awareness and application of critical analysis and evaluation application of critical
analysis and evaluation critical analysis and analysis and evaluation
evaluation

Mediating between Considering different No consideration of Limited consideration of Reasonable discussion of Sound discussion of Good discussion of conflicting
conflicting arguments and points of view. conflicting opinions. conflicting opinions and no conflicting opinions but limited conflicting opinions and opinions and mediation.
opinions Seeking balance based on mediation. mediation. reasonable mediation
evidence.

Wider social Consider impact beyond the Insufficient general A reasonable general A good, relevant general A very good, relevant general A professional, academic
impact and critical mere technological: Social, discussion or insufficient discussion, relevant for the discussion, with sound discussion, with complete treatment of the general topic.
analysis ethical, moral, legal, political, depth. Insufficient or most part, with some awareness and application of awareness and strong
environmental, economic. inappropriate critical awareness and application of critical analysis and evaluation application of critical
analysis and evaluation critical analysis and analysis and evaluation
evaluation

Conclusions: Logical conclusions to be Insufficient conclusions or Some appropriate Sound conclusions are drawn Sound conclusions are drawn Conclusions are logically
drawn from the body of the mainly non-sequiturs conclusions are drawn and demonstrated by clear complete.
discussion. drawn. argument

Reference base Provide a suitable set of Inadequate or Adequate reference base in Sound reference base in terms Good reference base in terms Excellent reference base in
verifiable sources to support inappropriate reference terms of size and focus. of size and focus. (Informal of size and focus. (Informal terms of size and focus.
your discussion base (Informal guide: 15+ credible guide: 20+ credible and varied guide: 30+ credible and (Informal guide: 40+ credible
references) references) varied references) and varied references)

COM645 Network Security, 2021-22 Trimester 1 4

You might also like