0% found this document useful (0 votes)
136 views4 pages

Assignment 2 PDF

Uploaded by

Areeba Shakil
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
136 views4 pages

Assignment 2 PDF

Uploaded by

Areeba Shakil
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

MITS 5004

IT SECURITY

Copyright © 2015-2018, Victorian Institute of Technology.


The contents contained in this document may not be reproduced in any form or by any means, without the written permission of VIT, other
than for the purpose for which it has been supplied. VIT and its logo are trademarks of Victorian Institute of Technology.

Copyright © 2015-2018 VIT, All Rights Reserved. 1


MITS5004 Assignment 2

Assessment item 2
Assignment - 2
Value: 10%
Due date:
Submission method options
Alternative submission method

Task

Part A: 30 Marks

Answer the following questions:

1. Search the web for news on computer security breaches that occurred during April-August 2015-2018.
Research one such reported incident. Prepare a report focusing on what the problem was, how and why it
occurred and what are the possible solutions. - 15 Marks

Length: Around 800 words

2. Explain why asynchronous I/O activity is a problem with many memory protection schemes, including
base/bounds and paging. Suggest a solution to the problem. - 15 Marks

Length: Around 600 words

Part B: 20 Marks

1. Research the 2011 Sony PlayStation Network outage case on the web and prepare a report focusing
on the following questions:

• What was the problem?


• Who were affected and how?
• How was the attack carried out?
• What could have been done to prevent the attack?

Length: Around 900 words


Rationale

This assessment task is based on the following topics discussed in the subject: the overview of
Information security fundamentals, security threats, cryptography, malicious software and its
countermeasures, operating system security and software security .

The assessment task is aligned with the following learning outcomes of the subject:
On successful completion of this subject, students will

• be able to justify security goals and the importance of maintaining the secure computing
environment against digital threats;
• be able to explain the fundamental concepts of cryptographic algorithms;
• be able to examine malicious activities that may affect the security of a computer program and
justify the choice of various controls to mitigate threats.
• be able to compare and contrast the security mechanisms of a trusted operating system with
those used in a general purpose operating system;

Copyright © 2015-2018 VIT, All Rights Reserved. 2


MITS5004 Assignment 2

Marking criteria

Assessment criteria
PART A : 30 marks
Assessable HD DI CR PS FL
Components 100% - 85% 84% - 75% 74% - 65% 64% - 50% 49% - 0

Q.1 (15 marks) 1. Comprehensive 1. Comprehensive 1. Mostly well- 1. Partially 1. Major


report addressing all report addressing all researched and well- complete report omissions or
Search the web for news criteria. Evidence of in- criteria. Evidence of presented report addressing most of incorrect
on computer security depth research. in-depth research. addressing all the criteria. Evidence answers.
breaches that occurred (Value: 95%) Minor omissions only. criteria. Some of research. Some (Value: 95%)
during April-August 2. Referenced a wide (Value: 95%) omissions. omissions.
2015-2018. Research range of appropriate (Value: 95%) (Value: 95%) 2. Either no
one such reported sources. 2. Referenced a range 2. Referenced a range 2. Referenced some evidence of
incident. Prepare a Referencing style of appropriate of appropriate sources. appropriate sources. literature
report focusing on what correctly used. sources. Referencing being
the problem was, how (Value: 5%) style correctly used. Referencing style Referencing style consulted or
and why it occurred and Minor errors only. correctly used. Some mostly correctly cited
what are the possible (Value: 5%) errors and omissions. used. Some errors references
solutions. (Value: 5%) and omissions. irrelevant to
(Value: 5%) the assignment
set. Major
errors in
referencing
style.
(Value: 5%)
Possible marks 15.0 – 12.75 12.6 – 11.25 11.10 – 9.75 9.60 – 7.5 7.35 – 0
Q.2 (15 marks) 1. Correct and in depth 1. Comprehensive and 1. Correct explanation 1. Mostly correct 1. Major
explanation of the correct explanation of of the problem with explanation and omissions or
Explain why problem. the problem. some details. solution. incorrect
asynchronous I/O answers.
activity is a problem Viable solution provided Viable solution Viable solution Minor errors. (Value: 95%)
with many memory with complete details. provided with provided. (Value: 95%)
protection schemes, (Value: 95%) complete details. 2. Either no
including base/bounds Some omissions. 2. Supporting evidence of
and paging. Suggest a 2. Supporting Very minor omissions (Value: 95%) reference/(s); writing literature
solution to the problem. reference/(s); fluent only. style appropriate to being
writing style appropriate (Value: 95%) 2. Supporting assignment with consulted or
to assignment with proper reference/(s); fluent proper in text cited
in text citation. 2. Supporting writing style citation. Some references
(Value: 5%) reference/(s); fluent appropriate to omissions. irrelevant to
writing style assignment with (Value: 5%) the assessment
appropriate to proper in text citation. set. Major
assignment with Minor omissions. errors in
proper in text citation. (Value: 5%) referencing
(Value: 5%) style.
(Value: 5%)

Possible marks 15.0 – 12.75 12.6 – 11.25 11.10 – 9.75 9.60 – 7.5 7.35 – 0
PART B: 20 marks
Q.1 (20 marks)
1. Comprehensive 1. Comprehensive 1. Mostly well- 1. Partially 1. Major

Copyright © 2015-2018 VIT, All Rights Reserved. 3


MITS5004 Assignment 2

Research the 2011 Sony report addressing all report addressing all researched and well- complete report omissions or
PlayStation Network criteria. Evidence of criteria. Evidence of presented report addressing most of incorrect
outage case on the web in-depth research. in-depth research. addressing all the criteria. Evidence answers.
and prepare a report (Value: 95%) Minor omissions only. criteria. Some of research. Some (Value: 95%)
focusing on the (Value: 95%) omissions. omissions.
following questions: 2. Referenced a wide (Value: 95%) (Value: 95%) 2. Either no
range of appropriate 2. Referenced a range evidence of
• What was the sources. of appropriate 2. Referenced a range 2. Referenced some literature
problem? Referencing style sources. Referencing of appropriate sources. appropriate sources. being
correctly used. style correctly used. consulted or
• Who were
(Value: 5%) Minor errors only. Referencing style Referencing style cited
affected and
(Value: 5%) correctly used. Some mostly correctly references
how?
errors and omissions. used. Some errors irrelevant to
• How was the (Value: 5%) and omissions. the assignment
attack carried (Value: 5%) set. Major
out? errors in
• What could referencing
have been done style.
to prevent the (Value: 5%)
attack?

Possible marks 20.0 – 17 16.9 – 15 14.9 – 13 12.9 – 10 9.4 – 0

Presentation

• You are recommended to write the answers in a word document and submit. You can also submit
your document in pdf format as well.
• Your answers to the questions should be precise but complete and informative.
• Each question should be answered individually with the corresponding label to indicate the tasks
completed e.g. Task 1 a.
• A cover page must be included and should contain relevant identifying information.

Copyright © 2015-2018 VIT, All Rights Reserved. 4

You might also like