NSC December 2014 Assignment Marking Scheme - Final
NSC December 2014 Assignment Marking Scheme - Final
NSC December 2014 Assignment Marking Scheme - Final
ASSIGNMENT TITLE:
POLICE AUTHORITY
DECEMBER 2014
MARKING SCHEME
Markers are advised that unless a task specifies that an answer be provided in a particular
form, then an answer that is correct, factually or in practical terms, must be given the available
marks. If there is doubt as to the correctness of an answer the relevant NCC Education
textbook should be the first authority.
This Marking Scheme has been prepared as a guide only to markers and there will frequently
be many alternative responses which will provide a valid answer.
Each candidate’s script must be fully annotated with the marker’s comments, where applicable,
and the marks allocated for each part of the tasks.
Notice to Markers
Where markers award half marks in any part of a task they should ensure that the total
mark recorded for a task is rounded up to a whole mark.
Network Security & Cryptography December 2014 Final NCC Education 2014
Task Guide Maximum
Marks
3.1 Looking for understanding of architectures available to meet
the needs of the police authority for data transfer and storage.
Up to a
a. Discussion of data protection issues maximum of
- Looking for discussion on sensitive nature of data 10 marks.
held on criminals, victims and suspects.
Up to a
c. Secure data transmission methods for remote working and maximum of
communication between the police stations and regional 3 marks for
headquarters (due to the sensitivity of data, message the first
encryption should be used along with some form of private point and 7
network) marks for the
- Data that will be transmitted securely (3 marks). second
- Transmission methods used (7 marks). point.
Up to a
d. Discussion of alternative secure transmission methods maximum of
considered with reasons why they were discarded. 6 marks for
- Alternative encryption and transmission methods (6 the first
marks). point and 4
- Reasons for discarding alternative methods (4 marks for the
marks). second
point.
Up to a
e. Measures and procedures to check for vulnerabilities and maximum of
remove them. 6 marks for
- Outline plans for vulnerability scanning of the the first
network (what scanned, frequency of scans, who point. Up to
responsible, etc.) (6 marks). a maximum
- Tools used in vulnerability scanning and detail of of 2 marks
data provided by tools (2 marks). for both the
- Plans for automated updating of software and OS. second and
(2 marks). third points.
Network Security & Cryptography December 2014 Final NCC Education 2014
Success of methods and problem-solving techniques used. Up to a
maximum of
4 marks.
Up to a
Lessons learned in completing the assignment. maximum of
4 marks.
Total Marks:
10.
Network Security & Cryptography December 2014 Final NCC Education 2014
Grade descriptors for Network Security and Cryptography
Learning
Pass Merit Distinction
Outcome
Demonstrate Demonstrate
Understand the Demonstrate highly
adequate robust
most common comprehensive
understanding of understanding of
types of understanding of
common types of common types of
cryptographic common types of
cryptographic cryptographic
algorithm cryptographic algorithm
algorithm algorithm
Understand the Demonstrate Demonstrate Demonstrate highly
Public-key adequate level of robust level of comprehensive level of
Infrastructure understanding understanding understanding
Network Security & Cryptography December 2014 Final NCC Education 2014