0% found this document useful (0 votes)
10 views5 pages

Sic Question

Uuuj

Uploaded by

karkeesimana
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views5 pages

Sic Question

Uuuj

Uploaded by

karkeesimana
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

1st SIT Coursework - 01 Question paper Year Long 2023/2024

Module Code: CC5004NI

Module Title: Security in Computing

Module Leader: Mr. Avinav Neupane (Islington College)

Coursework Type: Individual

Coursework Weight: This coursework accounts for 30% of the overall module
grades.
Submission Date: Monday, 15th January 2023

Coursework given Week 04


out:

Submission Submit the following to the Islington College’s MST portal


Instructions: before the due date (before 01:00 PM on the due date):
● A report (document) in .pdf format in the MST portal
or through any medium which the module leader
specifies.

Warning: London Metropolitan University and Islington College


takes plagiarism very seriously. Offenders will be dealt
with sternly.

© London Metropolitan University

1
PLAGIARISM

You are reminded that there exist regulations concerning plagiarism. Extracts from
these regulations are printed overleaf. Please sign below to say that you have read
and understand these extracts:

Extracts from University Regulations on Cheating, Plagiarism and Collusion

Section 2.3: “The following broad types of offence can be identified and are
provided as indicative examples ….

(i) Cheating: including taking unauthorised material into an examination; consulting


unauthorised material outside the examination hall during the examination;
obtaining an unseen examination paper in advance of the examination; copying
from another examinee; using an unauthorised calculator during the
examination or storing unauthorised material in the memory of a programmable
calculator which is taken into the examination; copying coursework.
(ii) Falsifying data in experimental results.
(iii) Personation, where a substitute takes an examination or test on behalf of the
candidate. Both candidate and substitute may be guilty of an offence under
these Regulations.
(iv) Bribery or attempted bribery of a person thought to have some influence on the
candidate’s assessment.
(v) Collusion to present joint work as the work solely of one individual.
(vi) Plagiarism, where the work or ideas of another are presented as the candidate’s
own.
(vii) Other conduct calculated to secure an advantage on assessment.
(viii) Assisting in any of the above.
Some notes on what this means for students:

1. Copying another student's work is an offence, whether from a copy on paper or


from a computer file, and in whatever form the intellectual property being copied takes,
including text, mathematical notation, and computer programs.

2. Taking extracts from published sources without attribution is an offence. To


quote ideas, sometimes using extracts, is generally to be encouraged. Quoting ideas
is achieved by stating an author's argument and attributing it, perhaps by quoting,
immediately in the text, his or her name and year of publication, e.g. “e = mc 2 (Einstein
1905)". A reference section at the end of your work should then list all such references
in alphabetical order of authors' surnames. (There are variations on this referencing
system which your tutors may prefer you to use.) If you wish to quote a paragraph or
so from published work then indent the quotation on both left and right margins, using
an italic font where practicable, and introduce the quotation with an attribution.

School of Computing, FLSC

2
Coursework 01 – Security in Computing (30% of the overall module grade)

Brief:

In this first coursework of the module “Security in Computing”, the students are
expected to carry out the following task individually and then create individual reports
(3000 words minimum or more) (documents) which can thus reflect all the research
and the learning outcome of the coursework.

The main aim of this coursework 01 for the students should be, to research, develop
and test a new cryptographic system (cryptographic algorithm). For that, the following
tasks are to be completed in a proper order.

By developing a new cryptographic system, the students are able to thus provide a
practical solution to mitigate various security issues related to the data and
information’s confidentiality, thus also helping to maintain its integrity.

Tasks:

The students are expected to carry out the following tasks:

Task 1: Carry out very in-depth research with regards to the topic “Cryptography”. This
research must include a detailed study in the domain of the history of cryptography,
the symmetric ciphers, and the asymmetric ciphers.

Task 2: The students are then required to select a single cryptosystem


(cryptographic algorithm) of their choice as a base for this coursework.

Task 3: Inclusion of new mathematical and logical operations is expected from the
students to create a new encryption and decryption algorithm of their choice.

Task 4: The developed algorithm must be tested using multiple test cases, to verify
the working order of the aforementioned algorithm.

Task 5: The new algorithm must be evaluated with regards to its strengths and its
weaknesses.

Task 6: The students are then to individually present their work through a formal
presentation session which shall be held after the submission of their coursework.

3
Report Structure for Coursework 01 (Security in Computing):

1. Cover Page (Module Name, Module Code, Title of the report, Student’s name,
Semester, Submitted To, Submission Date, Word Count)
2. Table of Contents (Auto generated) (Structure of the report)
3. Table of Figures (Auto generated) (Lists the images within the report)
4. Abstract
5. Introduction (Introduction to the topic, technical terminologies used in the
report, Aim and Objectives of this coursework, report structure)
6. Background (Main part of the report, must elaborate the contents here so as
to create a solid foundation for the next sections of the report)
7. Development (Must include and show the different steps involved in the
development stage)
8. Testing (Must demonstrate different test scenarios to validate the developed
product)
9. Evaluation (Advantages and disadvantages of the developed product,
application areas can also be discussed)
10. Conclusion
11. References (Auto generated)
12. Appendices

Referencing

Referencing is very important in that you are acknowledging and attributing the
work of others. If you do not properly reference your work, then you run the risk of
plagiarism – i.e. taking credit for the work or ideas of others by presenting them as
your own. It is easy to detect plagiarism! Therefore, you will need to attribute the
work or ideas of others by citing the source in the body of your report. There are
many referencing formats that you can use, such as for example, the Harvard APA.
As a simple example, using Harvard APA for a book reference, in the body of the
report you cite as follows:

Symmetric encryption is also commonly known as conventional encryption or


single-key encryption (Stallings, 2006).

And in your bibliography section you list your reference as follows:

Stallings, J. (2006). Cryptography and Network Security (4th ed.): Principles and
Practice. USA: Prentice Hall.

4
Marking Breakdown for Coursework

Criteria Total Marks


01. Research 15

02. Development 40

03. Testing 15

04. Documentation 20

05. Weekly Assignments 10

Total: 100

You might also like