0% found this document useful (0 votes)
52 views6 pages

CT058-3-M-ISA Assignment

Uploaded by

vczp7nqdnr
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
52 views6 pages

CT058-3-M-ISA Assignment

Uploaded by

vczp7nqdnr
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 6

Information Security Architecture Page 1 of 6

Assignment
Weightage: 100% of the overall assessment

The assignment focuses on the Information Security Architecture based on the IOT. There are
Three (3) tasks of the assignment which are Task 1 for the Individual assignment, Task 2
for the Group assignment and Task 3 for Presentation. The tasks are as follows:

1.Task 1 (Individual Assignment) - Will identify the weakness of the information security
architecture in the IOT.

2.Task 2 (Group Assignment) - Will propose the improvement and suggestion of


information security srchitecture in the IOT.

3.Task 3 (Presentation) – Will do the presentation of critical evaluation and the proposed
work.

Task 1 – Individual Assignment (Weightage: 40% of overall assessment)

OBE Outcome
CLO 1: Appraise issues in information security architecture and operational security to find the
gap based on the case study (C5, PLO2).

1.This is a research-based Assignment. Select an Information security architecture in IOT


(Internet of Things) as the subject of your research and work in a team of not more than 4
members to gather relevant information which you will find helpful in task 2. Findings from
your research will be used as a case study for your project.

2.Your research proposal must include at least the following information:


-Topic of Research.
-Literature Review.
-Information Security Technique / method Deployed
- Information Security Architecture principles that is implemented.
-Critical evaluation on the existing architecture and techniques.
-Other relevant information to Information Security Architecture.

3.Based on the feedback given during the proposal presentation, improve the quality of work,
especially on the critical discussion on issues in information security architecture and
operation security.

4.Delivery: Report (between 2500 – 3000 words).

5.Date for Submission :2/2/2025 11:59 pm

Masters Asia Pacific University of Technology and Innovation 112024


Information Security Architecture Page 2 of 6

Marking Rubrics Task 1

CLO 1: Appraise issues in information security architecture and operational security to find the gap based on the case study
(C5, PLO2)

PLO2: Cognitive Skills

0-7 8-10 11-13 14-16 17-20 Marks


Marking Criteria Awarded
(Fail) (Marginal Fail) (Pass) (Credit) (Distinction)

Not able to Not able to Research and Good research Excellent research
conduct enough conduct enough findings are work and work, with an
research to create a research to create a completed and confidently interesting
case study to start good case study to properly presented. presented most of approach to
the project. Weak start the project. the findings presenting the
investigation skills. Adequate Able to without any issue. findings.
Investigation / investigation skills, demonstrate good
Findings Some of the but the findings investigation skills Able to Able to
requirements were were not properly and able to create a demonstrate very demonstrate
incomplete presented. good case study to good investigation outstanding
continue with the skills and create a investigation skills
Some of the project. very good case and create an
requirements were study to continue excellent case
incomplete with the project. study to continue
with the project.

0-7 8-10 11-13 14-16 17-20 Marks


Marking Criteria
Awarded
(Fail) (Marginal Fail) (Pass) (Credit) (Distinction)

Almost no analysis Limited analysis Sufficient analysis Good analysis and Very good analysis
and comparison of and comparison of and comparison of comparison of and comparison of
facts presented to facts presented to facts presented to facts presented to facts presented to
appraise issues and appraise issues and appraise issues and appraise issues and appraise issues and
cyber security risks cyber security risks cyber security risks to cyber security cyber security risks
faced related to faced related to faced related to risks faced related faced related to
Critical information information information to information information
Discussion security design and security design and security design and security design and security design and
operation security operation security operation security operation security operation security

Very less critical Minimal critical Sufficient critical Good critical


discussion. discussion. discussion but lack discussion with
of evidence supporting
evidence.

Total Marks /40

Masters Asia Pacific University of Technology and Innovation 112024


Information Security Architecture Page 3 of 6

Task 2 – Group Assignment (Weightage: 40% of overall assessment)

CLO2: Propose solutions for security architecture and implementation including recovery
strategies and managing compliances (A5, PLO9)

1.Based on research done in Task 1:


a.Analyze the security architecture and identify any gap or weakness present.
b.Propose a solution that can strengthen the current information security architecture.

2.The main discussion in the report should focus on the following information:
-Must be based on all the information and issues that have been highlighted in Task 1.
-Any gap weakness present in the program.
-Solution proposal to address the gap and weakness.
-Other relevant information.

3.Students must show a proper work breakdown as marks will be given based on individual
performance and contribution. Each student should have his / her contribute to discussing
the issues and propose suitable solutions to address the gap.

4.Delivery: Report (between 2500 – 3000 words).

5.Date for Submission : 2/2/2025 11:59 pm

Masters Asia Pacific University of Technology and Innovation 112024


Information Security Architecture Page 4 of 6

ASSIGNMENT REQUIREMENTS
1. You are required to produce the work in a group of not more than 3 members

2. Your report must be typed using Microsoft Word with Times New Roman font size 12.
The expected length is from 2500 to 3000 words. The report should be in 1.5 spacing.

3. The report has to be well presented and should be typed. Submission of reports that are
unprofessional in their outlook will not fare well when marks are allocated.

4. Your report must combine all the deliverables in one coherent document.

5. The report should have a one (1”) margin all around the page as illustrated below:

1 inch 1 inch
1 inch

1 inch
The Typed Text
1 inch

1 inch

1 inch 1 inch

6. The report should be submitted through the Online Submission Platform (Moodle –
Turnitin Assignment)

7. Plagiarism is a serious offense and will automatically be awarded a zero (0) mark.

8. All information, figures, and diagrams obtained from external sources must be referenced
using the APA referencing system accordingly.

Masters Asia Pacific University of Technology and Innovation 112024


Information Security Architecture Page 5 of 6

Marking Rubrics Task 2

CLO 2: Propose solutions for security architecture and implementation including recovery strategies and managing
compliances (A5, PL04)

PLO4: Interpersonal Skills

0-2 3-4 5-6 7-8 9-10 Marks


Marking Criteria Awarded
(Fail) (Marginal Fail) (Pass) (Credit) (Distinction)

Not demonstrating Demonstrating Demonstrating Demonstrating Very professional


professionalism in minimal good very good in proposal
proposal writing. professionalism in professionalism in professionalism in writing.
proposal writing. proposal writing. proposal writing.
Poor articulation of Excellent
Professionalism thoughts. Had Weak articulation Adequate Good articulation articulation of
issues constructing of thoughts. Not articulation of of thoughts with thoughts with
sentences. able to write thoughts. Able to very good writing outstanding
properly to deliver write properly to skills. writing skills.
ideas. deliver ideas.
No in-text citation Minimal in-text A sufficient A recent source of Very good quality
and very minimal citation and number of references was of references used,
references. Major references used. references and used, with a proper with proper
Referencing issues in the Minor issues in the citations in the reference list. citation and
referencing format. referencing format. report. No issue in Limited in-text reference list for
the referencing citation in the all facts and
format report diagrams used
Almost no Able to show Able to show Able to show very Outstanding
improvements can minimal significant good quality of work
be seen in the improvements in improvements in improvements in was done in the
quality of the quality of the quality of the quality of discussion related
discussion related discussion related discussion related discussion related to information
to information to information to information to information security issues
security issues security issues security issues security issues faced by the
Research faced by the faced by the faced by the faced by the organization.
Progress organization. organization. organization. organization.
Lessons learned
Lessons learned Lessons learned Lessons learned Lessons learned from the previous
from the previous from the previous from the previous from the previous task (Assignment
task (Assignment task (Assignment task (Assignment task (Assignment 1) were highly
1) were not applied 1) were merely 1) were 1) were demonstrated in
to this final demonstrated in demonstrated in demonstrated in this final proposal.
proposal this final proposal. this final proposal. this final proposal.
Solutions are Solutions are Solutions are Solutions provide Compelling
superficial or do loosely related to related to the proof supporting solutions are
not develop proof. the proof. Many do but inconsistently statements and provided with
Quality of not provide provide supporting credible evidence. supporting
Solutions supporting statements and statements and
statements and credible evidence. credible evidence.
credible evidence.

Masters Asia Pacific University of Technology and Innovation 112024


Information Security Architecture Page 6 of 6

Total /40

CLO 3: Present best practices or new approaches relevant to information security architectures (A3, PL05)
PLO5: Communication Skills

0-2 3-4 5-6 7-8 9-10 Marks


Marking Criteria
Awarded
(Fail) (Marginal Fail) (Pass) (Credit) (Distinction)

Topic lack of The topic would The topic is The topic is very The topic is tightly
relevance or focus. benefit from more adequately focused focused and focused and
The presentation focus. The and relevant. Some relevant. Major relevant. The
contains multiple presentation facts are accurate facts are accurate presentation
factual errors. Poor contains some and almost and generally contains accurate
use of visual aid in factual errors or is complete. complete. Good information with
the presentation. arguable. Not able Satisfactory use of use of visual aid in no factual errors.
to use much visual visual aid in the the presentation. Very good and
Content Not able to answer aid in the presentation. creative use of
questions at all presentation. Able to answer visual aid in the
during the Q&A Able to answer most of the presentation.
session. Poor Not able to answer questions during questions during
understanding of most of the Q&A session with Q&A session Able to answer
the topic questions during some assistance. almost all
presented. the Q&A session questions during
Q&A session
Not attending the The presenter was The presenter was The presenter is The presenter is
presentation not prepared. somewhat well prepared and very well prepared
(without notice) Delivery is highly prepared. Delivery delivered ideas and delivers ideas
dependent on of the presentation with good eye clearly and
OR slides and notes. sometimes are contact. Good concisely without
Most of the time depending on confidence level. depending too
Delivery Poor presentation am reading from slides and notes. much on notes.
skills. Not able to the slides/notes. Showed a lack of Appropriate voice
deliver the confidence. volume, tone, and Volume, pacing,
presentation to the Lack of eye pacing. and gestures
audience. contact and clarity Some eye contact contributed
of voice. and good voice maximally to the
volume. presentation.

Total Marks /20

Masters Asia Pacific University of Technology and Innovation 112024

You might also like