CT058-3-M-ISA Assignment
CT058-3-M-ISA Assignment
Assignment
Weightage: 100% of the overall assessment
The assignment focuses on the Information Security Architecture based on the IOT. There are
Three (3) tasks of the assignment which are Task 1 for the Individual assignment, Task 2
for the Group assignment and Task 3 for Presentation. The tasks are as follows:
1.Task 1 (Individual Assignment) - Will identify the weakness of the information security
architecture in the IOT.
3.Task 3 (Presentation) – Will do the presentation of critical evaluation and the proposed
work.
OBE Outcome
CLO 1: Appraise issues in information security architecture and operational security to find the
gap based on the case study (C5, PLO2).
3.Based on the feedback given during the proposal presentation, improve the quality of work,
especially on the critical discussion on issues in information security architecture and
operation security.
CLO 1: Appraise issues in information security architecture and operational security to find the gap based on the case study
(C5, PLO2)
Not able to Not able to Research and Good research Excellent research
conduct enough conduct enough findings are work and work, with an
research to create a research to create a completed and confidently interesting
case study to start good case study to properly presented. presented most of approach to
the project. Weak start the project. the findings presenting the
investigation skills. Adequate Able to without any issue. findings.
Investigation / investigation skills, demonstrate good
Findings Some of the but the findings investigation skills Able to Able to
requirements were were not properly and able to create a demonstrate very demonstrate
incomplete presented. good case study to good investigation outstanding
continue with the skills and create a investigation skills
Some of the project. very good case and create an
requirements were study to continue excellent case
incomplete with the project. study to continue
with the project.
Almost no analysis Limited analysis Sufficient analysis Good analysis and Very good analysis
and comparison of and comparison of and comparison of comparison of and comparison of
facts presented to facts presented to facts presented to facts presented to facts presented to
appraise issues and appraise issues and appraise issues and appraise issues and appraise issues and
cyber security risks cyber security risks cyber security risks to cyber security cyber security risks
faced related to faced related to faced related to risks faced related faced related to
Critical information information information to information information
Discussion security design and security design and security design and security design and security design and
operation security operation security operation security operation security operation security
CLO2: Propose solutions for security architecture and implementation including recovery
strategies and managing compliances (A5, PLO9)
2.The main discussion in the report should focus on the following information:
-Must be based on all the information and issues that have been highlighted in Task 1.
-Any gap weakness present in the program.
-Solution proposal to address the gap and weakness.
-Other relevant information.
3.Students must show a proper work breakdown as marks will be given based on individual
performance and contribution. Each student should have his / her contribute to discussing
the issues and propose suitable solutions to address the gap.
ASSIGNMENT REQUIREMENTS
1. You are required to produce the work in a group of not more than 3 members
2. Your report must be typed using Microsoft Word with Times New Roman font size 12.
The expected length is from 2500 to 3000 words. The report should be in 1.5 spacing.
3. The report has to be well presented and should be typed. Submission of reports that are
unprofessional in their outlook will not fare well when marks are allocated.
4. Your report must combine all the deliverables in one coherent document.
5. The report should have a one (1”) margin all around the page as illustrated below:
1 inch 1 inch
1 inch
1 inch
The Typed Text
1 inch
1 inch
1 inch 1 inch
6. The report should be submitted through the Online Submission Platform (Moodle –
Turnitin Assignment)
7. Plagiarism is a serious offense and will automatically be awarded a zero (0) mark.
8. All information, figures, and diagrams obtained from external sources must be referenced
using the APA referencing system accordingly.
CLO 2: Propose solutions for security architecture and implementation including recovery strategies and managing
compliances (A5, PL04)
Total /40
CLO 3: Present best practices or new approaches relevant to information security architectures (A3, PL05)
PLO5: Communication Skills
Topic lack of The topic would The topic is The topic is very The topic is tightly
relevance or focus. benefit from more adequately focused focused and focused and
The presentation focus. The and relevant. Some relevant. Major relevant. The
contains multiple presentation facts are accurate facts are accurate presentation
factual errors. Poor contains some and almost and generally contains accurate
use of visual aid in factual errors or is complete. complete. Good information with
the presentation. arguable. Not able Satisfactory use of use of visual aid in no factual errors.
to use much visual visual aid in the the presentation. Very good and
Content Not able to answer aid in the presentation. creative use of
questions at all presentation. Able to answer visual aid in the
during the Q&A Able to answer most of the presentation.
session. Poor Not able to answer questions during questions during
understanding of most of the Q&A session with Q&A session Able to answer
the topic questions during some assistance. almost all
presented. the Q&A session questions during
Q&A session
Not attending the The presenter was The presenter was The presenter is The presenter is
presentation not prepared. somewhat well prepared and very well prepared
(without notice) Delivery is highly prepared. Delivery delivered ideas and delivers ideas
dependent on of the presentation with good eye clearly and
OR slides and notes. sometimes are contact. Good concisely without
Most of the time depending on confidence level. depending too
Delivery Poor presentation am reading from slides and notes. much on notes.
skills. Not able to the slides/notes. Showed a lack of Appropriate voice
deliver the confidence. volume, tone, and Volume, pacing,
presentation to the Lack of eye pacing. and gestures
audience. contact and clarity Some eye contact contributed
of voice. and good voice maximally to the
volume. presentation.