Assesment - 2022
Assesment - 2022
Staffordshire University, UK
4 Introduction................................................................................................................. 2
1 Coursework details
• Contact: Mohammad S. Hasan
2 Notes on Plagiarism
• Your report must have citations and the references should be in Harvard style. You
are recommended to use a referencing tool e.g. Mendeley, Zotero etc.
• You are expected to explain the concepts in your own words or rephrase and avoid
quotes. You are referred to the University’s regulations on plagiarism available at
http://www.staffs.ac.uk/assets/academic_misconduct_tcm44-26770.pdf
• If the Turnitin system detects plagiarism, it will be reported to the school and
appropriate actions will be taken.
3 Submission requirements
1. The deadline is published on the Blackboard.
2. Your report
a. Your report can be of up to 3000 words. However, you have a flexibility of
+10% and any further words will be ignored i.e. NOT marked. To improve the
document readability and reduce the number of words, you can use graphs,
figures etc. Word count guidance is available at
https://askus.staffs.ac.uk/academicskills/faq/252665
b. The report should be structured and should have a title page containing the
title of the coursework, student name, student ID etc., table of contents
(ToC), defined sections, diagrams, references, page numbers etc. Text font
size, image or diagrams must be readable. Margins must be sufficiently wide
to allow the work to be read easily.
c. Report submission through the Turnitin system ONLY. Turnitin system will
NOT accept submission after the deadline.
d. Paper submission or handwritten report / element will be ignored i.e. NOT
marked. Text, code etc. inserted as image will be ignored i.e. NOT marked.
e. An editable source file e.g. Microsoft docx MUST be submitted. Non-editable
source file e.g. PDF is NOT allowed. Do NOT attempt to submit other file
formats e.g. zip as these file formats might NOT be recognised by the Turnitin
system.
f. You will be allowed to upload ONLY once to the Turnitin system. Therefore,
please make sure that your coursework is free of plagiarism and you are
uploading the correct version.
g. It is strongly recommended that you attempt to submit bit early to avoid any
technical difficulty or missing the deadline.
3. Your simulation, if applicable
a. If you need to upload a simulation e.g., Packet Tracer, Riverbed, Qualnet etc.,
it must be uploaded to the Blackboard using a separate link.
4 Introduction
You have applied for a job as a Cybersecurity Operations Analyst. You have just passed the
first stage of the interview. The second stage will test your research and network packet
analysis skills based on a report using Wireshark as explained below. Your report should
have the following sections.
1. Title page
2. Clear heading for each section
3. Citations and references
a. At least 10 references
b. Presence of proper citation in the report body and references at the end of
the report.
7 Marking criteria
Part
Criterion # Description Mark
Man-in-the-middle (MITM) attack: explain the attack and possible
1A control mechanisms. 10
Denial-of-Service (DoS) attack: explain the attack and possible
2A control mechanisms. 10
SQL injection attack: explain the attack and possible control
3A mechanisms. 10
Zero-day exploit attack: explain the attack and possible control
4A mechanisms. 10
DNS tunneling attack: explain the attack and possible control
5A mechanisms. 10
Methodology: explain the steps you have taken to analyse the
given Wireshark file based on the hosts, traffic etc. This could be
presented as a table or flowchart showing various aspects e.g.
6B syntax for filters, expected results etc. 10
Network attack 1: show a relevant screenshot from Wireshark and
7B explain the attack. 10
Network attack 2: show a relevant screenshot from Wireshark and
8B explain the attack. 10
Network attack 3: show a relevant screenshot from Wireshark and
9B explain the attack. 10
Network attack 4: show a relevant screenshot from Wireshark and
10 B explain the attack. 10
11 A, B Citation and reference 10
Total 110