Cyber Security Management and Compliance
Cyber Security Management and Compliance
Submission deadline: Thursday 12 June 2025, no later than 16:30pm (UK local
time)
Learning outcomes:
Assessment details: Individual Portfolio (Tasks and activities accumulated over the
semester; equivalent to 2,500 words), 100%
Submission Method: Turnitin - Your work will be put through Turnitin. All
submissions will be electronically checked for plagiarism and the use of AI software.
You have the option to upload your work ahead of the deadline, more than once. ULBS
will be reviewing your last submission only. You can only upload one file. For example
if your work contains a word document and power point slides/Excel spreadsheet you
will need to copy your slides/spreadsheet into the word document.
Note: Keep in mind that self-plagiarism (when you reuse your own specific wording
and ideas from work that you have previously submitted without referencing yourself)
is also a form of plagiarism and is not allowed.
ASSIGNMENT DETAILS
In responding to all the tasks below you are required to use frameworks and
concepts which have been covered in the delivery of this module.
Business Email Compromise is a broad set of attacks that are extremely common
across the enterprise. As part of your role as a cyber security professional in a Energy
Sector company, you have been requested by the CEO to prepare a report at the next
company townhall on this issue.
Consider the learning experiences in enterprise security, specifically within the energy
sector. Picking a company within the Energy Sector (a provider or distributor), discuss
the following:
a) Identify and discuss the key attack vectors that are applicable from an enterprise
security perspective, in the context of the Energy Sector.
Consider the user security of a software development for the Energy Sector.
d) Identify and discuss the key attack vectors that are applicable from an employee
perspective, in the context of your chosen organisation, linking this to the
discussions in class?
e) Outline your approach to security awareness training that you plan to adopt for
the employees of your chosen company/organisation? Which employee-groups
would you prioritise, if any in particular, and why/why not? You are encouraged
to link the discussion to themes and topics discussed in class.
f) Identify and discuss technical controls that you propose to deploy to combat the
risks of phishing attacks, in the context of your chosen organisation, linking it to
the various models discussed in class.
Once you have completed individual tasks, you should write a summary report
(maximum approx. 1,000 words – keep in mind you have already written a brief
analysis per entry). In this report you would bring all your tasks together to summarise
your overall take on the cyber security management and compliance of your chosen
company/organisation, along with a summary of your recommendations. As before,
these need to be grounded in academic and non-academic sources, evidenced
through in-text citations and inclusion of these sources in a List of References,
according to Harvard Style of Referencing.
Portfolio instructions:
• Any write-up in the Portfolio should be written in font size 11, single spacing.
• With each entry (item/artefact) you put in your portfolio, you should write a brief
summary of why you have chosen this particular item/artefact and how it touch
on them of that particular section. You should then analyse it in accordance
with the tasks as they are laid out in the instructions above.
• Proper citations are essential. All tasks require referencing academic and other
sources, listed in a Harvard Referencing style, present a reference list at the
end of the Portfolio. Whenever you use external sources (pictures, definitions,
line of argumentation), clearly state this at the of the sentence or paragraph by
providing a reference to the original article using Harvard Referencing style.
Please refer to the marking criteria (below) for a breakdown of how the tasks will
be marked.
Assessment Criteria
DISTINCTION
FAIL PASS COMMENDATION
(70-100%)
(0 - 49%) (50 – 59%) (60 – 69%)
Exhibits an unsatisfactory Satisfactory grasp of the Good/very good understanding Excellent level of
GRADE DESCRIPTORS
grasp of the issues. issues, with limited of the issue with some understanding.
Primarily descriptive and independent critical thought independent critical thought and All requirements are dealt with
Mark lacking in independent appropriate to the tasks. approach to the tasks. Good to a high standard. Excellent
Weight critical thought. Weak or Material is largely relevant to attempt at analysis, synthesis analysis, synthesis and critical
no attempt at analysis, the tasks. Some evidence of and critical reflection, with reflection. Evidence of
synthesis and critical analysis, synthesis and critical evidence of some ability to independent and original
MARKING CRITERIA
reflection. Little evidence reflection. Work is presented tackle issues. Work is clearly judgement in relation to
of ability to tackle the in acceptable manner, with presented in a fairly well resolution of problems
issues. Poor some minor errors. organised manner. Excellently presented.
structure/grammar/
Knowledge & Understanding: Critical analysis and reflection on the
extent of the issue across use cases, using appropriate literature. 15