All assessment items must be uploaded to Moodle. No other forms of submission will be accepted. Submissions via email will be ignored. If a student chooses to submit his/her assignment via the Internet off the campus, it is the responsibility of the student to guarantee the accessibility of the Internet. Not being able to access to the Internet at a location which is off the campus is not an excuse for extension.
Assignment 2 weights 15% of the total marks of this unit and is due on 03/11/2014, week 13, at 23:55pm the latest. The deadline is the local time of Canberra, ACT, Australia. It is your responsibility to correctly adjust your clocks, including the one in Moodle personalized user interface.
Please be reminded the following statements from the unit outline on assignment submission.
Students will be asked to confirm the following online declaration at the point of submission. I certify that:
• the attached assignment is my own work and no part of this work has been written for me by any other person except where such collaboration has been authorised by the lecturer/s concerned;
• material drawn from other sources has been fully acknowledged as to author/creator, source and other bibliographic details according to unit-specific requirements for referencing; and
• no part of this work has been submitted for assessment in any other unit in this or another Faculty except where authorised by the lecturer/s concerned.
The first page of each assessment submission should include the following information:
Date of Submission:
Word Count (if applicable):
Late submission of assignments
Late submission of assignments without an approved extension will result in the assignment not being marked and zero being recorded for that particular assignment. In extenuating circumstances a late submission may be considered upon the production of supporting documentation and at the discretion of the unit convener.
Extensions: Extensions must be applied for before the due date
Students can apply for an extension to the submission due date for an assessment item on the grounds of illness or other unavoidable and verifiable personal circumstances. Documentary evidence will be expected for an extension to be granted.
It should be noted that such documentation will be considered but will not guarantee that the application will be successful. The Unit Convener will decide whether to grant an extension and the length of the extension.
Responsibility for understanding
If there is any doubt with regard to the requirements of any particular assignments or assessment procedure, the onus for clarifying the issue rests with the student who should contact the unit Convener or tutor. Further, it is the responsibility of students to ensure that they are correctly enrolled in the unit and that the tutor and Student Administration have their correct contact details.
Please submit your assignment in a single Microsoft Word or RTF document. Your tutor will use Microsoft Word tracking feature to mark your assignment.
The most important goals of this unit are to build up your systematic understanding in the areas and to develop your critical thinking and problem solving skills. Text book reading is a critical means to achieve these goals. Therefore, the answers to the assignment questions should be within the context of the text books. Blindly accepting the outcomes of a quick Internet search is extremely undesirable. With a systematic understanding in the field and well developed critical thinking and problem solving skills, you will then be able to take the full advantage of the easily available information on the Internet.
Warning: The following questions are not short-answer ones. You are expected to fully develop structured and logical arguments in your writing. A collection of key words or phrases won’t attract any marks.
1. [5 marks] Write a summary to briefly explain to a learner, who knows very little on computer security but has a general understanding of IT, how computer viruses and worms conduct DDOS. You will have to explain to the learner the involved concepts. The textbook is your reference, Stallings: Chapter 6 & 7.
2. [5 marks] Write a summary to briefly explain to a learner, who knows very little on computer security but has a general understanding of IT, what is a buffer overflow problem, and what are the defenses against the problems. The textbook is your reference, Stallings: Chapter 10 & 11.
3. [5 marks] Write a summary to briefly explain to a learner, who knows very little on computer security but has a general understanding of IT, the means of user authentication, with the advantages and drawbacks of each method. Suppose that you are in charge of the door accesses of the computer laboratories of your organization, what is your choice of the authentication method? Please justify your choice. You can make assumptions if you need, but your assumptions have to be used to justify your choice. Please also suggest, for your authentication method, the steps of “Phase B: Problem Identification” for Helpdesk operation, if a client states that he/she is denied of the access to a laboratory. The textbook is your reference. Stallings: Chapter 3, Limoncelli: Chapter 15, and Week 4 lecture on “Helpdesk Processes”.