CTEC5724 Advance Research Topics in Cyber Technology
The learning outcomes that are assessed by this coursework are:
1.Develop knowledge and understanding of the use of scientific and engineering principles and recognise the need to research new technologies as they emerge.
2.Define a research problem and be able to appreciate state of the art theories, models, techniques and recognise the impact that research has on the principles of computational modelling.
3.Undertake a critical literature review to establish the relevant body of research in that area.
Apply a selection of the scientific techniques and principles to a concrete instance of a real world
problem showing understanding of the subject domain and the ability to apply critical thinking and scientific principles.
Tasks to be undertaken:
In this coursework you are expected to:
1.Define a research problem: Define an appropriate research problem in the area of Cyber Security and/or Privacy.
2.Produce a critical literature review: Search and review critically the literature relating to the research problem identified in 1.
3.Describe concrete worked out examples that demonstrate the researched literature.
4.You will obviously undertake a broad search of the internet for journals, articles and reports for your chosen title, but do pay due regard to the relative status of some internet resources compared to more established academic ones.
Before you commence any real work on the assessments outlined in this document do make sure that you fully understand what is required of you. You will be working autonomously and remotely on these assessment items so please do not proceed unless you are absolutely sure what is required of you – you cannot afford to waste your time on unproductive work or run the risk of failure due to any misunderstanding over the requirements. Any questions or uncertainty... email or Skype the module leader and ask – please!
Students are asked to create a report of 4.000 words maximum of a hot topic, e.g. smart cars, 5G security etc. including mostly academia sources (conference articles and journal publications from respected publishers, e.g. IEEE, Elsevier, Springer) and try to analyze, discuss those sources in order to come to some discussion and conclusion sections. They are also asked to include real life incidents of recent years and critically discuss about them by presenting route cause of the attack, existing vulnerabilities that the attackers exploited, recommendations and similarities of those attacks.
Report containing Problem, Literature Review and Examples (max. 4.000 words)
When completed you are required to submit your coursework to:
1.Electronic copy on Blackboard (TurnItIn)
Late submission of courseworkpolicy: Late submissions will be processed in accordance with current University regulations which state:
“the time period during which a student may submit a piece of work late without authorisation and have the work capped at 50% if passed is 14 calendar days. Work submitted unauthorised more than 14 calendar days after the original submission date will receive a mark of 0%. These regulations apply to a student’s first attempt at coursework. Work submitted late without authorisation which constitutes reassessment of a previously failed piece of coursework will always receive a mark of 0%.”