Get Instant Help From 5000+ Experts For
question

Writing: Get your essay and assignment written from scratch by PhD expert

Rewriting: Paraphrase or rewrite your friend's essay with similar meaning at reduced cost

Editing:Proofread your work by experts and improve grade at Lowest cost

And Improve Your Grades
myassignmenthelp.com
loader
Phone no. Missing!

Enter phone no. to receive critical updates and urgent messages !

Attach file

Error goes here

Files Missing!

Please upload all relevant files for quick & complete assistance.

Guaranteed Higher Grade!
Free Quote
wave
Assessment of Information Environments and Cyber Operations

Module Learning Outcomes

This Assignment assesses the following module Learning Outcomes:
1. Develop a deep and systematic understanding and knowledge of Information Environments in terms of deterrence, detection, protection and reaction to access,
2. Develop a deep and systematic understanding and knowledge of current theoretical and  methodological approaches to offensive Cyber Operation concepts and philosophies,
3. Critically reflect on the implementation and management of offensive Cyber Operations at all levels,
4. Critically reflect on the implementation and management of defensive Cyber Operations at all levels
5. Apply with flexibility and creativity originality in the application of the different types of cyber
operations and their utilization and deployment based on the scenario at hand,
6. Design and undertake substantial investigations under the context of situational awareness,
7. Demonstrate self-direction and creativity in designing and developing a cyber defense environment
Assignment Brief:
This is an individual assessment comprised of three tasks. Task 1 and 2 carry 25% respectively and task 3 carries  45% of the overall portfolio mark. 5% is allocated to the overall conclusion of the portfolio. Task 1 will assess your  understanding of making decisions in the modern information environment. Task 2 will assess your understanding of the theoretical and practical aspects of computer security and operations. Task 3 will assess your understanding  of advanced principles in computer security from a systems perspective. All tasks are small academic reports and as  such the following report structure is expected for each milestone report:
1. Introduction, where you will discuss your plan for solving the problem introduced by the module team
2. Main Body, where you will develop your arguments
3. Conclusions, where you will critically discuss your findings
4. References, aim for an average of 20 references (yes, 20 for each task! Not task 3)
5. Appendixes
You are expected to demonstrate an insight into the implications of the problem introduced in each task by using  clear and concise arguments. You will receive formative feedback as part of the module to demonstrate how to be  concise in your written work. Please ensure, in completing these tasks you deploy the techniques you have been taught. If you produce work that is not concise and to the point, then marks may be reduced. The reports should be well written (and word-processed), showing good skills in creativity and design. Sentences should be of an appropriate length and the writing style should be brief but informative.
During the teaching weeks you will have the opportunity to submit draft copies of your portfolio activities. The module team will provide feedback based on your draft copies and advice regarding your progress (if it is deemed necessary). The deadline for the complete Portfolio is the 19.12.2019.
Task 1 – Clausewitz fog of war in the modern enterprise information environment
Task 1 is weighted at 25% of the overall portfolio mark. It should take you approximately 10 hours to complete. It is expected that the report for this task of the portfolio will be in the region of 1000 words. You are required to expand on the title and develop your arguments to clearly state why there is so much uncertainty in decision making for cyber security and how to overcome it. The deadline for the DRAFT Task 1 is on week 12 by electronic submission via Canvas. The module team will then provide general formative feedback, allowing you the opportunity to reflect on your activities and improve your work where necessary. The final copy of Task 1 should be included in the final Portfolio. Although there are no allocated marks for references and bibliography you are expected to use appropriate peer reviewed sources for developing your arguments, and the Harvard referencing style as per the University regulations.
It is expected you will discuss the notions in the above table and explain the fundamental issues behind the complex problem of cyber security today; taking the wrong decisions and/or not acting in a timely manner because of the environmental and systemic uncertainty.
Task 2 – cyber manoeuvre in the modern information environment
Task 2 is weighted at 25% of the overall portfolio mark. It should take you approximately 10 hours to complete. It is expected that the report for this task of the portfolio will be in the region of 1000 words. You are expected to critique the paper “Deception and Manoeuvre Warfare utilising Cloud Resources”: Stilianos Vidalis & Olga  Angelopoulou (2013) Deception and Maneuver Warfare Utilizing Cloud Resources, Information Security Journal: A  Global Perspective, 22:4, 151-158, DOI: 10.1080/19393555.2013.780273. In your critique you should explain how cyber manoeuvre principles can underpin the offensive and defensive operations in the modern information environment. The deadline for DRAFT Task 2 is on week 16 by electronic submission via Canvas. The module team will then provide general formative feedback, allowing you the opportunity to reflect on your activities and improve your work where necessary. The final copy of Task 2 should be included in the final Portfolio. Although there are no  allocated marks for references and bibliography you are expected to use appropriate peer reviewed sources for developing your arguments, and the Harvard referencing style as per the University regulations.

support
close