This is an individual assessment comprised of three tasks. Task 1 and 2 carry 25% respectively and task 3 carries 45% of the overall portfolio mark. 5% is allocated to the overall conclusion of the portfolio. Task 1 will assess your understanding of making decisions in the modern information environment. Task 2 will assess your understanding of the theoretical and practical aspects of computer security and operations. Task 3 will assess your understanding of advanced principles in computer security from a systems perspective. All tasks are small academic reports and as such the following report structure is expected for each milestone report:
You are expected to demonstrate an insight into the implications of the problem introduced in each task by using clear and concise arguments. The reports should be well written (and word-processed), showing good skills in creativity and design. Sentences should be of an appropriate length and the writing style should be brief but informative.
During the teaching weeks you will have the opportunity to submit draft copies of your portfolio activities. The module team will provide feedback based on your draft copies and advice regarding your progress (if it is deemed necessary). The deadline for the complete Portfolio is the 19.12.2019.
Task 1 is weighted at 25% of the overall portfolio mark. It should take you approximately 10 hours to complete. It is expected that the report for this task of the portfolio will be in the region of 1000 words. You are required to expand on the title and develop your arguments to clearly state why there is so much uncertainty in decision making for cyber security and how to overcome it. The deadline for the DRAFT Task 1 is on week 12 by electronic submission via Canvas. The module team will then provide general formative feedback, allowing you the opportunity to reflect on your activities and improve your work where necessary. The final copy of Task 1 should be included in the final Portfolio. Although there are no allocated marks for references and bibliography you are expected to use appropriate peer reviewed sources for developing your arguments, and the Harvard referencing style as per the University regulations.
Task 1, Assessment Criteria |
Mark Available |
Fog of war discussion |
5 |
Information environment discussion |
5 |
Decision making for cyber (friction issues?) |
5 |
Critical discussion (your justified & supported opinion) |
10 |
Total |
25 |
It is expected you will discuss the notions in the above table and explain the fundamental issues behind the complex problem of cyber security today; taking the wrong decisions and/or not acting in a timely manner because
of the environmental and systemic uncertainty.
Task 2 is weighted at 25% of the overall portfolio mark. It should take you approximately 10 hours to complete. It is expected that the report for this task of the portfolio will be in the region of 1000 words. You are expected to critique the paper “Deception and Manoeuvre Warfare utilising Cloud Resources”: Stilianos Vidalis & Olga Angelopoulou (2013) Deception and Maneuver Warfare Utilizing Cloud Resources, Information Security Journal: A Global Perspective, 22:4, 151-158, DOI: 10.1080/19393555.2013.780273. In your critique you should explain how cyber manoeuvre principles can underpin the offensive and defensive operations in the modern information environment. The deadline for DRAFT Task 2 is on week 16 by electronic submission via Canvas. The module team will then provide general formative feedback, allowing you the opportunity to reflect on your activities and improve your work where necessary. The final copy of Task 2 should be included in the final Portfolio. Although there are no allocated marks for references and bibliography you are expected to use appropriate peer reviewed sources for developing your arguments, and the Harvard referencing style as per the University regulations.
Task 2, Assessment Criteria |
Mark Available |
Paper Critique |
5 |
Manoeuvre operations principles |
10 |
Cyber operations in the modern environment |
10 |
Total |
25 |
Task 3 is weighted at 45% of the overall portfolio mark. It should take you approximately 20 hours to complete. It is expected that the report for this task of the portfolio will be in the region of 1500 words. You are expected to conduct an analysis of the network packet capture that will be made available to you, using Wireshark. You are required to present your findings in a factual manner to convince decision makers of a large corporation on business strategies. The capture will be made available to you in LB154 and through Canvas. The analysis rig you will have to use for this activity will also be setup in LB154 but you can use Wireshark from your own device. There is no DRAFT deadline for this Task. The FINAL deadline for Task 3 and for the WHOLE portfolio is on the 19.12.2019 by electronic submission via Canvas.
Task 3, Assessment Criteria |
Mark Available |
Statistical analysis (network boundaries, active nodes, external sources, type of traffic and protocols) |
15 |
Activity narrative and attack identification (of one attacker) |
20 |
Attack explanation (of one attacker) |
10 |
Total |
45 |
Overall Portfolio Conclusion and Reflection
The overall portfolio conclusion, offering your reflection on the undertaken activities and the encountered problems carry 5% of the overall portfolio mark.