CET 324 Advance Cybersecurity
CET 324 Advance Cybersecurity
CET 324 Advance Cybersecurity
Knowledge
Critical understanding of the principles and applications of cybersecurity, societal, legal
and business issues involved in secure systems taking into account the potential
security threats, breaches, risks and attacks
Skills
Analysis and evaluation of the professional requirements of a cybersecurity
practitioner, and critically discuss the challenges facing the cybersecurity practitioners
as an individuals and as part of organisations.
Important Information
You are required to submit your work within the bounds of the University Infringement of
Assessment Regulations (see your Programme Guide). Plagiarism, paraphrasing and
downloading large amounts of information from external sources, will not be tolerated
and will be dealt with severely. Although you should make full use of any source
material, which would normally be an occasional sentence and/or paragraph
(referenced) followed by your own critical analysis/evaluation. You will receive no marks
for work that is not your own. Your work may be subject to checks for originality which
can include use of an electronic plagiarism detection service.
For this assessment you are asked to submit an individual piece of work, therefore the
work must be entirely your own. The safety of your assessments is your responsibility.
You must not permit another student access to your work.
Referencing for this assessment should be done using the Harvard referencing
system. (see your Programme Guide).
Please ensure that you retain a duplicate of your assignment. We are required to send
samples of student work to the external examiners for moderation purposes. It will also
safeguard in the unlikely event of your work going astray.
Allocated time:
Students with no support plan: Deadline is Friday 13th March at 14:00.Students with
support plan: Deadline is Friday 13th March at 16:30. If any student in this category
require more than 3 hours extension should discuss the requirement with the module
leader before the deadline.
Assignment Specification
Section A
Produce a report consisting of the following two parts.
You should support your analyses, arguments, evidence and finding by scholarly works
through literature research.
Part 2 (55 marks)
Based on the work that you have undertaken on this module – both in seminar/lab tasks
and in independent study, produce a report (approximately 1750 words) to identify the
steps (before and after attack) that can be taken by individuals and organisations to
enhance their cybersecurity systems/environments. Your report should describe the
steps that can be taken, the cybersecurity actions that such steps will provide and an
evaluation of the effectiveness of the steps to individuals and organisations.
You should support your analyses, arguments, evidence and finding by scholarly works
through literature research.
Submission
CET324 – Advanced CyberSecurity
Assignment 1
Report
Big Brother Watch, 2017. Virtual Private Networks Privacy Factsheet. [ebook]
www.bigbrotherwatch.org.uk. Available at: <https://bigbrotherwatch.org.uk/wp-
content/uploads/2017/04/VPN.pdf> [Accessed 12 March 2020].
Levi, M. (2017) ‘Assessing the trends, scale and nature of economic cybercrimes:
overview and Issues’, Crime, Law & Social Change, 67(1), pp. 3–20. doi:
10.1007/s10611-016-9645-3.
Morgan, S., 2019. 2019 Official Annual Cybercrime Report. [ebook] Cybersecurity
Ventures sponsored by Herjavec Group. Available at:
<https://www.herjavecgroup.com/wp-content/uploads/2018/12/CV-HG-2019-Official-
Annual-Cybercrime-Report.pdf> [Accessed 12 March 2020].
Samtani, S. et al. (2017) ‘Exploring Emerging Hacker Assets and Key Hackers for
Proactive Cyber Threat Intelligence’, Journal of Management Information Systems,
34(4), p. 1023. Available at: http://search.ebscohost.com/login.aspx?
direct=true&db=edb&AN=127056615&site=eds-live&scope=site (Accessed: 12 March
2020).
Sproule, J., 2016. Cyber Security Underpinning The Digital Economy. [ebook] Available
at: <https://www.iod.com/Portals/0/PDFs/Campaigns%20and%20Reports/Digital
%20and%20Technology/Cyber%20Security%20-Underpinning%20the%20digital
%20economy.pdf?ver=2016-09-13-171033-407> [Accessed 12 March 2020].
Symantec. (2010). Norton Cybercrime Report: The Human Impact. Retrieved June 14
2018, from
https://www.symantec.com/content/en/us/home_homeoffice/media/pdf/cybercrime_r
eport/Norton_USA-Human%20Impact-A4_Aug4-2.pdf
UKEssays. November 2013. What Are The Main Features Of Nessus Information
Technology Essay. [online]. Available from: https://www.uniassignment.com/essay-
samples/information-technology/what-are-the-main-features-of-nessus-information-
technology-essay.php?vref=1 [Accessed 12 March 2020].
Vaidya, R., 2019. Cyber Security Breaches Survey 2019. [ebook] Portsmouth. Available
at:
<https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachme
nt_data/file/813599/Cyber_Security_Breaches_Survey_2019_-_Main_Report.pdf>
[Accessed 12 March 2020].
Vijayarani, D. and Sylviaa.S, M., 2015. Intrusion Detection System - A Study. [ebook]
Available at: <http://airccse.org/journal/ijsptm/papers/4115ijsptm04.pdf> [Accessed 12
March 2020].