For faster services, inquiry about  new assignments submission or  follow ups on your assignments please text us/call us on +1 (251) 265-5102

CMP71001: Cybersecurity

CMP71001: Cybersecurity S2/2018
Student:

Criteria Marks Mark break
down
Mark
Received
Feedback Note to the student Note to the marker
Task1 12 partial marks of 0.5(s) can be given to
incomplete but correct answers
Identify the most critical components of
the university’s information system – the
critical information assets
3 Access control is a critical component of any
information system. WFA can help to identify the
most critical component. If you don’t use WFA,
provide arguments to justify your choice of the
critical components.
Identify what threats the BYOD policy may
bring to the identified critical assets
3 Do not bring in any threats. Think about BYOD policy.
Identify potential vulnerabilities of each
asset against the identified threats
3 Use TVA worksheet to document this process.
Assess the risk to the university’s
information system.
3 You can use either quantitative or qualitative risk
assessment method.
Task 2 10
Clearly explains the working principle of
the certificate-based authentication.
3
Compare and contrast the certificate
based authentication and password-based
authentication.
3
Correctly identify and highlight the useful
features of the certificate-based
authentication for BYOD policy.
3
Quality of references 1 Reference from reputable sources e.g. textbook,
research papers, technical reports.
Task 3 8
Correctly identify the characteristics of a
Spam and Spamming act.
2
Provide three representative examples of
Spams
3
Spam handling instruction 3
Total 30 0
General feedback:

AssignmentTutorOnline

Assignment-2 Marking Guide

WhatsApp
Hello! Need help with your assignments? We are here