Category | Assignment | Subject | Computer Science |
---|---|---|---|
University | University of Hertfordshire | Module Title | 6COM1033 Computer Systems Security |
Assessment Type | Coursework Assignment |
---|
This Assignment assesses the following module Learning Outcomes (Take these from the module DMD):
Knowledge and understanding of:3. computer systems risks, vulnerabilities, threats analysis, and software security,Skills and Attributes:Students will develop the ability to:
This is an individual assessment, which carries 50% of the overall module mark. The task will assess your your ability to conduct a full-scale penetration test on a Linux based system. You will follow the plan that you made in Assignment 2, going through the steps of the pen test. Considering that the goal of the pen test is to find security vulnerabilities and to explain to a client how to mitigate them, you will write a detailed technical report of the practical work that you have done. It is important to write notes and take screenshots while you do the practical work.All academic reports that you write as part of your coursework assessments are in fact technical reports, and as such the following report structure is expected:
The reports should be well written (and word-processed), showing good skills in creativity and design. Sentences should be of an appropriate length and the writing style should be brief but informative. During the teaching weeks you will carry out the practical work in the Cybersecurity labs, or using the pen test rig set up on your own PC or laptop.
As stated above, the Assignment 3 is weighted at 50% of the overall module mark. It should take you approximately 30 hours to complete. It is expected that the report for this task will be in the region of 1800 - 2200 words, plus the appendices. You are expected to conduct a penetration test against a target system (Linux based) that will be provided to you (the IP address of the target will be provided for every individual student by the 15th of November 2023). You are required to present your findings in a factual manner based on the scenario “to advise and convince decision makers of a large corporation (your imaginary sponsor or client) on the security of their systems”. The target system will be accessible via the infrastructure in the Cybersecurity Lab through the VPN connection. You will also be able to use the computers in the Cybersecurity Lab for this purpose, during your timetabled hours. During the module, youwill also receive instructions on how to setup the same PenTest virtual lab in your home computer or laptop, in order to be able to complete your work remotely, through the VPN connection. Every student willbe provided a dedicated target which will be a clone of the same VM.
The overall report conclusions offer your reflection on the undertaken activities and the encountered problems carrying 5% of the overall report mark.
The FINAL deadline for Assignment 3 Pen testing report is on the 08.01.2024 by electronic submission viaStudyNet
Please note you are not required to provide an activity narrative (a narrative on your intelligence gathering activities). You are required to provide an attack narrative detailing four found vulnerabilities, from the risks point of view (the target scanning and four vulnerabilities).
During the narrative, you will have to explain your reasoning behind the attack vector (supported by the findings of the scanning phase), the vulnerabilities that you have chosen to report, linking them to the risks and threats they pose to the “client organization”.This will lead you to the next section - vulnerability exploits and mitigation methods for each vulnerability in the attack narrative. This section is your most important one, as it can be seen by the 40 marks associated with it.
Do You Need 6COM1033 Assignment of This Question
Order Non Plagiarized AssignmentYou are required to take and submit the coursework via StudyNet before the deadline.
You are expected to unify everything into one report. The final report is an academic report and as such the following report structure is expected:
This is imperative as the naming template will be used for corroborating what you claim in your reports with the log files your PenTest activities will generate.
This assignment is worth 50% of the overall assessment for this module.
Marks awarded for:
Grade | Description |
---|
CriteriaFail (< 40) | Very limited explanation of attacks. No technical terms used, no vulnerability identification, weak report structure, lack of originality. |
Pass (40–49) | Satisfactory explanation of attacks. Basic vulnerability identification and evaluation with some risk assessment, but lacks detail in mitigation. Report structure is okay. |
Reasonable (50–59) | Good explanation with technical terms. Four vulnerabilities identified, and some risk assessment and mitigation recommendations are given. Report is clear. |
Good (60–69) | Very good explanation with comprehensive analysis. Vulnerabilities identified, and solutions offered. Well-written report with few errors. |
Excellent (70–79) | Excellent report demonstrating a high level of understanding. Comprehensive risk assessment and detailed mitigation strategies. |
Outstanding (80+) | High academic ability, professional approach, and thorough analysis. Clear, methodological thinking in identifying vulnerabilities and assessing risks. |
Hire Experts to solve 6COM1033 Assignment Before Deadline
Pay & Buy Non Plagiarized AssignmentAre you looking for help with your 6COM1033 Computer Systems Security Assignment? Don’t stress anymore! We offer expert computer science assignment help at affordable prices. Our team of PhD writers provides well-researched, AI-free, and plagiarism-free work. We deliver before deadlines and are available 24/7 to support you. Whether it’s Understanding Computer Systems Security Place-Based Education or any other topic, we’re here for you. You can also get free assignment samples to check our quality. Improve your grades and reduce your stress—contact us today for reliable and professional assignment help that you can trust!