| Category | Assignment | Subject | Computer Science |
|---|---|---|---|
| University | The University of Law (ULaw) | Module Title | BS517 Data Security |
| Word Count | 2,500 words |
|---|---|
| Assessment Type | Individual Portfolio |
Key Details and Requirements Learning outcomes:
By sitting this assessment, I am confirming:
By submitting this assessment, I am confirming that I am fit to sit according to the Assessment Regulations.
Assessment details: Individual Portfolio, 100% (equivalent to 2,500 words). Portfolio should be written in PebblePad.
Referencing: Students are expected to use Harvard Referencing throughout their assignments where required. Please follow the Harvard Referencing Handbook for all your assignments at the ULBS.
Submission Method: Turnitin - Your work will be put through Turnitin. All submissions will be electronically checked for plagiarism.
You have the option to upload your work ahead of the deadline, more than once. ULBS will be reviewing your last submission only. You can only upload one file. For example, if your work contains a word document and power point slides/Excel spreadsheet you will need to copy your slides/spreadsheet into the word document. Note: Keep in mind that self-plagiarism (when you reuse your own specific wording and ideas from work that you have previously submitted without referencing yourself) is also a form of plagiarism and is not allowed.
eSecureFin Limited is a rapidly growing financial services company that offers a range of financial products, including loans, investment management, and insurance services. With its expanding client base, eSecureFin Limited collects and manages a significant volume of sensitive personal and financial data, including national insurance number (NINO), credit card information, and financial transaction records. Over the past year, eSecureFin Limited has faced several security incidents that have raised serious concerns about its data security measures.
These incidents include but are not limited to:
eSecureFin Limited’s current data security measures are outdated and insufficient to handle the increasing threats. Key challenges include Inadequate encryption, weak access control, lack of monitoring, insufficient employee training.
You have been hired as a data security consultant for eSecureFin Limited. Knowing the history of recent incidents your task is to assess the current data security measures, identify gaps, and develop a python-based solution to enhance the company’s data security.
Explain, critically evaluate and assess the data security risks using risk matrix (impact vs likelihood) and CVSS (common vulnerability scoring system) based on recent incidents in the given scenario above.
Based on the Task 1 evaluation, now develop software solutions considering the data security principles (eg, CIA). Provide evidence (screenshots and a Google Colab link) for 7 out of the 9 python scripts developed during the semester from consolidate section. Each screenshot must display the output and confirm that the code was executed correctly. Provide a brief explanation of how each script contributes to enhancing data security in the given scenario.
NOTE: Add the shareable colab link for verification.
Identify, describe and evaluate common cybersecurity frameworks and recommend one to enhance security. Provide the rationale for choosing this framework for the
scenario, and, if applicable, provide screenshots of the tools that was developed in task 2, to propose security improvements.
Once you have completed individual tasks, you should write a summary report. This summary report serves as a platform for you to articulate and describe the key learnings derived from each task. It is an opportunity to synthesise insights, providing an overview of the knowledge and understanding acquired throughout the completion of the assigned tasks.
Portfolio instructions:
Please refer to the marking criteria (below) for a breakdown of how the tasks will be marked.
| GRADE DESCRIPTORSMARKING CRITERIA | Mark Weight |
FAIL (0 - 49%) | PASS (50 – 59%) | COMMENDATION (60 – 69%) | DISTINCTION (70-100%) |
| Exhibits an unsatisfactory grasp of the issues.Primarily descriptive and lacking in independent critical thought. Weak or no attempt at analysis, synthesis and critical reflection. Little evidence of ability to tackle the issues. Poor structure/grammar/ | Satisfactory grasp of the issues, with limited independent critical thought appropriate to the tasks.Material is largely relevant to the tasks. Some evidence of analysis, synthesis and critical reflection. Work is presented in acceptable manner, with some minor errors. | Good/very good understanding of the issue with some independent critical thought and approach to the tasks. Good attempt at analysis, synthesis and critical reflection, with evidence of some ability to tackle issues. Work is clearly presented in a fairly well organised manner. | Excellent level of understanding.All requirements are dealt with to a high standard. Excellent analysis, synthesis and critical reflection. Evidence of independent and original judgement in relation to resolution of problems Excellently presented. | ||
| TASK 1 – Identify and critically evaluate and assess the data security risks using risk matrix (impact vs likelihood) and CVSS (common vulnerability scoring system) based on recent incidents in the given scenario above. | 20 | ||||
|
TASK 2 – Based on the Task 1 evaluation, now develop software solutions considering the data security principle. Provide evidence (screenshots and a Google Colab link) for 7 out of the 9 Python scripts developed during the semester. Each screenshot must display the output and confirm that the code was executed correctly. Provide a brief explanation of how each script contributes to enhancing data security in the given scenario. NOTE: Add the shareable Colab link for verification. |
30 | ||||
| TASK 3 – Evaluate common cybersecurity frameworks and recommend one to enhance security. Provide the rationale for choosing this framework for the scenario, and, if applicable, provide screenshots of the tools that was developed in task 2, to propose security improvements. | 30 | ||||
| TASK 4 – Once you have completed individual tasks, you should write a summary report. This summary report serves as a platform for you to articulate and describe the key learnings derived from each task. It is an opportunity to synthesise insights, providing an overview of the knowledge and understanding acquired throughout the completion of the assigned tasks. | 20 |
Do You Need This BS517 Data Security Assignment?
Order Non Plagiarized AssignmentDo you need help with your BS517 Data Security assignment at the University of Law? Look no further! We are here to assist you. Students seeking high-quality assistance often choose Best Assignment Help for timely and accurate solutions. Expert Online Cyber Security Assignment Help ensures easily understandable content backed by thorough research. A free list of assignment sample examples helps students learn proper writing techniques and improve their answers. This combination of guidance and resources helps students achieve better grades and develop a strong understanding of the subject.
Hire Assignment Helper Today!
Let's Book Your Work with Our Expert and Get High-Quality Content