OFFERS! offer image Get Expert-crafted assignments
Save 51%

CSY3062 Cyber Security and Applied Cryptography Assessment Brief 2026 | UON

Request Plagiarism Free Answer Published: 07 Feb, 2026
Category Assignment Subject Computer Science
University University of Northampton ( UON) Module Title CSY3062 Cyber Security and Applied Cryptography

CSY3062 Assessment Brief

Module title: Cyber Security and Applied Cryptography
Module code: CSY3062
Assessment code/title: Security report with recommendations for delivering data security
Assessment weighting/word-limit: 75%
Submission date: 22 March 2026
Feedback date: 4 weeks after the submission date

Assessment Task:

Title: Security report with recommendations for delivering data security

Setting the Scene

Please, read the full details below- Assignment Scenario.

Learning Outcomes aligned to this Assessment:

Learning Outcomes are available on the Module Specification for the module, and are also on the Nile site

Academic Practice (referencing style, literature usage, AI Usage):

Please, read the assessment brief below.

Use Of Generative AI (Artificial Intelligence) Within This Assessment:

Some uses of Generative AI may be deemed unethical in your Assessment. Please access the following position guidance from University of Northampton on the use of Generative AI within assessments.

This assignment falls into the following category:

Category 2: GenAI can be used in an assistive role

You may make use of GenAI in your assessment in an assistive role, but you must acknowledge this appropriately.

Ref to the UON guidance on the different types of GenAI use, what you need to acknowledge and how you should do this.

Get Solution of CSY3062 Cyber Security and Applied Cryptography Assessment before Deadline

Pay & Buy Non Plagiarized Assignment

Assessment Guidance:

Reading List:

You will find a link to your online reading list on NILE in the “About this module” section.

Include skills hub link:

You may refer to the following link:

https://skillshub.northampton.ac.uk/#

Confidential advice available through:

su.advice@nothampton.ac.uk

Feedback:

Feedback should be received within 20 working days
Announcement will be sent out on Nile

Instruction on Anonymity for students : Further guidance is available online

Assignment Scenario

Gradgo the Graduate Recruitment Agency in Northampton have considered your responses to their initial Cyber Security queries and have now decided to extend your commission for a comprehensive report in the form of a term (research) paper.

You are asked to write a security report in the form of a term paper, in which you propose a suitable “data security” solution for any type of software-based activity you may consider that the Agency would be engaged on as part of their total business operations on the Internet.

In your paper you should:

  • Describe your chosen area in detail
  • Describe any identifiable vulnerabilities- conduct a vulnerability test
  • Explain what you would recommend and consider to be a suitable mitigation solution
  • Identify and experiment with suitable cryptographic software tools
  • Explain how you would implement your recommended solution, based on your own findings, to provide data security for the Agency

Note: You are a Cyber Security professional with expertise in applied Cryptography. Cryptography should be the main basis of your solution and recommendations.

You may choose*:

Any online application

Or a security technology that might provide data security for online applications
Your paper should be clear, concise, and written in a technical context.

You will be expected to present your findings to an audience of other security experts.

You may discuss the topic of your choice with your tutor during the assignment support session.

There are several topics listed below for your reference.

Your Assignment Tasks In A Nutshell

You must do one of the following:

Option 1

  • Research, investigate, and evaluate the security implications of an online Application

Option 2

  • Conduct an in-depth analysis of a Security Technology that can provide online Security when deployed

Option 3

  • Choose and experiment with suitable cryptographic software tool(s)

Option 4

  • Develop your own software tool that can implement any form of cryptography, which could potentially be used as part of the provision of data security within the context of your chosen topic

Report Requirements

  • Write a full security report in the form of a 2000-4000 words term paper
  • Appendices are not considered in the word count
  • Submit a 10 minute video recording of your paper
  • The video must include a demonstration of the practical experimentation
  • Open source & free

Purpose Of The Presentation

Demonstrate your awareness and knowledge of your chosen topic for assessment purposes

Should you fail to submit, your mark may be adversely affected and you may fail.

Typical Technical Term Paper Structure

  • Section
  • Title
  • Authors details
  • Abstract
  • Introduction
  • Main Body
  • Summary
  • References

Introduction Includes:

  • Background information
  • Related work
  • Major issues
  • Scope of the investigation

Main Body Includes:

  • Your approach to address the issue(s)
  • Findings
  • Review
  • Comparative analysis
  • Detailed technical underpinning
  • Security software review
  • Use & analysis*
  • Development of solutions

*This would typically, involve some form of a practical experimentation.

Research Paper Possible Topics

  • Cyber Security issues*
  • Penetration testing & Ethical Hacking for improved security
  • Practical Cryptographic systems
  • Security Standards
  • Encryption algorithms
  • Hash functions with appendix and message recovery models
  • Authentication Systems
  • PKI
  • Secure Protocols: IPSec, SSL/TLS
  • Quantum resistant cryptography
  • WiFi technologies
  • Mobile technologies
  • Networking technologies: VPNs
  • E-commerce Security Systems
  • Security- Windows/ Unix/Linux cryptographic schemes
  • Identity and access Management
  • Social engineering
  • Insider Threat
  • MDM/Legacy/IOT security
  • Supply chain Vulnerabilities
  • SIEM Integration
  • Sophisticated Threat Landscape due to AI/other emerging threats

Online Sources

There are several online sources, to include the following, that publish technical papers and articles on various computer security topics.

http://www.techrepublic.com/topic/security/

It is known that you may be required to register to download some of their specific documents. In such cases, you can register as a University of Northampton student and give your course details.

Grading

The full grading criteria table is available to view on Nile.

  • Grading Criteria Will Be Based On:
  • The level of challenge met by the student
  • Knowledgeable and logical adherence to issues
  • Evidence of clearly focused and relevant research effort
  • Effective, appropriate, and clear choice and use of S/W tool
  • Written with appropriate technical detail and presented with clarity and creativity

Assessment Submission

To submit your work electronically:

  • Go to the ‘Submission’ area on the NILE site
  • Use the relevant submission points to upload the assignment deliverables
  • Deadline: 15:00 (UK local time) on the date of submission
  • Accepted Formats:
  • Microsoft Word documents (.doc or .docx)

Plagiarism & Turnitin

  • Written work submitted to Turnitin will be subject to anti-plagiarism detection software
  • Turnitin checks student work against internet sources and proprietary databases
  • Access the University of Northampton’s Plagiarism Avoidance Course (UNPAC)

Submission Confirmation:

  • Receipt = proof of submission
  • Green banner = successful submission

Further Assessment Guidance

Please access the following document for more general information about:

Anonymous marking

  • Submissions
  • Feedback
  • Grades

UON Standard Assessment Guidance

N.B Work emailed directly to your tutor will not be marked.

Get Answer of CSY3062 Cyber Security and Applied Cryptography Assessment

Pay & Buy Non Plagiarized Assignment

Looking for Online Assignment Help for your CSY3062 Cyber Security and Applied Cryptography course at University of Northampton (UON)? We offer expert guidance to help you ace your assignments and exams. Our team of professionals provides 100% plagiarism-free, AI-free, and high-quality UON assignment solutions tailored to your academic needs. We ensure timely delivery and help you understand complex concepts in a simple, easy-to-understand way. Improve your grades and secure your academic future with our trusted services. Contact us now for top-notch Cyber Security Assignment Help in UK!

Workingment Unique Features

Hire Assignment Helper Today!


Latest Free Samples for University Students

BTEC International Level 3 Business Unit: 5 International Business Assignment Answers Sample

Category: Assignment

Subject: Business

University: ______

Module Title: Unit: 5 International Business

View Free Samples

SC1006 Key Issues in Sociology (Part 2) Essay Continuous Assessment Answer PDF | UCC

Category: Assignment

Subject: Sociology

University: University College Cork (UCC)

Module Title: SC1006 Key Issues in Sociology

View Free Samples

BL6024 Quantitative Skills for Biologists using R Assignment Answers Solution PDF UCC

Category: Assignment

Subject: Science

University: University College Cork (UCC)

Module Title: BL6024 Quantitative Skills for Biologists using R

View Free Samples

MH6016 Advance Care Planning Continuous Assessment Answer Solutions pdf

Category: Assignment

Subject: Education

University: University college cork (UCC)

Module Title: MH6016 Advance Care Planning

View Free Samples

HI1002 Modern Ireland: Culture, Politics and Society Essay Continuous Assessment Answers Sample PDF | UCC

Category: Assignment

Subject: Education

University: University College Cork (UCC)

Module Title: HI1002 Modern Ireland: Culture, Politics and Society

View Free Samples
Online Assignment Help in UK