Category | Assignment | Subject | Management |
---|---|---|---|
University | University of Salford Manchester | Module Title | Cybersecurity and Information Management |
Academic Year | 2025/26 |
---|
This assessment comprises of two tasks as described below:
1.TASK 1: You are expected to submit one 7-minute podcast and associated artefacts at the final submission point on Blackboard.
The podcast submission deadline is by no later than 18:59 on Friday, the 24th of October 2025. Any submission received after 18:59 of the date (even if only by a few seconds will be considered as late).
2.TASK 2: You are expected to attempt 80 multiple-choice questions (MCQs) spread over 4 weeks (20 questions per week)
During the second hour of your respective timetabled seminar sessions in week 3, 4, 5, and 6, the MCQ segment of the Blackboard site will open and you would be expected to attempt 20 multiple-choice questions, per week, directly associated with the lecture theme from the prior week. The test will be open book styled.
Students with a Reasonable Adjustment Plan (RAP) or Carer Support Plan should check their plan to see if an extension to this submission date has been agreed.
After developing your podcast audio and the associated artefacts (case study document and subtitle file), you would be expected to submit three separate files on Blackboard.
Please ensure to submit by uploading:
Note: Ensure your podcast audio is NOT LESS than 5 minutes and does NOT EXCEED 7 minutes. Anything beyond the recommended timescale will not be considered in the marking and scores allocation.
You should submit the three items (two files, and one Clipchamp link) to three different allocated areas on Blackboard by the date set on the schedule (i.e., 18:59 on Friday, the 24th of October 2025). You will be shown where to submit at the appropriate time.
As the University will mark assessments anonymously where this is possible, please use your student roll number and not your name on your submission.
The assessment is a digital portfolio, which includes two distinct tasks:
Detailed instructions on the tasks are below:
During your respective timetabled seminar sessions in week 2, 3, 4, and 5, you will be supported by the tutor to develop a 7-minute-long podcast involving two speakers discussing a specific cybersecurity breach. You are expected to learn and utilise a combination of various digital applications, including Microsoft Clipchamp and Google NotebookLM, to develop your podcast. Full guidance will be provided in a slide deck and practically at various points during the seminar sessions. For the case study, you can choose to base your podcast on (a) the 2025 cyber-attack on a UK retailer, The Co-Op, OR (b) the 2025 ransomware attack on another UK retailer, Marks and Spencer (M&S). Choose one case study only.
Your 7-minute podcast, involving two speakers, should provide a detailed and engaging discussion on only one of the two provided case studies.
Your case study document must:
Digital Application Utilisation
A key component of this task is your ability to effectively use modern digital tools to enhance your workflow and the quality of your output, and to communicate academic language to a lay audience. You are expected to learn and utilise a combination of various digital applications, including Microsoft Clipchamp and Google NotebookLM.
Step 1: Google NotebookLM for Podcast production: Google NotebookLM is a powerful tool you will use to organise and synthesise your research materials. You will upload your chosen source documents, including your well-researched case study document, and relevant news articles, academic papers, and official reports related to your chosen case study into a new notebook. You should then leverage NotebookLM's AI-powered capabilities to generate a two-person 7-minute-long podcast audio by activating the "Audio Overview" feature on the app. Once the audio is ready, preview it by listening from start to finish. If satisfied, download the .mp3 file, which will later be uploaded to Clipchamp. If unsatisfied with the output, tweak your input (i.e., the AI-generated prompt, and uploaded documents, etc.,) and repeat the process until you get a satisfactory podcast audio. This iterative creative process will help you understand the core issues of the breach, including the technical details, the business impact, and the company's response. A step-by-step guide on how to create this audio file will be provided in a slide deck and in-class seminars.
Step 2: Microsoft Clipchamp for Podcast Post-Production: You will use Microsoft Clipchamp to produce and edit your podcast by uploading the .mp3 file downloaded from Google NotebookLM. Podcast production, in this regard, includes arranging segments, inserting background music, adding an introductory and concluding segment (e.g., a short jingle), inserting video or similar multimedia template elements (optional), and ensuring the final podcast is a professional, polished 7-minute podcast file. You will be assessed on the clarity of your audio, the seamlessness of your edits, and the overall quality of the final podcast file. This tool is chosen for its user-friendly interface and accessibility, allowing you to focus on the content and structure of your discussion.
Remember that your goal is to not only demonstrate your technical and managerial understanding of a significant cybersecurity breach but also to showcase your ability to use modern digital tools for content creation, knowledge synthesis, and effective communication to a lay audience.
Stuck Your Assignment? Deadlines Are Near?
Hire Assignment Helper Now!During week 3, 4, 5, and 6, the respective MCQ segment of the Blackboard site for each week will open and you would be expected to attempt 20 multiple-choice questions, per week, directly drawn from the lecture theme discussed the prior week. Each question will be worth 0.5 marks. In other words, you can score up to a maximum of 10 marks per week if you get all the answers correctly. At the end of week 6, you must have completed all 80 questions as the segment will automatically close by 18:59 on Friday, the 24th of October 2025.
Furthermore, this segment of the assessment is practice based and directly aligned to key learnings from the British Computer Society’s Certificate in Information Security Management Principles (CISMP) and is particularly aimed at helping you prepare for the certification.
Digital Portfolio components |
Detailed requirements |
||||
Task: Podcast Artefacts & Multiple-Choice Questions (100 marks) |
Podcast (60 marks) |
Discussion Points and Quality in the Podcast Audio submitted to Blackboard as a Clipchamp Link (30 marks) |
|||
|
|
Case Study Content, Academic Rigour, and Presentation in the Microsoft Word document submitted to Turnitin on Blackboard as a .docx file (25 marks) |
|||
|
|
Closed Caption (SubRip Subtitle) file submitted to Blackboard as .srt file (5 marks) |
|||
|
Multiple Choice Questions (40 marks)
|
Week Three 20 MCQs (10 marks) |
|||
|
|
Week Four 20 MCQs (10 marks) |
|||
|
|
Week Five 20 MCQs (10 marks) |
|||
|
|
Week Six 20 MCQs (10 marks) |
Your digital portfolio will be assessed based on several key criteria for both the podcast and the multiple-choice questions. We are looking for scholarly rigour, critical thinking, and the effective application of digital tools.
Marks Will Be Awarded For:
This includes the quality of your audio, the seamlessness of your edits, and the inclusion of any optional multimedia elements. The submission of a professional-looking and functioning closed caption (.srt) file is also a key part of this criterion.
Marks May Be Deducted For:
Please see the Assessment Marking Rubric at the end of this document for more details about mark allocations and your obligations.
On successful completion of this assessment, you will be able to:
Practical, Professional or Subject Specific Skills
Please see the Assessment Rubric below for more clarity on what we expect from you and how various segments of the assessment will be scored.
Criteria |
Distinction (79-100%) |
Merit (69-79%) |
Good (59-69%) |
Pass (49-59%) |
Fail (0-49%) |
Non-Submission/Wrong Submission (0%) |
Integration of Knowledge |
Demonstrates outstanding synthesis of knowledge from a wide range of academic and industry sources, showing a deep and comprehensive understanding that goes well beyond the provided materials. |
Effectively synthesises knowledge from diverse sources, demonstrating a strong understanding of the topic. |
Integrates knowledge from some sources, showing a solid understanding of the concepts discussed. |
Shows a basic level of knowledge integration from a limited number of sources but may lack depth. |
Shows little to no evidence of knowledge integration and may misinterpret core concepts. |
The work shows no evidence of knowledge integration or is a non-submission. |
Critical Analysis & Synthesis |
Provides a highly critical and insightful analysis of the cyber-attack, demonstrating original thinking and an exceptional ability to connect different aspects of the breach. The work is not merely descriptive. |
Critically analyses the chosen cyber-attack, exploring causes, impacts, and responses. The analysis shows good synthesis and connection of ideas. |
Provides a clear analysis of the cyber-attack. The work is mostly descriptive but includes some critical points. |
The work is largely descriptive, with limited or no critical analysis of the breach. |
The work is completely descriptive, lacking any critical analysis, synthesis, or original thought. |
The work is a non-submission or shows no attempt at analysis. |
Use of Digital Tools & Multimedia |
Expertly uses Google NotebookLM and Microsoft Clipchamp to produce a professional, highly engaging, and well-edited podcast with flawless audio quality and a perfect closed caption file. |
Effectively uses digital tools to produce a professional and engaging podcast with good audio quality and a functional closed caption file. |
Shows competence in using the digital tools to create a functional podcast and a basic closed caption file. |
The use of digital tools is basic, resulting in a podcast that may lack professional polish or a fully functional closed caption file. |
The podcast audio is unprofessional (e.g., poor quality, no edits) or the closed caption file is non-functional or of very poor quality. The submission lacks a required component (e.g., audio, case study, or subtitle file). |
The submission is missing a required file (e.g., podcast audio, case study document, or subtitle file). |
Professionalism & Rigour |
Submissions are exemplary in every aspect, including perfect APA 7th edition referencing, logical structure, and concise writing in the case study document. No errors. The work demonstrates high originality and insight. |
Submissions are professional and well-structured with accurate APA 7th edition referencing. The writing is clear, and the work reflects a good level of originality. |
Submissions are generally professional, but may have minor issues with referencing, structure, or writing clarity. |
Submissions have noticeable issues with referencing, structure, or clarity, reflecting a lack of professional presentation. |
The work demonstrates poor academic conduct, including significant errors in referencing, poor structure, or a lack of professional presentation. Plagiarism or submitting work that is not your own will result in a failing grade. |
The work is plagiarised, or shows poor effort, or exceeds the specified time/page limits. |
Buy Custom Answer Of This Assignment & Raise Your Grades
Get A Free QuoteIf you are worried about the Cybersecurity and Information Management Assignment? No need to worry anymore! Our experts provide Cyber Security Assignment Help that has been designed for the students. You will get expert guidance and help on assignments that will strengthen your concepts. We also provide you with free assignment samples that will help you understand. And the best part? All the content is 100% original, written by PhD expert writers, and well-researched, so that you get the best quality. So don’t delay now; boost your grades with our help!
Let's Book Your Work with Our Expert and Get High-Quality Content