| Category | Assignment | Subject | Computer Science |
|---|---|---|---|
| University | Northumbria University | Module Title | LD7098 Cyber Security Principles |
| Academic Year | 2025/26 |
|---|
| Module Title: | Cyber Security Principles |
| Module Number: | LD7098 |
| Academic Year: | 2025 – 2026 |
| % Weighting (to overall module): | 100% |
| Coursework Title: | Cyber Security Principles |
There are many avenues of support available to you in the completion of your assignment:
Do You Need This LD7098 Cyber Security Principles Assignment?
Order Non Plagiarized AssignmentThis assignment is designed to support the creation of a portfolio of evidence towards your chosen technical pathway specialism. Central to this is the structured development of an appropriate artefact (or set of artefacts) that are in line with your specific organisational context. The artefact form will vary depending on your specific context but will be informed by and aligned to the material covered within this module.
Agreement of an appropriate business challenge (around which the artefact can be created, and other relevant areas explored) should be conducted in partnership between yourself and employer.
You are required to produce a 3000-word portfolio documenting the artefact creation process and evidencing your critical exploration of the topic area. Appropriate academic sources (Journals, Conference Papers, Books, etc.) should be used throughout (and Harvard referenced) to provide evidence of an in depth understanding of the area and justification for the decisions taken. Further to this, evidence of consideration for alternative options (beyond those undertaken in your organisation) are expected.
You may use appendices to include relevant material such as evidence, source data and any data that backs up claims you are making and insights you are generating, such as redacted emails or documents or interview transcripts. Appendices are not directly included in your mark but do provide useful information to the reader. Your main script should only include things you consider should be in your mark. If these are tables, diagrams, graphs etc think of how much time they will take to absorb by the reader.
Ensure any diagrams, tables etc. that are within the script are given a title and referred to in the body of your assessment. Do not expect the reader to understand how they fit into your argument unless you explain how they do.
Your writing should be contextualised through the inclusion and analysis of work-related examples through the lens of appropriate academic literature and models covered in this module and in your own research, where applicable
A detailed description of the business and organisational context of the proposed challenge, including a direct discussion of its relevance to the technical pathway specialism.
Whilst this section is not included in the overall word count it will allow the reader to fully appreciate the impact of your writing.
Please note: You may use part of a previous assignments Business Context but it mostly should be written to this assignment.
A detailed rationale, and critical coverage of:
(1) The principles of threat intelligence, modelling and assessment. The range of modern attack techniques and how and where to research emerging attack techniques to inform the development of improved security controls, countermeasures and policies and standards;
[15 marks]
(2) The use of human factor analysis in the assessment of threats, including the motivations and methods adopted by a wide range of human threat actors;
[15 marks]
(3) The different types of cyber security controls that can be implemented, the main principles of secure configuration of security components and devices, including firewalls and protective monitoring tools and how to apply them;
[15 marks]
(4) The different approaches and design principles that are used to engineer secure systems, focusing on the importance of building in security, privacy and resilience in the initial design;
[15 marks]
(5) The development and implementation of security event response programmes, security event handling, and operational security activities;
[15 marks]
The selection and application of tools and techniques to carry out a variety of appropriate security testing strategies including vulnerability scanning, penetration testing and ethical hacking, recognising that security testing itself cannot guarantee security and only reveal gaps in security provisioning;
[15 marks]
A reflective evaluation of the implications of conducting this artefact investigation and development for your learning development on this programme.
[10 marks]
Note – These sections are aligned to the apprenticeship standard for your chosen technical specialism, so it is essential that all are covered to a good degree.
Your report should include as an appendix a copy of Table 1 indicating how each relevant aspect of the apprenticeship standard has been met. The ‘Evidence’ should indicate where specifically within this report this can be found.
Table 1 – Apprenticeship Standard Evidence Mapping
| Apprenticeship Standard | Evidence |
| TK1) The principles of threat intelligence, modelling and assessment. The range of modern attack techniques and how and where to research emerging attack techniques to inform the development of improved security controls, countermeasures and policies and standards | |
| TK2) How to use human factor analysis in the assessment of threats, including the motivations and methods adopted by a wide range of human threat actors | |
| TK3) How to select and apply tools and techniques to carry out a variety of security testing strategies including vulnerability scanning, penetration testing and ethical hacking, recognising that security testing itself cannot guarantee security and only reveal gaps in security provisioning | |
| TK4) The different approaches and design principles that are used to engineer secure systems, focusing on the importance of building in security, privacy and resilience in the initial design | |
| TK5) How to develop and implement security event response programmes, security event handling, and operational security activities | |
| TK6) The different types of cyber security controls that can be implemented, the main principles of secure configuration of security components and devices, including firewalls and protective monitoring tools and how to apply them |
Table 1: The following assessment criteria will be used as a marking rubric to assign an overall mark for this assessment.
| Assessment Criteria Section | Excellent
70-100% |
Commendable
60-69% |
Satisfactory
50-59% |
Inadequate
20-49% |
Very Poor
0-19% |
| For each of the following categories:
·Threat Intelligence, Modelling and Assessment (15%) · Human Factors (15%) · Security Controls (15%) ·Security Engineering (15%) · Security Event Management (15%) · Security Testing (15%) |
11-15 | 9-10 | 8 | 3-7 | 0-2 |
| Demonstrates excellent or outstanding knowledge, understanding and skills in this area.
Utilising appropriate primary sources, it forms compelling arguments, critically analysing and evaluating the theoretical views with each other and in the relevant context, making excellent use of presentation to convey the findings to the reader. |
Demonstrates good evidence of appropriate understanding, knowledge and skills in this area.
Makes use of a range of references to make effective arguments, incorporating critical analysis and evaluation of relevant theory, and presenting the information well. |
Demonstrates adequate evidence of relevant understanding, knowledge and skills in this area.
Uses a variety of relevant references, making clear and relevant arguments, analysing and evaluating theoretical aspects to an adequate level, and all clearly presented. |
Shows only limited evidence of understanding, knowledge and skills in this area.
Lacking in one or more of the following: use of relevant references, clear arguments, analysis or evaluation of theory, or effective presentation. |
No clear or very basic demonstration of relevant understanding, knowledge and skills in this area. | |
| Personal Reflection (10%) | 7-10 | 6 | 5 | 2-4 | 0-1 |
| A detailed reflection, which investigates various root causes and examines a variety of potential actions. | A relevant reflection, which explores causes and a number of potential actions. | A clear reflection, which considers causes and possible actions. | A basic reflection, describing outcomes and development, without clearly considering causes or describing realistic actions. | No clear reflection on investigation outcomes or development. |
Order Custom Answers for LD7098 Assignment
Order Non Plagiarized AssignmentNeed help with your LD7098 Cyber Security Principles assignment? Our Online Assignment Help service provides expert guidance to make the concepts easy to understand. Whether you need Cyber Security Assignment Help or other assignment help, our experts offer all the assignment writing services you need. We also offer Free Assignment Samples and Examples to help you get a clearer idea of how to structure your work. Our focus is on providing original, plagiarism-free content to help you succeed in your Cyber Security Principles assignment. Let us help you achieve your academic goals!
Let's Book Your Work with Our Expert and Get High-Quality Content