Task
Write around 600 words for each of the short-essay questions. All questions are of equal value. You
should provide credible references for each question according to the Faculty guidelines.
Topic 1- Introduction to Information Security
Question 1
Research the issue of social engineering in the context of cyber security and report your findings,
including what the problem is, types of social engineering techniques, existing and potential protection
mechanism and future trends.
Topic 2 - Cryptography
Question 2
Research the two generalized cryptographic schemes: symmetric and asymmetric encryption. Write a
report comparing the two schemes. Your research should include the latest developments in this field
along with classical concepts.
Topic 3, 4 & 5 - Network Security fundamentals and Firewalls
Question 3
Intrusion detection systems (IDS) are used to monitor a network or systems for malicious activity or
policy violations. Research the issue of current trends in Network Intrusion Detection Systems and
report your findings.
Referencing
All sources of information must be appropriately referenced using the APA style
( http://student.csu.edu.au/library/integrity/referencing-at-csu )
Rationale
This assessment aims at partially achieving the following subject objectives:
- be able to explain basic information security concepts;
- be able to discuss and debate some of the security implications of computer networks;
- be able to compare and contrast firewall technologies.
Marking criteria
Criteria HD
100% - 85%
DI
84% - 75%
CR
74% - 65%
PS
64% - 50%
FL
49% - 0
Able to apply
theories and
concepts to
analyse IT
security
implications
Demonstrates
comprehensive
understanding of the
relevant IT security
perspectives. Correct
application of the
theories and concepts
through indepth
discussion, providing
highly relevant real
world examples.
Demonstrated clear
understanding of the
relevant IT security
perspectives.
Correct application
of the theories and
mostly
comprehensive
analysis with
suitable examples.
Correct application
of the IT Security
perspective and
mostly
comprehensive
analysis with
suitable examples.
Mostly correct
application of
the IT security
perspective;
includes
reasonable
level of
analysis. Some
omission.
Major
omissions in
the
application of
the IT
security
concepts and
the analysis.
Demonstrates
application of
research skills
Literature and sources
presented is evidence of
high level application of
Clear evidence of
research relevant to
the subject; able to
Clear evidence of
research relevant to
the subject; uses
Some
evidence of
research. Some
Either no
evidence of
literature
Criteria HD
100% - 85%
DI
84% - 75%
CR
74% - 65%
PS
64% - 50%
FL
49% - 0
through the
critical analysis
and evaluation of
relevant literature
research skills; with
comprehensive and
critical appraisal of the
literature and discussion
of theory supported by
sources in addition to
those recommended in
the course content.
Referencing style has no
mistakes.
critically appraise
the literature and
theory gained from
a variety of sources.
Referencing style
correctly used.
indicative texts
identified.
Referencing style
correctly used.
Minor omissions
only.