Hello, dear friend, you can consult us at any time if you have any questions, add WeChat: THEend8_
CMP9771M Cyber Security - Assessment Item 1
Learning Outcome Criterion Pass 2:2 2:1 1st
LO1 critically evaluate
the security of a computer
system
Create an appropriate
tool that will detect a
DoS attack in Python.
(20%)
A tool has been created but it does
not work correctly, with few results
and little or testing has been done.
There is little consideration for the
user interface.
A tool has been created which
shows some results and some
testing has been done.
There is some consideration for
the user interface.
A tool has been created which
shows full results in a good
format. Testing has been done.
There is consideration for the user
interface.
A comprehensive tool has been created
which shows full results in a good
format. Testing has been done. There is
consideration for the user interface.
Provide a narrative to
explain how the tool
works.
(20%)
A narrative has been provided
which is very limited and not easy
to follow.
A narrative to explain how the
tool works has been provided
but lacks detail an is not easy to
follow.
A narrative to explain how the tool
works has been provided but lacks
clarity and some detail is missing.
A detailed narrative to explain how the
tool works has been provided.
Identified the flaws in
the network security.
(20%)
A few flaws in the network have
been identified
Some flaws have been identified
and discussed. The discussion
does not contain any critical
analysis.
The flaws have been identified
and discussed. There is little in the
way of critical analysis.
The flaws have been identified and
critically analysed.
LO2 differentiate
between types of attacks
and critically assess their
impact
Explain the impact of a
DoS attack.
(20%)
The impact of a DoS attack has
been briefly discussed in little or
no detail or analysis.
The impact of a DoS attack has
been discussed but is lacking in
detail and analysis.
The impact of a DoS attack has
been discussed. There is some
detail and critical analysis.
The impact of a DoS attack has been
discussed but in detail and there is
critical analysis.
Define how the tool can
be used to help protect
the business.
(20%)
An outline of how the tool can aid
in protecting the business is
provided.
A clear definition of how the tool
can aid in protecting the
business is provided.
A clear definition of how the tool
can aid in protecting the business
is provided in some detail and with
some critical analysis.
A clear definition of how the tool can aid
in protecting the business is provided.
There is a good critical analysis.