- Information
- AI Chat
Was this document helpful?
CSE -Spring 20-21-Assign 1
Course: Computer and Network Security (ECC4703)
68 Documents
Students shared 68 documents in this course
University: Universiti Putra Malaysia
Was this document helpful?
CSE210 – Spring 20-21 – Assignment#1
Objective and Overview
Marks: out of 10%
▪ Identify, describe and evaluate the levels of protection and response to security threats
Grading Rules - rubric
Individual Submission
▪ Evaluation Criteria:
o Correctness and clarity:
▪ The answer is correct and has no factual mistakes.
▪ The answer is explained with clear language and is supported by
illustrating examples whenever necessary.
o Completeness:
▪ The answer covers all required elements/criteria.
o Critical analysis
▪ Justifications and reasoning are logical and supported by logical
arguments.
▪ The student makes reflections from his/her own opinion whenever
necessary.
o Format
▪ Report is properly formatted using consistent font size/style,
consistent alignment, page numbers, captions, and headers.
▪ Proper citation and referencing is applied wherever appropriate.
5% Part (A)
5% Part (B)
Submission Rules
▪ Submit in word or PDF format on blackboard.
▪ Include the front page with All the details (Course description, Student id, name etc.)
▪ Please note this is an individual assignment.
▪ Use proper referencing wherever required.
▪ Due on 2oth March 2021 – late submissions will be penalized. Reports will be scanned for similarity
and high similarity score will be penalized.
• Analyze the Case Studies/Articles on BB then complete Part (A) and Part (B) tasks.
Part (A)
Background / Scenario
Security breaches occur when individuals or applications are trying to gain unauthorized access to data,
applications, services, or devices. During these breaches, the attackers, whether they are insiders or not,
attempt to obtain information that they could use for financial gains or other advantages. In this task,
you will explore a few security breaches to determine (1) what was taken, (2) what exploits were
used, and (3) what you can do to protect yourself.
o Read the following 2 articles available on your BB:
▪ Missing drives contained PHI on 950K Centene customers.
▪ Article 29 Working Party still not happy with Windows 10 privacy controls
o Conduct some search to look for similar incidents/attacks (at least 5) and record the findings
in the below table: