ITC578 Assessments - A brief description of each assessment item for ITC 578 Dark Web PDF

Title ITC578 Assessments - A brief description of each assessment item for ITC 578 Dark Web
Course Dark Web
Institution Charles Sturt University
Pages 18
File Size 531.5 KB
File Type PDF
Total Downloads 68
Total Views 139

Summary

A brief description of each assessment item for ITC 578 Dark Web...


Description

Item No.

Title

Value

Due Date*

Return Date**

1

Online Quizes

10%

Variable

-

2

Short Questions

10%

15-Aug-2021

03-Sep-2021

3

Analytical Questions

15%

12-Sep-2021

06-Oct-2021

4

Research report

15%

03-Oct-2021

25-Oct-2021

5

Final Exam

50%

To be advised

-

Assessment item 1 - Online Quizes Value: 10% Due Date: Variable Date Return Date: Group Assessment: No Submission method options: Alternative submission method TASK There will be two (2) online quizzes on topics 1 -7. The online quizzes must be attempted by the students individually using the Test Centre in the Interact site. Each quiz is weighted 5%, thus in total, the online quizzes are worth 10% of the subject grade. Students need to attempt and finish the online quizzes through Interact2 Test Centre and it will be notified by the Subject Coordinator. Online Quiz 1 Key information: 

Quiz 1 consists of 10 multiple-choice questions. This will cover concepts in topics 1 to 3. You will demonstrate that you are familiar with the key terminology and concepts in these topics.



This is a timed quiz and you have 60 mins to answer the questions



It will be saved and submitted automatically when the time expires



You can attempt the quiz only once, so make sure that you attempt it when you feel you are ready and have reviewed the above topics



It will be available from 04 August 2021 00:01 to 08 August 2021 23:59 (Due date)



There will be no practice attempt, when you start the quiz, you will need to complete it

If you do encounter any technical issues when completing the online quiz, please contact your lecturer with a screenshot of the issue. Online Quiz 2 Key information:



Quiz 2 consists of 10 multiple-choice questions. This will cover concepts in topics 4 to 7. You will demonstrate that you are familiar with the key terminology and concepts in these topics.



This is a timed quiz and you have 60 mins to answer the questions



It will be saved and submitted automatically when the time expires



You can attempt the quiz only once, so make sure that you attempt it when you feel you are ready and have reviewed the above topics



It will be available from 05 September 2021 00:01 to 19 September 2021 23:59 (Due date)



There will be no practice attempt, when you start the quiz, you will need to complete it

If you do encounter any technical issues when completing the online quiz, please contact your lecturer with a screenshot of the issue. MARKING CRITERIA AND STANDARDS Most quizzes will involve multiple-choice or true/false type questions, although quizzes may include other contents. Marks will be given based on the correctness of the answers. The Test Centre will be marked automatically and you will receive marks according to the following criteria: 

HD: At least 85% of the answers were correct.



DI: At least 75% of the answers were correct.



CR: At least 65% of the answers were correct.



PS: At least 50% of the answers were correct.



FL: Less than 50% of the answers were correct.

Assessment item 2 - Short Questions Value: 10% Due Date: 15-Aug-2021 Return Date: 03-Sep-2021 Group Assessment: No Submission method options: EASTS (online) TASK Your task in this assessment is to prepare a response to each of the questions. Please refer to the marking guide when preparing your response to see what criteria and standards will be used to assess your work and your progress towards Learning Outcomes 1 to 4. Total Marks:10 Distinguish between Cyberwar and cybercrime. Explain why are cybercrime efforts becoming more targeted? Explain the general categories of dark web cybercriminals and their impact on online services. Differentiate the Privacy and Anonymity. Explain how Tor maintains anonymity during web browsing.

Investigate the threat analysis on the deep web compared to the surface web. Why it is necessary to protect from cyber threats? Distinguish between virus and worms? Investigate the role of encryption in the operation of a virus. MARKING CRITERIA AND STANDARDS Marks will be given using the following criteria 

correctness and completeness of the answers;



inclusion of appropriate figures, where applicable;



clarity of explanation;



correctness of spelling, grammar, and format of the submission;



sufficient references and use of APA referencing style

The following standard will be used to mark assignment 2: Assessable components

HD

DI

CR

PS

Q1.

The answer is correct and complete. You have provided a clear and concise explanation with an appropriate example. Accurate referencing using APA 6th edition Including bibliography, intext citation. No grammatical or spelling mistakes.

The answer is correct and complete. A detailed explanation is provided with an appropriate example. Accurate referencing using APA 6th edition Including bibliography, intext citation. Only a few grammatical or spelling mistakes.

The answer is correct, but the explanation is not complete. Very few references are used and they are not formatted appropriately.

The answer is correct but not complete and a barely adequate explanation is provided. No references are used. There are grammatical errors and spelling mistakes.

The answer is correct and complete. You have provided a clear and concise explanation with an appropriate example. Accurate referencing using APA 6th edition Including bibliography, in-

The answer is correct and complete. A detailed explanation is provided with an appropriate example. Accurate referencing using APA 6th edition Including bibliography, in-

The answer is correct, but the explanation is not complete. Very few references are used and they are not formatted appropriately.

The answer is correct but not complete and a barely adequate explanation is provided. No references are used. There are grammatical errors and spelling mistakes.

Maximum marks:2

Q2 Maximum marks:2

Q3 Maximum marks: 2

text citation. No grammatical or spelling mistakes.

text citation. Only a few grammatical or spelling mistakes.

The answer is correct and complete. You have provided a clear and concise explanation with an appropriate example. Accurate referencing using APA 6th edition

The answer is correct and complete. A detailed explanation is provided with an appropriate example. Accurate referencing using APA 6th edition Including bibliography, intext citation. Only a few grammatical or spelling mistakes.

The answer is correct, but the explanation is not complete. Very few references are used and they are not formatted appropriately.

The answer is correct but not complete and a barely adequate explanation is provided. No references are used. There are grammatical errors and spelling mistakes.

The answer is correct and complete. A detailed explanation is provided with an appropriate example. Accurate referencing using APA 6th edition Including bibliography, intext citation. Only a few grammatical or spelling mistakes.

The answer is correct, but the explanation is not complete. Very few references are used and they are not formatted appropriately.

The answer is correct but not complete and a barely adequate explanation is provided. No references are used. There are grammatical errors and spelling mistakes.

The answer is correct and complete. A detailed explanation is provided with an appropriate example. Accurate referencing using

The answer is correct, but the explanation is not complete. Very few references are used and they are not formatted appropriately.

The answer is correct but not complete and a barely adequate explanation is provided. No references are used. There are grammatical errors

Including bibliography, intext citation. No grammatical or spelling mistakes. Q4 Maximum marks: 2

The answer is correct and complete. You have provided a clear and concise explanation with an appropriate example. Accurate referencing using APA 6th edition Including bibliography, intext citation. No grammatical or spelling mistakes.

Q5 Maximum marks: 2

The answer is correct and complete. You have provided a clear and concise explanation with an appropriate example. Accurate referencing using

APA 6th edition Including bibliography, intext citation. No grammatical or spelling mistakes.

APA 6th edition Including bibliography, intext citation. Only a few grammatical or spelling mistakes.

and spelling mistakes.

PRESENTATION 

You are recommended to write the answers in a word document and submit it via EASTS. You can also submit your document in pdf format as well.



Your answers to the questions should be precise but complete and informative.



Each question in Task 1 should be answered individually with the corresponding label to indicate the tasks completed.



Your submission must be no more than 10 pages long (including diagrams), have margins no less than 2cm, and be in a font size no less than 12 points.



A cover page (outside the page limit) must be included and should contain relevant identifying information.

REQUIREMENTS For this assessment, you are required to use APA referencing to acknowledge the sources that you have used in preparing your assessment. Please refer to the CSU referencing guide http://student.csu.edu.au/study/referencing-at-csu. In addition, a very useful tool for you to use that demonstrates how to correctly use in-text referencing and the correct way to cite the reference in your reference list can be found at https://apps.csu.edu.au/reftool/apa-6 Assessment item 3 - Analytical Questions Value: 15% Due Date: 12-Sep-2021 Return Date: 06-Oct-2021 Group Assessment: No Submission method options: EASTS (online) TASK Investigate attacks on anonymising networks This assessment aims to assess the understanding of anonymising network inside the Dark Web using The Onion Router (TOR) and analysing the network traffic. This assessment task will also assess the following learning outcome of this subject as well as measuring progress towards all the learning outcomes: be able to investigate the usage of anonymising networks in the dark web using publically available tools

Description: In preparation for this assessment, you will be given a tour of the dark web and walked through the technical details of how it works. Using this knowledge and skill, you will explore how organisations can use the Darknet as a threat intelligence resource to proactively secure your organisation’s information in this assessment. You are required to prepare an anonymising network analysis report using the Tor browser based on the following scenario: As a security specialist for an organisation, you are tasked with the early detection of potential threats and vulnerabilities such as data leaks and other cyber incidents that may damage your organisation’s reputation. The organisation’s web server has alerted you to suspicious activity. Initially, you investigated the security logs and completed all other security compliance procedures that could be the source of an entry that appeared suspicious but no malicious activity was detected. As part of your organisation’s security precautions and policies, you proceed to investigate the source of the suspicious activity by going to the hidden/secret site of the web by using available anonymising network tools. Exploration of the dark web conditions: you may stumble upon the content you do not want to see, as part of the safety practices when exploring the Dark Web, it is expected that you stick to the purpose of this assessment task and look solely for sites relevant to the threat intelligence. In line with CSU’s duty of care, you will be required to capture how you used the safety protocols in your final report. Your task: You will access your network security logs (please make sure that you are not breaching the privacy if it is your workplace logs) Your task is to access the Dark Web safely and anonymously using the Tor network through the Tor browser. The best way to keep yourself private you may combine Tor with a VPN. You will be required to describe how you have kept safe while exploring the Dark Web. Navigate the Dark Web to discover suspicious activity by digging through search engines. You need to start with Tor browser to conduct the dark web investigations Evaluate its routing protocols and security features. You should be able to describe the navigated hidden web traffic logs for your traffic analysis In your report, you must include a description of the potential challenges of the Tor network concerning traffic analysis. This assessment also provides an opportunity for you to : - demonstrate factual knowledge, understanding and application of state-of-art of the anonymizing network; - demonstrate the ability to investigate the usage of anonymising networks in the dark web - apply understanding and knowledge to a practical situation; MARKING CRITERIA AND STANDARDS The following standards will be used to mark part B: Assessable Components

HD

DI

CR

PS

Access and collection of dark web traffic, summarize the report with potential challenges of traffic analysis, including steps to safeguard yourself while exploring the Dark Web. Maximum marks:15

Comprehensive summary of the report is provided which is consistent with the task. Report provides logical statements that explicitly illustrates how access and collection of dark web traffic was achieved. The potential challenges to traffic analysis was explained in full. Safety protocols captured in report. Report language is appropriate to the assessment with accurate referencing using APA 6th edition.

Detailed report summary that is consistent with the task. Provides a accurate and detailed overview of the results, threats and vulnerabilities including a explicit reference to challenges faced in analysing network traffic. Safety protocols captured in report. Report language is appropriate to assessment with accurate referencing using APA 6th edition.

Good summary of results reflecting the assessment purpose. Provides a general overview of the results, threats and vulnerabilities, including an outline of challenges faced in analysing network traffic. Safety protocols captured in the report. Report language appropriate to assessment with proper referencing.

Satisfies the minimum requirements. Provided basic description of access and collection of dark web traffic and summarised the challenges faced in analysing net work traffic. Safety protocols captured in the report. Summary report contains referencing.

PRESENTATION Presentation Your answers to the questions should be precise but complete and informative. Your submission must be in a form readable by Microsoft Word or PDF/Acrobat format and submit it via EASTS. The report should be precise but complete and informative and the number of words within 800-1000 words. Your submission must be no more than 8 pages long (including diagrams), must have margins no less than 2cm, and a font size no less than 12 points. Any text adapted from any source must be clearly labelled and referenced. Please refer to the CSU referencing guide http://student.csu.edu.au/study/referencing-at-csu. REQUIREMENTS For this assessment, you are required to use APA referencing to acknowledge the sources that you have used in preparing your assessment. Please refer to the CSU referencing guide http://student.csu.edu.au/study/referencing-at-csu. In addition, a very useful tool for you to use that

demonstrates how to correctly use in-text referencing and the correct way to cite the reference in your reference list can be found at https://apps.csu.edu.au/reftool/apa-6 Assessment item 4 - Research report Value: 15% Due Date: 03-Oct-2021 Return Date: 25-Oct-2021 Group Assessment: No Submission method options: EASTS (online) TASK Your task in this assessment is to write a research report. Please refer to the marking guide when preparing your report to see what criteria and standards will be used to assess your work and your progress towards Learning Outcomes 1, 3,4,5 and 6. Research report: Total of 15 Marks Task Your task in this assessment is to write a research report. This assessment is designed to demonstrate your familiarity with the underlying complex technology and industry terminology that will help you leverage the Dark Web and analyse data discovery to strengthen your security position. It will also start your journey towards gaining the knowledge to establish relevant policies and procedures based on research and fact-finding foundations. Please refer to the marking guide when preparing your report to see what criteria and standards will be used to assess your work and your progress towards Learning Outcomes 1, 3, 4, 5 and 6 Your report will consist of two parts: Part 1: Annotated Bibliography Refer to the following resources to help you set up your annotated bibliography What is an annotated bibliography: https://owll.massey.ac.nz/assignment-types/annotatedbibliography.php Sample annotated bibliography: https://owll.massey.ac.nz/sample-assignments/sample-annotatedbibliography.php A set of topics* is listed below. Choose one topic you are really interested in or is closely related to your professional practice. You are required to conduct a literature search on a topic of your choice. You should choose at least three research papers, journal articles or conference papers). To start you off, you will include the following article. Hatta, M. (2020). Deep web, dark web, darknet. Annals of Business Administrative Science, 2020, 19(6), 277-292. Retrieved https://www.jstage.jst.go.jp/article/abas/19/6/19_0200908a/_pdf/-char/en Topics Set*: Cybersecurity threat landscape during COVID-19

Malware as a Service (MaaS) during the COVID-19 pandemic. Cyber-Warfare, Attacks and Defences in the Australian Context ToR Network Crypto market and Cryptocurrencies Dark Web forensics The security impact of COVID-19 on social media Bay pointe Security Consulting (BPSC) CIA (Code Injection Attack) Social engineering Data exfiltration Network traffic analysis * (You are allowed to select a different topic (not in the list) that is related to the subject but, in that case, please let your Lecturer/subject coordinator know prior to your assessment) Part 2: Discussion From your annotated bibliography answer the following discussion questions: Identify any important issue/s that you believe were not addressed (or not addressed adequately) in the literature. Explain why you view this issue/these issues as important. Discuss what you believe to be the most important lesson you have learnt as a result of your literature research. Develop recommendations on how this knowledge will improve the security of your workplace. RATIONALE This assessment task will work towards assessing the following learning outcome/s: be able to differentiate between theoretical and cross-disciplin...


Similar Free PDFs