Lincoln School of Computer Science
CMP9771M Cyber Security – Assessment Item 1
Learning Outcome
Criterion
Pass
2:2
2:1
1st
LO1 critically evaluate the security of a computer system
Create an appropriate tool that will detect a DoS attack in Python. (20%)
A tool has been created but it does not work correctly, with few results and little or testing has been done. There is little consideration for the user interface.
A tool has been created which shows some results and some testing has been done.
There is some consideration for the user interface.
A tool has been created which shows full results in a good format. Testing has been done. There is consideration for the user interface.
A comprehensive tool has been created which shows full results in a good format. Testing has been done. There is consideration for the user interface.
Provide a narrative to explain how the tool works.
(20%)
A narrative has been provided which is very limited and not easy to follow.
A narrative to explain how the tool works has been provided but lacks detail an is not easy to follow.
A narrative to explain how the tool works has been provided but lacks clarity and some detail is missing.
A detailed narrative to explain how the tool works has been provided.
Identified the flaws in
the network security. (20%)
A few flaws in the network have
been identified
Some flaws have been identified
and discussed. The discussion does not contain any critical analysis.
The flaws have been identified
and discussed. There is little in the way of critical analysis.
The flaws have been identified and
critically analysed.
LO2 differentiate between types of attacks and critically assess their impact
Explain the impact of a DoS attack.
(20%)
The impact of a DoS attack has been briefly discussed in little or no detail or analysis.
The impact of a DoS attack has been discussed but is lacking in detail and analysis.
The impact of a DoS attack has been discussed. There is some detail and critical analysis.
The impact of a DoS attack has been discussed but in detail and there is critical analysis.
Define how the tool can be used to help protect the business.
(20%)
An outline of how the tool can aid in protecting the business is provided.
A clear definition of how the tool can aid in protecting the business is provided.
A clear definition of how the tool can aid in protecting the business is provided in some detail and with some critical analysis.
A clear definition of how the tool can aid in protecting the business is provided. There is a good critical analysis.
Document updated 1 December 20