Professional Documents
Culture Documents
ITC578 - Dark Web: Subject Outline
ITC578 - Dark Web: Subject Outline
Table of Contents
Subject Summary ...................................................................................................................2
Subject Coordinator ...............................................................................................................2
Subject Coordinator ..................................................................................................2
Email ..........................................................................................................................2
Phone .........................................................................................................................2
Consultation procedures ..........................................................................................2
Subject Overview....................................................................................................................2
Abstract......................................................................................................................2
Learning outcomes....................................................................................................3
Subject content .........................................................................................................3
Academic Progress Requirements............................................................................3
Assumed knowledge .................................................................................................3
Subject Schedule & Delivery ..................................................................................................3
Prescribed text...........................................................................................................3
Class/tutorial times and location .............................................................................4
Schedule ....................................................................................................................5
Learning materials.....................................................................................................6
Learning, teaching and support strategies ..............................................................6
Recommended student time commitment .............................................................9
Assessment and Exam Items ..................................................................................................9
Essential requirements to pass this subject.............................................................9
Items ........................................................................................................................10
Online Quizes .............................................................................................10
Short Questions .........................................................................................12
Analytical Questions ..................................................................................15
Research report..........................................................................................18
Final Exam .................................................................................................23
Assessment and Exam Information .....................................................................................30
Academic Integrity ..................................................................................................30
Referencing..............................................................................................................30
How to submit your Assessment and Exam items.................................................30
Postal Assessment - submission process..................................................30
Hand delivered Assessment - submission process ..................................30
Alternative Assessment - submission process..........................................30
Interact2 - Online exam submission process ............................................31
Extensions................................................................................................................31
How to apply for special consideration..................................................................32
Penalties for late submission..................................................................................32
Resubmission ..........................................................................................................33
Feedback processes ................................................................................................33
Assessment return...................................................................................................33
Subject Summary
Subject Coordinator
Consultation procedures
I am available for consultation throughout the session. The best way to contact me is via
email. For emails, please remember to include your name, student number, contact details
and the subject code. Since I am responsible for several subjects it is helpful to have this
information before I respond to your query. This will also avoid your email being treated as
SPAM.
Subject Overview
Abstract
This subject provides a broad overview of emerging malicious and cybercriminal activities
inside the dark web. The subject also analyses dark web content and investigates anonymising
networks in the dark web using publically available tools. Students will also learn dark web
forensics and mitigating techniques to defend against cybercrime.
• be able to analyse the malicious and cybercriminal activities inside the dark web;
• be able to analyse dark web content and create web logs;
• be able to evaluate forensic techniques used to defend against cybercrime;
• be able to investigate the usage of anonymising networks in the dark web using
publically available tools; and
• be able to investigate the threat landscape in the dark web and appraise mitigating
techniques used to combat cybercrime.
Subject content
Information regarding the subject’s content is outlined above in the Schedule.
Assumed knowledge
ITI581 Network Security Fundamentals or ITC595 Information Security
Prescribed text
Find information about the textbooks required for your subjects on the Current Students
(https://www.csu.edu.au/current-students/learning-resources/information-planning/
textbooks) site. Check the Library (https://library.csu.edu.au/) to find out if your text is an
eBook.
Main Text:
Recommended reading/resources
• Hands-On Dark Web Analysis - sion Retzkin, Packt Publishing, 2018, ISBN:
9781789133363
If you are studying at a Study Centre or other partner institution, your class timetable
information will be provided by your institution.
Schedule
Session Week
Topics Assignments/Notes
Week Commencing(Mon)
Introduction to
1 19 July 2021 Dark web and
Cybersecurity
The analysis
2 26 July 2021 threat landscape
in the Dark web
Cybercriminal
5 16 August 2021 activities in the
darknet
Evolution of the
6 23 August 2021 web and its
hidden data
Open-source
Assessment -4 ( Research Report
intelligence &
10 27 September 2021 -15%) is due on the 3rd of October
The emerging
2021
trend of the
End of Session
25 October 2021
Exam period
Please see below Additional/Replacement Class Requirements for this session: Classes
running on the following Public Holidays should have a replacement class:
This study schedule has been devised to assist in your planning during the session and is
intended as a guide only.
Learning materials
Details of learning materials that support your success in this subject can be found in the
Interact2 Subject Site.
Subject outline
Your first task in the subject is to print out a copy of the subject outline (the document you are
looking at now), and read through it very carefully. You can find an icon at the top right of the
Charles Sturt University Subject Outline
ITC578 202160 S I Page 6 of 34
Version 2 - Published 09 July 2021
page which will take you to a printable PDF of the subject outline. This document contains
essential information about the subject concerning assessment, marking criteria and special
consideration. Please be sure to make a note of when the assessment items are due and when
the exam period is. Since we won't know the exam date until around the middle of the session,
you must make sure you are available for the entire exam period.
Subject Site
The subject Interact site is where you will find the material and information that you need in
order to engage with the subject. The site is divided into sections which are accessed from
tabs on the left-hand side of the page. Learning modules are also accessible from the subject
site. You should check the site for announcements at least once a week - these appear on your
Interact dashboard and are also sent by email.
Weekly Lectures
In this subject, there are also lots of opportunities for you to engage with me, with your peers
and with the subject. We will have weekly lectures (online meetings) throughout the session
where we can discuss subject content and assessment items. The schedule of weekly online
meetings will be available via interact2 site of the subject.
Online engagement
Students are expected to engage in the online aspects of the subject. These include:
• Participation in asking questions and interacting with your classmates in the online
discussion forum. I will also be reading the forum and answering questions regularly during
the session, typically twice each week.
Visit the learning support website for advice about assignment preparation, academic
reading, and note-taking, referencing, and preparing for exams at: http://student.csu.edu.au/
study (http://student.csu.edu.au/study%E2%80%8B)
Study Support Coordinators are available at each campus to assist students with a range of
academic support including:
To contact Study Support Coordinators for your campus via phone or Zoom, please visit
this iLearn site (https://interact2.csu.edu.au/webapps/blackboard/content/
listContentEditable.jsp?content_id=_4447316_1&course_id=_59470_1&mode=reset) for a
schedule of availability.
Queries regarding the content of this subject should be directed to your subject lecturer.
Library services
To access the range of resources available to you at Charles Sturt University Study Centres, go
to the library’s iLearn page (https://interact2.csu.edu.au/webapps/blackboard/content/
listContent.jsp?course_id=_59470_1&content_id=_4445538_1&mode=reset)
• Video tutorials in research skills, finding journal articles for assignments, topic
analysis
• Endnote referencing software
• Online assistance via free call on 1800 808 369, or ‘Ask a Librarian’ - Live Chat or Web
Form.
• Other online library services to help you successfully complete your assignments
http://libguides.csu.edu.au/
Online Tutorials
http://student.csu.edu.au/library/study-research/training-tutorials-videos
(http://student.csu.edu.au/library/study-research/training-tutorials-videos)
• Use Primo Search to find eReserve study materials and journal articles
• Search journal databases and web resources for information for your assessment
tasks
• Identify appropriate sources of information and peer reviewed material, to evaluate
resources
Library Help
This subject is an 8 point subject. The Charles Sturt University Subject Policy states that a
standard 8 point subject should require you to spend up to 160 hours engaged in the learning
and teaching activities. These activities include the time spent in preparation for the
assessment, including study for examinations, tests, and assignment preparation.
If you marginally fail these pass criteria you are entitled to a second chance in the following
circumstances:
i. You are eligible for an Additional Assignment (AA) if you submitted all assessment items,
passed the exam (e.g. you scored 50% or above) but received an overall mark between 45 and
49;
or
ii. You are eligible for an Additional Examination (AE) if you submitted all assessment items
However, if you are found guilty of academic misconduct then you may not receive your
second chance.
Items
Item No. Title Value Due Date* Return Date**
1 Online Quizes 10% Variable -
TASK
There will be two (2) online quizzes on topics 1 -7. The online quizzes must be attempted by
the students individually using the Test Centre in the Interact site. Each quiz is weighted 5%,
thus in total, the online quizzes are worth 10% of the subject grade. Students need to attempt
and finish the online quizzes through Interact2 Test Centre and it will be notified by the
Subject Coordinator.
Online Quiz 1
Key information:
If you do encounter any technical issues when completing the online quiz, please contact your
lecturer with a screenshot of the issue.
Online Quiz 2
Key information:
If you do encounter any technical issues when completing the online quiz, please contact your
lecturer with a screenshot of the issue.
RATIONALE
This assessment task will assess the following learning outcome/s:
• be able to analyse the malicious and cybercriminal activities inside the dark web.
• be able to analyse dark web content and create web logs.
• be able to evaluate forensic techniques used to defend against cybercrime.
• be able to investigate the threat landscape in the dark web and appraise mitigating
techniques used to combat cybercrime.
The online quizzes are designed to increase students' timely engagements with the subjects.
Especially, the first online quiz will be used to provide feedback to students. The online
quizzes are also designed to cover all the learning outcomes and allow students to test and
demonstrate their ability to understand the topics.
TASK
Your task in this assessment is to prepare a response to each of the questions. Please refer to
the marking guide when preparing your response to see what criteria and standards will be
used to assess your work and your progress towards Learning Outcomes 1 to 4.
Total Marks:10
1. Distinguish between Cyberwar and cybercrime. Explain why are cybercrime efforts
becoming more targeted?
2. Explain the general categories of dark web cybercriminals and their impact on online
services.
3. Differentiate the Privacy and Anonymity. Explain how Tor maintains anonymity during
web browsing.
4. Investigate the threat analysis on the deep web compared to the surface web. Why it is
necessary to protect from cyber threats?
5. Distinguish between virus and worms? Investigate the role of encryption in the
operation of a virus.
RATIONALE
This assessment task will assess the following learning outcome/s:
• be able to analyse the malicious and cybercriminal activities inside the dark web.
• be able to analyse dark web content and create web logs.
• be able to investigate the threat landscape in the dark web and appraise mitigating
techniques used to combat cybercrime.
Assessable HD DI CR PS
components
PRESENTATION
• You are recommended to write the answers in a word document and submit it via
Turnitin. You can also submit your document in pdf format as well.
• Your answers to the questions should be precise but complete and informative.
• Each question in Task 1 should be answered individually with the corresponding label
to indicate the tasks completed.
• Your submission must be no more than 10 pages long (including diagrams), have
margins no less than 2cm, and be in a font size no less than 12 points.
• A cover page (outside the page limit) must be included and should contain relevant
identifying information.
REQUIREMENTS
For this assessment, you are required to use APA referencing to acknowledge the sources that
you have used in preparing your assessment. Please refer to the CSU referencing guide
http://student.csu.edu.au/study/referencing-at-csu. In addition, a very useful tool for you to
use that demonstrates how to correctly use in-text referencing and the correct way to cite the
reference in your reference list can be found at https://apps.csu.edu.au/reftool/apa-6
TASK
Investigate attacks on anonymising networks
This assessment aims to assess the understanding of anonymising network inside the Dark
Web using The Onion Router (TOR) and analysing the network traffic. This assessment task will
also assess the following learning outcome of this subject as well as measuring progress
towards all the learning outcomes:
• be able to investigate the usage of anonymising networks in the dark web using
publically available tools
Description:
1. You will access your network security logs (please make sure that you are not
breaching the privacy if it is your workplace logs)
2. Your task is to access the Dark Web safely and anonymously using the Tor network
through the Tor browser. The best way to keep yourself private you may combine Tor
with a VPN. You will be required to describe how you have kept safe while exploring
the Dark Web.
3. Navigate the Dark Web to discover suspicious activity by digging through search
engines. You need to start with Tor browser to conduct the dark web investigations
4. Evaluate its routing protocols and security features. You should be able to describe
the navigated hidden web traffic logs for your traffic analysis
5. In your report, you must include a description of the potential challenges of the Tor
network concerning traffic analysis.
RATIONALE
This assessment task will assess the following learning outcome/s:
• be able to analyse the malicious and cybercriminal activities inside the dark web.
• be able to analyse dark web content and create web logs.
• be able to investigate the usage of anonymising networks in the dark web using
publically available tools.
Assessable HD DI CR PS
Components
PRESENTATION
Presentation
• Your answers to the questions should be precise but complete and informative.
• Your submission must be in a form readable by Microsoft Word or PDF/Acrobat format
and submit it via Turnitin.
Charles Sturt University Subject Outline
ITC578 202160 S I Page 17 of 34
Version 2 - Published 09 July 2021
• The report should be precise but complete and informative and the number of words
within 800-1000 words.
• Your submission must be no more than 8 pages long (including diagrams), must have
margins no less than 2cm, and a font size no less than 12 points.
• Any text adapted from any source must be clearly labelled and referenced. Please
refer to the CSU referencing guide http://student.csu.edu.au/study/referencing-at-csu.
REQUIREMENTS
For this assessment, you are required to use APA referencing to acknowledge the sources that
you have used in preparing your assessment. Please refer to the CSU referencing guide
http://student.csu.edu.au/study/referencing-at-csu. In addition, a very useful tool for you to
use that demonstrates how to correctly use in-text referencing and the correct way to cite the
reference in your reference list can be found at https://apps.csu.edu.au/reftool/apa-6
TASK
Your task in this assessment is to write a research report. Please refer to the marking guide
when preparing your report to see what criteria and standards will be used to assess your
work and your progress towards Learning Outcomes 1, 3,4,5 and 6.
Task
Your task in this assessment is to write a research report. This assessment is designed to
demonstrate your familiarity with the underlying complex technology and industry
terminology that will help you leverage the Dark Web and analyse data discovery to
strengthen your security position. It will also start your journey towards gaining the
knowledge to establish relevant policies and procedures based on research and fact-finding
foundations.
Please refer to the marking guide when preparing your report to see what criteria and
standards will be used to assess your work and your progress towards Learning Outcomes 1, 3,
4, 5 and 6
Your report will consist of two parts:
Part 1: Annotated Bibliography
Refer to the following resources to help you set up your annotated bibliography
1. A set of topics* is listed below. Choose one topic you are really interested in or is
closely related to your professional practice.
2. You are required to conduct a literature search on a topic of your choice. You should
choose at least three research papers, journal articles or conference papers). To start
you off, you will include the following article.
Hatta, M. (2020). Deep web, dark web, darknet. Annals of Business Administrative
Science, 2020, 19(6), 277-292. Retrieved https://www.jstage.jst.go.jp/article/abas/19/6/
19_0200908a/_pdf/-char/en
Topics Set*:
• Cybersecurity threat landscape during COVID-19
• Malware as a Service (MaaS) during the COVID-19 pandemic.
• Cyber-Warfare, Attacks and Defences in the Australian Context
• ToR Network
• Crypto market and Cryptocurrencies
• Dark Web forensics
• The security impact of COVID-19 on social media
• Bay pointe Security Consulting (BPSC)
• CIA (Code Injection Attack)
• Social engineering
• Data exfiltration
• Network traffic analysis
* (You are allowed to select a different topic (not in the list) that is related to the subject but, in
that case, please let your Lecturer/subject coordinator know prior to your assessment)
Part 2: Discussion
From your annotated bibliography answer the following discussion questions:
1. Identify any important issue/s that you believe were not addressed (or not addressed
adequately) in the literature.
2. Explain why you view this issue/these issues as important.
3. Discuss what you believe to be the most important lesson you have learnt as a result
of your literature research.
4. Develop recommendations on how this knowledge will improve the security of your
RATIONALE
This assessment task will work towards assessing the following learning outcome/s:
RATIONALE
This assessment task will assess the following learning outcome/s:
• be able to analyse the malicious and cybercriminal activities inside the dark web.
• be able to analyse dark web content and create web logs.
• be able to evaluate forensic techniques used to defend against cybercrime.
• be able to investigate the usage of anonymising networks in the dark web using
publically available tools.
• be able to investigate the threat landscape in the dark web and appraise mitigating
techniques used to combat cybercrime.
It also aims -
Assessable HD DI CR PS
Components
Reflect on what The reflection is The reflection is The reflection is a The reflection
you believe to be an in-depth a reasonable reasonable analysis of attempts a basic
the most analysis of the analysis of the the learning analysis of the
important lesson learning learning experience, with some learning
you have learnt as experience, the experience, the analysis of the value experience, but
a result of these value of the value of the of the derived learning the value of the
discussions. derived learning derived learning to self. derived learning to
Maximum to self and the to self and the self is vague.
marks:10 enhancement of enhancement of
Learning the student’s the student’s
outcomes-3,6 appreciation for appreciation for
the issues the issues
surrounding the surrounding the
topic. topic.
PRESENTATION
REQUIREMENTS
For this assessment, you are required to use APA referencing to acknowledge the sources that
you have used in preparing your assessment. Please refer to the CSU referencing guide
http://student.csu.edu.au/study/referencing-at-csu. In addition, a very useful tool for you to
use that demonstrates how to correctly use in-text referencing and the correct way to cite the
reference in your reference list can be found at https://apps.csu.edu.au/reftool/apa-7
EXAM PENALTIES
Exam Penalties
The penalty for late submission of an exam will only apply to exam options (such as
Turnitin) that do not include an auto-submit function. It will be a deduction of the
maximum marks allocated for the exam equal, in percentage terms, to the extent of the late
submission. The extent of the late submission will be determined with reference to the
duration of the exam, including all allowances.
Example 1.
An exam with 120 minutes (2 hours) of writing time, 10 minutes of reading time and a 30
minute technology allowance is an exam of 160 minutes duration. If a student submits after
200 minutes, the 40 minutes of excess time represents 25% of the total duration and they
would therefore be deducted 25% of the maximum marks available for the subject.
Example 2.
An exam with 2 days (48 hours) of writing time. If a student submits after 60 hours, the 12
hours of excess time represents 25% of the total duration and they would therefore be
deducted 25% of the maximum marks available for the subject.
Note that the penalties for late submission of an online exam are different to the standard
penalties for late submission of an assessment task covered in the Assessment
Information section below.
REQUIREMENTS
Your exam will be an open book, time-limited online exam with invigilation conducted by CSU
staff via Zoom. You will need access to a webcam and microphone. The exam will be timetabled
as per normal and you will be notified of your scheduled time via the exams office. The exam
questions will be available from an interact 2 test within your interact 2 site. The link to your
exam within Interact 2 will become active at the time specified in the exam timetable. Once you
have completed your exam, you will submit your answers to the online test as per the details
below. Detailed information about online proctored exams is available from the following link:
https://www.csu.edu.au/current-students/learning-resources/information-planning/exams/
online-invigilated
What you can have in your online Zoom exam
What to remove from your desk and exam room before your exam
• Computing devices other than a calculator and the device used to sit your exam.
• Mobile phones or other electronic communication devices (including smart glasses).
• iPads, tablets and MP3 music/media devices.
• Watches of any kind, including standard watches, smartwatches, hybrid watches and
fitness trackers.
• Briefcases, bags, attaché cases, shopping bags, backpacks or similar.
The time allocated to complete the exam is 10 minutes reading time + 2 hours writing time
+ 15 minutes technology allowance. The technology allowance gives you extra time to deal
with the different test conditions (e.g., making allowances for typing speed, slow internet,
etc.). You are allowed to answer questions in your test for the whole allocated time. The
test will be automatically submitted when that time is up. It is your responsibility to ensure
that questions are completed by that stage.
The sample exam is a guide to the style and format of your final exam. Additionally, there
will be an example test to help you become familiar with how the i2 test system works.
VALUE: 50%
Instructions:
• For each question, select the single best response from the options given.
• There is no negative marking for incorrect answer. Attempt all questions. All
Charles Sturt University Subject Outline
ITC578 202160 S I Page 25 of 34
Version 2 - Published 09 July 2021
questions have equal value (1 mark each).
1. The international standard for rating the security of a computer system is called:
a. The Common Criteria
b. The Universal Criteria
c. The Trusted Evaluation Criteria
d. The Orange Book Standard
2. Which of the following types of the password is the most secure against
eavesdropping?
a. A one-time password
b. A password that has been hashed
c. A password that has been randomly generated
d. A password that contains a mixture of upper and lower case letters, and digits
a. blind deciphering
b. cryptanalysis
c. transposition
d. steganography
4. “Release of message contents to any person or process not possessing the appropriate
cryptographic key” is a called -
5. Which mechanism assures that a received packet was in fact transmitted by the party
identified as the source in the packet header and assures that the packet has not been
altered in transit.
a. Security
b. key management
c. authentication
d. confidentiality
6. Which approach is unsuitable for a connectionless type of application because it
requires the overhead of a handshake before any connectionless transmission,
effectively negating the chief characteristic of a connectionless transaction.
a. Replay
b. timestamp
7. Which one of the following is a secret entry point into a program that allows someone
who is aware of it to gain access without going through the usual security access
procedures?
a. backdoor
b. Multipartite
c. hatch
d. Trojan horse
8. Which one of the following attacks makes computer systems inaccessible by flooding
servers, networks, or even end-user systems with useless traffic so that legitimate
users can no longer gain access to those resources?
a. PWC
b. Backdoor
c. DDoS
d. Flooder
9. What antivirus programs are memory resident programs that identify a virus by its
actions rather than its structure in an infected program?
a. Second-generation
b. First-generation
c. Fourth-generation
d. Third-generation
a. computer-generated passwords
b. a reactive password checking strategy
c. user education
d. a proactive password checker
Instructions:
• Attempt all questions, each question has an equal value (5 marks each).
1. Describe with example the main differences between Cyberwar and cybercrime.
END OF EXAMINATION
RATIONALE
This assessment task will assess the following learning outcome/s:
• be able to analyse the malicious and cybercriminal activities inside the dark web.
• be able to analyse dark web content and create web logs.
• be able to evaluate forensic techniques used to defend against cybercrime.
• be able to investigate the usage of anonymising networks in the dark web using
publically available tools.
• be able to investigate the threat landscape in the dark web and appraise mitigating
techniques used to combat cybercrime.
All questions are worth equal marks and each question is worth 1 mark.
Academic Integrity
Play your part in maintaining academic integrity at our university. Complete your compulsory
Academic Integrity at Charles Sturt University (https://www.csu.edu.au/current-students/
learning-resources/build-your-skills/academic-integrity) subject. This subject will help you
understand our Academic Integrity Policy, our expectations of you, and the support services
available to help you meet your academic obligations.
You’ll learn how to avoid plagiarism, cheating, contract cheating, and collusion. Charles Sturt
University treats breaches of academic integrity seriously. We may use Turnitin to check your
submitted work for plagiarism or contract cheating.
Referencing
Referencing is an important component of academic work. All assessment tasks should be
appropriately referenced. The American Psychological Association (APA) referencing style is
the default referencing style to be used in students’ assessment work. If your subject requires
a different style to be used, this will be stated in the assessment requirements. Get referencing
style guides and help with referencing from Charles Sturt’s Referencing webpage
(https://www.csu.edu.au/current-students/learning-resources/build-your-skills/academic-
skills-help/referencing).
Unless advised otherwise, all Turnitin submissions are due by midnight (AEST) of the date
All textual elements within an assessment must be submitted in a format that is readable by
Turnitin. Specific exceptions, where an assessment requires the insertion of image based
evidence of workings will be outlined in the context of the assessment. Students that
deliberately attempt to insert content of assessments in a format that is not readable by
Turnitin may be subject to Academic misconduct investigations.
It is recommended that your name, student ID and page number are included in the header
or footer of every page of any assignment. You are also required to rename your assignment
file before you submit via Turnitin as per below protocol:
You may have previously completed an online quiz using this system. You will access your
Interact2 test using your online web browser, such as Chrome.
Please ensure that you have turned off any pop-up blocking software, as this may block your
online exam from opening in Interact2.
Once you login to your Interact2 subject site, you will see an option on the left-hand side of
your screen that will take you to your online exam page.
Before your exam is scheduled to start, a link will appear on this page. You may have to refresh
this page.
Interact2 will automatically submit your exam for you when the time is up or you can submit
your exam yourself if you finish early.
Please ensure you write your own responses within the text field provided. You will not be able
to cut and paste text into the exam respond field.
Extensions
It is best to complete assessment items by the due date. However, when something
unavoidable comes up an extension may be possible. The following principles are used when
processing extensions
1. For in-session assessment items, an extension request for up to three (3) calendar days can
be made by emailing your subject coordinator directly before the due date. In your email
please state the reason why you need more time as well as what precisely you are requesting.
Supporting documentation is not required. If an extension is requested in the above format
2. For in-session assessment items, extension requests of more than three (3) calendar days
must be made via the special consideration form: https://apps.csu.edu.au/specialcons/. The
request must be made before the due date and must include supporting documentation.
Acceptable reasons are given in the Special Consideration Policy<https://policy.csu.edu.au/
view.current.php?id=00298>. Each request will be considered on a case by case basis. The
request may not be granted. The maximum extension possible will be seven (7) calendar days.
3. If you receive an extension, then you should expect the assessment item and its feedback to
be returned later. If you submit later than the extended due date you will receive late penalties
as per guidelines below.
4. Unless your extension permits otherwise, submissions received 10 days after the original
due date will receive zero.
5. For end of session exams, you can request a supplementary exam via
https://apps.csu.edu.au/specialcons/. This request must be made within 3 working days of the
date of exam and must include supporting documentation. Acceptable reasons are given in
the Special Consideration Policy <https://policy.csu.edu.au/view.current.php?id=00298>. For
medical issues, a CSU medical certificate is required. If the supplementary exam (SX) is
awarded then your exam is moved to the next examination period. In order to preserve exam
integrity and manage the logistics of exams, the timing of a supplementary exam is heavily
restricted.
10% deduction per day, including weekends, of the maximum marks allocated for the
assessment task, i.e. 1 day late 10% deduction, or 2 days late 20% deduction.
If an assignment is due on a Friday but is not submitted until the following Tuesday, then the
penalty will be four days (40% deduction or 8 marks in the example above).
Resubmission
Under normal circumstances resubmission of assessment items will not be accepted for any of
the assessments required in this subject.
Feedback processes
Marking rubrics provided with each assessment item will be used to assess the submissions.
Assessment return
You should normally expect your marked assignment to be despatched/returned to you
within 15 working days, if your assignment was submitted on time. If an assignment is
submitted on time but not returned by the return date, you should make enquiries in the first
instance to your lecturer. If the lecturer is not available, please contact your teaching team
using the contact details and consultation procedures provided on your Interact2 subject site.
.
Evaluation of subjects
Charles Sturt University values constructive feedback and relies on high response rates to
Subject Experience Surveys (SES) to enhance teaching. Responses are fed back anonymously
to Subject Coordinators and Heads of Schools to form the basis for subject enhancement and
recognition of excellence in teaching. Schools report on their evaluation data; highlighting
good practice and documenting how problems have been addressed. You can view a summary
of survey results via the Student Portal SES Results (https://student.csu.edu.au/study/subject-
experience-survey-results) page.
We strongly encourage you to complete your online Subject Experience Surveys. You will be
provided with links to your surveys via email when they open three [3] weeks before the end of
session.
Learning analytics
Learning Analytics refers to the collection and analysis of student data for the purpose of
improving learning and teaching. It enables the University to personalise the support we
Based on past analytics, changes made to the subject included <ABC> and <XYZ>.
Library Services
Access scholarly eBooks, journal articles and multimedia through your Library
(https://library.csu.edu.au/). Learn how to find the best information for your study. We’re here
to help with Library Resource Guides, videos, online workshops and online chat.