Professional Documents
Culture Documents
Instructions
No marks will be awarded for the entire assignment if any part of it is found to be copied directly
from printed materials or from another student. All submissions should be made on or before the
due date. Any late submissions after the deadline will not be entertained. Zero (0) mark will be
awarded for late submission unless extenuating circumstances are upheld.
According to an article dated February 2021 on Covid-19 Economic Impact Assessment, the
coronavirus pandemic has helped drive the rapid growth of digital solutions. While this has
enabled several positive developments, it has also exposed many sectors to a heightened threat of
cyberattacks. These are the summary of findings according to the article:
Reference: https://oxfordbusinessgroup.com/news/covid-19-and-cyberattacks-which-emerging-
markets-and-sectors-are-most-risk
Activities:
1. Choose one sector from the above list.
2. Propose the application of PKI for the chosen sector against cyberattacks.
3. Suggest specific applications / systems to be used in the security proposal.
Deliverable:
Proposal for application of PKI in specific sector
One of the employees in M57 is stealing proprietary research from the company and passing it
on to an outside entity. This employee has taken some measures to cover their tracks, but
probably did not count on the company machines being imaged in the ongoing investigation of
other criminal activity.
The police seized the digital evidence at the scene and made forensic copies of various evidence
sources. However, for the scope of this portfolio, you are going to investigate ONE of the USB
drives’ images only which can be downloaded here:
https://downloads.digitalcorpora.org/corpora/scenarios/2009-m57-patents/usb/
Reference:
Activities:
1. Refer to the additional details provided.
2. Document your investigation steps and findings as a case investigation report, following
proper structure and sequence.
3. Evaluate the case based on your findings.
4. Provide recommendations for the case and for the future if similar case were to happen as
part of your conclusion.
Deliverable:
Case investigation report
Kessa feels strongly that the system should be more secure than it would be if the least secure
option is selected. Ms. Jones has tried to explain the risks to ToyTime, but the CEO, the CIO,
and the Director of Personnel are all convinced that the cheapest security is what they want.
Should Kessa refuse to build the system with the least secure option?
How would the benefits and burdens be distributed for each alternative? What groups among
the stakeholders would be favored and which would be disadvantaged under each of the
alternatives?
Deliverable:
Group discussion on the case study
This case does not require research – it requires thought and reflection.
Documentation Guidelines:
Document the results of your work in a professional and systematic manner. Your completed
documentation should at least contain the following requirements:
1) Cover
2) Table of content
3) Write up for Portfolio 1, 2 and 3 with proper numbered sections and subsections. Each
portfolio should have the following structure at minimum:
a) Introduction
b) Structured write up content (with appropriate referencing and in-text citations)
c) Conclusion
d) References
e) Appendix
Submission Requirements
1. Online submission via Moodle.
2. Times New Roman font size 12, with 1.5 line spacing and justified paragraphs.
Performance Criteria:
Marking Rubrics
0 to 19 20 to 25 26 to 29 30 to 40
(Fail) (Pass) (Credit) (Distinction)
PLO2 – Fail to demonstrate Average level in Good level in Excellent level in
Cognitive intellectual demonstrating demonstrating demonstrating
Skills independence in the intellectual intellectual intellectual
application of independence in the independence in the independence in the
knowledge within application of application of application of
specific field(s) by knowledge within knowledge within knowledge within
applying critical, specific field(s) by specific field(s) by specific field(s) by
analytical and applying critical, applying critical, applying critical,
evaluation skills in analytical and analytical and analytical and
the field of evaluation skills in evaluation skills in evaluation skills in
study the field of the field of the field of
study study study
0 to 9 10 to 12 13 to 14 15 to 20
(Fail) (Pass) (Credit) (Distinction)
PLO 4 – Fail to work Average level in Good level in Excellent level in
Interpersonal together with working together working together working together
Skills different people in with different with different with different
diverse learning people in diverse people in diverse people in diverse
and learning and learning and learning and