Professional Documents
Culture Documents
2024
Assessment 2: Report
This document provides you with information about the requirements for your assessment. Detailed
instructions and resources are included for completing the task. The Criterion Reference Assessment
(CRA) Rubric that markers use to grade the assessment task is included.
Task overview
Course learning This report addresses the following course learning objectives (CLO) 2,3, and 4:
outcomes addressed CLO2: reflect on and synthesise complex issues, problems, concepts and
theories relating to securing diverse devices on non-wired networks;
CLO3: apply specialist knowledge and skills in enabling secure use of wireless,
mobile and IoT networks to mitigate potential security breaches;
CLO4: critically examine cyber security breaches using forensic tools, processes,
and procedures
Task snapshot
Maximum 3000 words+/-10% (word length includes in-text referencing and
Length
excludes your reference list and appendices)
Weighting 40%
Marks/ mark 40
allocation
Individual or Group Individual
This assignment must be all your own work. It is acceptable to discuss course
content with others to improve your understanding and clarify requirements, but
solutions to assignment questions must be done on your own.
You must not copy from anyone, including artificial intelligence tools (such as
ChatGPT), tutors and fellow students, nor allow others to copy your work.
Turnitin
Turnitin is a detection software and text matching tool used in this course.
Plagiarism checking is automatically done when you submit your assignment.
An originality/similarity report is automatically created which checks the
originality of your assignment. You can access and review the report.
NOTE:
• It may take up to 24 hours for a report to be issued from Turnitin
• When the assignment has been checked, you will see a notice in the
Files submission area.
• The percentage mark given indicates the amount of text matched
against the Turnitin Database. It is merely an indicator that should
always be reviewed to identify where Turnitin have picked up
potential plagiarism.
• You may have the option to edit submission or the option to submit
assignment, this is determined by your lecturer.
• Once you submit assignment you are no longer able to edit it.
Moderation (optional) All staff who are assessing your work meet to discuss and compare their
judgements before marks or grades are finalised.
Assessment Policies Information and links regarding USQ’s assessment policy/ procedure;
& Procedures extensions and late submissions; academic integrity & misconduct and
marking are found on your course StudyDesk Assessment page.
Note on Late submission & extensions: Applications for an extension of time
will only be considered if received in accordance with the USQ Assessment
procedure and the Assessment of Compassionate and Compelling
Circumstances Procedure. Refer to the links on StudyDesk for copies of these
procedures.
Academic Integrity
Your time at University is an opportunity to develop the knowledge and the skills you will need to
succeed in your chosen profession. Academic integrity is essential in ensuring the quality of your
education and development. Academic Integrity means acting with the values of honesty, trust, fairness
and respect in learning, teaching and research. It celebrates the genuine achievements made by yourself
and your peers.
Breaches of academic integrity undermine your development and the ability of you to work at the level
needed after you graduate. Academic Misconduct includes but is not limited to Plagiarism, Collusion,
Cheating and Contract Cheating, Impersonation, Misrepresentation and Falsification, Self-Plagiarism and
Solicitation.
To help maintain the integrity of your work within your degree, USQ has sophisticated detection systems
that monitor all assessment for indicators of academic misconduct. When you submit an assessment
item, all the details are recorded and can be referred to if we suspect academic misconduct has
occurred. Penalties may be applied retrospectively in circumstances where a breach is identified after
completion of a course.
IMPORTANT
ARTIFICIAL INTELLIGENCE (AI) AND ACADEMIC INTEGRITY
Many websites and apps use artificial intelligence to generate or paraphrase material. Tools like
ChatGPT, GrammarlyGo and Quillbot may only be used in assessments when you have been given
explicit approval from your course coordinator to do so. Unless you receive explicit, written approval,
you may not submit any work that was not written or created by yourself, because this constitutes
academic misconduct.
We understand that when you take on a university study program, you might be in a time poor, high
pressure situation. From time to time the temptation might be there to take short cuts that lead to
instances of academic misconduct.
If you are ever feeling pressured or the temptation to submit work that is not your own arises, don’t do
it. Instead, get the free support you need from USQ.
Contact your Course Examiner, iconnect or your Library Learning Advisor for free support.
Assessment 2 (written report) Rubric
Assessment 2 Rubric
Student Name: Due Date:
Assessment Name: Written report Weighting: 40% Mark out of 40
Criteria High Distinction Distinction Credit Pass Fail
(100 – 85) (84 – 75) (74 – 65) (65 – 50) (49 – 0)
Question Clarity of tool description The description of The description of The description of The description of The selected tools are
1 (CLOs and justification selected tools is selected tools is selected tools is not explained
selected tools needs
2 and 4) (supportive scenario- complete, distinct complete, distinct incomplete or partial, completely. No
further development
specific examples) the features for each are features for each are distinct features for examples of distinct
(no example of key
strengths and discussed, and the discussed, and the each are well- features for each tool.
weaknesses of tool for way each tool is used way each tool is used explained, and the features). The No example or
investigation including during the during the way each tool is used application of tools irrelevant examples of
digital evidence and data investigation is well- investigation is well- during the during the tool application during
acquisition (25 marks) described. The described. The investigation is investigation the investigation
answers clearly answers clearly unclear. There is process in unclear process. The are
explain how the tools explain how the tools partial clarity about (no context-specific several presentation
are collectively help are collectively help how these tools help examples are issues including
with the investigation with the investigation with the investigation provided). There are spelling/formatting.
process along with process along with process according to some presentation
illustrative examples illustrative examples the scenario. There issues.
relevant to the relevant to the are some presentation
scenario. scenario. However, issues.
the application of each
tool and relevant
examples to conduct
the investigation
process are not well
developed and
justified (some
examples are too
general, wrong, or
irrelevant to the
scenario).
Question Clarity of steps to be The description of The description of The description of The description of The description of
2 taken to gather evidence steps is complete and steps is somewhat steps and identified steps and identified steps and identified
(CLOs 2 from different sources and supported with complete and obstacles need further obstacles are too obstacles are not well-
and 3) justifications for different examples according to supported with development. They general or incomplete explained and not
obstacles (25 marks) the scenario. The examples according to are too general and according to the related to the scenario.
identified obstacles the scenario. not specific to the scenario. There are It is not clear how steps
against the However, the scenario. some presentation are performed, and
investigation process investigation process issues. obstacles are relevant
are sound and is general and some to the scenario. The are
relevant to the identified obstacles several presentation
scenario need further issues including
along with illustrative development. spelling/formatting.
examples.
Question Context specific (no The description of The description of The description of The description of The description of
3 general) example challenges and challenges and challenges or challenges or challenges or
(CLOs 4) challenges and example advantages related to advantages related to advantages related to advantages related to advantages related to
advantages in using XAI XAI application to XAI application to XAI application to XAI application to XAI application to
to conduct digital forensic conduct digital conduct digital conduct digital conduct digital forensic conduct digital forensic
along with rationale to forensic analysis are forensic analysis is forensic analysis are analysis are analysis are not clear,
select the examples well described with somewhat complete, incomplete, too underdeveloped. They wrong, or relevant to
analysis (50 marks) clear illustrative clear, and specific to general, and not are irrelevant, too XAI. The are several
examples. XAI. Some challenges specifically related to general, and not presentation issues
and advantages need XAI. specifically related to including
further explanation or XAI. There are some spelling/formatting.
support with presentation issues.
examples.
Result:
Additional Feedback