Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Assessment item 1
Security assignment
Value: 25%
EASTS (online)
Task
Length: The maximum number of words set for this assignment is 350/answer.
However, it is expected that answers to the assignment questions be succinct (i.e.
precise and concise) with all sources of information fully referenced.
Instructions
Answer the following questions:
1. Explain the significance of the key characteristics of information, namely the CIA,
to information security. Preserving confidentiality, integrity and availability of data is
a restatement of the concern over interruption, interception, modification and
fabrication. How do the first three concepts relate to the last four?
2. How do the NIST criteria for selection of DES and AES relate to Shannon’s
original standards of a good cryptographic system? What are the significant
differences? How do these standards reflect a changed environment many years after
Shannon wrote his standards?
4. A synchronous password token has to operate at the same pace as the receiver. That
is, the token has to advance to the next random number at the same time the receiver
advances. Because of clock imprecision, the two units will not always be perfectly
together; for example, the token’s clock might run 1 second per day slower than the
receiver’s. Over time the accumulated difference can be significant. Suggest a means
by which the receiver can detect and compensate for clock drift on the part of the
token.
5. Can link and end-to-end encryption both be used on the same communication?
What would be the advantage of that? Cite a situation in which both forms of
encryption might be desirable.
Rationale
This assignment is designed to test your knowledge and understanding of some of the
key concepts and issues related to information security as covered in the Module 1 of
this subject.
Marking criteria
• the degree to which you demonstrate your understanding of facts, principles and
concepts; (Value: 70%)
• clarity of explanations; (Value: 10%)
• grammar and referencing. (Value: 20%)
Note:
Assessment item 2
Ethics assignment
Value: 25%
EASTS (online)
Task
Instructions
Choose one ethical issue arising from the use of ICT that has been reported in the
press in last three years, and discuss it in depth. Show why or how the technology
creates or contributes to the problem. Produce an article, discussing both sides of the
issue (pros and cons) drawing on both technical and philosophical literature. In
addition, argue for your own view of the matter, giving your reasons for your point of
view and showing why you believe that they are better than opposing views.
The text book has an obvious United States of America bias. You can choose to
provide a comparative discussion that includes how cultural differences impact on the
US-centric view of ethical behaviour in the context of the instructions above. You
should clearly identify the differences and the country to which those differences
relate.
You will be assessed on your ability to reason, analyse and present cogent argument
for a particular case. You should outline the main statement you wish to make about
your chosen ethical issue along with your reasons and others’ objections to it. You
may use any appropriate technique to set out the basic structure of your article.
Examples
1. In the recent years there have been considerable discussions on Internet content
regulation. In an examination of this issue, I would expect a discussion of the pros and
cons of censorship in general, and how these general principles apply to the Internet,
and of the technical issues of Internet content regulation. Your main focus statements
could be, for example: Internet content ought to be regulated; Internet content ought
not to be regulated; information wants to be free (the Hacker ethic); and Content
regulation is just censorship under another name.
2. A perennial issue is privacy. Hardly a week passes without some report in the press
about something that is causing concern, whether it be some merger, new software, a
failure of security, new legislation, or whatever. Your main focus statements could be,
for example: Privacy on the internet ought to be protected; The government
should determine the extent of personal privacy on the internet. There are of
course many other statements that could be made about the issue of privacy.
Rationale
This assignment relates to many of the learning outcomes (subject objectives) for
Module 2. It provides an opportunity for you to:
Marking criteria
Marks will be awarded as per the Assessment Criteria provided in the Mark Sheet
below.
Referencing 10
Total 100
Comments: