Vous êtes sur la page 1sur 5

ITC331 – 201130 Assignment 1 & Assignment 2

Assessment item 1

Security assignment
Value: 25%

Due date: 15-April-2011

Return date: 6-May-2011

Submission method options

EASTS (online)

Task

Length: The maximum number of words set for this assignment is 350/answer.
However, it is expected that answers to the assignment questions be succinct (i.e.
precise and concise) with all sources of information fully referenced.

Instructions
Answer the following questions:

1. Explain the significance of the key characteristics of information, namely the CIA,
to information security. Preserving confidentiality, integrity and availability of data is
a restatement of the concern over interruption, interception, modification and
fabrication. How do the first three concepts relate to the last four?

2. How do the NIST criteria for selection of DES and AES relate to Shannon’s
original standards of a good cryptographic system? What are the significant
differences? How do these standards reflect a changed environment many years after
Shannon wrote his standards?

3. Security decision making should be based on rational thinking and sound


judgement. In this context critique five security design principles.

4. A synchronous password token has to operate at the same pace as the receiver. That
is, the token has to advance to the next random number at the same time the receiver
advances. Because of clock imprecision, the two units will not always be perfectly
together; for example, the token’s clock might run 1 second per day slower than the
receiver’s. Over time the accumulated difference can be significant. Suggest a means
by which the receiver can detect and compensate for clock drift on the part of the
token.

5. Can link and end-to-end encryption both be used on the same communication?
What would be the advantage of that? Cite a situation in which both forms of
encryption might be desirable.

Rationale

This assignment is designed to test your knowledge and understanding of some of the
key concepts and issues related to information security as covered in the Module 1 of
this subject.

Marking criteria

All questions are of equal value.

Marks will be awarded based on:

• the degree to which you demonstrate your understanding of facts, principles and
concepts; (Value: 70%)
• clarity of explanations; (Value: 10%)
• grammar and referencing. (Value: 20%)

Note:

-No marks will be awarded for a wrong answer.

-All sources of information must be fully referenced.

Assessment item 2

Ethics assignment
Value: 25%

Due date: 12-May-2011

Return date: 2-June-2011

Submission method options

EASTS (online)
Task

Length: Minimum 1500 words


Maximum 2000 words

Instructions

Choose one ethical issue arising from the use of ICT that has been reported in the
press in last three years, and discuss it in depth. Show why or how the technology
creates or contributes to the problem. Produce an article, discussing both sides of the
issue (pros and cons) drawing on both technical and philosophical literature. In
addition, argue for your own view of the matter, giving your reasons for your point of
view and showing why you believe that they are better than opposing views.

The text book has an obvious United States of America bias. You can choose to
provide a comparative discussion that includes how cultural differences impact on the
US-centric view of ethical behaviour in the context of the instructions above. You
should clearly identify the differences and the country to which those differences
relate.

You will be assessed on your ability to reason, analyse and present cogent argument
for a particular case. You should outline the main statement you wish to make about
your chosen ethical issue along with your reasons and others’ objections to it. You
may use any appropriate technique to set out the basic structure of your article.

Examples

1. In the recent years there have been considerable discussions on Internet content
regulation. In an examination of this issue, I would expect a discussion of the pros and
cons of censorship in general, and how these general principles apply to the Internet,
and of the technical issues of Internet content regulation. Your main focus statements
could be, for example: Internet content ought to be regulated; Internet content ought
not to be regulated; information wants to be free (the Hacker ethic); and Content
regulation is just censorship under another name.

2. A perennial issue is privacy. Hardly a week passes without some report in the press
about something that is causing concern, whether it be some merger, new software, a
failure of security, new legislation, or whatever. Your main focus statements could be,
for example: Privacy on the internet ought to be protected; The government
should determine the extent of personal privacy on the internet. There are of
course many other statements that could be made about the issue of privacy.

You are required to submit the following:


• A comprehensive and coherent article containing your critical analysis of an ethical
issue in IT.
• Your article should clearly show:
- the main point(s) of the issue;
- the pros and cons for the main point(s) (including your reasons and objections as
well as others); and
- a critique of the effectiveness of the arguments presented
• A short summary of your assessment of the way the public press portrays the
identified issue.

Rationale

This assignment relates to many of the learning outcomes (subject objectives) for
Module 2. It provides an opportunity for you to:

• demonstrate factual knowledge, understanding and the application of principles of


ethics to ICT-related issues;
• demonstrate depth of analysis by examining arguments for one ethical issue related
to ICT;
• demonstrate coherent and logical presentation of ethics issues in ICT;
• demonstrate research and writing skills;
• demonstrate knowledge and application of appropriate terminology; and
• demonstrate ability to integrate and apply information from various topics and to
apply understanding and knowledge to a practical situation.

Marking criteria

Marks will be awarded as per the Assessment Criteria provided in the Mark Sheet
below.

Note: No marks will be awarded for a wrong answer.


Assignment 2 Mark sheet

Student name: Student ID:

Assessment criterion Marks Actual Comments

Presentation (including title, subheadings, 1 1/2 10


spacing, paragraphs) and grammar and spelling

Writing and Research skills 10

Description of scenario to be analysed 10

Identification of relevant ethical issue(s) 10

Reasoning/Analysis (subdivided as follows) 50


Knowledge and application of
(20)
ethical principles

Appropriateness of pros and cons


(15)
in arguments

Coherence and logical presentation


(15)
of discussion

Referencing 10

Total 100

Comments:

Vous aimerez peut-être aussi