SelfLearningAssessment 1.docx - MITS 5004 IT SECURITY Week 1 Tutorial Review the assessments for the class with your tutor Make sure you understand the

SelfLearningAssessment 1.docx - MITS 5004 IT SECURITY Week...

This preview shows page 1 - 4 out of 6 pages.

Image of page 1
Week 1 Tutorial Review the assessments for the class with your tutor. Make sure you understand the requirements of you in this class. Assignment 1 (Due Week 4) 10% Multiple Choice The assignment 1 is due in week 4, not long! It is recommended that you create a study group to review and find material to use for this assignment. Assignment 2 (Due Week 8) 10% Report This assignment will be due in week 8. Assignment 3 (Due Week 11) 30% Presentation The Major Assignment is due in Week 11. However there is a significant amount of work needed to properly complete the assignment. You need to research tools in the Kali and show how these tools work. Plagiarism Keep in mind plagiarism rules, meaning that you cannot: (1) Submit the same work as another person (2) Submit work from the internet. A common misconception is that you can use sentences from other sources as long as they are cited or they are factual descriptions. Neither is true. All words submitted must be your own, except for quotations. Keep in mind that quotations should be minimised – any more than 1 sentence per page is probably too much, unless the quotation is a specific insight into a problem – not a factual description! Resource of the week: Stay Smart Online This website contains all the information you need to be secure online. It is targeted at home users and novices, but contains information on the latest threats and vulnerabilities. The language is very readable and provides a good platform for future research into threats (for example, for the week 4 assignment). Resource of the week: Pico CTF This introduction to security game provides a fun interactive 8-bit adventure in security. You will need to solve challenges that build skills for penetration testing and other security skills. You gain points and progress as you complete these challenges.
Image of page 2
TRUE/FALSE QUESTIONS: False 1. Threats are attacks carried out. True 2. Computer security is protection of the integrity, availability, and confidentiality of information system resources.
Image of page 3
Image of page 4

You've reached the end of your free preview.

Want to read all 6 pages?

  • Three '17
  • mary luka

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern

Stuck? We have tutors online 24/7 who can help you get unstuck.
A+ icon
Ask Expert Tutors You can ask You can ask You can ask (will expire )
Answers in as fast as 15 minutes
A+ icon
Ask Expert Tutors