CYB401: Cyber Security Threat and Risk Assignment
Module Name CYB401: Cyber Security Threat and Risk
Assignment Name CYB401: Cyber Security Threat and Risk Assignment
Level 4
Plagiarism and Collusion
In submitting the assignment Learner must complete a statement of authenticity
confirming that the work submitted for all tasks is their own. The statement should also
include the word count.
Plagiarism and collusion are treated very seriously. Plagiarism involves presenting
work, excerpts, ideas, or passages of another author without appropriate referencing
and attribution.
Collusion occurs when two or more learners submit work that is so alike in ideas,
content, wording and/or structures that the similarity goes beyond what might have
een mere coincidence.
Referencing
A professional approach to work is expected from all learners. Learners must therefore
identify and acknowledge ALL sources/methodologies/applications used.
The learner must use an appropriate referencing system to achieve this. Marks are not
awarded for the use of English; however, the learner must express ideas clearly and
ensure that appropriate terminology is used to convey accuracy in meaning.
Please use the Harvard Style of Referencing throughout your work.
Appendices
You may include appendices to support your work. However, appendices must only
contain additional supporting information and must be clearly referenced in you
assignment.
CYB401: 1
You may also include tables, graphs, diagrams, Gantt charts, and flowcharts that
support the main report and should be incorporated into the back of the assignment
eport that is submitted.
Any published secondary information such as annual reports and company literature
should be referenced in the main text of the assignment, following Harvard Style
Referencing, and referenced at the end of the assignment.
Confidentiality
When Learners choose to include organisational information that deals with sensitive
material or issues, they must seek advice and permission from that organisation about
its inclusion.
Where confidentiality is an issue, Learners are advised to anonymise their assignment
eport so that it cannot be attributed to that particular organisation.
Word Count Policy
Learners must comply with the required word count, within a margin of +10%. These
ules exclude the index, headings, tables, images, footnotes, appendices, and
information contained within references and bibliographies. When an assessment task
equires learners to produce presentation slides with supporting notes, the word count
applies to the supporting notes only.
Submission of Assignments
-Before submitting your work check you have:
✓ Completed the tasks or activities as required by the assignment
✓ Labeled or numbered each task or activity
✓ Understood and responded to the command ve
s in the Assessment Criteria
✓ Produced the tasks or activities in the required format
✓ Presented your work clearly
✓ Referenced sources you have used and cited from
✓ Put cited material in quotation marks
✓ Checked for any spelling or grammatical e
ors
✓ Added a footer with page numbers
CYB401: 2
Marking and Grades
The details of a standard marking ru
ic can be found at the end of this document.
Unless stated elsewhere, learners must answer all questions in this document.
Assignment Question
Task 1 – 700 words
Understand complex business cyber security threats and risks.
1.1: Analyse major cyber
eaches and methods of attack that have severely impacted
usinesses and public organisations.
1.2: Examine how to calculate the business impact of a suspected or actual cybe
security
each.
Assessment Criteria
1.1: Analyse major cyber
eaches and methods of attack that have severely
impacted businesses and public organisations.
1.2: Examine how to calculate the business impact of a suspected or actual
cyber security
each.
Task 2 – 650 words
Understand recent mega
eaches and explain malware and ransomware attacks.
2.1: Apply threat and risk management concepts and models.
2.2: Explain the terms malware, ransomware and other forms of intentional malicious
cyber attacks.
Assessment Criteria
2.1: Apply threat and risk management concepts and models.
2.2: Explain the terms malware, ransomware and other forms of intentional
malicious cyber attacks.
Task 3 – 650 words
Understand how threats and malicious hackers are advancing and developing
customized intrusion tools.
CYB401: 3
3.1: Discuss the development of customised intrusion tools and their use by malicious
hackers.
3.2: Analyse how an intrusion occu
ed to cause a mega data
each.
Assessment Criteria
3.1: Discuss the development of customised intrusion tools and their use by
malicious hackers.
3.2: Analyse how an intrusion occu
ed to cause a mega data
each.
CYB401: 4
Marking Ru
ic:
Distinguished Excellent Good Proficient Basic Marginal Unacceptable
Criteria XXXXXXXXXX0
Content
(alignment with
assessment
criteria)
Extensive
evaluation and
synthesis of
ideas; includes
substantial
original thinking
Comprehensiv
e critical
evaluation and
synthesis of
ideas; includes
coherent
original
thinking
Adequate
evaluation and
synthesis of
key ideas
eyond basic
descriptions;
includes
original
thinking
Describes
main ideas
with
evidence of
evaluation;
includes
some original
thinking
Describes some
of the main ideas
ut omits some
concepts; limited
evidence of
evaluation;
confused original
thinking
Largely
incomplete
description of
main issues;
misses key
concepts; no
original
thinking
Inadequate
information o
containing
information not
elevant to the
topic
Application of
Theory and
Literature
In-depth,
detailed and
elevant
application of
theory; expertly
integrates
literature to
support ideas
and concept
Clear and
elevant
application of
theory; fully
integrates
literature to
support ideas
and concepts
Appropriate
application of
theory;
integrates
literature to
support ideas
and concepts
Adequate
application of
theory; uses
literature to
support
ideas and
concepts
Limited
application of
theory; refers to
literature but may
not use it
consistently
Confused
application of
theory; does
not use
literature fo
support
Little or no
evidence of
application of
theory and
elevant
literature
Knowledge and
Understanding
Extensive depth
of
understanding
and exploration
eyond key
principles and
concepts
Comprehensiv
e knowledge
and depth of
understanding
key principles
and concepts
Sound
understanding
of
principles and
concepts
Basic
Knowledge
and
understandin
g
of key
concepts and
principles
Limited and
superficial
knowledge and
understanding of
key concepts and
principles
Confused o
inadequate
knowledge
and
understanding
of key
concepts and
principles
Little or no
evidence of
knowledge o
understanding
of key concepts
and principles
Presentation
and Writing
Skills
Logical,
coherent and
polished
presentation
exceeding
expectations at
this level; free
from e
ors in
mechanics and
syntax
Logical,
coherent
presentation
demonstrating
mastery; free
from e
ors in
mechanics
and syntax
Logical
structure to
presentation;
makes few
e
ors in
mechanics and
syntax which
do not prohibit
meaning
Orderly
presentation;
minor e
ors
in mechanics
and syntax
Somewhat weak
presentation;
e
ors in
mechanics and
syntax may
interfere with
meaning
Confused
presentation;
e
ors in
mechanics
and syntax
often interfere
with meaning
Illogical
presentation
lacking
cohesion;
contains
significant e
ors
that interfere
with meaning
Referencing Advanced use
of in- text
citation and
eferences
Mastery of
in-text citation
and
eferencing
Appropriate
use of in-text
citation and
eferencing
Adequate
use of in- text
citation and
eferencing
Limited use of in-
text citation and
eferencing
Inadequate
use of citation
and
eferencing
Little or no
evidence of
appropriate
eferencing o
use of sources
Assessor’s Comments
CYB401: 5
Directions:
Total the boxes and divide by 5 to a
ive at the final mark.
Example:
Distinguished Excellent Good Proficient Basic Marginal Unacceptable
Range XXXXXXXXXX XXXXXXXXXX34
Criteria Score
Content 50
Application of Theory and Literature 40
Knowledge and Understanding 50
Presentation/Writing Skills 40
Referencing 40
Total Score 220/5 = 44, Pass
CYB401: 6