Faculty of Engineering, Environment and Computing 4034CEM Introduction to Operating Systems, Networks & Cyber Security
Assignment Brief 2021/22
ModuleTitle: Introduction to Operating Systems, Networks & Cyber Security | Ind/Group:Individual Report | Cohort(Sept/Jan/May):September 2021 Cohort | Module Code: 4034CEM |
CourseworkTitle: Resit Coursework 2 | Hand outdate: 03/06/2022 | ||
Lecturer: Dr. Awinder Kaur | Duedate: 04/07/2022 at 18:00 | ||
EstimatedTime(hrs): 20 hours Word Limit*:1500 words | Courseworktype: 1500 words Individual Report | Creditvalueassessed: 10 credits | |
SubmissionarrangementonlineviaAula: 04/07/2022 Filetypesandmethodofrecording: Individual Report submitted on the 4034CEM Aula Site. MarkandFeedbackdate: Within 2 weeks of the deadline of the assessments MarkandFeedbackmethod: Individual Report will be marked with marks and feedback will be provided within 2 weeks |
ModuleLearningOutcomesAssessed LO1:Understand the basic concepts of modern operating systems and the roles of operating systems components LO2:Understand the usage of services and functions provided by the operating systems, such as process control, file management, threading, memory management, device access LO3:Understand the fundamental and essential networking concepts such as the network layers, interfaces and protocols LO4: Identify system security issues pertaining to the OS and enterprise networks, evaluate appropriate security techniques and technologies to protect the OS and enterprise networks |
TaskandMarkdistribution |
Building on the knowledge gained from the module, this assessment requires you to demonstrate your understanding of the concepts you have learnt from the module. Resit Coursework 2 will be assessing Module Learning outcome 1, 2, 3 and 4. As the Chief Technology Officer (CTO) of a new bank branch in Coventry, you are in-charge of ensuring the technology requirements and needs for the bank are met. You will need to write a 1500 report covering the 3 key technology requirements that are operating systems, networks and cyber security. OperatingSystems Selecting an operating system for the bank can be a challenging decision as there are various factors to consider such as performance, user friendliness and security. Select the appropriate Operating Systems (E.g., Windows) for the bank and list the reasons for why you have selected it in comparison to other available ones in terms of services and functions provided by the chosen operating systems Networks Selecting the right network for the bank is vital as networks provides easy communication, data security, speed and other benefits. Chose the right network for the bank and provide a list of reasons for why you have chosen it in comparison to other available networks with specific focus on network layers, interfaces and protocols. CyberSecurity Companies need Cyber Security to protect them in an event of a data breach, a Cyber Attack or other security risks. List and discuss ways that you will be protecting the bank against events of Data Breaches, Cyber Attack or other security risks with specific focus on security techniques and technologies to protect the bank’s Operating Systems and Enterprise Networks. SubmissionDetails Submission of the coursework report will be via the Turnitin submission link on the 4034CEM Aula site. Your report should be in PDF format. The maximum word count for the report is 1500 words, but the limit does not include tables, references and appendices of the report. MarkingScheme | |||
Professional presentation, structure and depth of the report | /10 |
Background of the bank and overview of the report | /10 | ||
Discussions of the Operating Systems chosen for the bank with the list of reasons for why it was chosen in comparison to other available ones in terms of services and functions provided by the chosen operating system | /25 | ||
Discussions of the Network chosen for the bank with list of reasons for why it was chosen in comparison to other available networks with specific focus on network layers, interface and protocols | /25 | ||
Discussions of the list of ways that you will be protecting the bank against events of Data Breaches, Cyber Attacks and other Security risks with specific focus on security techniques and technologies to protect the bank’s Operating Systems and Enterprise Networks | /25 | ||
References | /5 | ||
Total | /100 | ||
Notes: You are expected to use the Coventry University APA referencing format. For support and advice on how this students can contact Centrefor AcademicWriting(CAW). Please notify your registry course support team and module leader for disability support. Any student requiring an extension or deferral should follow the university process as outlined here. The University cannot take responsibility for any coursework lost or corrupted on disks, laptops or personal computer. Students should therefore regularly back-up any work and are advised to save it on the University system. |
This document is for Coventry University students for their own use in completing their assessed work for this module and should not be passed to third parties or posted on any website. Any infringements of this rule should be reported to facultyregistry.eec@coventry.ac.uk.
Marking Rubric:
90-100% Distinction | 80-89% Distinction | 70-79% Distinction | 60-69% Merit | 50-59% Pass | 40-49% Pass | 30-39% Fail | 20-29% Fail | 0-19% Fail | |
Individual | Exceptional | Outstanding | Excellent work | Very good work | Good work | Assessment | Very limited | Clear failure | Clear failure |
Written | work with very | work with high | undertaken with | often | undertaken with | demonstrates | understanding | demonstrating | demonstrating |
Assessment | high degree of | degree of rigour, | rigour, creativity | undertaken with | some creativity | some advanced | of relevant | little | no |
rigour, creativity | creativity and | and | rigour, creativity | and | knowledge and | theories, | understanding | understanding | |
and | critical/analytic | critical/analytic | and | critical/analytic | understanding | concepts and | of relevant | of relevant | |
critical/analytic | skills. | skills. | critical/analytic | skills. Work | of the subject | issues with | theories, | theories, | |
skills. | Work | Work | skills. | demonstrates | informed by | deficiencies in | concepts, issues | concepts, issues | |
Demonstrates, | consistently | demonstrates | Work | problem-solving | current practice, | rigour and | and only a vague | and no | |
creativity, | demonstrates | creativity, | demonstrates | skills and is | scholarship and | analysis. Some | knowledge of | understanding | |
originality and | creativity, | originality and | creativity, | completed with | research. Work | relevant | the area. | of area. | |
outstanding | originality and | excellent | originality and | some level of | may be | material may be | No originality, | Extremely | |
problem-solving | outstanding | problem-solving | problem-solving | accuracy, | incomplete with | present but be | creativity, and | unsatisfactory | |
skills. Work | problem-solving | skills. Work | skills. Work | proficiency and | some irrelevant | informed from | struggles with | presentation, | |
completed with | skills. Work | completed with | completed with | autonomy. | material | very limited | problem-solving | structure and | |
very high degree | completed with | very consistent | very consistent | Good | present. | sources. Limited | skills. | depth of the | |
of accuracy, | high degree of | levels of | levels of | presentation, | Demonstrates | originality, | Unsatisfactory | report. | |
proficiency and | accuracy, | accuracy, | accuracy, | structure and | some originality, | creativity, and | presentation, | ||
autonomy. | proficiency and | proficiency and | proficiency and | depth of the | creativity and | struggles with | structure and | ||
Exceptional | autonomy. | autonomy. | autonomy. | report. | problem-solving | problem-solving | depth of the | ||
presentation, | Outstanding | Excellent | Very good | skills but often | skills. | report. | |||
structure and | presentation, | presentation, | presentation, | with | Unsatisfactory | ||||
depth of the | structure and | structure and | structure and | inconsistencies. | presentation, | ||||
report. | depth of the | depth of the | depth of the | Satisfactory | structure and | ||||
report. | report. | report. | presentation, | depth of the | |||||
structure and | report. | ||||||||
depth of the | |||||||||
report. |
This document is for Coventry University students for their own use in completing their assessed work for this module and should not be passed to third parties or posted on any website. Any infringements of this rule should be reported to facultyregistry.eec@coventry.ac.uk.
Get complete solution for 4034CEM Introduction to Operating Systems, Networks & Cyber Security Assignment and many more. Plag free, 100% safe. Order Online Now!
No Fields Found.