国产人妻人伦精品_欧美一区二区三区图_亚洲欧洲久久_日韩美女av在线免费观看

合肥生活安徽新聞合肥交通合肥房產生活服務合肥教育合肥招聘合肥旅游文化藝術合肥美食合肥地圖合肥社保合肥醫院企業服務合肥法律

COM398SUST代做、代寫Java/Python程序

時間:2024-05-02  來源:合肥網hfw.cc  作者:hfw.cc 我要糾錯



COM398SUST
COM398 Systems Security
60% OF THE TOTAL MARK
Release Date: 04th March 2024
Submission Date: 3rd May 2024 (12:00 (Noon) UK time)
Date returned with feedback: Within twenty working days after the submission deadline.
In submitting your assignment, you are agreeing to the following declaration of ownership:
I declare that this is all my own work and does not contain unreferenced material copied from any
other source. I have read the University’s policy on plagiarism and understand the definition of plagiarism.
If it is shown that material has been plagiarised, or I have otherwise attempted to obtain an unfair
advantage for myself or others, I understand that I may face sanctions in accordance with the policies
and procedures of the University. A mark of zero may be awarded and the reason for that mark will be
recorded on my file.
University policy on plagiarism is available here.
CW2 is an individual coursework which is worth 60% of the total coursework mark for this module.
The successful completion of CW2 will address the following learning outcomes:
• Develop practical prototypes to experiment with and reinforce core systems security
concepts.
• Illustrate a comprehension of the key issues and principles underlying modern security in
computing systems.
• Characterise the threats faced by computing systems, applications and systems; and
examine the role of security risks assessment and management in IT.
This coursework component requires students to research, write and make a presentation on the topic of
traffic analysis during a DoS / DDoS attack using Wireshark. This element would require each student to
prepare PowerPoint slides (10-15) and vodcast of the student presenting the slides. The vodcast should
be a maximum of 15 minutes long (vodcast exceeding the maximum limit will be penalised according to
the following scheme).
COM398SUST
15 minutes + 10% No penalty
15 minutes + >10% - 20% reduction in the total mark by 5%
15 minutes + >20% - 30% reduction in the total mark by 10%
15 minutes + >30% - 40% reduction in the total mark by 15%
15 minutes + >40% - 50% reduction in the total mark by 20%
15 minutes +>50% The maximum total mark achievable is 40%
This assessment component is designed to encourage students to reflect critically on the fundamentals of
systems security; and relate these fundamental concepts to developments within the field, and to realworld practical examples.
The students should submit the PPT they presented along with the video to show his / her ability to carry
out research on the CW topic.
This coursework component requires you to prepare (see also notes 1 & 2, and the coursework
preparation, submission and provision of feedback sections below) a video-recorded PPT
presentation and the PPT file (video + PPT slides) on traffic analysis using Wireshark. In this
coursework, you will be only considering the TCP/IP protocols for the analysis. Students will have
to log their experience (including any Wireshark based visualisation), observations and analysis
of the captured network traffic in a PPT document describing the TCP/IP protocol suit, and
addressing some specific points related to the provided Wireshark traffic file (PCAP file). The PPT
document and presentation may include (but not limited to) and address the following points:
1. An explanation of the TCP/IP protocols suit including:
a) The Transmission Control Protocol (TCP) and User Datagram Protocol (UDP), and the
difference between the two protocols
b) The Internet Protocol (IP)
c) The Difference between TCP and IP
d) The work of the TCP 3-Way Handshake Process.
2. Describe and contrast the Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS)
attacks, and their sub-types.
3. In the provided PCAP file, identify the type of the attack; any of your observations and analysis
of the traffic should be justified and explained by adding suitable Wireshark snapshots (or
any suitable Wireshark trace visualisation approach that you can embed in your presentation
/ video)
4. What is the IP address of the suspected attacker in the PCAP file? Justify and explain?
COM398SUST
5. Reflecting on the detected attack(s), you should add in your conclusion the possible context
/ cause(s) that allowed such attack(s) to take place; and countermeasure recommendations.
You should prepare your PPT document and presentation in such a way that it may be understood
by and useful to a fictitious group of students taking a course in computing and who may be
joining placement employers.
Although you have the freedom to adopt and follow your own presentation plan and structure,
the expectation, however, is that there should be an ‘Introduction’ in which you should cover the
TCP/IP protocols suit from which you can elaborate on the DoS and DDoS as in the points above.
The body of the report should be divided and partitioned into sections and any appropriate
visualization means should be used (e.g snapshots).
Your presentation should be evidence-based and supported by relevant and up-to-date
references and links. Sources should include textbooks, academic web sites, manufacturers’ web
sites, RFCs, white papers and academic literature (conferences and journals). You may use your
own selected referencing style.
Note 1: You can use data from such sources as evidence but you need to express this in your own
words. Plagiarism will not be tolerated and will be dealt with according to University policy:
https://www.ulster.ac.uk/student/exams/cheating-and-plagiarism. It is inappropriate to make a
presentation based on sources which are not listed.
Note 2: You should demonstrate good knowledge and understanding of the topics and points of
your presentation; and express them with high effectiveness, conciseness and succinctness.
When preparing your presentation, you should make sure to include only the most relevant
references.
Coursework preparation, submission and provision of feedback:
This coursework should be returned as an electronic submission by the due date specified above.
University regulations require that late submissions attract a mark of zero and will be rigorously
applied, without exception. If you have extenuating circumstances, you should complete an EC1
form according to your course rules; forms are found on your course website – your year tutor
and course director can advise.
• What should be returned is file 1) a copy of the PPT document used as the basis of your
presentation (in this case your researched material / script should either be embedded in
the notes section or appended to the end of your PPT document), file 2) the video (in a
suitable format, e.g. mp4, you may also use Panopto etc – for a Panopto submission,
please refer to the material on the module page). These files should be put saved in the
COM398SUST
same folder which is then compressed (zipped); the obtained ZIP file must be uploaded
using the CW2 Submission link in the module webpage on Cloud Campus.
You should also take note of the following:
• Please ensure the filename of the submitted project folder archive is given as YourBNumber_CW (i.e., B0011_CW2-PPT and B0011_CW2-VODCAST).
• As it may be expected that the file to be submitted can be of a substantial size, you are
advised to attempt your submission early to avoid any IT related issues.
• Feedback will be provided within 20 working days after submission by the date shown
above. Feedback can take the form of comments and a mark as shown herewith:
Student’s ID
Mark overall (%)
Criterion Weight
Research material (to include extent of background research,
quality of analysis and citations & references)
25
Trace files, traffic or design files analysis (as appropriate; and to
include quality of analysis and answers and approach
justification)
40
PPT presentation (to include quality of both PPT and text; ad
coherence of the points made)
20
Video recording (to include quality of recording, creativity,
communication, organization and clarity, use of adequate
visualization techniques (e.g. snapshots)
15
Comments:
1) Research Material: The material you present should be evidence-based and supported
by relevant and up-to-date references.
2) PCAP files analysis: The analysis should include but not limited to filters and graphs to
support your argument(s).
3) PPT presentation: When preparing your presentation, you should be sure to include only
the most relevant points on the slides: you can give more details in the notes section if
you wish to, however, the purpose of the slide is to be succinct in your information. The
background image and snapshots (or additional graphics if you want to use them) and
sound/audio effects should be relevant to the points being made on the slide.
COM398SUST
4) Video recording: Your recording should demonstrate good knowledge and
understanding of the topic of your presentation and express them with high
effectiveness.
Submission: An electronic copy of the assignment may be submitted anytime up until the cutoff date but will not be accepted after it. ASSIGNMENT TO BE SUBMITTED VIA THE DROPBOX
MARKED ‘CW 2 Submission’ WITHIN Cloud Campus.
COM398SUST Coursework 2023/2024
Evaluation and Marking Rubric
COM398 System Security
Component Two: The Project (60%) 
Criteria (100%) 80-100%
High 1st
70-79%
1st
60-69%
2.1
50-59%
2.2
40-49%
3rd
0-39%
fail
Research material
(to include extent
of background
research, quality of
analysis and
citations &
references)
25%
Subject knowledge is
evident throughout the
presentation; information
is clear and correct. The
presentation contains
pertinent points related
to the assignment topic;
and is free of errors and
weaknesses. Such points
are excellently addressed
in an appropriate depth
level and thoroughly
analysed. When needed,
specific support is
provided for each
statement from credible
sources.
Subject knowledge is
evident in much of the
presentation; with very
few exceptions, almost all
presented information is
clear; most references
are suitable, and the
statements made are
supported with
appropriate citations. The
researched material to a
considerable extent is
addressed and analysed
thoroughly. When
particular points are
addressed, it is done in a
particularly proficient
level of conciseness.
Subject knowledge is
evident in the
presentation; however,
there are few
exceptions where
details may be missing
or where particular
points are not
addressed in a good
depth and conciseness.
The researched
material is mainly
meeting the
requirements and
guidelines of the
assignments with very
few exceptions, it is
generally clear and easy
to identify the sources
of statements made
and references are
suitable.
The researched material
in the presentation
partially meets the
requirements and
general guidelines of the
assignment; details can
be missing, and when
particular points are
addressed, it is not
always done in an
appropriate level of
conciseness. There are
instances where material
sources may not be
suitable, or the claims
are not supported by
citations.
The researched
material may be
remotely related to the
topic of the
assignment; details are
somewhat sketchy and
do not support the
topic of the
assignment and may
lack conciseness.
Source materials may
not be relevant to the
purpose of the
presentation. Often, it
can be unclear where
information or facts
come from a source.
The researched
material and
information are
confusing, incorrect,
or flawed; the
presentation material
can be partially or
totally unrelated to the
topic of the
assignment; addressed
points are not well
defined, not well
argued and sketchily
covered. The
presented material
does not meet the
requirement of the
assignment; material is
not supported by
citations, or the
references used are
not suitable / credible.
Trace files, traffic
or design files
analysis (as
appropriate)
40%
The analysis addressed
the majority of the issues
related to the problem
area. The analysis
integrated sufficient
components to the bulk of
its goals.
The analysis addressed a
large part of the issues
related to the problem
area. The analysis
integrated a large
number of components
to the bulk of its goals.
The analysis addresses
a good number of the
issues related to the
problem area. The
analysis integrated a
good number of
components to achieve
a good range of goals.
The analysis partly
addresses some of the
issues related to the
problem area. The
analysis integrated
sufficient components to
achieve a moderate
range of goals.
An inadequate analysis
was presented which
did not clearly address
the problem at hand.
The analysis minimally
integrated elements to
achieve its goals.
The analysis is flawed
or incorrect. It is very
sketchy and does not
address the problem
at hand.
COM398SUST Coursework 2023/2024
PPT presentation
(to include quality
of both PPT and
text; ad coherence
of the points
made)
20%
Points made catch the
viewer/listener’s
attention and hook
him/her to the
presentation: they are
well organized and
motivating. Such
statements and points are
introduced in a logical
order and are well interlinked. The presentation
is error free and does not
encompass any grammar
or spelling errors.
The points made in the
presentation are clear
and coherent and evoke
good interest from the
viewer/listener. The text
has very few mistakes or
spelling errors, details are
presented in a logical
order.
The points made in the
presentation are
generally clear but may
be uncoherent
occasionally and the
link between such
points may not be
obvious. The text has
few mistakes or spelling
errors, details are
presented in a logical
order mainly, although
with some
incoherence.
The points made in the
presentation evoke a
limited interest from the
viewer/listener: they are
brief, sketchy and
incoherent. The
structure of the
presentation from its
introduction to its
conclusion did not orient
the student to the topic
being covered; there are
many spelling and other
mistakes in the text.
The points made in the
presentation do not
evoke interest from
the listener / viewer as
there is a very limited
coherence between
the points made. The
presentation is badly
structured; text
includes many errors.
The points made in the
presentation are
unclear; the listener or
viewer may lose
interest and is hard for
him / her to
comprehend the topic;
the presentation in
incoherent and is ill
structured.
Video recording (to
include quality of
recording,
creativity,
communication,
organization and
clarity, use of
adequate
visualization
techniques (e.g.
snapshots)
15%
The recording runs
smoothly; the
introduction of new ideas
transitions are smooth
and almost unnoticeable.
The video recording,
video or podcast is well
structured. The selections
of graphics, sound effects
and works of art have
assisted in the
communication of ideas.
The recording timing is
perfect.
The recording runs
mostly smoothly; only
very few changes of
introductions of new
ideas transitions are
noticeable. Still the
viewer is hooked and the
recording, video or
podcast is well
structured. The
selections of graphics,
sound effects and works
of art have assisted in
the communication of
ideas. The recording
timing is almost perfect.
Multiple types of
transitions may be
used; however, there is
little impact on the
smoothness of the
recording. Such
transitions are used for
a purpose: to help tell
the story of the
presentation. The
pacing and timing of
the video are good; and
the graphics are well
employed to convey
information.
Multiple types of
transitions may be used;
however, there is some
impact on the
smoothness of the
recording. There are few
transitions which do not
help the purpose of the
recording, or the
recording is ill
structured. The timing
and pacing need to be
reviewed as the
recording is either too
long or too short. When
used, graphics and sound
effects are not always
well employed.
Multiple types of
transitions may be
used: there is a clear
impact on the
smoothness of the
recording. There may
be multiple transitions
which do not help the
purpose of the
recording, or the
recording is ill
structured. The
recording is either too
short or too long; the
pacing is ill suited for
the recording length.
There may be no
graphics, sound effects
or work of art to
support the recording
story.
Video is of poor quality
and is unedited. There
are no transitions
added or transitions
are used so frequently
that they detract from
the video. There are no
graphics. The timing
and pacing are not
suitable.
COM398SUST Coursework 2023/2024
References
CHAPPELL, L. & COMBS, G. 2010. Wireshark network analysis: the official Wireshark certified network analyst study guide, Protocol Analysis
Institute, Chappell University.
OREBAUGH, A., RAMIREZ, G. & BEALE, J. 2006. Wireshark & Ethereal network protocol analyzer toolkit, Elsevier.
COM398SUST Coursework 2023/2024
Appendix A
Wireshark is an open-source tool used for capturing and analysing network traffic at a very granular level. Wireshark shows packet details captured
from different network sources, and breaks down the traffic into the individual layers of the Open Systems Interconnection (OSI) model (e.g. the
data link, network, transport, and application layers). Wireshark uses display filters to highlight and focus the analysis on the interesting
packets(Orebaugh et al., 2006, Chappell and Combs, 2010). For this CW component, the MC provides a single PCAP file that includes a network
activity. Such file content is to be analysed (the students are not allowed to analyse any other PCAP files as part of this assignment to explain a
Dos / DDos attack; however they are free to use any other PCAP files or resources in order to complete their presentation; e.g. students are at
liberty of using any resources to highlight any TCP, IP or any protocol’s activity using Wireshark for instance)

請加QQ:99515681  郵箱:99515681@qq.com   WX:codinghelp

掃一掃在手機打開當前頁
  • 上一篇:COMP5125M代做、Java/Python程序代寫
  • 下一篇:菲律賓旅游簽逾期一年(簽證逾期怎么處理)
  • 無相關信息
    合肥生活資訊

    合肥圖文信息
    流體仿真外包多少錢_專業CFD分析代做_友商科技CAE仿真
    流體仿真外包多少錢_專業CFD分析代做_友商科
    CAE仿真分析代做公司 CFD流體仿真服務 管路流場仿真外包
    CAE仿真分析代做公司 CFD流體仿真服務 管路
    流體CFD仿真分析_代做咨詢服務_Fluent 仿真技術服務
    流體CFD仿真分析_代做咨詢服務_Fluent 仿真
    結構仿真分析服務_CAE代做咨詢外包_剛強度疲勞振動
    結構仿真分析服務_CAE代做咨詢外包_剛強度疲
    流體cfd仿真分析服務 7類仿真分析代做服務40個行業
    流體cfd仿真分析服務 7類仿真分析代做服務4
    超全面的拼多多電商運營技巧,多多開團助手,多多出評軟件徽y1698861
    超全面的拼多多電商運營技巧,多多開團助手
    CAE有限元仿真分析團隊,2026仿真代做咨詢服務平臺
    CAE有限元仿真分析團隊,2026仿真代做咨詢服
    釘釘簽到打卡位置修改神器,2026怎么修改定位在范圍內
    釘釘簽到打卡位置修改神器,2026怎么修改定
  • 短信驗證碼 寵物飼養 十大衛浴品牌排行 suno 豆包網頁版入口 wps 目錄網 排行網

    關于我們 | 打賞支持 | 廣告服務 | 聯系我們 | 網站地圖 | 免責聲明 | 幫助中心 | 友情鏈接 |

    Copyright © 2025 hfw.cc Inc. All Rights Reserved. 合肥網 版權所有
    ICP備06013414號-3 公安備 42010502001045

    国产人妻人伦精品_欧美一区二区三区图_亚洲欧洲久久_日韩美女av在线免费观看
    国产精品一二区| 国产精品国产三级国产aⅴ9色 | 日本婷婷久久久久久久久一区二区 | 日本最新高清不卡中文字幕| 日韩中文一区| 日韩欧美电影一区二区| 欧美性猛交久久久乱大交小说| 日本电影亚洲天堂| 欧美亚洲激情视频| 韩国精品久久久999| 美女黄毛**国产精品啪啪| 精品视频无码一区二区三区| 国产一区玩具在线观看| 国产伦精品一区二区三区高清| 国产嫩草一区二区三区在线观看| 国产精品夜夜夜一区二区三区尤| 91久久精品日日躁夜夜躁国产| 久在线观看视频| 日韩中文字幕在线免费观看| www.99久久热国产日韩欧美.com| 国产精品日韩高清| 欧美日本高清一区| 日韩尤物视频 | 日本一区二区在线| 奇米888一区二区三区| 国语自产精品视频在线看一大j8| 国产精品一区二区三区久久| 国产成人91久久精品| xxxx性欧美| 欧美日韩国产二区| 色中文字幕在线观看| 欧美精品久久久久久久自慰| 国产精品制服诱惑| 久久精品国产理论片免费| 国产精品久久久久久久久久久久| 亚洲综合中文字幕在线| 日韩人妻一区二区三区蜜桃视频| 免费不卡亚洲欧美| 久久久视频在线| 精品国产一区二区三区久久狼5月 精品国产一区二区三区久久久狼 精品国产一区二区三区久久久 | 国产精品一区二区三区久久久| 久久男人资源站| 国产精品热视频| 亚洲97在线观看| 黄色网址在线免费看| 成人精品水蜜桃| y97精品国产97久久久久久| 一道本在线观看视频| 青青成人在线| 91精品啪在线观看麻豆免费| 国产精品乱码久久久久| 色哺乳xxxxhd奶水米仓惠香| 国产日韩欧美大片| 俺也去精品视频在线观看| 亚洲一区二区三区乱码aⅴ| 欧美精品一区二区三区三州 | 久久久久久国产精品| 欧美污视频久久久| 91久久精品视频| 久久av资源网站| 日本www在线播放| 粉嫩av四季av绯色av第一区| 国产精品乱码一区二区三区| 秋霞久久久久久一区二区| 久久久免费观看| 亚洲色图都市激情| 国产一级做a爰片久久毛片男| 久久66热这里只有精品| 亚洲欧美一区二区原创| 国产视频99| 国产精品欧美亚洲777777| 日本福利视频导航| 久久艳妇乳肉豪妇荡乳av| 亚洲专区在线视频| 国产精品一区视频网站| 国产精品三级网站| 日韩中文字幕组| 91国内揄拍国内精品对白| 亚洲欧洲日夜超级视频| 国产女女做受ⅹxx高潮| 国产精品久久久久aaaa九色| 欧美中文娱乐网| 国产成人久久久精品一区 | 欧美视频免费播放| 日韩亚洲欧美成人| 日本国产一区二区三区| 国产成人亚洲精品| 性亚洲最疯狂xxxx高清| 99在线热播| 在线一区高清| youjizz.com亚洲| 亚洲高潮无码久久| 国产成人精品久久二区二区91| 日本欧美色综合网站免费| 99久久自偷自偷国产精品不卡| 中文精品视频一区二区在线观看| 国产日韩三区| 欧美日韩成人精品| 成人h视频在线观看| 亚洲一区二区三区欧美| 国产精品91免费在线| 色99中文字幕| 日韩在线播放视频| 欧美在线视频一二三| 久久九九全国免费精品观看| 国内精品免费午夜毛片| 久久久久久97| 91精品国产自产在线| 国产精品久久久久久久免费大片| 黄色免费福利视频| 自拍日韩亚洲一区在线| 久久日韩精品| 欧美亚洲一级二级| 久久综合五月天| 91精品免费看| 欧美一区少妇| 另类专区欧美制服同性| 成人国产一区二区| 懂色一区二区三区av片| 国产成人精品av在线| 男人添女人下部视频免费| 九九久久国产精品| 久久久最新网址| 秋霞无码一区二区| 精品不卡一区二区三区| 久久免费观看视频| 国内精品伊人久久| 亚洲国产婷婷香蕉久久久久久99| 九色91国产| 国产精品一区二区在线| 色就是色欧美| 久久亚洲精品国产亚洲老地址| 99亚洲国产精品| 日韩美女av在线免费观看| 国产精品人成电影在线观看| 成人久久18免费网站漫画| 欧美中文字幕在线视频| 在线观看日韩羞羞视频| 中文字幕日韩精品无码内射| 久久精品女人的天堂av| 国产精自产拍久久久久久蜜| 日韩av电影在线网| 久久6免费高清热精品| 国产成人成网站在线播放青青| 国产综合久久久久| 日本一区二区三区四区五区六区| 国产精品久久一区主播| 久久一区二区三区av| 国产原创欧美精品| 日韩在线一级片| 欧美人与物videos| 久久久国产精品视频| 91久久精品视频| 好吊色欧美一区二区三区四区 | 亚洲第一综合| 国产精品国内视频| 久久久久久久久久久人体| yy111111少妇影院日韩夜片| 国内精久久久久久久久久人| 日本精品一区在线观看| 亚洲午夜精品福利| 久久国产精品免费视频| 国产v综合v亚洲欧美久久| 成人免费91在线看| 国产日韩视频在线观看| 国内视频一区二区| 日韩免费在线看| 少妇免费毛片久久久久久久久| 欧美激情亚洲一区| 国产精品高清免费在线观看| 久久天天躁狠狠躁夜夜av| 日韩在线中文字| 国产成人一区二区三区| 久久综合久久综合这里只有精品| 国产精品一区二区女厕厕| 国产午夜精品在线| 国模吧无码一区二区三区| 欧美一级成年大片在线观看| 奇米精品一区二区三区| 日韩免费高清在线| 日本久久久久亚洲中字幕| 日本在线高清视频一区| 中文字幕在线乱| 亚洲综合五月天| 亚洲一区二区三区色| 亚洲自拍另类欧美丝袜| 亚洲午夜精品久久久中文影院av| 国产99在线|中文| 久久99国产综合精品女同| 九九视频直播综合网| 精品国产乱码久久久久软件 | 视频在线精品一区| 色视频一区二区三区| 日韩av电影在线网| 日韩欧美xxxx| 欧美乱偷一区二区三区在线| 欧美h视频在线观看| 国产一区二区三区乱码| 不卡影院一区二区| 国产激情在线观看视频|