Menu

NewDOCXDocument

0 Comment

Length: ~10 slides, with voiceover,Presentation duration: 10 ~ 15 minsFeedback mode: Marks and comments from canvasAssignment Mode:IndividualMain Specification Document and submission template:See the files below for detailed instructions for this assignment. The version with voiceover, has me discussing the assignment in detail. Load it into Powerpoint, press F5 to view / run it. The version without voiceover can be used as a template for you.Without voiceover (71KB) 1-ITIS-2010-Asg-1.pptxActionsWith voiceover (35MB) 1M-ITIS-2010-Asg-1.pptxActionsThe ‘hack’ refers to the CVE (“Common Vulnerabilities and Exploits”) database.You will find more details about this standard way of referring to newly discovered hacks inhttps://cve.mitre.org/(Links to an external site.).Academic integrityThe rule is simple. If you pretend the work of others to be your own work, whether that be those of other students or cut/paste from websites or whatever. If you pretend it to be yours, and it is not, there is an automated procedure which will involve your student record. Don’t do it.More details:https://www.rmit.edu.au/students/student-essentials/rights-and-responsibilities/academic-integrity(Links to an external site.)Learning Objectives Assessed:This assignment assesses Learning Objectives:CLO1:Describe all of the IT Infrastructure Architecture components and the issues relating to each of themCLO2:Demonstrate knowledge of higher level aspects of data communications and network technology appropriate for the development of software applications in a networked environment;CLO4: Analyse and determine an appropriate secure web server configuration based on stated user needs;CLO5: Explain the functioning of security services in computing environments and the security issues in mobile and IoT computing,CLO6:Describe and review emerging networking technologiesGraduate Outcomes supported:1. Enabling Knowledge2. Critical Analysis3. CommunicationAssessment declaration:declare that in submitting all work for this assessment I have read, understood and agree to the content and expectations of theAssessment declaration(Links to an external site.). .RubricITIS 2010 Asg 1 Presentation ITIS 2010 Asg 1 Presentation Criteria Ratings Pts This criterion is linked to a learning outcomeA. ZIP Submission A.1 PPTX with voiceover (optionally with MP4) — OR — PPTX without voiceover + MP4 20.0Pts Files supplied as per spec 10.0Pts 2 files expected Only one of PPTX w/o V/O or MP4 supplied, 0.0Pts No PPTX or MP4 files supplied ????? 20.0pts This criterion is linked to a learning outcomeA.2 SRT SRT file supplied 10.0Pts Supplied 0.0Pts Not supplied 10.0pts This criterion is linked to a learning outcomeA.3 PDF PDF of all 3 papers supplied 10.0Pts Supplied 0.0Pts Not supplied 10.0pts This criterion is linked to a learning outcomeB. Overall Slides B.1 Title / overview / summary slides all present? 10.0Pts Supplied and Acceptable Contains: Title; Overview; Summary; with names of all 3 papers and the hack. 0.0Pts Not supplied 10.0pts This criterion is linked to a learning outcomeB.2 Overall Discussion Overall discussion highlights the common thread among papers presented 30.0Pts Both verbally and in slides and attempt to engage audience 20.0Pts Both verbally and in slides 10.0Pts Either verbally or in slides 0.0Pts Not supplied 30.0pts This criterion is linked to a learning outcomeB.3 Citation All papers + Hack + any other external material cited properly 20.0Pts All citations supplied and correct 10.0Pts Many citations supplied and correct, but some are not correct, or are missing. 0.0Pts Not supplied 20.0pts This criterion is linked to a learning outcomeC. Papers C.1 Paper 1 details properly summarised highlighting any parts that are directly relevant to the discussion thread. Can be ‘çlassic’ or recent paper. 30.0Pts Excellent, very engaging and clear how it related to the overall theme 20.0Pts Supplied but no real attempt to engage audience 10.0Pts Supplied, but incomplete or inadequate 0.0Pts Not supplied 30.0pts This criterion is linked to a learning outcomeC.2 Paper 2 details Reduce by 5 marks if not recent (<10 years old) 30.0Pts Excellent, very engaging and clear how it related to the overall theme 20.0Pts Supplied but no real attempt to engage audience 10.0Pts Supplied, but incomplete or inadequate 0.0Pts Not supplied 30.0pts This criterion is linked to a learning outcomeC.3 Paper 3 details Reduce by 5 marks if not recent (<10 years old) 30.0Pts Excellent, very engaging and clear how it related to the overall theme 20.0Pts Supplied but no real attempt to engage audience 10.0Pts Supplied, but incomplete or inadequate 0.0Pts Not supplied 30.0pts This criterion is linked to a learning outcomeD. Hack D.1 Hack Identification. Hack properly identified / referenced (CVE) 20.0Pts Adequately named, numbered, and with URL and correct citation. 10.0Pts Supplied, but not adequately named, numbered, and with URL and correct citation. 0.0Pts Not Supplied 20.0pts This criterion is linked to a learning outcomeD.2 Hack Description Hack properly described and relevance to slide theme is clearly indicated 20.0Pts Relevance to theme discussion is made clear 10.0Pts Description seems to be regurgitated from CVE doco with no integration to theme 0.0Pts Not Supplied 20.0pts This criterion is linked to a learning outcomeD.3 Background Explanation Background explanation to further explain hack significance and relevance 20.0Pts Explanation is good. Significance and relevance to theme is made clear 10.0Pts Explanation is not adequate 0.0Pts Not Supplied 20.0pts Total points:250.0