Provide Constructive Feedback for Cohort Colleagues

Task

In this assessment you are required to -

- Select a topic from the list given below and conduct research (based on literature, at least three recent research papers) on any major aspect of this chosen topic and prepare a summary report with brief supportive descriptions to post on the forum/blog. In your posting you should provide information about the topic (discuss the topic, associated challenges & problems, describe the relevant technologies, applications of the technologies, clarify vague areas, research questions etc.)
- Provide constructive feedback for (at least two) cohort colleagues and receive feedback from (at least two) cohort colleagues on your own report and make refinements accordingly.
- Raise questions about the information provided by other students (this must be done in an adequately professional manner)
- Respond to questions raised about your own information and that of other students
- Contribute to discussions in general

Note that the aim of this task is:
1. to build an understanding and perspective of current hot topics in Information Security; and
2. to build generic skills including, but not limited to:

- a capacity for teamwork and collaboration;
- an ability for critical thinking, analysis and problem solving;
- information technology literacy;
- a capacity for lifelong learning and an appreciation of its necessity.


As such, the more you contribute to the development of these topics and related discussion the more likely you will score well in this task.

Topics Set
1. Cyberterrorism
2. Biometrics for authentication: past. present and future
3. Web Browser Attacks
4. Recent trends in malware
5. Anomaly-based intrusion detection systems
6. Quantum cryptography
7. Privacy and security issues associated with Big Data
8. Smart device security
9. Internet of Things (IOT): Security issues and solutions
10. Threats to wireless networks and countermeasures
11. Security and privacy issues associated with social media
12. Security and privacy issues in cloud computing

Your submission:
You are required to prepare and submit a report on your topic to address the following issues (Length of the report: 1500~2000 words, excluding references):

a. Provide your published (to the forum/blog) research report on the chosen topic with brief supportive descriptions about the challenges, problems, relevant technologies, applications of the technologies, clarification on vague areas and research questions.
b. Summarize the issues discussed in the forum (at least two peers). Discuss how your own posts contributed to this knowledge and discuss whether or not the summary presented by your peers is accurate.
c. Identify any important issue/s that you believe were not addressed, or not addressed adequately in the discussions. Discuss why you view this issue/these issues as important.
d. Discuss the impact of the above mentioned issues and their application/impact in the real world.
e. Reflect on what you believe to be the most important lesson you have learnt as a result of these discussions.
f. Provide references (at least three) using APA referencing system including in text citations.

Rationale

Depending on the topic selected, this assessment item relates to a number of key learning outcomes of your subject.

Its also provides an opportunity for you to :

- demonstrate factual knowledge, understanding and application of state-of-art information security;
- demonstrates an understanding of what constitutes authoritative and valid evidence
- demonstrate ability to identify, locate, critique, integrate and apply information from various topics and ;
- apply valid and applicable knowledge and understanding to a practical situation;
- analyse current data to construct and communicate new knowledge
- demonstrate ability to work in a team, sharing knowledge.

Marking criteria

Assessment criteria

Assessable Components

HD

100% - 85%

DI

84% - 75%

CR

74% - 65%

PS

64% - 50%

FL

49% - 0

Provide your published (to the forum/blog) research report on the chosen topic with brief supportive descriptions about the challenges, problems, relevant technologies, applications of the technologies, clarification on vague areas and research questions.(10)

Demonstrate an ability to survey the literature, concise summary which are logically structured, integrate and link information into cohesive and coherent piece of analysis and consistently use correct to the selected topic terminologies and sophisticated language.

Demonstrate an ability to survey the literature, concise summary which are logically structured to create cohesive and coherent piece of analysis that consistently use correct forensic terminologies.

Demonstrate an ability to survey the literature, concise summary which are generally logically structured to create a comprehensive, mainly descriptive piece of analysis. Some use of correct forensic terminologies.

Demonstrate an ability to survey the literature, concise summary which partially structured into loosely-linked rudimentary sentences to create a comprehensive, descriptive piece of analysis. Some use of correct forensic terminologies.

Fails to demonstrate the ability to survey the literature, concise summary which partially structured and may tend to list information. Uses frequent informal language.

Possible Marks

10.0 – 8.5

8.4 – 7.5

7.4 – 6.4

6.4 – 5

4.9 – 0

Summarize the issues discussed in the forum (at least two peers). Discuss how your own posts contributed to this knowledge and discuss whether or not the summary presented by your peers is accurate. (10)

The DI criteria, plus:

Summary of the literature (the forum posting above) also exhibits significant creativity and innovation in the way it depicts and presents the design concept and supportive information.

Feedback provided to two cohort colleagues offers in-depth insights and relies strongly prompts on broader examination of emerging trend of Information security.

Summary of the literature (the forum posting above) is strongly student-centred or reader-orientated, strikes a balance between being simple, informative and engaging and is supported by brief descriptions, how it fits within the subject.

Feedback provided to two cohort colleagues is informed, constructive and progressive and feedback received is critically reviewed and prompts a broader examination of the issues raised through reliance on information security.

Summary of the literature (the forum posting above) strikes a balance between being simple, informative and engaging and is supported by brief descriptions, how it fits within the topic.

Feedback provided to two cohort colleagues is informed, constructive and progressive and feedback received is critically reviewed with changes made supported through reliance on Information security.

Summary of the literature (the forum posting above) is supported by brief descriptions, how it fits within the topic. Feedback provided to two cohort colleagues is informed and constructive and feedback received is reviewed with changes made to your report accordingly.

Fails to summarise the literature (the forum posting above) and feedback provided to cohort colleagues is inadequate/or lacking research. Uses frequent informal language.

Possible Marks

10.0 – 8.5

8.4 – 7.5

7.4 – 6.4

6.4 – 5

4.9 – 0

Identify any important issue/s that you believe were not addressed, or not addressed adequately in the discussions. Discuss why you view this issue/these issues as important. (8)

Comprehensive knowledge of the topic and in depth explanation of the issues that were not addressed;

Reasonable knowledge of the topic and a comprehensive explanation of the issues that were not addressed;

Provided factual/conceptual knowledge of the topic and an overall explanation of the issues that were not addressed;

Limited knowledge of the of the topic and a basic explanation of the issues that were not addressed;

Fails to satisfy minimum requirements of explaining the issues.

Possible Marks

8.0 – 6.8

6.7 – 6.0

5.9 – 5.2

5.1 – 4.0

3.9 – 0

Discuss the impact of the above mentioned issues and their application/impact in the real world. (8)

Comprehensive knowledge of the issues and real life consequences to a firm.

Reasonable knowledge of the issues and real life consequences to a firm.

Provided factual/conceptual knowledge of the issues and real life consequences to a firm.

Limited knowledge of the issues and real life consequences to a firm.

Fails to satisfy minimum requirements of explaining the impact on a firm.

Possible Marks

8.0 – 6.8

6.7 – 6.0

5.9 – 5.2

5.1 – 4.0

3.9 – 0

Reflect on what you believe to be the most important lesson you have learnt as a result of these discussions. (8)

The reflection is an in-depth analysis of the learning experience, the value of the derived learning to self and the enhancement of the student’s appreciation for the issues surrounding the topic.

The reflection is a reasonable analysis of the learning experience, the value of the derived learning to self and the enhancement of the student’s appreciation for the issues surrounding the topic.

The reflection is a reasonable analysis of the learning experience, the some value of the derived learning to self.

The reflection attempts a basic analysis of the learning experience, but the value of the derived learning to self is vague.

Fails to satisfy minimum requirements of reflecting the important lessons.

Possible Marks

8.0 – 6.8

6.7 – 6.0

5.9 – 5.2

5.1 – 4.0

3.9 – 0

Provide references (at least three) using APA referencing system including in text citations. (6)

Faultless

referencing,

including

reference list and in text citations.

High quality

references.

Very good

referencing,

including

reference list and

in text citations.

High quality

references.

Good referencing,

including

reference list and

in text citations.

Good quality

references.

Evidence of

rudimentary

referencing skills.

Mix of good and

poor quality

references.

Sub-standard

referencing.

Poor quality

references.

Possible Marks

6.0 – 5.1

5.04 – 4.5

4.44 – 3.85

3.84 – 3.0

2.9 – 0

 

Solution

High quality administrations being provided by assignmenthelp4me make it one of the highest rated online task help websites.

ORDER NOW

Assignmenthelp4me.com is online assignment assistance Provider Company with a difference. As we are in this field for several years, we have matured our processes over the period of time, to ensure delivery of high quality assignments with consistency. Our success in touching high quality levels and positive feedback from the customers has given us confidence to expand ourselves into new geographies. As a result, we have been innovative and creative in getting clients’ delight and establishing good customer relationship.