INFO2222 Security Logbook 1 Due: Thursday of Weeks 10 and 13, 11:59pm This assignment is worth 10% of your final assessment Your logbook mark will be comprised of three components; your work on the project, your notes on the readings associated with each tutorial, and your solutions and methods of solution of the security challenge questions. Project You are expected to catalogue and track your contributions and progress on part 1 of the security project within your logbook entries. Readings Along with each module we will be releasing a series of recommended readings these will contain both technical readings and case studies. For each topic in the security portion of this course: • You should select at least one technical reading and summarise and discuss it within your log- book. • You should select at least one case study and reflect on it within your logbook. • You should find one additional technical reading or case study not listed within this course and either summarise, discuss or reflect on it as appropriate. • If feasible you should attempt to reconstruct some element of the attack, exploit or vulnerability discussed in any of the above three sources. War-games / Challenges Along with each module a series of war-games or challenge questions will be released on canvas. You are required to solve these problems and discuss your solution attempts and methods in your logbook entries. If your solution is called into question the contents of your logbook will be used as evidence. 1 INFO2222 Submission You should submit your logbook as a single pdf on canvas. Your logbook should contain a link to a private git repository containing the source for your log book any additional supporting evidence that you have used (for example source code). This should be the same repository that you have used for your usability log book entries. The week 10 due date is for challenges and readings from modules 6 and 7 along with part 1 of the security project. The week 13 due date is for challenges and readings from modules 8, 9 and 10 along with part 2 of the security project. This is an individual assessment. Please do not include screenshots of code or your terminal. Code is text, your logbook contains text. Use a proper code environment to display code. I declare that I have read and understood the University of Sydney Student Plagiarism: Coursework Policy and Procedure, and except where specifically acknowledged, the work contained in this assignment/project is my own work, and has not been copied from other sources or been previously submitted for award or assessment. I understand that failure to comply with the Student Plagiarism: Coursework Policy and Procedure can lead to severe penalties as outlined under Chapter 8 of the University of Sydney By-Law 1999 (as amended). These penalties may be imposed in cases where any significant portion of my submitted work has been copied without proper acknowledgment from other sources, including published works, the Internet, existing programs, the work of other students, or work previously submitted for other awards or assessments. I realise that I may be asked to identify those portions of the work contributed by me and required to demonstrate my knowledge of the relevant material by answering oral questions or by undertaking supplementary work, either written or in the laboratory, in order to arrive at the final assessment mark. I acknowledge that the School of Computer Science, in assessing this assignment, may reproduce it entirely, may provide a copy to another member of faculty, and/or communicate a copy of this assignment to a plagiarism checking service or in-house computer program, and that a copy of the assignment may be maintained by the service or the School of Computer Science for the purpose of future plagiarism checking. Page 2 of 2
欢迎咨询51作业君