0% found this document useful (0 votes)
97 views6 pages

Sheet1: Q P Description Max Score

This document outlines the marking scheme for a security assignment with 5 questions. It includes the questions, descriptions of what is required for each part, and the maximum scores available. The marking criteria for each question are also defined, such as how many marks will be awarded based on the level of correctness, clarity, completeness, and justification provided for each answer.

Uploaded by

suguna
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as XLSX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
97 views6 pages

Sheet1: Q P Description Max Score

This document outlines the marking scheme for a security assignment with 5 questions. It includes the questions, descriptions of what is required for each part, and the maximum scores available. The marking criteria for each question are also defined, such as how many marks will be awarded based on the level of correctness, clarity, completeness, and justification provided for each answer.

Uploaded by

suguna
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as XLSX, PDF, TXT or read online on Scribd
You are on page 1/ 6

Sheet1

Q P Description Max Score


1 a All correct files submitted 1

1 b Commands work correctly 5

1 c Commands.bash 2

1 - Question total 8 0

2 a Demonstration of secure website 4

b Correct files submitted 1

2 c Message sequence diagram 3

2 d Bytes 0.5
2 d Hash algorithm 0.5
2 d Encryption algorithm 0.5
2 d Modulos 0.5
2 d TLS Encrypting 0.5
2 d Hashing MAC 0.5
2 d Key exchange 0.5
2 d Random bytes 0.5
2 e CA Self-signed 2

2 f Attack 1

2 - Question total 15 0

3 a RBAC table: format. 1.5

3 a RBAC table: design. The 1.5


mappings selected must be
reasonable for the scenario, with
3 b appropriate justification in the
MAC explanation. 1
explanation.

3 c Password policy considers 1


relevant aspects of choosing new
passwords.

Page 1
Sheet1
3 c Password policy considers 1
relevant aspects of updating
passwords
3 c Password policy is not too 1
inconvenient and not too insecure

3 - Question total 7 0

4 a Firewall rules 3

b Firewall location 1

4 c DMZ 2

4 - Question total 6 0

5 a Web proxy: how it works. Clear, 1


correct.
5 a Web proxy: security it provides 1
and limitations
5 b VPN vs proxy: benefits, 1
limitations
5 b VPN security and convenience 1
weaknesses
5 - Question total 4 0

- - Assignment sub-total 40 0

- - Files in wrong format e.g. zip or 0 0


many wrong names
- - Days late (part of) 0 0

- - Late penalty (2.5 per day) 0 0

- - Assignment total 40 0

Page 2
Sheet1
Comments

Page 3
Sheet1

Page 4
Sheet1
MarkingScheme
See openssl-log.txt file for automatic marking results

See openssl-log.txt file for automatic marking results

2: Commands included and mostly correct


1: 2 or 3 errors or 1 or 2 missing comments
0: Multiple errors or missing commands

4: Working perfectly
3: Working with minor issue
2: Not working properly
1:
SeeMajor issue file for automatic marking results
https-log.txt
0: Not demonstrated

3: All packets clearly shown


2: Minor formatting issues
1: Some mistakes or missing packets
0: Many mistakes or missing packets
8 Bytes
SHA256
RSA
256 Bytes
AES256
SHA384
Diffie Hellman or ECDHE or similar
28 Bytes
2: explanation clear and correct AND benefit clear and correct
1: explanation or benefit is not both clear and correct
0: neither clear and correct
1: correct, enough detail and clear
0: incorrect, or both missing details and unclear

1.5: Tablet structured correctly, containing correct values in the cells.


1: Structured but coorect value missing
0: Incorrect
1.5: The mappings selected reasonable for the scenario, with appropriate justification in
the explanation.
1: Reasonable but not clear
0:
1: Incorrect
Levels and assignments are appropriate.
0: Incorrect

1: Correct
0: incorrect, unclear

Page 5
Sheet1
1:Correct
0:Incorrcet, unclear

1: Correct
0: incorrect, unclear0

3: All rules correct and no unnecessary rules


Deduct 1 mark for a incorrect rule, explanation, missing rule or unnecessary rule
Only consider explanation if rule is wrong

1: clear explanation and justification


0.5: either explanation or justification unclear
0: both unclear

2: clear explanation, pros and cons


1: either explanation or pros/cons unclear
0: both unclear

1: Clear and correct


0.5: Details missing
0:
1: Incorrect
Clear and correct
0.5: Details missing
0:
1: Incorrect
Clear and correct
0.5: Details missing
0:
1: Incorrect
Clear and correct
0.5: Details missing
0: Incorrect

Page 6

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy