CP60059E Cyber Security Assignment: Cloud Computing and Cryptography

Verified

Added on  2023/01/13

|3
|615
|75
Homework Assignment
AI Summary
This assignment delves into cloud computing and cryptography, covering key concepts and practical applications. The first part of the assignment focuses on cloud computing, examining Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). It requires a detailed explanation of each approach, along with real-world examples and a comparative analysis. The second part of the assignment explores cryptography, specifically focusing on the Advanced Encryption Standard (AES) and Rivest-Shamir-Adleman (RSA) algorithms. It includes detailed explanations of their operations, mathematical expressions, and use cases, along with a comparison of their strengths and weaknesses. The assignment emphasizes the importance of these technologies in ensuring security and requires students to demonstrate a thorough understanding of both cloud computing and cryptographic principles. The use of tables, examples, and proper referencing is also highlighted as important aspects of the assignment.
Document Page
School of Computing and
Engineering
Cyber Security - Assignment
Title Assignment
Module Cyber Security
Module Code CP60059E
Module Leader: Dr. Waqar Asif
Set by: Dr. Waqar Asif
Moderated by: Dr. Wei Jei
Assignment Assignment
Hand in
arrangement
s
This assignment will be submitted via Turnitin.
Structure of
assignment
The assessment consists of a portfolio of 2 elements. Each Element has a specific weighting,
and its own criteria. The assessment is described below. The learning outcomes of the module
are assessed by a successful completion of the whole portfolio.
Assessment Type Weighting Week due
1 Resit assignment 50% 1st August
2 Resit assignment 50% 1st August
Learning
outcomes
1 Understand the essential concepts and critically evaluate mechanisms and processes
involved in securing information in an enterprise system environment.
2 Demonstrate expertise in understanding and independent application of
encryption/decryption algorithms and design encryption/decryption algorithms
3 Analyse and apply knowledge and skills to investigate and protect against specific security
threats.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Assessment 1: Assignment
Weighting:
50%
Title Assessment 1
Task details As part of this assignment, you need to look into the different cloud computing technologies
namely, Infrastructure as a Service, Platform as a Service and Software as a Service. You are
expected to explain these three technologies in detail with examples where they fit well. You are
also expected to produce a comparison table to highlight the different options each platform has
to offer. The comparison among all three should be detailed.
Marking Guide Criteria Issues Marks
Introduction
about Cloud
Computing
Explanation about cloud computing and why it is
necessary (6)
What are the benefits of cloud computing (4)
10
IaaS, PaaS,
SaaS Explanation about the three different approaches
(15)
Examples of all three approaches (5)
20
Comparison Comparison of the three different approaches
with proper explanation and tabulation where
necessary
10
Presentation Proper sections added (2)
Citation and referencing where necessary (2)
Overall presentation of document (3)
Refences added in Harvard formatting (3)
10
Total 50
Assessment 2: Assignment
Weighting:
50%
Title Assessment 2
Task details RSA and AES are two well-known approaches that are used widely. Despite their success, they
both fit in their own particular scenarios. In retrospect, it might nit be possible to use one instead
of the other. In this assignment, you will look into the details of both AES and RSA and provide
detailed insight into where and how they are being used. Present details of their operation and
also provide a comparison of where one excels the other. Use a table to highlight the differences
where necessary. Use examples to highlight the use of the different approaches.
Marking Guide Criteria Issues Marks
Introduction
about
Cryptography
Explanation about cryptography and why it is
eminent for ensuring security (6)
Brief explanation of the different cryptographic
approaches with figures where necessary (4)
10
RSA and AES Detailed explanation about both the approaches 30
Document Page
(10)
Mathematical expression and operations used in
both the schemes (10)
Use of an example to show operation (6)
Addition of figures where necessary (4)
Comparison Comparison between AES and RSA and where
one supersedes the other. Use of table.
5
Presentation Proper sections added (1)
Citation and referencing where necessary (1)
Overall presentation of document (2)
Refences added in Harvard formatting (1)
5
Total 50
chevron_up_icon
1 out of 3
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]