网络安全代写|Module: 6005-CEM Security Assignment Brief

本次英国代写是一个网络安全的assignment,需要生成报告

Module Learning Outcomes Assessed

1. Critically evaluate a range of encryption and authentication methods for a given set of requirements.
4. Critically evaluate the security of an IT ecosystem.

Task and Mark Distribution

In this coursework you are required to perform a security audit of a computer system and write a report on the results of the audit.

You will have access to a copy of the system, and the source code, you can find details on the learning platform.

The Audit

You will need to perform an audit to find potential flaws in the system. You are free to choose appropriate method(s) for the audit
process. This can include (and is not limited to):

While you are free to use any appropriate method for the audit. You will be expected to justify the decision. Why are the approaches chosen appropriate for the audit process, what are the benefits and drawbacks of the audit methods chosen.

The Report

You are expected to write a report suitable for a technical audience.

The report should describe the process used to Audit the system, and discuss any security issues found.

It is expected that the report will contain.

Report Structure

A suggested structure for the report would be:

Introduction