CS代考计算机代写 Excel Cardiff School of Computer Science and Informatics Coursework Assessment Pro-forma

Cardiff School of Computer Science and Informatics Coursework Assessment Pro-forma
Module Code: CMT118
Module Title: Malware Analysis and Vulnerability Assessment Lecturer: George Theodorakopoulos
Assessment Title: Malware Analysis and Vulnerability Assessment Assessment Number: 1
Date Set: 9 December 2020
Submission Date and Time: 12 February 2021 at 9:30am
Return Date: 28 February 2021
This assignment is worth 100% of the total marks available for this module. If coursework is submitted late (and where there are no extenuating circumstances):
1 If the assessment is submitted no later than 24 hours after the deadline, the mark for the assessment will be capped at the minimum pass mark;
2 If the assessment is submitted more than 24 hours after the deadline, a
mark of 0 will be given for the assessment.
Your submission must include the official Coursework Submission Cover sheet, which can be found here:

https://docs.cs.cf.ac.uk/downloads/coursework/Coversheet.pdf


Submission Instructions
There are two Tasks in this coursework: Task 1 (T1) is on Malware Analysis and Task 2 (T2) is on Vulnerability Assessment. In addition to the official Coursework Submission Cover sheet (see above), you should submit two reports (PDF or Word file).
Description
Type
Name
Cover sheet
Compulsory
One PDF (.pdf) file
[student number].pdf
T1 report
Compulsory
One PDF (.pdf) or Word file (.doc or .docx)
T1_[student number].pdf/doc/docx
T2 report
Compulsory
One PDF (.pdf) or Word file (.doc or .docx)
T2_[student number].pdf/doc/docx
Any deviation from the submission instructions above (including the number and types of files submitted) will result in a 10% reduction in marks for the corresponding Task.
Staff reserve the right to invite students to a meeting to discuss coursework submissions

Assignment
There are two Tasks in this coursework: T1 is to analyse malware and it is worth 30 marks. T2 is to test a vulnerable Virtual Machine image and it is worth 70 marks.
For T1, you will be given access to two pieces of malware. You will analyse both and write a report with your conclusions. You should submit your report as a PDF or Word file. The report should be at most 1000 words. Anything beyond the first 1000 words will not be marked.
For T2, you will be given two VM images: one is a Kali Linux VM from which you will conduct your attacks against the other VM (Ubuntu Linux), which contains at least 7 vulnerabilities. Your task is to follow a systematic process to find and exploit the vulnerabilities in the Ubuntu VM, propose fixes for the vulnerabilities that you find, and finally write a report with your findings and your recommendations. You should submit your report as a PDF or Word file. In total, the report should be at most 3000 words. Anything beyond the first 3000 words will not be marked.
Learning Outcomes Assessed
1. Perform static and dynamic malware analysis to explain the malware’s anatomy, its effects on a system and its spreading behaviour.
2. Identify, evaluate, and recommend, with justification, a selection of configurations and countermeasures to reduce the likelihood and impact of potential security attacks.
3. Perform application penetration testing to identify system and network security vulnerabilities and exploit them.
4. Explain how to detect and react to network intrusions.
5. Explain how web browsers are used to exploit vulnerabilities and inject malicious code into web services (e.g. cross-site scripting).

Criteria for assessment
Fail (0-49%)
Pass (50-59%)
Merit (60-69%)
Distinction (70-100%)
Approach
Random steps taken to conduct analysis and attacks. Many inappropriate tools chosen.
Clear understanding of relevant tools and methods, but with some unsystematic or unjustified deviations from proper methodology.
Systematic methodology chosen. Adopts appropriate methods and tools
Exceptional scholarship shown in choice and application of methodology. Justification of choices and good evidence of understanding alternatives.
Results
Very few or no relevant malware behaviour discovered. Superficial demonstration of only basic skills in malware analysis and pentesting.
Adequate discovery of behaviour and vulnerabilities, but some relevant ones are missing.
Some competency in analysis/pentesting shown, but with clear limitations. Recommendations are present but limited in quantity or quality.
Most relevant malware behaviour and VM vulnerabilities found. Skilful tool usage. Effective recommendations for fixing vulnerabilities.
Extensive discovery of relevant malware behaviour and VM vulnerabilities. Wide range of skills shown and executed with precision. State-of- the-art recommendations for fixes.
Argument
Many factual or technical errors. Findings are not linked to evidence.
Arguments contain some errors or invalid statements/facts are presented. Some evidence is provided, but linkage to findings is not strong or it could be easily questioned.
Significant ability illustrated for logical and technically valid arguments. Findings are clearly linked to evidence.
Scientifically and technically correct statements, with no nuances missed. Evidence provided is both adequate to support the conclusions and it has no reasonable alternative interpretations.
Presentation
Significant lack of clarity and/or coherence. Unstructured report. Minimal awareness of technical terminology.
Communication is adequate to get the point across but requires some effort to understand. Good attempt to provide structure to the report, but with limitations (e.g. information that should be in one section appearing in another). Some but not many misunderstandings of terminology.
Clear and concise language. Well- structured into sections. Uses standard technical terminology.
Clear, precise, to- the-point description with no ambiguities nor irrelevant information included. Logical structure, easy to follow with appropriate use of screenshots. Displays excellent command of technical terminology.

Feedback and suggestion for future learning
Feedback on your coursework will address the above criteria. Feedback and marks will be returned on or before 28 February 2021 via Learning Central.
Detailed Instructions
Task 1: Malware Analysis – 30 marks
As explained above, you will be given access to two pieces of malware. You must perform static and dynamic analysis on both to collect evidence and complete the following sub- tasks by referring to the evidence you collected:
1. List the malware’s significant imports and strings, and its host-based and network-
based indicators.
2. Describe how the malware works.
3. Describe the purpose the malware tries to achieve.
Your report must clearly separate your responses to each of these sub-tasks.
Task 2: Vulnerability Assessment – 70 marks
(10 marks) (10 marks) (10 marks)
The VM images that you will be provided with are linked together in a network topology. You will log into the Kali Linux VM and you will conduct all your attacks from that VM. You should not modify the network topology. You should clearly follow a systematic pentesting methodology, you should clearly identify and describe each vulnerability you find and how you exploit it, and you should clearly propose how to fix it.

Posted in Uncategorized

Leave a Reply

Your email address will not be published. Required fields are marked *

CS代考计算机代写 Excel Cardiff School of Computer Science and Informatics Coursework Assessment Pro-forma

Cardiff School of Computer Science and Informatics Coursework Assessment Pro-forma
Module Code: CMT118
Module Title: Malware Analysis and Vulnerability Assessment Lecturer: George Theodorakopoulos
Assessment Title: Malware Analysis and Vulnerability Assessment Assessment Number: 1
Date Set: 9 December 2020
Submission Date and Time: 12 February 2021 at 9:30am
Return Date: 28 February 2021
This assignment is worth 100% of the total marks available for this module. If coursework is submitted late (and where there are no extenuating circumstances):
1 If the assessment is submitted no later than 24 hours after the deadline, the mark for the assessment will be capped at the minimum pass mark;
2 If the assessment is submitted more than 24 hours after the deadline, a
mark of 0 will be given for the assessment.
Your submission must include the official Coursework Submission Cover sheet, which can be found here:

https://docs.cs.cf.ac.uk/downloads/coursework/Coversheet.pdf


Submission Instructions
There are two Tasks in this coursework: Task 1 (T1) is on Malware Analysis and Task 2 (T2) is on Vulnerability Assessment. In addition to the official Coursework Submission Cover sheet (see above), you should submit two reports (PDF or Word file).
Description
Type
Name
Cover sheet
Compulsory
One PDF (.pdf) file
[student number].pdf
T1 report
Compulsory
One PDF (.pdf) or Word file (.doc or .docx)
T1_[student number].pdf/doc/docx
T2 report
Compulsory
One PDF (.pdf) or Word file (.doc or .docx)
T2_[student number].pdf/doc/docx
Any deviation from the submission instructions above (including the number and types of files submitted) will result in a 10% reduction in marks for the corresponding Task.
Staff reserve the right to invite students to a meeting to discuss coursework submissions

Assignment
There are two Tasks in this coursework: T1 is to analyse malware and it is worth 30 marks. T2 is to test a vulnerable Virtual Machine image and it is worth 70 marks.
For T1, you will be given access to two pieces of malware. You will analyse both and write a report with your conclusions. You should submit your report as a PDF or Word file. The report should be at most 1000 words. Anything beyond the first 1000 words will not be marked.
For T2, you will be given two VM images: one is a Kali Linux VM from which you will conduct your attacks against the other VM (Ubuntu Linux), which contains at least 7 vulnerabilities. Your task is to follow a systematic process to find and exploit the vulnerabilities in the Ubuntu VM, propose fixes for the vulnerabilities that you find, and finally write a report with your findings and your recommendations. You should submit your report as a PDF or Word file. In total, the report should be at most 3000 words. Anything beyond the first 3000 words will not be marked.
Learning Outcomes Assessed
1. Perform static and dynamic malware analysis to explain the malware’s anatomy, its effects on a system and its spreading behaviour.
2. Identify, evaluate, and recommend, with justification, a selection of configurations and countermeasures to reduce the likelihood and impact of potential security attacks.
3. Perform application penetration testing to identify system and network security vulnerabilities and exploit them.
4. Explain how to detect and react to network intrusions.
5. Explain how web browsers are used to exploit vulnerabilities and inject malicious code into web services (e.g. cross-site scripting).

Criteria for assessment
Fail (0-49%)
Pass (50-59%)
Merit (60-69%)
Distinction (70-100%)
Approach
Random steps taken to conduct analysis and attacks. Many inappropriate tools chosen.
Clear understanding of relevant tools and methods, but with some unsystematic or unjustified deviations from proper methodology.
Systematic methodology chosen. Adopts appropriate methods and tools
Exceptional scholarship shown in choice and application of methodology. Justification of choices and good evidence of understanding alternatives.
Results
Very few or no relevant malware behaviour discovered. Superficial demonstration of only basic skills in malware analysis and pentesting.
Adequate discovery of behaviour and vulnerabilities, but some relevant ones are missing.
Some competency in analysis/pentesting shown, but with clear limitations. Recommendations are present but limited in quantity or quality.
Most relevant malware behaviour and VM vulnerabilities found. Skilful tool usage. Effective recommendations for fixing vulnerabilities.
Extensive discovery of relevant malware behaviour and VM vulnerabilities. Wide range of skills shown and executed with precision. State-of- the-art recommendations for fixes.
Argument
Many factual or technical errors. Findings are not linked to evidence.
Arguments contain some errors or invalid statements/facts are presented. Some evidence is provided, but linkage to findings is not strong or it could be easily questioned.
Significant ability illustrated for logical and technically valid arguments. Findings are clearly linked to evidence.
Scientifically and technically correct statements, with no nuances missed. Evidence provided is both adequate to support the conclusions and it has no reasonable alternative interpretations.
Presentation
Significant lack of clarity and/or coherence. Unstructured report. Minimal awareness of technical terminology.
Communication is adequate to get the point across but requires some effort to understand. Good attempt to provide structure to the report, but with limitations (e.g. information that should be in one section appearing in another). Some but not many misunderstandings of terminology.
Clear and concise language. Well- structured into sections. Uses standard technical terminology.
Clear, precise, to- the-point description with no ambiguities nor irrelevant information included. Logical structure, easy to follow with appropriate use of screenshots. Displays excellent command of technical terminology.

Feedback and suggestion for future learning
Feedback on your coursework will address the above criteria. Feedback and marks will be returned on or before 28 February 2021 via Learning Central.
Detailed Instructions
Task 1: Malware Analysis – 30 marks
As explained above, you will be given access to two pieces of malware. You must perform static and dynamic analysis on both to collect evidence and complete the following sub- tasks by referring to the evidence you collected:
1. List the malware’s significant imports and strings, and its host-based and network-
based indicators.
2. Describe how the malware works.
3. Describe the purpose the malware tries to achieve.
Your report must clearly separate your responses to each of these sub-tasks.
Task 2: Vulnerability Assessment – 70 marks
(10 marks) (10 marks) (10 marks)
The VM images that you will be provided with are linked together in a network topology. You will log into the Kali Linux VM and you will conduct all your attacks from that VM. You should not modify the network topology. You should clearly follow a systematic pentesting methodology, you should clearly identify and describe each vulnerability you find and how you exploit it, and you should clearly propose how to fix it.

Posted in Uncategorized

Leave a Reply

Your email address will not be published. Required fields are marked *