-
Research Methods & Professional Practice, Week 12, Self Test Quiz
Self Test Quiz Read More
-
Research Methods & Professional Practice, Week 12, Professional Skills Matrix
Professional Skills Matrix Download Link Professional Skills Matrix.xlsx Read More
-
Research Methods & Professional Practice, Week 12, End of Module Assignment, Individual e-Portfolio including 1000-word reflective piece
End of Module Assignment Individual e-Portfolio including 1000-word reflective piece Author: Anja Kosar e-Portfolio link: Home ANJA KOSAR Research Skills and Professional Practice Professor Karen Outram MSc Cyber Security (online) Introduction This assignment evaluates academic and personal growth throughout... Read More
-
Research Methods & Professional Practice, Week 10, Assignment 2, Research Proposal Presentation
Assignment 2, Research Proposal Presentation Research Proposal Presentation Research Proposal Presentation.pptx Transcript Transcript: Research Proposal Presentation Presentation Topic: The challenges of Cyber Crime in law enforcement Research Question: How do jurisdictional overlaps and international legal disparities impede cybercrime inve... Read More
-
Research Methods & Professional Practice, Week 8 & 9, Statistical Worksheets
Statistical Worksheets BAR CHARTS Example 9.1 For this e-portfolio exercise, students were required to partake in various exercises using Excel. For the first exercise, the instructions were to open an Excel spreadsheet and select the clustered column chart, followed by further instructions for the layout of the chart for Area 1. The result... Read More
-
Research Methods & Professional Practice, Week 9, Collaborative Discussion 2, Summary Post
Collaborative Discussion 2 Summary Post Abi’s dilemma in analyzing and reporting data on the nutritional value of Whizzz cereal raises critical questions about the balance between professional integrity, transparency and commercial interests. As a statistical programmer, Abi is subject to ethical standards, which stress the significance of hone... Read More
-
Research Methods & Professional Practice, Week 8, Research Proposal Outline
Research Proposal Outline Introduction In this section, I will provide a brief introduction of the research topic and proposal. The topic I have chosen is “The challenges of cybercrime in law enforcement”, with a research question: “How do jurisdictional overlaps and international legal disparities impede cybercrime investigations?”. The i... Read More
-
Research Methods & Professional Practice, Week 8, Collaborative Discussion 2, Peer Responses
Collaborative Discussion 2 Peer Responses Hello Amrol, Thank you for your informative post. Your analysis effectively highlights the ethical responsibility that professionals, including Abi, must uphold when handling research data. The British Dietetic Association (2021) emphasizes that systematic and continuous data collection is essential to... Read More
-
Research Methods & Professional Practice, Week 7, E-Portfolio Activity, Summary Worksheets
E-Portfolio Activity, Summary Worksheets Summary Worksheets 6.1 For this e-portfolio exercise, students were required to partake in the summary hypothesis testing using Excel, in the Unit7 workbooks. For the first exercise, the instructions were as follows: Calculate the sample size, sample mean, and sample standard deviation of the weight l... Read More
-
Research Methods & Professional Practice, Week 7, E-Portfolio Activity, Hypothesis Testing Worksheet
E-Portfolio Activity, Hypothesis Testing Worksheet Hypothesis Testing Worksheet For this e-portfolio exercise, students were required to partake in the hypothesis testing using Excel, in the Unit7 workbooks. For the first exercise, the instructions were as follows: 7.1 Containers Consider the container design using two variables Con1 and Con2... Read More
-
Research Methods & Professional Practice, Week 7, Collaborative Discussion 2, Initial Post
Collaborative Discussion 2 Initial Post Studies with positive results are greatly more represented in literature than studies with negative results, producing so-called publication bias (Mlinaric et al., 2017). In this example, Abi faces a complex ethical dilemma. While it is possible for data to be analyzed from multiple perspectives, selecti... Read More
-
Research Methods & Professional Practice, Week 7, Assignment 1, Literature Review
Assignment 1 Literature Review Literature review on app development for emergency services (healthcare). Research Question: How do emergency service mobile applications integrate with existing emergency systems? Focusing on interoperability challenges. Author: Anja Kosar Student ID: 12692515 Module: Research Methods and Professional Practi... Read More
-
Research Methods & Professional Practice, Week 5, E-Portfolio Activity, Reflective Activity 2, Case Study, Inappropriate Use of Surveys
E-Portfolio Activity, Reflective Activity 2 Case Study: Inappropriate Use of Surveys The 2018 Cambridge Analytica scandal exposed the unethical use of personal data through online surveys, with the company harvesting data from millions of Facebook users without their knowledge or consent. In 2018, it became public knowledge that millions of Fa... Read More
-
Research Methods & Professional Practice, Week 4, Literature Review Outline
Week 4, Literature Review Outline Literature Review Outline Topic: App development for emergency services (healthcare, fire department, disaster management). For the first assignment, I have chosen app development for emergency services. By following the literature review guidelines, I plan to address the following question: How do em... Read More
-
Research Methods & Professional Practice, Week 3, E-Portfolio Activity, Research Proposal Review
E-Portfolio Activity, Research Proposal Review Research Proposal Review Considering your thoughts on your chosen area of interest for your project: Which of the methods described in this week’s reading would you think would suit your purpose? Which data collection methods would you consider using? For my project, and the topic of app de... Read More
-
Research Methods & Professional Practice, Week 2, Collaborative Discussion, Peer Responses
Collaborative Discussion Peer Response 1 Hi Amrol, Thank you for your interesting post. Having picked the same topic, it was very interesting and informative to read a different perspective. I believe Rogue Services raises several concerns regarding the ethical dimensions of the company’s operations. By advertising the “no matter what” tagli... Read More
-
Research Methods & Professional Practice, Week 3, Collaborative Discussion 1, Summary Post
Collaborative Discussion 1 Summary Post During the Rogue Services case study discussion, various ethical and legal implications of internet service providers (ISPs) that failed to uphold professional standards, were highlighted. Rogue Services, by prioritizing its “no matter what” uptime guarantee, facilitated the spread of malware and spam, r... Read More
-
Research Methods & Professional Practice, Week 1, E-Portfolio Activity, Reflective Activity 1, Ethics in Computing in the age of Generative AI
E-Portfolio Activity, Reflective Activity 1 Ethics in Computing in the age of Generative AI In this research article, “Worldwide AI Ethics: A Review of 200 Guidelines and Recommendations for AI Governance” a thorough comprehensive analysis of global ethical standards for Artificial Intelligence (AI) is discussed and its issues highlighted. Aut... Read More
-
Research Methods & Professional Practice, Week 1, Collaborative Discussion 1, Initial Post
Case Study - Rogue Hosting Services Initial Post This case study highlights Rogue Services, an internet service provider that marketed its web hosting with a “no matter what” uptime guarantee. While some clients were legitimate retailers, many were involved in distributing malware and spam. Despite repeated requests from major ISPs and internat... Read More
-
Security Risk Management – Week 12 – End of Module Assignment – E-Portfolio Submission
Individual Project E – Portfolio Submission In the final week (12) of the SRM module, students were expected to submit the final assignment, an E-Portfolio submission in which all evidence of the work throughout the module was to be collated, with a word count total of 2000 words, with 1000 of those being used for the reflective section only. Th... Read More
-
Security Risk Management – Week 11 – Second Assignment – Individual Project - Executive Summary
Individual Project: Executive Summary This week, students were preparing for the submission of the second graded assignment, the ‘Individual Project: Executive Summary, which was an addition to the first assignment, in week 6. In this assignment, which students were required to enumerate the potential risks to the quality and supply chain for P... Read More
-
Security Risk Management – Week 10 – Business Continuity & Disaster Recovery (BCDR)
Business Continuity & Disaster Recovery (BCDR) Business Continuity Business continuity refers to an organization’s ability to continue essential operations and services during and after disruptions, such as natural disasters, technological failures, human errors, or other unexpected events. Business continuity planning (BCP) is a proactive... Read More
-
Security Risk Management – Week 9 – Collaborative Learning Discussion 2 – Summary Post
Collaborative Learning Discussion – Summary Post This week, students were expected to post a summary post for the Collaborative Learning Discussion 1, taking into consideration the first initial post from week 1 and peer responses in week 2. Post The Common Vulnerability Scoring System (CVSS) is a method used to supply a qualitative measure o... Read More
-
Security Risk Management – Week 8 – Collaborative Learning Discussion 2 – Peer Responses
Collaborative Learning Discussion – Peer Responses In this week, the collaborative learning discussion continued and students were instructed to provide at least two responses to other peer’s posts. The following represent the two peer responses: Peer Response – Mohammed Younes Hello Mohammed, Thank you for your informative post. CVSS was fi... Read More
-
Security Risk Management – Week 7 – Collaborative Learning Discussion 2 – Initial Post
Collaborative Learning Discussion 2 – Initial Post This week, students were introduced to various methods used as part of Quantitative risk modeling, some of which use probabilistic approaches such as Monte Carlo simulations and Bayes theorem-based methods, as well as multi-criteria decision analysis techniques such as TOPSIS, AHP and ANP. As ... Read More
-
Security Risk Management – Week 6 – Assignment – Team Project & Peer Review
Assignment 1 – Development Team Project: Risk Identification Report & Peer Review This week, students were preparing for the submission of the first graded assignment, the Team Project and individual Peer Review, which was a team project report on Risk Identification for a small enterprise, Pampered Pets. Pampered Pets Enterprise Pampered... Read More
-
Security Risk Management – Week 5 – GDPR Case Study
GDPR Case Study This week, students were expected to carry out a Week 5 E-Portfolio activity, during which a list of case studies was provided for review. These contained a span of breaches from 2014 to 2018. The activity instructions were to choose a case study and answer the following questions: • What is the specific aspect of GDPR that your... Read More
-
Security Risk Management – Week 4 – Seminar 3 – Threat Modeling Exercises
Threat Modeling Exercises This week, students were expected to carry out a Week 4 Seminar activity during which the prepared format of choice would have been discussed during the seminar. The activity instructions were to read the Spears & Barki (2010) article and prepare answers to the following questions: Read Shostack (2018) chapters 3-... Read More
-
Security Risk Management – Week 3 – Collaborative Learning Discussion Summary Post
Summary Post This week, students were expected to post a summary post for the Collaborative Learning Discussion 1, taking into consideration the first initial post from week 1 and peer responses in week 2. Post Over the past 3 weeks, we discussed the evolution of digital industries and highlighted Industry 4.0 which represents a significant s... Read More
-
Security Risk Management – Week 2 Seminar – User Participation In The Risk Management Process
User Participation In The Risk Management Process This week, students were expected to carry out a Week 2 Seminar activity during which the prepared format of choice would have been discussed during the seminar. The activity instructions were to read the Spears & Barki (2010) article and prepare answers to the following questions: How ... Read More
-
Security Risk Management - Week 2 – Collaborative Learning Discussion Peer Responses
Collaborative Learning Discussion – Peer Responses In this week, the collaborative learning discussion continued and students were instructed to provide at least two responses to other peer’s posts. The following represent the two peer responses: Peer Response – Amrol Miah Hello Amrol, This is a very interesting post and I have enjoyed your ... Read More
-
Security Risk Management - Week 1 – Collaborative Learning Discussion Initial Post
Collaborative Learning Discussion - Initial Post In this week, students were instructed to describe the following: What do the authors mean by the term ‘Industry 4.0’ - give two examples? Give two real-world examples of risks that fit into the authors categories. Find another journal article that either supports or contradicts the points ... Read More
-
Network Security - Week 6 - Two Major Final Assignments
Week 6 Two Major Final Assignments In this week, students were preparing for two major end-of-module assignments. Below are both explained: Vulnerability Audit & Assessment – Results and Executive Summary This assignment is a follow up from Week 3 assignment. It was by far the most challenging one to complete, as well as the Reflective Pie... Read More
-
Network Security - Week 5 - Seminar - The Debate - Future of the internet
Seminar - The Debate - Future of the internet In this week students were placed into 4 groups where they had to prepare a presentation on their assigned topic as to why they think that would be the future of the internet. For the purpose of the activity, my group’s topic was that the future of the internet is based on the adoption of IPv6 and th... Read More
-
Network Security - Week 5 - Case Study - Reviewing An Assessment Reporting Template
Case Study: Reviewing An Assessment Reporting Template This week students were required to review a PurpleSec sample template on vulnerability assessment reporting. The template consisted of… Executive Summary Scan Results Methodology Findings Risk Assessment - Critical, High, Medium or Low Severity Vulerability Recommendations on r... Read More
-
Network Security - Week 5 - Collaborative Discussion 2 - Pros and Cons of Logging - Log4j - Peer Responses
Pros and Cons of Logging - Log4j - Peer Responses In this week students were required to review peer posts on pros and cons of logging, pertaining to the Log4j breach and provide at least 2 responses. Peer Responses: Hello Hainadine, This is a very good post. I completely agree with your first statement in relation to security analysts ha... Read More
-
Network Security - Week 4 - Scanning Activity
Network Security - Week 4 - Scanning Activity In this week, students were provided with a scanning activity which related to our chosen websites. For the purpose of the activity, I used a combination of Kali Linux tools, as well as some open-source tool kits. The information gathered is as follows: What Operating System does the website... Read More
-
Network Security - Week 4 - Seminar - Breach Case Analysis Case Study
Seminar - Breach Case Analysis Case Study - Yahoo Data Breach In this week students had to present a Power Point presentation on a data breach of their choise, from a provided list. The below is information taken from the Power Point presentation on the Yahoo Data Breach. In what quite possibly could be the largest data breach to date, yahoo co... Read More
-
Network Security - Week 4 - Collaborative Discussion 2 - Pros and Cons of Logging - Log4j
Collaborative Discussion 2 - Pros and Cons of Logging - Log4j - Initial Post In this week students were required to research various literature on pros and cons of logging, particularly the impact of log4j. POST: Monitoring and logging is an important aspect of every day security, as it provides raw data that administrators and security teams u... Read More
-
Network Security - Week 3 - Collaborative Discussion 1 - Digitalization - Summary Post
Collaborative Discussion 1 - Digitalization - Summary Post In this week, students were required to conclude on the Collaborative Discussion 1, Digitalization. This summary post was generated taking into consideration the first initial post and peer’s responses. POST: Over the past three weeks, interesting discussions were held regarding digital... Read More
-
Network Security - Week 3 - Vulnerability Audit & Assessment
Assignment - Baseline and Analysis Plan In this week, the first graded assignment was due, the Baseline and Analysis Plan. In week one, each student chose a website they wanted to be assigned to them, which would have been used throughout the module for various scanning and research activities, eventually used in this and the last (week 6) assig... Read More
-
Network Security - Week 3 - Scanning Activity
Week 3 Scanning Activity Throughout this Network Security (NS) module, from week 1, my fellow students and I were provided with a list of websites to choose from, which would be utilized throughout this module for various assignments. My website of choice was www.allthegear.org.uk, an e-commerce platform, specializing in sales of outdoor clothi... Read More
-
Network Security - Week 2 - Vulnerability Analysis
Vulnerability Analysis - Literature Review Activity The Open Worldwide Application Security Project (OWASP) is an online community that produces freely available articles, methodologies, documentation, tools, and technologies in the field of web application security. According to (OWASP, N.D), below are some of the most common web application s... Read More
-
Network Security - Week 2 - Solar Winds Breach Seminar
The Solar Winds Breach Case Study – Seminar SolarWinds is a major software company which provides system management tools for network and infrastructure monitoring, and other technical services to hundreds of thousands of organizations around the world. Among the company’s products is an IT performance monitoring system called Orion. The SolarW... Read More
-
Network Security - Week 2 - Collaborative Discussion 1 - Peer Responses
Collaborative Discussion 1 - Digitalization - Peer Responses In week two, students were required to review peer’s posts, and provide at least two responses. Peer Response 1: Hello Amrol, I admire your first sentence and comparison of Homo Sapiens settlements to today, 2023, which is a great representation of how far we have come, as people, an... Read More
-
Network Security - Week 1 - Collaborative Discussion 1 - Digitalization - What are the security implications of the digital economy?
Digitalization - What are the security implications of the digital economy? In this first collaborative discussion, students were required to conduct relevant literature research on provided reading lists, relative to security challenges of companies expanding to a fully digital enterprise. In this first post, students were required to provide... Read More
-
Introduction to Python
Introduction to Python This post is meant to summarize some of the key concepts I have learned in the course Introduction to Python Read More
