--- Sep 20 - Oct 25, 2022 ---

Network Security

Artifacts List

--- October 10, 2022 ---

Vulnerability Audit and Assessment

Baseline Analysis and Plan

Open in a New Tab

Tutor's Feedback
You have provided a solid level of knowledge & understanding through the discussion of the security challenges/vulnerabilities facing your chosen website – https://ehr-online.co.uk. A baseline assessment of the website is included. Some research has been used to strengthen your analysis. GDPR and other standards have been briefly mentioned.

There is a very good demonstration of the application of knowledge with the discussion of the tools. You have listed potential security challenges and the specific tools required to address the issues. There was scope for further justification of the tools you have chosen. The various threats have generally been related to the specific website. In addition, you have discussed the impact to the business, and you have indicated that remote scans will be performed.

A good range of research has been used to support your plan. You have generally addressed the list of assumptions/limitations of the tools. You have briefly mentioned when scans/tests would be carried out, however you could have also included a timeline.

A well organised report with the sections clearly laid out. Your ideas flow smoothly throughout, with good use of tables. A good range of references were incorporated, mostly in the correct referencing format (references list needs to be in alphabetical order). Spelling and grammar are good throughout.
--- October 31, 2022 ---

Vulnerability Audit and Assessment

Results and Executive Summary

Open in a New Tab

Tutor's Feedback on the Coding Output
You have provided a good level of knowledge in this field, providing some explanation of the security issues. You have also specified the methodology used. You have provided some tables and screenshots to highlight the findings from the scanning process and generally evaluated the website referring to the GDPR and ISO27001 standards. There are relevant recommendations/mitigations given although these could have been ordered by business priority.

There is good demonstration of critical analysis, with some further research resources used to support your arguments. You have briefly shown some evidence of linking the security standards to the examples provided. Your recommendations are fairly well reflected upon based on the findings from the scans. You have provided a briefconclusion/summary to finalise your report.

The further research incorporated were relevant and scholarly sources, which broadly supported your executive summary. There was a good selection used in your submission to support your findings in terms of the security standards and recommendations.

The overall structure and presentation of your results and executive summary was well organised, and generally followed the required layout specified in the assignment brief. A selection of tables and screenshots have been included to structure your findings. You have met the required word count.

Overall you have included in-text citations to identify the sources and a references list. Your references list is in the correct format. Some good demonstration of academic writing.
--- October 12, 2022 ---

Data Breach Case Study

Presentation

Open in a New Tab