Reference no: EM133150613
Launching into Cyber Security
Learning Outcome 1: Evaluate critically the solutions developed to solve/mitigate security issues
Assignment: OOP application of principles and concepts
This final assessment will show how you evaluate critically solutions developed to solve/mitigate these security issues. It accounts for 40% of your final module grade. The applicable word count of 600 words is for the README file only. Remember to save your work to your GitHub repository.
Assignment Brief
You are now required to implement a Python code of a solution to the issue described in Unit 9. This could be one of the solutions you recommended in your report submission in Unit 9 or one you did not consider in that submission. The cyber security approaches you have chosen should be clearly highlighted. So your proposed solution could involve the implementation of Multi-factor Authentication and the use of encryption technologies to store user data. You are not expected to implement solutions that involve the use of external devices, such as biometric devices. Ensure you consider the feedback you have received on your Unit 9 submission and in your formative programming outline submission.
Please write and test your scripts in Codio using the Python workspace created for you (A ssessment: Python P roject). All scripts must be documented and explained following best practices. This helps to ensure that you carry out a critical evaluation of your program. Submit your saved exercise files in Codio before the end of Unit 12 AND download a copy of the submitted file and submit it below.
Assignment Guidance
You will receive marks for unsuccessful answers if they build a logical argument. The deliverables for this assignment and the associated grading criteria (to be reviewed alongside the criteria grid in the Module Resources page) are:
1. Python code, covering
Code elegance - is the appropriate approach (techniques, algorithms etc) used? and Meeting your chosen solution requirements(Knowledge and Understanding weighted at 30%)
Application of object-oriented programming features and Test data used to test the code. (Application of Knowledge and understanding weighted a 30%)
2. Structure and Presentation (weighted at 30%) focuses on comments on the code explaining it, your README file containing a description of the solution implemented and instructions on how to execute the code (600 words), and how well you have organised your code
Please note that academic integrity also applies to codes, where all sources can be placed in the README file and/or as part of the code commentary. (Academic Integrity weighted at 10%)
Attachment:- Cyber Security.rar