I got an assignment on cyber security based on Linux and 1000 word Can u plz have a look on 3.Assessment Datails3.1 Details of Each Assessment Item Topic is firewall setup and configuration Week 6 as
ICT 205 CYBER SECURITY T219
All information contained within this Subject Outline applies to all students enrolled in the trimester as indicated.
- General Information
- Administrative Details
Associated HE Award(s) | Duration | Level | Subject Coordinator |
Bachelor of Information Technology | 1 trimester | Level 2 | Consultation: via Moodle or by appointment. |
Core / Elective
Core subject for BIT
- Subject Weighting
Indicated below is the weighting of this subject and the total course points.
Subject Credit Points | Total Course Credit Points |
BIT (96 Credit Points) |
- Student Workload
Indicated below is the expected student workload per week for this subject
No. Timetabled Hours/Week* | No. Personal Study Hours/Week** | Total Workload Hours/Week*** |
4 hours/week (2 hour Lecture + 2 hour Tutorial) | 6 hours/week | 10 hours/week |
* Total time spent per week at lectures and tutorials
** Total time students are expected to spend per week in studying, completing assignments, etc.
*** Combination of timetable hours and personal study.
Mode of Delivery On-campus
Pre-requisites ICT 106 Data Communications and Networks
- General Study and Resource Requirements
Dedicated computer laboratories are available for student use. Normally, tutorial classes are conducted in the computer laboratories.
Students are expected to attend classes with the requisite textbook and must read specific chapters prior to each tutorial. This will allow them to actively take part in discussions. Students should have elementary skills in both word processing and electronic spreadsheet software, such as Office 365 or MS Word and MS Excel.
Computers and WIFI facilities are extensively available for student use throughout KOI. Students are encouraged to make use of the campus Library for reference materials.
Students will require access to the internet and email. Where students use their own computers, they should have internet access. KOI will provide access to required software.
Resource requirements specific to this subject: MS Imagine, Office 365.
- Academic Details
- Overview of the Subject
As the Internet becomes more pervasive, so do security threats to our computer systems and communications. Cybersecurity affects the social and economic health of the world. This subject provides students with a grounding in security technology and the fundamentals of encryption systems. Students will learn about types of attacks, access control and authentication, firewalls, wireless network security, intrusion detection systems, and cryptographic techniques and their applications.
Graduate Attributes for Undergraduate Courses
Graduates of Bachelor courses from King’s Own Institute (KOI) will be able to demonstrate the attributes of a successful Bachelor degree graduate as outlined in the Australian Qualifications Framework (2nd edition, January 2013). Graduates at this level will be able to apply an advanced body of knowledge across a range of contexts for the purposes of professional practice or academic scholarship, and as a pathway for further learning.
King’s Own Institute’s key generic graduate attributes for a bachelor’s level degree are summarised below:
KOI Bachelor Degree Graduate Attributes | Detailed Description | |
Knowledge | Current, comprehensive, and coherent and connected knowledge | |
Critical Thinking | Critical thinking and creative skills to analyse and synthesise information and evaluate new problems | |
Communication | Communication skills for effective reading, writing, listening and presenting in varied modes and contexts and for the transferring of knowledge and skills to others | |
Information Literacy | Information and technological skills for accessing, evaluating, managing and using information professionally | |
Problem Solving Skills | Skills to apply logical and creative thinking to solve problems and evaluate solutions | |
Ethical and Cultural Sensitivity | Appreciation of ethical principles, cultural sensitivity and social responsibility, both personally and professionally | |
Teamwork | Leadership and teamwork skills to collaborate, inspire colleagues and manage responsibly with positive results | |
Professional Skills | Professional skills to exercise judgement in planning, problem solving and decision making |
Across the course, these skills are developed progressively at three levels:
Level 1 Foundation – Students learn the basic skills, theories and techniques of the subject and apply them in basic, standalone contexts
Level 2 Intermediate – Students further develop the skills, theories and techniques of the subject and apply them in more complex contexts, and begin to integrate this application with other subjects.
Level 3 Advanced – Students demonstrate an ability to plan, research and apply the skills, theories and techniques of the subject in complex situations, integrating the subject content with a range of other subject disciplines within the context of the course.
- Subject Learning Outcomes
This is a Level 2 subject.
On successful completion of this subject, students should be able to:
Subject Learning Outcomes | Contribution to Course Graduate Attributes |
a) Analyse and evaluate the organisational adoption of security controls | |
b) Design solutions for concrete security problems for distributed applications |
|
c) Formulate and evaluate security countermeasures to reduce potential security risks | |
d) Analyse emerging security threats and controls. |
- Subject Content and Structure
Below are details of the subject content and how it is structured, including specific topics covered in lectures and tutorials. Reading refers to the text unless otherwise indicated.
Weekly Planner:
Week (beginning) | Topic covered in each week’s lecture | Reading(s) | Expected work as listed in Moodle |
08 Jul | Introduction to network security | Ch. 1 | Complete exercises in Tutorials on challenges of securing information, information security and types of attackers. Formative not graded |
15 Jul | Malware and social engineering attacks | Ch. 2 | Complete exercises in Tutorials on basic steps of an attack and principles of defence and different types of malware and payloads of malware. Formative not graded. |
22 Jul | Applications network attacks and risk mitigation | Ch. 15 | Complete exercises in Tutorials on client-side attacks, overflow attacks and different types of networking- based attacks. Formative not graded. |
29 Jul | Vulnerability assessment and data security | Ch. 13 | Complete exercises in Tutorials. Formative not graded. |
05 Aug | Networking-based and webserver attacks | Ch. 5 | Complete exercises in Tutorials on securing a host computer and application security. How to secure data. Formative not graded. |
12 Aug | Network security devices, technologies, and design | Ch. 6 | Complete exercises in Tutorials on network security devices and their uses, network technologies and security. Formative not graded. Assignment 1: Practical and Written Assessment Summative worth 20% |
18 Aug 2019 – 25 Aug 2019 | Mid trimester break |
26 Aug | Administering a secure network and systems and application security | Chs. 7, 9 | Complete exercises in Tutorials on network design elements, functions of common network protocols, principles of network administration and how they can be secured. Formative not graded. |
02 Sep | Wireless network security and mobile and embedded devices | Chs. 8, 10 | Complete exercises in Tutorials on different types of wireless network attacks and the vulnerabilities in IEEE 802.11 security. Solutions for securing a wireless network. Formative not graded. |
09 Sep | Access management fundamentals | Ch. 11 | Complete exercises in Tutorials on four access control models, how to implement access control and the different types of authentication services. Formative not graded. |
10 16 Sep | Authentication and account management | Ch. 12 | Complete exercises in Tutorials on authentication credentials and account management procedures for securing passwords. Formative not graded. |
11 23 Sep | Cryptography: hash; symmetric; and asymmetric algorithm | Chs. 3, 4 | Assignment 2: Written Assessment Summative worth 30%. Complete exercises in Tutorials on cryptography, hash, symmetric, and asymmetric cryptographic algorithms. Formative not graded. |
12 30 Sep | Business continuity | Ch. 14 | Complete exercises in Tutorials on how to control risk, ways in which security policies can reduce risk Formative not graded. |
13 06 Oct | Study review week | ||
14 14 Oct | Examination | Please see exam timetable for exam date, time and location | |
15 20 Oct | Student Vacation begins Enrolments for T319 open | ||
16 28 Oct | Results Released 29 Oct 2019 Certification of Grades 01 Nov 2019 | ||
T319 begins 04 Nov 2019 | |||
04 Nov | Week 1 of classes for T319 Friday 01 Nov 2019 – Review of Grade Day for T219 – see Sections 2.6 and 3.6 below for more information. |
- Public Holiday Amendments
Please note: KOI is closed on all scheduled NSW Public Holidays.
T219 has one (1) public holiday (Labour Day) that occurs during this trimester. Classes scheduled for this public holiday (Calendar Class Dates) will be rescheduled as per the table below.
This applies to ALL subjects taught in T219.
Please see the table below and adjust your class timing as required. Please make sure you have arrangements in place to attend the rescheduled classes if applicable to your T219 enrolment.
Classes will be conducted at the same time and in the same location as your normally scheduled class except these classes will be held on the date shown below.
Calendar Class Date | Rescheduled Class Date |
Monday 07 October 2019 (Week 13) Study Review Week | Not required |
- Review of Grade, Deferred Exams & Supplementary Exams/Assessments
Review of Grade:
There may be instances when you believe that your final grade in a subject does not accurately reflect your performance against the subject criteria. Section 8 of the Assessment and Assessment Appeals Policy (www.koi.edu.au) describes the grounds on which you may apply for a Review of Grade.
If this happens and you are unable to resolve it with the Academic staff concerned then you can apply for a formal Review of Grade within the timeframes indicated in the following sections of this subject outline - Supplementary Assessments, 3.6 Appeals Process as well as the Assessment and Assessment Appeals Policy. Please ensure you read the Review of Grade information before submitting an application.
Review of Grade Day:
KOI will hold the Review of Grade Day for all subjects studied in T219 on
Friday 01 November 2019Only final exams will be discussed as all other assessments should have been reviewed during the trimester.
If you fail one or more subjects and you wish to consider applying for a Review of Grade you MUST attend the Review of Grade Day. You will have the chance to discuss your final exam with your lecturer, and will be advised if you have valid reasons for applying for a Review of Grade (see Section 3.6 below and Assessment and Assessment Appeals Policy).
If you do not attend the Review of Grade Day you are considered to have accepted your results for T219.
Deferred Exams:
If you wish to apply for a deferred exam, you should submit an Application for Assignment Extension or Deferred Exam Form before the prescribed deadline.
If you miss your mid-trimester or final exam there is no guarantee you will be offered a deferred exam.
You must apply within the stated timeframe and satisfy the conditions for approval to be offered a deferred exam (see Section 8.1 of the Assessment and Assessment Appeals Policy and the Application for Assignment Extension or Deferred Exam Forms). In assessing your request for a deferred exam, KOI will take into account the information you provide, the severity of the event or circumstance, your performance on other items of assessment in the subject, class attendance and your history of previous applications for special consideration.
Deferred mid-trimester exams will be held before the end of week 9. Deferred final exams will be held on two days during week 1 or 2 in the next trimester. You will not normally be granted a deferred exam on the grounds that you mistook the time, date or place of an examination, or that you have made arrangements to be elsewhere at that time; for example, have booked plane tickets.
If you are offered a deferred exam, but do not attend you will be awarded 0 marks for the exam. This may mean it becomes difficult for you to pass the subject. If you apply for a deferred exam within the required time frame and satisfy the conditions you will be advised by email (to your KOI student email address) of the time and date for the deferred exam. Please ensure that you are available to take the exam at this time.
Marks awarded for the deferred exam will be the marks awarded for that item of assessment towards your final mark in the subject.
Supplementary Assessments (Exams and Assessments):
A supplementary assessment may be offered to students to provide a final opportunity to demonstrate successful achievement of the learning outcomes of a subject. Supplementary assessments are only offered at the discretion of the Board of Examiners. In considering whether or not to offer a supplementary assessment, KOI will take into account your performance on all the major assessment items in the subject, your attendance, participation and your history of any previous special considerations.
Students are eligible for a supplementary assessment for their final subject in a course where they fail the subject but have successfully completed all other subjects in the course. You must have completed all major assessment tasks for the subject and obtained a passing mark on at least one of the major assessment tasks to be eligible for a supplementary assessment.
If you believe you meet the criteria for a supplementary assessment for the final subject in your course, but have not received an offer, complete the “Complaint, Grievance, Appeal Form” and send your form to [email protected]. The deadline for applying for supplementary assessment is the Friday of the first week of classes in the next trimester.
If you are offered a supplementary assessment, you will be advised by email to your KOI student email address of the time and due date for the supplementary assessment – supplementary exams will normally be held at the same time as deferred final exams during week 1 or week 2 of the next trimester.
You must pass the supplementary assessment to pass the subject. The maximum grade you can achieve in a subject based on a supplementary assessment is a PASS grade.
If you:
are offered a supplementary assessment, but fail it;
are offered a supplementary exam, but do not attend; or
are offered a supplementary assessment but do not submit by the due date; you will receive a FAIL grade for the subject.
- Teaching Methods/Strategies
Briefly described below are the teaching methods/strategies used in this subject:
On-campus lectures (2 hours/week) are conducted in seminar style and address the subject content, provide motivation and context and draw on the students’ experience and preparatory reading.
Tutorials (2 hours/week) include class discussion of case studies and research papers, practice sets and problem-solving and syndicate work on group projects. Tutorial participation is an essential component of the subject and contributes to the development of graduate attributes (see section 2.2 above). It is intended that specific tutorial material such as case studies, recommended readings, review questions etc. will be made available each week in Moodle.
Online teaching resources include class materials, readings, model answers to assignments and exercises and discussion boards. All online materials for this subject as provided by KOI will be found in the Moodle page for this subject. Students should access Moodle regularly as material may be updated at any time during the trimester
Other contact - academic staff may also contact students either via Moodle messaging, or via email to the email address provided to KOI on enrolment.
- Student Assessment
Assessment is designed to encourage effective student learning and enable students to develop and demonstrate the skills and knowledge identified in the subject learning outcomes. Assessment tasks during the first half of the study period are usually intended to maximise the developmental function of assessment (formative assessment). These assessment tasks include weekly tutorial exercises (as indicated in the weekly planner) and low stakes graded assessment (as shown in the graded assessment table). The major assessment tasks where students demonstrate their knowledge and skills (summative assessment) generally occur later in the study period. These are the major graded assessment items shown in the graded assessment table.
Final grades are awarded by the Board of Examiners in accordance with KOI's Assessment and Assessment Appeals Policy. The definitions and guidelines for the awarding of final grades within the BIT degree are:
HD High distinction (85-100%) an outstanding level of achievement in relation to the assessment process.
DI Distinction (75-84%) a high level of achievement in relation to the assessment process.
CR Credit (65-74%) a better than satisfactory level of achievement in relation to the assessment process.
P Pass (50-64%) a satisfactory level of achievement in relation to the assessment process.
F Fail (0-49%) an unsatisfactory level of achievement in relation to the assessment process.
Provided below is a schedule of formal assessment tasks and major examinations for the subject.
Assessment Type | When assessed | Weighting | Learning Outcomes Assessed |
Assignment 1: practical and written assessment , individual assignment (1,000 words) | Weeks 6 | 20 % | a, b |
Assignment 2: written assignment, individual assignment (2,000 words) | Week 11 | 30 % | c, d |
Assessment 3: final exam (3 hours) | Final exam period | 50% | a, b, c, d |
Requirements to Pass the Subject:
To gain a pass or better in this subject, students must gain a minimum of 50% of the total available subject marks.
- Prescribed and Recommended Readings
Provided below, in formal reference format, is a list of the prescribed and recommended readings.
Prescribed Texts:
Ciampa, M., 2017, Security + Guide to Network Security Fundamentals, 6th ed., Cengage Learning: Boston, USA.
Recommended Readings:
Johnson, M., 2016, Cyber Crime, Security and Digital Intelligence, Taylor and Francis. Graham, J., Olson, R., and Howard, R., 2015 ed., Cyber Security Essentials , CRC press Journals:
Journal of Information System Security
ACM Transactions on Information and System Security
Computers and Security
IEEE Transactions on Information Forensics and Security
Conference/ Journal Articles:
Students are encouraged to read peer reviewed journal articles and conference papers. Google Scholar provides a simple way to broadly search for scholarly literature. From one place, you can search across many disciplines and sources: articles, theses, books, abstracts and court opinions, from academic publishers, professional societies, online repositories, universities and other web sites.
- Assessment Details
- Details of Each Assessment Item
The assessments for this subject are described below. The description includes the type of assessment, its purpose, weighting, due date and submission requirements, the topic of the assessment, details of the task and detailed marking criteria, including a marking rubric for essays, reports and presentations.
Supplementary assessment information and assistance can be found in Moodle.
KOI expects students to submit their own original work in both assignments and exams, or the original work of their group in the case of group assignments.
Marking guides for assessments follow the assessment descriptions. Students should compare final drafts of their assessment against the marking guide before submission.
Assessment 1
Assessment type: Practical and Written Assessment, Individual assignment (1,000 words).
Purpose: The purpose of this assignment is to assess student understanding on firewall design and configuration and students ability to exercise the operational, analytical and critical skills needed to reduce the potential security risks. This assessment contributes to learning outcomes a, b.
Value: 20% Due Date: Week 6
Submission requirements details: All work must be submitted on Moodle by the due date. Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using Harvard Anglia referencing style.
Assessment topic: Firewall Setup and Configuration
Task Details: This Assignment requires you to perform a security testing on the network to identify the threats, prepare a Risk Mitigation report and configure some of the firewall settings using Kali Linux to secure the network and the distributed applications. The assignment consists of two parts.
Part A:
Use Nmap – a security testing in Kali Linux to perform penetration testing on the network (features of Nmap listed below). Prepare a short Risk Mitigation plan to identify the threats for the assets. This plan will guide you to proceed with the firewall settings required for the organization as you focus on the second part of the assignment.
Features of Nmap:
Host discovery: useful for identifying hosts in any network
Port scanning: lets you enumerate open ports on the local or remote host
OS detection: useful for fetching operating system and hardware information about any connected device
App version detection: allows you to determine application name and version number
Scriptable interaction: extends Nmap default capabilities by using Nmap Scripting Engine (NSE) Part B:
Configure a few settings on the firewall for the network using Kali Linux commands to achieve a required level of security. The initial set of commands are given to you to start with. You may need to perform online search to complete the rest of the requirements for the firewall settings.
Case Study for the Assignment:
CMC is a small business enterprise comprising a network to reach their business requirements. A network need to be secured to achieve their business goals. The System and Network administrator of CMC realizes that it is necessary to impose certain level of filtering for the network to be secure and that is when it can sustain from attacks, which may damage the whole network. To develop a secure network, network administrators must have a good understanding of all the attacks that are caused by an intruder and their mitigation techniques. Choosing a particular mitigation technique for an attack has an impact on the overall performance of the network, because each attack has different ways for mitigation. The network administrators identify the assets that need to be protected by performing a risk analysis, threats and vulnerabilities that the network may pose. The risk analysis provides sufficient information about all risks and helps to build a network with high security. After risk analysis, designing a set of security policies is very important to provide high level of security.
Security policies provide information for network users for using and auditing the network. Firewall is considered to be a part of the security policy providing necessary protection to the network and the applications.
You are the System and Network Administrator of CMC and the top management of CMC urges you to design the required firewall for the organization’s network. Looking into the requirements of the security and adhering to information security policy you are required to provide firewall settings to secure the network from different types of possible attacks that can harm the business network.
Part A
Perform the following task:
Use Nmap from Kali on your Virtual Box
Write an introduction to include the description of the tool
Demonstrate four tasks Nmap can perform. Discuss on how this tool can be used for mitigating differ types of threats. The discussion should include the name and brief description of the threat and must be supported by screenshots.
Discuss the performance of the tools based on the following:
Security features and
Time taken to detect any threat
Perform the firewall testing using Nmap
From the report generated from the above tasks write a short Risk Mitigation Plan to identity the type of threats on the organisation’s assets.
Part B
Configure the following setting on the firewall using the appropriate commands in Kali Linux. The list of commands is provided below:
Command | Description |
Ufw status | To check firewall status |
Ufw enable | Enable firewall |
Ufw allow | Allow services, port range and network |
Ufw deny | Blocking a service |
Check the firewall status
Enable or disable the firewall accordingly
Allow services such as TCP, SSH and samba using their port number or name
Verify the firewall rules after adding the above services
Secure a web server by blocking HTTP(80) service and allowing HTTPS(443) service only
Allow a range of ports from 20 to 80 and deny a range of ports from 100 to 500
Verify the firewall rules
Allow HTTP from a specific subnet to access your web services
Block connections to a network interface
Submission Guidelines:
The assignment should be submitted on Moodle on or before the deadline as a word document that includes all the details of the task completed in Part A and Part B. The report should address the requirements mentioned in the Marking Criteria section of the assignment.
Marking Criteria:
Sections | Description of the section | Marks |
Executive Summary | Summary on what the report is addressing | |
Outline | Outline of the whole report including tool description | |
Risk Mitigation Plan | Details of the threats in the mitigation report | |
Analysis | Critical analysis of the scenario | |
Firewall setup | Details of the firewall settings with screenshots | 15 |
Conclusion | Information on what has been addressed in the report – discussion of the findings is important | |
Demonstration | Details of the tests performed with screenshots | 10 |
Total | 50 | |
Criteria | Fail (0 – 49%) | Pass (50 – 64%) | Credit (65 – 74%) | Distinction (75 – 84%) | High Distinction (85 – 100%) |
Research –extent and application | Very difficult to read the structure | Some difficulty in reading structure and lacking information | Well written structure but not very clear | Well written and structured | Very clearly written and structured |
Value 5% Mark awarded | |||||
Analysis of the topic Value 5% Mark awarded | Does not directly answer questions | Directly answered most of the questions | Directly answers the questions | Directly answers the question giving additional insights | Directly answers the question, gives additional insights and theoretical perspectives |
Recommendations/ conclusions Value 3% Mark awarded | No support for the position taken in the answer and no conclusion provided | Provides some support for the position taken and provided conclusion based on the argument | Provides good level of support for position taken and provided conclusion based on a sound argument | Provides excellent level of support for position taken | Provides exceptional level of support for position taken and conclusion based on extensive and compelling argument |
Demonstration Value 7% Mark awarded | No demonstration provided | Demonstrated with insufficient details | Demonstration with sufficient level of details | Demonstration completed with sound knowledge of theory | Demonstration provided with sound knowledge a and additional understanding |
Total Mark: / 20% | COMMENTS: The assessment rubric has a demonstration. The requirements of the completion of this assessment looks for a demonstration to be completed by the students |
Assessment 2
Assessment type: Written assessment, Individual assignment (2,000 words).
Purpose: The purpose of this assessment is to demonstrate student awareness of current industry and research trends in the field of information security. This assessment contributes to learning outcomes c, d.
Value: 30% Due Date: Week 11
Submission requirements details: All work must be submitted on Moodle by the due date. Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using Harvard Anglia referencing style.
Assessment topic: Security Plan and Training Program
Task Details: This assignment requires you to design a security plan based on a given case study. The learning outcomes of this assignment are to recognize the threats that exist in your current or future work place. Through your research, identify the threats, outline security guidelines and develop a robust and pragmatic training programme. You should develop a plan that you would regard as helpful to you, the information user, as well as protecting your organization’s information environment. Use your imagination in combination with a wide-range of material. You are required to complete and submit a security plan based on the following scenario:
Case Study Scenario:
You are the recently appointed head of a security team responsible for protecting the information holdings of a business organization of around 1000 staffs. The organization is placed in a separate multistoried building located in the central business district of the city. The security team is responsible for administering the security of information from deliberate and accidental threats. The recent information security management found it to be deficient in some key areas such as incident response, disaster recovery and business continuity, social engineering attacks and lack of personnel awareness of the various threats to information, and poor password security. The above issues identified needed urgent remedy. Technical systems were found to be reasonably effective in maintaining database and document management security, and were well serviced by the IT team.
The management of the organization has directed you to undertake some security analysis and planning to improve the organization’s security of information. You tasks are to:
Identify and describe the organizational holdings at risk
Identify and describe the potential security threats to the organization
Design a security plan with the details of necessary counter-measures to manage and address the threats
Develop a comprehensive information security training and awareness program for the staff personnel of the organization
Marking Criteria:
Sections | Description of the section | Marks |
Executive Summary | Summary on what the report is addressing | |
Introduction | Give an introduction on what is security from the organization’s perspective and what is the need for a security plan | 10 |
Security Plan | Detail on how the organization wants to attain security (identify risks, threats, attacks) | 15 |
Security Countermeasures | Identify solutions to safeguard the organization (physical, human, electronic countermeasures) | 15 |
Training | Identify level of awareness provided for the users | 10 |
Security Policy | Develop an appropriate security plan | 10 |
Conclusion | Conclusion based on the findings in the report | |
Total | 70 |
Criteria | Fail (0 – 49%) | Pass (50 – 64%) | Credit (65 – 74%) | Distinction (75 – 84%) | High Distinction (85 – 100%) |
Research –extent and application Value 15% Mark awarded | Very difficult to read the structure | Some difficulty in reading structure and lacking information | Well written structure but not very clear | Well written and structured | Very clearly written and structured |
Analysis of the topic Value 5% Mark awarded | Does not directly answer question | Directly answered most of the question | Directly answers the question | Directly answers the question giving additional insights | Directly answers the question, gives additional insights and theoretical perspectives |
Recommendations/ conclusions Value 10% Mark awarded | No support for the position taken in the answer and conclusion presented | Provides some support for the position taken and conclusion based on some argument | Provides good level of support for position taken and conclusion based on sound argument | Provides excellent level of support for position taken and conclusion based on extensive argument | Provides exceptional level of support for position taken and conclusion based on extensive and compelling argument |
Presentation Value xx% Mark awarded | NA | NA | NA | NA | NA |
Total Mark: / 30% | COMMENTS: This assignment does not require a demonstration to be provided by the students. |
Assessment 3
Assessment type: Final Exam: individual– closed book exam.
Purpose: The purpose of the final examination is to test student understanding of all topics covered in this subject. This assessment contributes specifically to learning outcomes a, b, c, and d.
Value: 50% Due Date: The final exam will be held in the official KOI exam period in Week 14 of the trimester. The specific date and time of the exam will be posted towards the end of the trimester.
Topic: The examination may cover content from any part of the subject.
Task Details: Students will be expected to answer written response questions
- Late Penalties and Extensions
An important part of business life and key to achieving KOI’s graduate outcome of Professional Skills is the ability to manage workloads and meet deadlines. Consequently, any assessment items such as in-class quizzes and assignments missed or submitted after the due date/time will attract a penalty (see below).
Students who miss mid-trimester tests and final exams without a valid and accepted reason (see below) may not be granted a deferred exam and will be awarded 0 marks for assessment item. These penalties are designed to encourage students to develop good time management practices, and create equity for all students.
Any penalties applied will only be up to the maximum marks available for the specific piece of assessment attracting the penalty.
Late penalties, granting of extensions and deferred exams are based on the following:
In Class Tests (excluding Mid-Trimester Tests)
No extensions permitted or granted – a make-up test may only be permitted under very special circumstances where acceptable supporting evidence is provided. The procedures and timing to apply for a make-up test (only if available) are as shown in Section 3.3 Applying for an Extension (below).
Missing a class test will result in 0 marks for that assessment element unless the above applies.
Written Assessments
5% of the total available marks per calendar day unless an extension is approved (see Section 3.3
below)
Presentations
No extensions permitted or granted – no presentation = 0 marks. The rules for make-up presentations are the same as for missing in-class tests (described above).
Mid-Trimester Tests and Final Exams
If students are unable to attend mid-trimester tests or final exams due to illness or some other event (acceptable to KOI), they must:
Advise KOI in writing (email: [email protected]) as soon as possible, but no later than three
(3) working days after the exam date, that they will be / were absent and the reasons. They will be advised in writing (return email) as to whether the circumstances are acceptable.
Complete the appropriate Application for Extension or Deferred Exam Form available from the Student Information Centre in Moodle, on the KOI Website (Policies and Forms) and the Reception Desk (Market St and Kent St), as soon as possible and email with attachments to [email protected].
Provide acceptable documentary evidence in the form of a satisfactorily detailed medical certificate, police report or some other evidence that will be accepted by KOI.
Agree to attend the deferred exam as set by KOI.
Deferred exam
There will only be one deferred exam offered.
Marks awarded for the deferred exam will be the marks awarded for that assessment.
If you miss the deferred exam you will be awarded 0 marks for the assessment. This may mean you are unable to complete (pass) the subject.
- Applying for an Extension
If students are unable to submit or attend an assessment when due, and extensions are possible, they must apply by completing the appropriate Application for Extension form available from the Student Information Centre in Moodle, the KOI Website (Policies and Forms) and the Reception Desk (Market St and Kent St), as soon as possible but no later than three (3) working days of the assessment due date.
The completed form must be emailed with supporting documentation to [email protected]. Students and lecturers / tutors will be advised of the outcome of the extension request as soon as practicable.
Appropriate documentary evidence to support the request for an extension must be supplied. Please remember there is no guarantee of an extension being granted, and poor organisation is not a satisfactory reason to be granted an extension.
- Referencing and Plagiarism
Please remember that all sources used in assessment tasks must be suitably referenced.
Failure to acknowledge sources is plagiarism, and as such is a very serious academic issue. Students plagiarising run the risk of severe penalties ranging from a reduction through to 0 marks for a first offence
for a single assessment task, to exclusion from KOI in the most serious repeat cases. Exclusion has serious visa implications. The easiest way to avoid plagiarising is to reference all sources.
Harvard referencing is the required method – in-text referencing using Author’s Surname (family name) and year of publication. A Referencing Guide, “Harvard Referencing”, and a Referencing Tutorial can be found on the right hand menu strip in Moodle on all subject pages.
An effective way to reference correctly is to use Microsoft Word’s referencing function (please note that other versions and programs are likely to be different). To use the referencing function, click on the References Tab in the menu ribbon – students should choose Harvard.
Authorship is also an issue under plagiarism – KOI expects students to submit their own original work in both assessment and exams, or the original work of their group in the case of a group project. All students agree to a statement of authorship when submitting assessments online via Moodle, stating that the work submitted is their own original work.
The following are examples of academic misconduct and can attract severe penalties:
Handing in work created by someone else (without acknowledgement), whether copied from another student, written by someone else, or from any published or electronic source, is fraud, and falls under the general Plagiarism guidelines.
Copying / cheating in tests and exams is academic misconduct. Such incidents will be treated just as seriously as other forms of plagiarism.
Students who willingly allow another student to copy their work in any assessment may be considered to assisting in copying/cheating, and similar penalties may be applied.
Where a subject coordinator considers that a student might have engaged in academic misconduct, KOI may require the student to undertake an additional oral exam as a part of the assessment for the subject, as a way of testing the student’s understanding of their work.
Further information can be found on the KOI website.
- Reasonable Adjustment
The Commonwealth Disability Discrimination Act (1992) makes it unlawful to treat people with a disability less fairly than people without a disability. In the context of this subject, the principle of Reasonable Adjustment is applied to ensure that participants with a disability have equitable access to all aspects of the learning situation. For assessment, this means that artificial barriers to their demonstrating competence are removed.
Examples of reasonable adjustment in assessment may include:
provision of an oral assessment, rather than a written assessment
provision of extra time
use of adaptive technology.
The focus of the adjusted assessment should be on enabling the participants to demonstrate that they have achieved the subject purpose, rather than on the method used.
- Appeals Process
Full details of the KOI Assessment and Assessment Appeals Policy may be obtained in hard copy from the Library, and on the KOI website under Policies and Forms.
Assessments and Mid-Trimester Exams:
Where students are not satisfied with the results of an assessment, including mid-trimester exams, they have the right to appeal. The process is as follows:
Discuss the assessment with their tutor or lecturer – students should identify where they feel more marks should have been awarded – students should provide valid reasons based on the marking guide provided for the assessment. Reasons such as “I worked really hard” are not considered valid.
If still not satisfied, students should complete an Application for Review of Assessment Marks form, detailing the reason for review. This form can be found on the KOI website and is also available at KOI Reception (Market St and Kent St).
Application for Review of Assessment Marks forms must be submitted as explained on the form within ten (10) working days of the return of the marked assessment, or within five (5) working days after the return of the assessment if the assessment is returned after the end of the trimester.
Review of Grade – whole of subject and final exams:
Where students are not satisfied with the results of the whole subject or with their final exam results, they have the right to request a Review of Grade – see the Assessment and Assessment Appeals Policy for more information.
An Application for Review of Grade/Assessment Form (available from the KOI Website under Policies and Forms and from KOI Reception, Market St and Kent St) should be completed clearly explaining the grounds for the application. The completed application should be submitted as explained on the form, with supporting evidence attached, to the Academic Manager.
PAGE 2 OF 16
CRICOS 03171A
ABN: 72 132 629 979
Approved by KOI Academic Board for T2 2019