Too Tired? Too Anxious? Need More Time? We’ve got your back.
The assessment aims are:
To mirror the role of an intelligence/security analyst tasked with evaluating a particular threat for a stakeholder.
To identify a cybercrime threat that is of interest to you, and develop and show your information literacy by researching, assessing and evaluating that threat and the mitigation measures being employed to address it.
To demonstrate a general understanding of key issues and concepts relating to the module topic, including socio-economic trends, cybercrime threats, security actors, and response strategies.
Please download and review the four documents contained in the above section, and note the following details.
There are three stages to the assessment:
Choose a cyber threat that interests you
For Assignment 1: Annotated Bibliography, research your selected threat
For Assignment 2: Security Briefing Report, compile your report on that threat, drawing on the 10 sources in your annotated bibliography and any other relevant ones
1. Choose a cyber threat that interests you
Identify three potential options for your chosen topic. Using Google and then progressing to the e-library resources and Google Scholar, get a feel for each of the topics and the resources available, and see if one jumps out as especially interesting or viable.
Some examples include: cyber-bullying, cyber-espionage, cyber-terrorism, DDOS attacks, disinformation, online child sexual exploitation, online drug trafficking, online firearms trafficking, online fraud, online harassment, online hate, online wildlife trafficking, phishing, ransomware, and SCADA attacks. Consider whether you want to have a global or national focus, and whether you want to be more specific in the threat – e.g. Action Fraud’s A-Z of Fraud lists many types of fraud, many of which are predominantly or partially instigated online.
Please contact Alison (alison.wakefield@uwl.ac.uk) to confirm or discuss your topic, so that I can check it is viable and give you some pointers.
2. For Assignment 1: Annotated Bibliography (due after week 8), research your selected threat
An annotated bibliography (the first part of the assessment) is an approach to organising your research before you start writing it. Some information about annotated bibliographies as well as examples can be see here: https://library.leeds.ac.uk/info/1401/academic_skills/80/annotated_bibliographies.
Details:
1000 words +/- 10%
Worth 30% of the module grade
Will assess the research you carry out to support assignment 2 (assignment 2 should normally be on the same topic)
The title is your selected topic, e.g. online firearms trafficking
Prepare 10 annotations (select your best 10 sources). Have a look at this short article on the merits of different types of source and maintaining the right balance between them. Try to find at least one general textbook or textbook chapter that offers a complete overview of the topic area and helps you build a plan for the report.
Use the full Harvard reference as the heading for each annotation (consult https://www.citethemrightonline.com/ to assist you with formatting your references)
Present each annotation below the reference to which it relates
Sort your annotations alphabetically from A to Z
Each annotation should be 100 words (on average) and on this occasion it should include the Harvard reference.
There is no need for an additional, separate references list.
Have a look at the grading criteria for both the annotated bibliography and the report, supplied in the section above.
Example annotation (based on the guidance in the week 1 seminar and on slide 18 of the assessment presentation contained in the section above):
HM Government (2015) National Security Strategy and Strategic Defence and Security Review, London: HM Government. Available at: https://www.gov.uk/government/publications/national-security-strategy-and-strategic-defence-and-security-review-2015 (Accessed: 15 February 2021).
This updated UK government strategy document states that the world is a less safe place than in 2010, and reports increases in aspects of national security spending. It emphasises alignment of military, intelligence and security strategies with diplomatic and development strategies in addressing matters overseas, and prioritises counter-terrorism, cyber security and crisis management at home. Published within a fortnight of the Paris attacks, it seeks to convey that the government is taking a heightened threat level seriously. It will be used in the Responses section of the report to set UK policy in context.
Key: type of source, summary, evaluation, applicationThe assessment aims are:
To mirror the role of an intelligence/security analyst tasked with evaluating a particular threat for a stakeholder.
To identify a cybercrime threat that is of interest to you, and develop and show your information literacy by researching, assessing and evaluating that threat and the mitigation measures being employed to address it.
To demonstrate a general understanding of key issues and concepts relating to the module topic, including socio-economic trends, cybercrime threats, security actors, and response strategies.
Please download and review the four documents contained in the above section, and note the following details.
There are three stages to the assessment:
Choose a cyber threat that interests you
For Assignment 1: Annotated Bibliography, research your selected threat
For Assignment 2: Security Briefing Report, compile your report on that threat, drawing on the 10 sources in your annotated bibliography and any other relevant ones
1. Choose a cyber threat that interests you
Identify three potential options for your chosen topic. Using Google and then progressing to the e-library resources and Google Scholar, get a feel for each of the topics and the resources available, and see if one jumps out as especially interesting or viable.
Some examples include: cyber-bullying, cyber-espionage, cyber-terrorism, DDOS attacks, disinformation, online child sexual exploitation, online drug trafficking, online firearms trafficking, online fraud, online harassment, online hate, online wildlife trafficking, phishing, ransomware, and SCADA attacks. Consider whether you want to have a global or national focus, and whether you want to be more specific in the threat – e.g. Action Fraud’s A-Z of Fraud lists many types of fraud, many of which are predominantly or partially instigated online.
Please contact Alison (alison.wakefield@uwl.ac.uk) to confirm or discuss your topic, so that I can check it is viable and give you some pointers.
2. For Assignment 1: Annotated Bibliography (due after week 8), research your selected threat
An annotated bibliography (the first part of the assessment) is an approach to organising your research before you start writing it. Some information about annotated bibliographies as well as examples can be see here: https://library.leeds.ac.uk/info/1401/academic_skills/80/annotated_bibliographies.
Details:
1000 words +/- 10%
Worth 30% of the module grade
Will assess the research you carry out to support assignment 2 (assignment 2 should normally be on the same topic)
The title is your selected topic, e.g. online firearms trafficking
Prepare 10 annotations (select your best 10 sources). Have a look at this short article on the merits of different types of source and maintaining the right balance between them. Try to find at least one general textbook or textbook chapter that offers a complete overview of the topic area and helps you build a plan for the report.
Use the full Harvard reference as the heading for each annotation (consult https://www.citethemrightonline.com/ to assist you with formatting your references)
Present each annotation below the reference to which it relates
Sort your annotations alphabetically from A to Z
Each annotation should be 100 words (on average) and on this occasion it should include the Harvard reference.
There is no need for an additional, separate references list.
Have a look at the grading criteria for both the annotated bibliography and the report, supplied in the section above.
Example annotation (based on the guidance in the week 1 seminar and on slide 18 of the assessment presentation contained in the section above):
HM Government (2015) National Security Strategy and Strategic Defence and Security Review, London: HM Government. Available at: https://www.gov.uk/government/publications/national-security-strategy-and-strategic-defence-and-security-review-2015 (Accessed: 15 February 2021).
This updated UK government strategy document states that the world is a less safe place than in 2010, and reports increases in aspects of national security spending. It emphasises alignment of military, intelligence and security strategies with diplomatic and development strategies in addressing matters overseas, and prioritises counter-terrorism, cyber security and crisis management at home. Published within a fortnight of the Paris attacks, it seeks to convey that the government is taking a heightened threat level seriously. It will be used in the Responses section of the report to set UK policy in context.
Key: type of source, summary, evaluation, application
Too Tired? Too Anxious? Need More Time? We’ve got your back.