Knowledge and skill level demonstrated class discussion
|
|
|
|
|
|
Implement stream and block cipher algorithms, shared and public key methods, message authentication codes and digital signatures in cyber security contexts. | |
Guidance notes and considerations
Late Submission
If you are not able to complete your coursework on time due to extenuating circumstances, the ONLY way to receive an extension (up to 5 working days) or a deferral (anything longer than 5 working days) is to contact a Registry team member located at your specific CU site.
Plagiarism and Malpractice
* You are encouraged to check the originality of your work by using the draft Turnitin links on your Moodle Web.Where earlier work by you is citable, ie. it has already been published/submitted, you must reference it clearly. Identical pieces of work submitted concurrently will also be considered to be self-plagiarism.
Submission Guidelines
There should be a title page which clearly identifies the following;
* Name of the module
* Title of the Assessment * Assessment number
* Word count
The word count identified includes quotations, but excludes the bibliography and unless specifically stated, encompasses a discrepancy of + or – 10%.
|
||||
---|---|---|---|---|
|
||||
|
|
|
|
|||
---|---|---|---|---|
|
||||
|
|
|