CSI1101 - Video Presentation Assignment
CSI1101 - Video Presentation Assignment
CSI1101 - Video Presentation Assignment
School of Science
Assignment Overview:
This assignment requires you to record a video presentation detailing the tasks mentioned in this
document. You are required to demonstrate your understanding of the various contents/concepts
covered in this unit through lectures/vignettes, workshop materials, and other support
readings/videos. The aim of this assignment is to improve your presentation skills while
communicating clearly and coherently to technical and non-technical audiences.
Scenario:
Bob is working on a computer running an Ubuntu operating system with root privileges. He accessed
the ‘shadow’ file from the system and observed a list of different users. Bob understands that the file
contains a list of usernames and hashed passwords and is curious to know whether the passwords
used are easy to guess or follow strong password principles. Bob has limited IT/security knowledge
which restricts him from cracking the hashed passwords and has approached Alice for assistance. In
doing so, Bob did the following:
used RC4 modern symmetric encryption algorithm in CrypTool using the 72 bits hexadecimal
key of ‘84 35 97 52 16 37 24 90 59’ to generate the encrypted ‘shadow.hex’ file.
emailed the encrypted ‘shadow.hex’ file to Alice and included the name of the tool used to
encrypt the ‘shadow’ file, the encryption algorithm used, SHA-512 hash value of the encrypted
file, along with the hexadecimal key in the body of the email for Alice to decrypt the file and
perform subsequent actions.
Alice was surprised at receiving this but went on to work on Bob’s actual task. Imagine you are Alice
in this scenario, and so you need to download the ‘shadow.hex’ file and its hash value from Canvas
under Assignments Assignment 4: Video Presentation Assignment Instructions/Task
Requirements and Working Files
Task:
As Alice, you are required to record a presentation demonstrating you:
1. checking the content of the encrypted file using VirusTotal. While showing this, state the reason(s)
why this step is necessary.
2. using any distribution of Linux (Kali recommended) to calculate the hash value of the encrypted file
over the command-line.
3. comparing the calculated hash value with the one received from Bob (downloaded from Canvas).
For this comparison, you must use a mechanism using Linux command-line, Python in Linux or
similar (no visual comparison or GUI software allowed).
4. decrypting the file received from Bob using CrypTool and showing the contents of the file.
5. running a password cracking utility (command-line) to crack the passwords in the ‘shadow’ file.
Explanation/narration of the rationale for each command with arguments/ use of tools such as
CrypTool/ relevant information from VirusTotal, etc., must be included while demonstrating to
communicate your knowledge to the target audience, i.e. novice end-users. Using just the
commands without appropriate explanation will result in significant loss of marks.
6. summarise your findings and provide concrete recommendations by doing the following:
a. analysing the ‘shadow’ file by providing information such as the total number of users,
passwords cracked and not cracked, the hashing algorithms used, salt used, etc.
b. identifying the weaknesses related to the ‘shadow’ file with appropriate reasoning.
c. identifying the weaknesses related to the approach used in sharing the ‘shadow.hex’ file, the
reason you (Alice) were surprised, the type of cipher/algorithm, key length, the key used for
encryption, etc., with appropriate reasoning.
d. discussing the possible recommendations against each of the identified weaknesses.
See also the Required Video Presentation Structure section to ensure you include all required
sections.
Mandatory Requirements:
To ensure Student Identity Verification (SIV), you must:
1. be in possession of your ECU Student ID Card and show this for five (05) seconds at the start of
the presentation, where you will introduce yourself. The information on the card should be
readable. You can use your passport or driving license if you do not have your ECU Student ID
Card. However, you must mention the reason(s) as to why you are using your passport or driving
license.
2. capture both the screens in real-time, i.e., computer screen covering the live demonstration
(primary capture) and yourself (secondary capture). The secondary capture needs to be a
headshot only and must be recorded for the entire duration of the presentation.
Failure to do the above may result in the assignment not being marked and zero
marks being awarded to this assignment piece. See further details in the rubric.
6. Use Panopto to edit your recording by trimming frames that are irrelevant to keep to the allowable
timeframe, but do not overuse editing as it can impact the flow of the presentation and may affect
marks.
7. Plan and practise before you record the final submission to help you use your time efficiently.
8. Read the marking rubric carefully, as you will be evaluated against it. If in doubt about the criteria,
ask your lecturer/tutor/facilitator as soon as possible before the submission.
9. For Task 6, use PowerPoint slides and consider the following points:
a. The entire presentation does not have to be a collection of bullet points. Instead, consider
using diagrams/illustrations, tables and charts to communicate your points. You can make
your own tables and diagrams or use them from other sources (which you must reference).
Check out the following decision tree on data visualisation.
b. You may choose any slide layout and background as long as it is well structured, has
appropriate slide titles, bullet points and fonts, and projects professionalism.
Top Tips:
1. Start early and plan ahead. Use an assignment planner to help you:
https://www.studiosity.com/assignment-calculator
2. Study the marking rubric, paying particular attention to the grade related descriptors as you will
be evaluated against these. If in doubt, ask your lecturer, tutor, or learning adviser before
submitting.
3. Practice how to use/create a presentation using Panopto. Use the submission to rehearse the
submission process using Panopto. Only the last submission will be marked. This approach will
ensure that your end product is refined and polished.
4. The video presentation work must be your own and depict your understanding of what you are
presenting.
5. Deliver the presentation using clear and concise language, ensuring your ideas flow logically. The
PowerPoint slides (if used) must follow an appropriate structure with concise headings and bullet
points.
6. Use a presentation style that is professional and appropriate for purpose and audience. Use first-
person and third-person objective voice depending on the point you are presenting.
7. Use appropriate discipline-specific terminology and vocabulary in the presentation.
8. Ensure correct sentence structure, spelling, and grammar.
9. Make sure of the following:
a. Your PC/laptop/computing device is equipped with a microphone and a webcam
b. You are ready and comfortable to sit in front of the webcam and record yourself
c. You have access to Panopto software which is available for free to ECU students
d. You have followed the step by step instructions available on the Assignments page on how
to use, record, and upload your presentation using Panopto.
e. You have practised and are well-equipped to record and submit your final presentation.
f. You have thoroughly reviewed your presentation before submission to ensure Student
Identity Verification (SIV) requirements are met.
Common Observations in the Submissions from Previous Semesters:
The following pointers are presented to make you aware of the common mistakes that students have
made in the previous semesters. Ensure you read and understand them to avoid them in your
submissions. Note that some of the points may not be relevant to this specific task:
1. Not taking full advantage of the multiple submission allowance and struggling at the time of actual
submission.
2. Not providing an introduction and the purpose of the presentation.
3. Not introducing themselves and instead going straight into discussing the tasks.
4. Poor audio quality, even with the volume turned up to the maximum level.
5. Not using the allotted time to discuss the task requirements thoroughly.
6. Using screenshots instead of real-time walkthrough/demonstration.
7. Reading from presentation slides or script without looking at the camera. While demonstrating,
the presenter should engage the audience.
8. The presentation slides should ideally have only short bullet points, which are expanded on by the
presenter.