CSI1101 - Video Presentation Assignment

Download as pdf or txt
Download as pdf or txt
You are on page 1of 4

Edith Cowan University

School of Science

Computer Security (CSI1101)


Video Presentation

Assignment Overview:
This assignment requires you to record a video presentation detailing the tasks mentioned in this
document. You are required to demonstrate your understanding of the various contents/concepts
covered in this unit through lectures/vignettes, workshop materials, and other support
readings/videos. The aim of this assignment is to improve your presentation skills while
communicating clearly and coherently to technical and non-technical audiences.

Scenario:
Bob is working on a computer running an Ubuntu operating system with root privileges. He accessed
the ‘shadow’ file from the system and observed a list of different users. Bob understands that the file
contains a list of usernames and hashed passwords and is curious to know whether the passwords
used are easy to guess or follow strong password principles. Bob has limited IT/security knowledge
which restricts him from cracking the hashed passwords and has approached Alice for assistance. In
doing so, Bob did the following:
 used RC4 modern symmetric encryption algorithm in CrypTool using the 72 bits hexadecimal
key of ‘84 35 97 52 16 37 24 90 59’ to generate the encrypted ‘shadow.hex’ file.
 emailed the encrypted ‘shadow.hex’ file to Alice and included the name of the tool used to
encrypt the ‘shadow’ file, the encryption algorithm used, SHA-512 hash value of the encrypted
file, along with the hexadecimal key in the body of the email for Alice to decrypt the file and
perform subsequent actions.
Alice was surprised at receiving this but went on to work on Bob’s actual task. Imagine you are Alice
in this scenario, and so you need to download the ‘shadow.hex’ file and its hash value from Canvas
under Assignments  Assignment 4: Video Presentation  Assignment Instructions/Task
Requirements and Working Files

Task:
As Alice, you are required to record a presentation demonstrating you:

1. checking the content of the encrypted file using VirusTotal. While showing this, state the reason(s)
why this step is necessary.
2. using any distribution of Linux (Kali recommended) to calculate the hash value of the encrypted file
over the command-line.
3. comparing the calculated hash value with the one received from Bob (downloaded from Canvas).
For this comparison, you must use a mechanism using Linux command-line, Python in Linux or
similar (no visual comparison or GUI software allowed).
4. decrypting the file received from Bob using CrypTool and showing the contents of the file.
5. running a password cracking utility (command-line) to crack the passwords in the ‘shadow’ file.

Explanation/narration of the rationale for each command with arguments/ use of tools such as
CrypTool/ relevant information from VirusTotal, etc., must be included while demonstrating to
communicate your knowledge to the target audience, i.e. novice end-users. Using just the
commands without appropriate explanation will result in significant loss of marks.

CSI1101, Video Presentation PAGE 1


Edith Cowan University
School of Science

6. summarise your findings and provide concrete recommendations by doing the following:
a. analysing the ‘shadow’ file by providing information such as the total number of users,
passwords cracked and not cracked, the hashing algorithms used, salt used, etc.
b. identifying the weaknesses related to the ‘shadow’ file with appropriate reasoning.
c. identifying the weaknesses related to the approach used in sharing the ‘shadow.hex’ file, the
reason you (Alice) were surprised, the type of cipher/algorithm, key length, the key used for
encryption, etc., with appropriate reasoning.
d. discussing the possible recommendations against each of the identified weaknesses.

See also the Required Video Presentation Structure section to ensure you include all required
sections.

Mandatory Requirements:
To ensure Student Identity Verification (SIV), you must:

1. be in possession of your ECU Student ID Card and show this for five (05) seconds at the start of
the presentation, where you will introduce yourself. The information on the card should be
readable. You can use your passport or driving license if you do not have your ECU Student ID
Card. However, you must mention the reason(s) as to why you are using your passport or driving
license.
2. capture both the screens in real-time, i.e., computer screen covering the live demonstration
(primary capture) and yourself (secondary capture). The secondary capture needs to be a
headshot only and must be recorded for the entire duration of the presentation.

Failure to do the above may result in the assignment not being marked and zero
marks being awarded to this assignment piece. See further details in the rubric.

Required Video Presentation Structure:


1. Format: Video recording that records the computer screen showing demonstration and
presentation slides as primary capture and recording yourself as secondary capture with voice
narration created using Panopto. The presentation recording must be submitted via the Panopto
link on Canvas. The instructions are available on Canvas under the Assignment section. Please
make sure you follow the instructions carefully.
2. The following is a checklist of the flow of the presentation:
Component Broad Description and Guidelines
Introduction  Introduce yourself to the audience
 Show your ECU ID Card clearly to the camera. If using passport or driver’s license,
state the reason for not showing ECU ID Card.
 Mention Unit code and title, assignment title, your name, student number, campus
and lecturer’s name. You can use a PowerPoint slide for this information as primary
capture.
Objective Outline the aims and objectives of the presentation. Provide:
 the purpose of the presentation
 an overview of the content covered/flow/sequence of the presentation
You can use a PowerPoint slide for this information as a primary capture.
Tasks 1-5 Demonstrate and discuss the requirements specified in Tasks 1-5 above. Note that this
must be a real-time demonstration by the student. PowerPoint is not allowed.
Task 6 Discuss your findings with the help of PowerPoint slides. Be creative so that you engage
the audience’s attention.
End of the presentation No formal conclusion is required. A thank you slide informing the audience about the
end of the presentation is sufficient.

CSI1101, Video Presentation PAGE 2


Edith Cowan University
School of Science

Approaches to Completing the Task:


1. The presentation should be presented and recorded in a manner that would be appropriate for
someone in an audience with very little or no understanding of cyber security (novice end-users).
As a result, you must ensure that you simplify the communication of your findings. Using complex
descriptions or terminology will result in a loss of marks, and you must use acronyms correctly.
You can use analogies if it enables you to communicate the identified issue in a simplified way.
2. You are not expected to include references in the presentation unless you are referring to data
taken from a published source, e.g. report, white paper or survey.
3. Be creative in how you choose to communicate your findings.
4. Ensure you speak clearly in the recording.
5. Ensure everything you show and describe is clearly visible to the audience.
Play back your recordings and listen for audio quality. Poor audio quality will lead to loss of marks.
Narration over a pre-recorded video is not allowed.

6. Use Panopto to edit your recording by trimming frames that are irrelevant to keep to the allowable
timeframe, but do not overuse editing as it can impact the flow of the presentation and may affect
marks.
7. Plan and practise before you record the final submission to help you use your time efficiently.
8. Read the marking rubric carefully, as you will be evaluated against it. If in doubt about the criteria,
ask your lecturer/tutor/facilitator as soon as possible before the submission.
9. For Task 6, use PowerPoint slides and consider the following points:
a. The entire presentation does not have to be a collection of bullet points. Instead, consider
using diagrams/illustrations, tables and charts to communicate your points. You can make
your own tables and diagrams or use them from other sources (which you must reference).
Check out the following decision tree on data visualisation.
b. You may choose any slide layout and background as long as it is well structured, has
appropriate slide titles, bullet points and fonts, and projects professionalism.

CSI1101, Video Presentation PAGE 3


Edith Cowan University
School of Science

Top Tips:
1. Start early and plan ahead. Use an assignment planner to help you:
https://www.studiosity.com/assignment-calculator
2. Study the marking rubric, paying particular attention to the grade related descriptors as you will
be evaluated against these. If in doubt, ask your lecturer, tutor, or learning adviser before
submitting.
3. Practice how to use/create a presentation using Panopto. Use the submission to rehearse the
submission process using Panopto. Only the last submission will be marked. This approach will
ensure that your end product is refined and polished.
4. The video presentation work must be your own and depict your understanding of what you are
presenting.
5. Deliver the presentation using clear and concise language, ensuring your ideas flow logically. The
PowerPoint slides (if used) must follow an appropriate structure with concise headings and bullet
points.
6. Use a presentation style that is professional and appropriate for purpose and audience. Use first-
person and third-person objective voice depending on the point you are presenting.
7. Use appropriate discipline-specific terminology and vocabulary in the presentation.
8. Ensure correct sentence structure, spelling, and grammar.
9. Make sure of the following:
a. Your PC/laptop/computing device is equipped with a microphone and a webcam
b. You are ready and comfortable to sit in front of the webcam and record yourself
c. You have access to Panopto software which is available for free to ECU students
d. You have followed the step by step instructions available on the Assignments page on how
to use, record, and upload your presentation using Panopto.
e. You have practised and are well-equipped to record and submit your final presentation.
f. You have thoroughly reviewed your presentation before submission to ensure Student
Identity Verification (SIV) requirements are met.
Common Observations in the Submissions from Previous Semesters:
The following pointers are presented to make you aware of the common mistakes that students have
made in the previous semesters. Ensure you read and understand them to avoid them in your
submissions. Note that some of the points may not be relevant to this specific task:
1. Not taking full advantage of the multiple submission allowance and struggling at the time of actual
submission.
2. Not providing an introduction and the purpose of the presentation.
3. Not introducing themselves and instead going straight into discussing the tasks.
4. Poor audio quality, even with the volume turned up to the maximum level.
5. Not using the allotted time to discuss the task requirements thoroughly.
6. Using screenshots instead of real-time walkthrough/demonstration.
7. Reading from presentation slides or script without looking at the camera. While demonstrating,
the presenter should engage the audience.
8. The presentation slides should ideally have only short bullet points, which are expanded on by the
presenter.

CSI1101, Video Presentation PAGE 4

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy