COCS71153 Cyber Operations Coursework 202409
COCS71153 Cyber Operations Coursework 202409
University of Staffordshire, UK
4 Introduction .............................................................................................................. 3
1 Coursework details
• Contact: Mohammad S. Hasan
2 Notes on Plagiarism
• You are expected to explain the concepts in your own words or rephrase and avoid
quotes as quotes will increase Turnitin matches. You are referred to the University’s
regulations on plagiarism available at
http://www.staffs.ac.uk/assets/academic_misconduct_tcm44-26770.pdf
• If the Turnitin system detects plagiarism, it will be reported to the school and
appropriate actions will be taken.
3 Submission requirements
1. The deadline is published on Blackboard.
2. Your report
f. You will be allowed to upload ONLY once to the Turnitin system. Therefore,
please make sure that your coursework is free of plagiarism and you are
uploading the correct version.
4 Introduction
You have applied for a job as a Cybersecurity Operations Analyst. You have just passed the
first stage of the interview. The second stage will test your research and network packet
analysis skills based on a report using Wireshark as explained below. Your report should
have the following sections.
1. Title page
2. Clear heading for each section
3. Citations and references
a. Presence of proper citation in the report body and references at the end of
the report.
using to examine the file is the Wireshark network protocol analyser which is a free tool and
available from https://www.wireshark.org/. See section 7 for further details and marking
criteria.
7 Marking criteria
Part
Task # # Description Mark
Man-in-the-middle (MITM) attack: explain the attack and possible
1A control mechanisms. 10
Denial-of-Service (DoS) attack: explain the attack and possible
2A control mechanisms. 10
SQL injection attack: explain the attack and possible control
3A mechanisms. 10
Zero-day exploit attack: explain the attack and possible control
4A mechanisms. 10
DNS tunneling attack: explain the attack and possible control
5A mechanisms. 10