代写WM9PG-15 Cloud & Virtualisation Security代写留学生Matlab语言程序

Module title & code

WM9PG-15 Cloud & Virtualisation Security

Assessment type

Coursework [MAIN]

Weighting of mark

100%

Assignment brief

At the end of this document

Word count

The word count is 3000 words. +10% will be allowed on this before a five mark penalty is applied.

The word count does not include tables, however, you must use tables carefully. Improper use of tables, e.g. as an opportunity to consume more words will be penalised.

The word count does not include references, or appendices. Although appendices are allowed, these will not be marked and only referred to add context.

Module learning outcomes (numbered)

1. Analyse the security relationships within a virtualised ecosystem between a virtualised container and its sibling containers

2. Analyse the security relationships within a virtualised ecosystem between a virtualised container and the underlying host

3. Evaluate the extent to which a virtualised container ecosystem satisfies its desired security properties

4. Configure a virtualised container ecosystem to achieve the desired security properties from the perspective of both the container and the underlying host.

Learning outcomes assessed in this assessment (numbered)

1, 2, 3, 4

Marking guidelines

Marking Guidelines

The following criteria and weighting will be applied in the marking, as shown in the table below.

Criteria

Mark

Testcase interactions and verification (Task 1, 5)

20%

Reduction of the attack surfaces of the images. (Task 2)

30%

Deployed Hardened Images (Tasks 3,4) and presentation of working deployment

40%

Report Presentation and Structure:

· Report’s logical and well-defined structure

· Clear and high-quality figures/screenshots

· Good writing without grammar or spelling issues

10%

TOTAL MARKS

100%

Pass band marks
Marks in pass band will be awarded for correctly delivering against all of the following:

· Satisfying all the file name constraints and internal structural requirements of all the deliverables.

· Partial reduction of the attack surfaces of the images, supported by clear narrative in the pdf / comments in scripts of the reasoning associated with trying to reduce the attack surface.

· Somewhat restrictive though overly permissive security policies supported by clear narrative in the pdf / comments in scripts, of the reasoning associated with the development of the security policies.

· Somewhat restrictive though overly permissive runtime environment supported by clear narrative in the pdf / comments in scripts of the reasoning associated with trying to establish a secure runtime container ecosystem.

· A functional though somewhat insecure application that can be run at the demo supported by clear narrative in the pdf / comments in scripts of understanding of the shortcomings of the submission.

Merit band Marks

Once all the requirements of the pass band are achieved, then marks in the merit band will be awarded for additionally satisfying all of the following:

· substantial reduction of the attack surfaces of at least one image, supported by clear narrative in the pdf / comments in scripts of the reasoning associated with reducing the attack surface. Other images partially reduced, as the pass band.

· tight security policies with suitably restrictive runtime environment for at least one container supported by clear narrative in the pdf / comments in scripts of the reasoning associated with the development of the security policies and secure runtime container ecosystem. Other containers somewhat restricted as the pass band.

· robust treatment of persistence, a functional modestly secure application that can be run at the demo.

Distinction band marks

· Once all the requirements of the merit band are achieved, then marks in the distinction band will be awarded for additionally satisfying all of the following:

· Complete reduction of the attack surfaces of the images, supported by clear narrative in the pdf / comments in scripts.

· Tight security policies with suitably restrictive runtime environment of all containers s supported by clear narrative in the pdf / comments in scripts.

· Deep insight and associated application to the problem at hand, that goes beyond the material taught in the module.

· Robust, clean, well structured, well- commented build scripts that could be safely passed to a third party to maintain and / or further develop.

· A functional, secure, robust application that can be run at the demo.

Please also see marking scale.

Criteria (LO)

80+

70-79

60-69

50-59

40-49

30-39

<30

Analyse the security relationships within a virtualised ecosystem between a virtualised container and its sibling containers

Assessed in Task: 1

Exceptional work of the highest quality, demonstrating excellent knowledge and understanding, analysis, organisation, accuracy, relevance, presentation, and appropriate skills in the analysis of the security relationships. The work may achieve or be close to publishable standard

Work of original and exceptional quality in the analysis of the security relationships, which in the examiners’ judgement merits special recognition by the award of the highest possible mark

High-quality work demonstrating excellent knowledge and understanding, analysis, organisation, accuracy, relevance, presentation and appropriate skills in the analysis of the security relationships. Work which may extend existing debates or interpretations.

Competent work demonstrating good knowledge and understanding, analysis, organisation, accuracy, relevance, presentation and appropriate skills in the analysis of the security relationships.

Work of limited quality, demonstrating some relevant knowledge and understanding in the analysis of the security relationships.

Work does not meet standards required for the appropriate stage of a Masters degree. Evidence of study and demonstrates some knowledge and some basic understanding of relevant concepts and techniques, but subject to significant omissions and errors

Work of no merit OR Absent, work not submitted, penalty in some misconduct cases

Analyse the security relationships within a virtualised ecosystem between a virtualised container and the underlying host

Assessed in Task: 4

Exceptional work of the highest quality, demonstrating excellent knowledge and understanding, analysis, organisation, accuracy, relevance, presentation, and appropriate skills in the the analysis of the security relationships. The work may achieve or be close to publishable standard

Work of original and exceptional quality in the analysis of the security relationships, which in the examiners’ judgement merits special recognition by the award of the highest possible mark

High-quality work demonstrating excellent knowledge and understanding, analysis, organisation, accuracy, relevance, presentation and appropriate skills in the analysis of the security relationships. Work which may extend existing debates or interpretations.

Competent work demonstrating good knowledge and understanding, analysis, organisation, accuracy, relevance, presentation and appropriate skills in the analysis of the security relationships.

Work of limited quality, demonstrating some relevant knowledge and understanding in the analysis of the security relationships.

Work does not meet standards required for the appropriate stage of a Masters degree. Evidence of study and demonstrates some knowledge and some basic understanding of relevant concepts and techniques, but subject to significant omissions and errors

Work of no merit OR Absent, work not submitted, penalty in some misconduct cases

Evaluate the extent to which a virtualised container ecosystem satisfies its desired security properties

Assessed in Task: 5

Exceptional work of the highest quality, demonstrating excellent knowledge and understanding, analysis, organisation, accuracy, relevance, presentation, and appropriate skills in the satisfying the desired security properties. The work may achieve or be close to publishable standard

Work of original and exceptional quality in satisfying the desired security properties, which in the examiners’ judgement merits special recognition by the award of the highest possible mark

High-quality work demonstrating excellent knowledge and understanding, analysis, organisation, accuracy, relevance, presentation and appropriate skills in satisfying the desired security properties. Work which may extend existing debates or interpretations.

Competent work demonstrating good knowledge and understanding, analysis, organisation, accuracy, relevance, presentation and appropriate skills in satisfying the desired security properties.

Work of limited quality, demonstrating some relevant knowledge and understanding in satisfying the desired security properties.

Work does not meet standards required for the appropriate stage of a Masters degree. Evidence of study and demonstrates some knowledge and some basic understanding of relevant concepts and techniques, but subject to significant omissions and errors

Work of no merit OR Absent, work not submitted, penalty in some misconduct cases

Configure a virtualised container ecosystem to achieve the desired security properties from the perspective of both the container and the underlying host.

Assessed in Tasks: 2, 3

Exceptional work of the highest quality, demonstrating excellent knowledge and understanding, analysis, organisation, accuracy, relevance, presentation, and appropriate skills in the delivery of a secure configuration. The work may achieve or be close to publishable standard

Work of original and exceptional quality in the delivery of a secure configuration, which in the examiners’ judgement merits special recognition by the award of the highest possible mark

High-quality work demonstrating excellent knowledge and understanding, analysis, organisation, accuracy, relevance, presentation and appropriate skills in the delivery of a secure configuration. Work which may extend existing debates or interpretations.

Competent work demonstrating good knowledge and understanding, analysis, organisation, accuracy, relevance, presentation and appropriate skills in the delivery of a secure configuration.

Work of limited quality, demonstrating some relevant knowledge and understanding in the delivery of a secure configuration.

Work does not meet standards required for the appropriate stage of a Masters degree. Evidence of study and demonstrates some knowledge and some basic understanding of relevant concepts and techniques, but subject to significant omissions and errors

Work of no merit OR Absent, work not submitted, penalty in some misconduct cases

1 Assessment brief

Overall Context:

As a cloud and virtualization security expert, you're responsible for assessing and strengthening the security of a prototype containerized cloud system. You have been provided with prototype that is intended for deployment within the company's existing Docker production setup. The development team has expertise in system development but lacks experience in virtualization security. Your task is to create a detailed report presenting your evaluation results and security recommendations for the client, a company that develops cloud-based solutions.

This report will:

• Provide recommendations on how they could improve the security of a system, using a technical case study of their work as an example.

TASKS:

1. Define up to 10 test cases to verify the functionality and security of the containers and application.

2. Refine supplied Dockerfiles and any custom files, excluding those from official repositories, to create hardened images capable of running the application.

3. Generate hardened images from the refined Dockerfiles.

4. Determine runtime commands for running containers from the images on the production team's chosen system, ensuring maximum security. Consider commands for:

a. one-time configuration

b. running the container each time

5. Verify the application's correct functionality against the test cases when applying the proposed runtime security to the containers.

Deliverables:

Report:

Via tabula, a succinct pdf report named csvs.pdf containing the following five sections:

· Section 1 your set of testcase interactions.

· Section 2 containing your reasoning and evidence for your submission against tasks 2 & 3 (image hardening & image generation).

· Section 3 containing your reasoning and evidence for your submission against tasks 4 & 5 (runtime hardening & verification).

· References.

Pages must be numbered in the page footer. In sections 2, 3 you should illustrate significant aspects of the process that you followed. Include significant examples that demonstrate your ability to think and act coherently. It is not sufficient merely to produce the finished item; reasoning about the process followed is essential.

B, Compressed Archive

Via Tabula, a compressed archive named csvs.zip containing:

· the build directories and additional scripts related to the image build process associated with Tasks 1 & 2.

· the various files require to deploy the containers securely in the runtime environment associated with Task 3.

· Video file or video file link for your presentation

2 Special instructions

Do not include the Assignment Guidance and Front Sheet in the submission.

Spelling/grammar. Ensure that you spell check the submission, use a grammar checker and ensure that you proofread your work prior to submission. Spell/grammar checkers must be set to UK English, do not use ‘Americanised’ spellings.

References. References are to be included at the end of the report using the Harvard referencing system. You may also include a bibliography. Each reference must be connected to a citation within the main body of the report.

Do not attempt to hide text within JPEGs, this will be construed as an attempt to mislead the assessor.

Coherence. A poorly worded report will hide excellent content. The narrative should be easy to read, and arguments should be presented coherently and convincingly.

Presentation. At this stage in your studies, there is no excuse for poor presentation. You will not receive marks for presentation; however, your submission will be penalised for poor presentation.

Formatting. All figures and tables must be properly labelled and captioned. All pages must be numbered. Formatting must be consistently applied throughout the submission. Submissions that stray from this guidance may be penalised.




热门主题

课程名

mktg2509 csci 2600 38170 lng302 csse3010 phas3226 77938 arch1162 engn4536/engn6536 acx5903 comp151101 phl245 cse12 comp9312 stat3016/6016 phas0038 comp2140 6qqmb312 xjco3011 rest0005 ematm0051 5qqmn219 lubs5062m eee8155 cege0100 eap033 artd1109 mat246 etc3430 ecmm462 mis102 inft6800 ddes9903 comp6521 comp9517 comp3331/9331 comp4337 comp6008 comp9414 bu.231.790.81 man00150m csb352h math1041 eengm4100 isys1002 08 6057cem mktg3504 mthm036 mtrx1701 mth3241 eeee3086 cmp-7038b cmp-7000a ints4010 econ2151 infs5710 fins5516 fin3309 fins5510 gsoe9340 math2007 math2036 soee5010 mark3088 infs3605 elec9714 comp2271 ma214 comp2211 infs3604 600426 sit254 acct3091 bbt405 msin0116 com107/com113 mark5826 sit120 comp9021 eco2101 eeen40700 cs253 ece3114 ecmm447 chns3000 math377 itd102 comp9444 comp(2041|9044) econ0060 econ7230 mgt001371 ecs-323 cs6250 mgdi60012 mdia2012 comm221001 comm5000 ma1008 engl642 econ241 com333 math367 mis201 nbs-7041x meek16104 econ2003 comm1190 mbas902 comp-1027 dpst1091 comp7315 eppd1033 m06 ee3025 msci231 bb113/bbs1063 fc709 comp3425 comp9417 econ42915 cb9101 math1102e chme0017 fc307 mkt60104 5522usst litr1-uc6201.200 ee1102 cosc2803 math39512 omp9727 int2067/int5051 bsb151 mgt253 fc021 babs2202 mis2002s phya21 18-213 cege0012 mdia1002 math38032 mech5125 07 cisc102 mgx3110 cs240 11175 fin3020s eco3420 ictten622 comp9727 cpt111 de114102d mgm320h5s bafi1019 math21112 efim20036 mn-3503 fins5568 110.807 bcpm000028 info6030 bma0092 bcpm0054 math20212 ce335 cs365 cenv6141 ftec5580 math2010 ec3450 comm1170 ecmt1010 csci-ua.0480-003 econ12-200 ib3960 ectb60h3f cs247—assignment tk3163 ics3u ib3j80 comp20008 comp9334 eppd1063 acct2343 cct109 isys1055/3412 math350-real math2014 eec180 stat141b econ2101 msinm014/msing014/msing014b fit2004 comp643 bu1002 cm2030
联系我们
EMail: 99515681@qq.com
QQ: 99515681
留学生作业帮-留学生的知心伴侣!
工作时间:08:00-21:00
python代写
微信客服:codinghelp
站长地图