LO1: Examine principles of cyber security within organisations and society

 Assignment Brief

Session: January 2026    

Programme title

NCFE Level 4 Diploma: Cyber Security Engineer (603/7748/3)

Unit number and title

1

Principles of cyber security (Y/651/0932)

Assignment number & title

1- Principles of cyber security

 Unit Credit: 20

Issue Date

19-Jan-2026

Final assignment submission deadline

06-Apr-2026

Late submission deadline

The learners are required to follow the strict deadline set by the

College for submissions of assignments in accordance with the NCFE level 4 submission guidelines and College policy on submissions. They should also refer to Merit and Distinction criteria that require evidence of meeting agreed timelines and ability to plan and organise time effectively without which the learner may not expect to receive a higher grade.

13-Apr-2026

Resubmission deadline

11-May-2026

Feedback

Formative feedback will be available in class during the semester after 5 weeks. Final feedback will be available within 2 - 3 weeks of the assignment submission date.

Signature (IV of the brief) *

 MAI

Date: 05-Jan-2026

Caspian School of Academics

NCFE Level 4 Diploma: Cyber Security Engineer (603/7748/3)

Unit 01 Principles of cyber security (L4) (Y/651/0932)

Session: Jan 2026

Coursework

Recommended words 3000 excluding PPT

You are strongly advised to read “Preparation guidelines of the Coursework Document” before answering your assignment. 

 General

Guidelines 

  • You should write the assignment in your own words. You are required to cite the source of any quotes or illustrations you utilise.
  • At the conclusion of your document, include a list of references. You must list all of your informational sources.
  • Ensure that the English you use is easily understood and that your work is presented clearly.
  • Use a word processor`s "spell-checker" whenever possible.
 

Unit number, title and learning outcomes (LOs)

Unit 1: Principles of cyber security (Y/651/0932)

LO1: Examine principles of cyber security within organisations and society

LO2: Explore factors that contribute to security functionality in cyber security

LO3: Apply programming and scripting languages to design or end user requirements

Assignment title

Principles of cyber security

Scenario

Background

Apex University is a private higher education institution with over 10,000 students and staff. The university relies heavily on online platforms such as virtual learning environments (VLEs), cloud-based storage, and email services. Recently, the university faced two major incidents: a ransomware attack that temporarily blocked access to the VLE, and a data breach that exposed personal details of students applying for scholarships. 

These incidents highlighted the urgent need for stronger cyber security to protect sensitive data (student records, financial information, research data), comply with GDPR, and maintain institutional reputation. Apex University appointed Zenith Solutions to conduct a review of current practices, strengthen its security framework, and implement secure coding measures in its new student portal. 

Tasks

 Task 1: Examine Principles of Cyber Security within Organisations and Society (LO1)

Scenario Context: disrupted online classes for several days. At the same time, a student records breach exposed names, addresses, and financial details of scholarship applicants. The university wants to rebuild student and staff trust and ensure compliance with GDPR and other education data protection laws.

Requirements:

  1. Describe the role of cyber security principles (Confidentiality, Integrity, Availability, Identification, Authentication, Authorisation, Accountability) within Apex University and society. (P1)

For higher grade:

  1. Explain how these principles are applied within Apex University (e.g., encrypting student records, using MFA, logging user actions) and their importance to wider society (maintaining trust in digital education). (M1)
  1. Justify the use of specific principles and technology components (e.g., AES encryption, SIEM, RBAC) by showing how they address Apex’s risks and benefit both the organisation and the public. (D1)

Submission Guidelines: Prepare a report (approximately 1,000 words) addressing the requirements outlined above. Use real-world examples and case studies to support your analysis.

Task 1 structure could be around:

✔ Introduction

✔ Explanation of principles

✔ Application to Apex

✔ Justification of technologies

✔ Conclusion

✔ References

Task 2: Explore Factors That Contribute to Security Functionality in Cyber Security (LO2)

Scenario Context: Apex currently has outdated antivirus, limited intrusion detection, and weak email filters. A phishing campaign recently compromised staff account. The university wants stronger security systems and assurance methods.

Requirements:

  1. Outline the impact of Apex’s current security technology components (firewalls, IDS/IPS, endpoint protection). (P2)
  1. Describe security assurance methods Apex can apply (penetration testing, vulnerability scans, GDPR audits). (P3)

For higher grade:

  1. Explain the purpose and application of frameworks (e.g., NIST Cybersecurity Framework, COBIT) for designing better security. (M2)
  1. Justify why these components and frameworks are essential for Apex’s needs and their societal value (e.g., protecting trust in online learning and personal data security). (D1)

Submission Guidelines: Create a presentation (8-10 slides around 500 words)  in .pptx format that outlines your findings and recommendations. Include diagrams, such as network topology and data flow diagrams, to illustrate your points. Present your work in a clear and professional manner suitable for an executive audience. Diagrams such as network topology or data flow may be included within the 8–10 slides.

Task 3: Apply Programming and Scripting Languages to Design or End User Requirements (LO3)

Scenario Context: Apex is launching a new Student Portal for grades, tuition payments, and resources. The IT manager wants secure authentication and access control built into the system.

Requirements:

  1. Produce a Python script or in any other programming language that meets Apex’s requirements (e.g., password hashing, MFA, RBAC). (P4)
  1. Explain the variations you considered when producing clean and maintainable code (e.g., commenting, modular design, avoiding hard-coded values). (P5)

For higher grade:

  1. Assess the suitability of the code produced (functionality, efficiency, and security). (M3)
  1. Evaluate the suitability of the code in terms of end-user requirements, and recommend improvements for security, scalability, and maintainability. (D2)

Note for Task 3.1:

Here the learner has flexibility in how they approach the coding task. They could (Anyone need to be implemented):

  • Implement password hashing using a suitable method (e.g., bcrypt, Argon2, or PBKDF2) to avoid storing plain-text passwords.
  • Add a simple Multi-Factor Authentication (MFA) step, such as generating a one-time code (OTP) sent by email, SMS, or displayed in the terminal.
  • Design Role-Based Access Control (RBAC), ensuring different user types (e.g., student, lecturer, admin) have different permissions.
  • Create a session management system (tokens or session IDs) so logged-in users keep their access until logout.
  • Build a logging/audit system to record failed and successful login attempts for accountability.
  • Add encryption of sensitive files (e.g., encrypting student results before storage).
  • Integrate with a small database (SQLite/MySQL) instead of storing credentials in plain variables.
  • Package the solution as a simple web app (Flask/Django) instead of just a command-line tool.
  • Add error handling for wrong passwords, expired OTPs, or unauthorised access attempts.

Some may build a simple command-line login system, while others could extend it into a web application or API-based service both approaches are valid, as long as the solution demonstrates functionality and has some basic level of security.

Submission Guidelines: Submit the program code or script along with a reflective commentary (approximately 1500 words) that explains your approach to clean coding and assesses the suitability of the code. Additionally, include a section with recommendations for future improvements.

Evidence Requirements

You must provide a written report covering the tasks indicated above. The work will be submitted to Turnitin for academic integrity check.

Additional Guidelines:

  1. All submissions should be properly referenced, and any external sources should be cited in Harvard’s Referencing format.
  2. Use professional language and ensure clarity in your explanations.
  3. Diagrams, charts, and code snippets should be well-labelled and explained within the context of your discussion.
  4. Font size must be within the range of 10 point to 14 points including the headings and body text (preferred font size is 11) in Arial. Standard and commonly used type face, such as Arial and Times New Roman, should be used.
  5. Material taken from external sources must be properly referred and cited within the text using Harvard system 
  6. Submit all documents through the designated submission portal by the given deadline. 

Appendices 

Note: You should attach all the supporting documents as a separate file in the appendix section of your assignment.

Relevant Information

To gain a Pass in a NCFE Level 4 Diploma: Cyber Security Engineer modules, you must meet ALL the Pass criteria; to gain a Merit, you must meet ALL the Merit and Pass criteria; and to gain a Distinction, you must meet ALL the Distinction, Merit and Pass criteria.

Plagiarism and Collusion

Any plagiarism or collusion will be taken very seriously in accordance with the policies of the college. Below are the definitions and parameters of plagiarism and collaboration in this context:
Presenting someone else`s work as your own is plagiarism. It involves turning in collaborative homework as a solo project and copying information verbatim from books or the Internet without citing the source.
Plagiarism refers to the practice of taking another person`s assignments and turning them in as your own. If plagiarism or collusion is suspected, it will be investigated and dealt with in accordance with college policy (please refer to the student handbook for further information on plagiarism and collusion).

AI Use Policy for This Assignment

To support academic integrity, learners must follow the guidance below regarding the use of Artificial Intelligence (AI), including tools such as ChatGPT, Copilot, Bard, and other generative AI systems.

Permitted Use

Students may use AI tools for:

  • Researching background concepts
  • Generating ideas during early planning
  • Checking spelling, grammar, structure, and formatting
  • Clarifying understanding of terminology
  • Practising or testing knowledge
  • Creating datasets only if anonymised and checked for accuracy
  • Producing non-assessed drafts for inspiration

Not Permitted

Students must not use AI tools to:

  • Generate full answers, explanations, or solutions that are directly submitted as their own
  • Write entire sections of the assignment
  • Produce analysis or evaluation without meaningful human input
  • Create polished final content that the student only copies and pastes
  • Bypass learning activities by submitting AI-generated work
  • Fabricate citations, references, or invented facts

Student Responsibilities

Learners must:

  • Ensure all submitted work is their own, original, and written in their own words
  • If AI is used in any way, this must be declared in your references.
  • Clearly reference any AI assistance following the college’s academic integrity policy
  • Keep drafts to demonstrate development of work if requested
  • Verify all information for accuracy and relevance
  • Use AI as a support tool, not a writing substitute

Consequences of Misuse

Improper use of AI may be treated as academic misconduct and may result in:

  • Work being rejected
  • No grade being awarded
  • Requirement to resubmit
  • Further disciplinary action in serious cases

Submission

  1. Initial submission of coursework to the tutors is compulsory in each unit of the course.
  2. The student must check their assignments on Caspian School of Academics (CSA) VLE with plagiarism software Turnitin to make sure the similarity index for their assignment stays within the College approved level. A student can check the similarity index of their assignment up to five times in the Draft Assignment submission point located in the home page of the CSA VLE.
  3. All Final coursework must be submitted to the Final submission point into the Unit (not to the Tutor). The student would be allowed to submit only once and that is the final submission.
  4. Any computer files generated such as program code (software), graphic files that form part of the coursework must be submitted as an attachment to the assignment with all documentation.
  5. Any portfolio for a Unit must be submitted as an attachment in the assignment
  6. You must use an Exceptional Extenuating Circumstances (EEC) form, which is accessible at the Examination Office and CSA VLE, to request an extension if you require one for a legitimate cause. Do not request a coursework extension from the tutors as they do not possess the authority to extend the deadlines for coursework. The completed form must be turned into the Examination Office with supporting documentation, such as a medical certificate if you are ill.
  7. Late entries will be accepted and graded in accordance with college policy. Please be aware that late submissions might not receive Merit and Distinction grades.
  8. All late coursework must be submitted to the Late submission point into the unit (not to the Tutor) in the CSA VLE. A student is allowed to submit only once and that is also treated as the final submission.
  9. If you fail in the Final or Late submission, you can resubmit in the Resubmission window.

Extension and Late Submission

Submission deadlines

Formative feedback

After Week 5

Final Submission

06-Apr-2026

Submit to: Online to the CSA VLE only

Explanation of Terms:

Analyse

Break the subject or complex situations into separate parts and examine
each part in detail. Identify the main issues and show how the main ideas
are related to practice and why they are important. Reference to current
research or theory may support the analysis.

Critically analyse

This is a development of ‘analyse’ which explores limitations as well as
positive aspects of the main ideas in order to form a reasoned opinion.

Clarify

Explain the information in a clear, concise way showing depth of
understanding.

Classify

Organise accurately according to specific criteria.

Collate

Collect and present information arranged in sequence or logical order that is
suitable for purpose.

Compare

Examine the subjects in detail, consider and contrast similarities and
differences.

Critically compare

This is a development of ‘compare’ where the learner considers and
contrasts the positive aspects and limitations of the subject.

Consider

Think carefully and write about a problem, action or decision showing how
views and opinions have been developed.

Demonstrate

Practical application of an element/content to show that you understand
theories/concepts in a practical sense.

Describe

Provide a broad range of detailed information about the subject or item in a
logical way.

Discuss

Write a detailed account that includes contrasting perspectives.

Draw conclusions
(which...)

Make a final decision or judgement based on reasons.

Evaluate

Examine strengths and weaknesses, arguments for and against and/or
similarities and differences. Judge the evidence from the different
perspectives and make a valid conclusion or reasoned judgement. Apply
current research or theories to support the evaluation.

Critically evaluate

This is a development of ‘evaluate’ where the learner debates the validity of
claims from the opposing views and produces a convincing argument to
support the conclusion or judgement.

Examine

Look closely at something. Think and write about the detail, and question it
where appropriate.

Explain

Apply reasoning to account for how something is or to show understanding
of underpinning concepts. Responses could include examples to support
these reasons.

Explore

Consider an idea or topic broadly, searching out related and/or particularly
relevant, interesting or debatable points.

Identify

Apply an in-depth knowledge to give the main points accurately (a
description may also be necessary to gain higher marks when using
compensatory marking).

Investigate

To inquire into (a situation or problem) to explore solutions.

Justify

Give a detailed explanation of the reasons for actions or decisions.

Perform

Present/enact/demonstrate practically.

Reflect

Learners should consider their actions, experiences or learning and the
implications of these in order to suggest significant developments for
practice and professional development.

Review and revise

Look back over the subject and make corrections or changes based on
additional knowledge or experience.

Summarise

Give the main ideas or facts in a concise way to develop key issues.

100% Plagiarism Free & Custom Written, Tailored to your instructions