Cybersecurity Assignment



Descriptor Object Location(s) Asset(s) Exploit(s) Mitigation(s) Action

Information

This assignment requires a bespoke approach for timely, fair and consistent marking due to the very large amount of fine-grained individually-weighted responses and large classes.

If you have any feedback, suggestions or spot any bugs, please let me know via email or drop into my office hour.

@cwkx