Posted: January 1st, 2014
|
Report Section
|
Content guidelines
|
Length guidelines*
|
Critical review of 2 methods
|
A critical review of the 2 chosen security protocol verification methods i.e. explain how they work, and explain their strengths and weaknesses, etc.
|
1000 words*
|
Comparison, selection and justification of preferred method.
|
Compare the 2 methods and select and justify the selection of the one of the methods as your preferred method.
|
500 words*
|
Appendix A
|
You could place in an appendix any extended example of the use of any of the methods investigated or other concrete evidence that you might refer to in the body of your report.
|
Report section.
|
%
|
Critical appraisal of security protocol verification methods considered
|
75%
|
Comparison. selection and justification of preferred method
|
25%
|
Report section.
|
Marking criteria
Note – The criteria below are not individually weighted within a section. Marks will be attributed by considering all relevant assessment evaluation criteria. Some criteria may be inapplicable depending upon the extent to which certain other criteria have been met.
|
Critical appraisal of security protocol verification methods considered
|
i) the nature and reliability of the evidence used
ii) the extent to which assertions are the conclu
sion to a valid argument based on relevant and cogent evidence. iii) the extent to which evaluative criteria used/chosen as the basis of criticism/evaluation support the achievement of security protocol goals.
iv) the extent to which the analysis of the methods explains their properties/behaviour
to the characteristics/properties of the methods
|
Comparison, selection and justification of preferred method.
|
i) the nature and reliability of the evidence used
ii) the extent to which assertions are the conclusion to a valid argument based on relevant and cogent evidence.
iii) the extent to which evaluative criteria chosen as the basis of comparison, selection and justification support the achievement of security protocol goals.
iv) the extent to which comparisons are valid deductions from the application of evaluative criteria
v) the extent to which the method selected fulfils the criteria used for their justification
|
Place an order in 3 easy steps. Takes less than 5 mins.