Professional Documents
Culture Documents
ITT450_Case study_COVID19.pdf (1)
ITT450_Case study_COVID19.pdf (1)
ITT450_Case study_COVID19.pdf (1)
COVID-19
1) Pick one affected country by COVID -19. Study the spreading methods of COVID -19 in
the selected country and translate it into pseudocode. (20 marks)
2) Find the similarities in destructive impacts between COVID-19 and the logic bomb. (10
marks)
3) List out the target of attacks and identify the characteristics of devices that prone to be
compromised by the attacks. (10 marks)
4) Based on your answers in 2, draft out a guideline to the user to prevent this kind of attack.
(30 Marks)
5) Please suggest protection methods and how to deal with the attacks when compromised.
(30 marks)
Note:
Translation of the The pseudocode of The pseudocode of The pseudocode of The pseudocode of
spreading method to spreading method is spreading method is spreading method is spreading method is
pseudocode thoroughly and very well satisfactorily translated partially translated insufficiently translated
(10 marks) translated
2 Similarities in Thoroughly identified and Satisfactorily identified and Partially identified and Insufficiently identified
destructive impacts explained the similarities in explained the similarities in explained the similarities and explained the
between COVID-19 and destructive impact between destructive impact between in destructive impact similarities in destructive
the logic bomb COVID-19 and logic bomb COVID-19 and logic bomb between COVID-19 and impact between COVID-
(10 marks) – at least 3 similarities – at least 2 similarities logic bomb – at least 1 19 and logic bomb – 1
similarity similarity
3 Target of attacks and Thoroughly identified and Satisfactorily identified and identified and listed the Insufficiently researched
characteristics of listed the target of attacks listed the target of attacks target of attacks and and identified the target
devices that prone to be and characteristics of and characteristics of characteristics of devices of attacks and
compromised by the devices that prone to be devices that prone to be that prone to be characteristics of devices
attacks compromised by the compromised by the compromised by the that prone to be
(10 marks) attacks – at least 3 targets attacks – at least 2 targets attacks – at least 1 target compromised by the
and 3 characteristics and 2 characteristics and 1 characteristic attacks –1 target and 1
characteristic
5 Protection method Thoroughly identified Satisfactorily identified Partially identified and Insufficiently identified
and action taken deal and explained the and explained the explained the and explained the
with the attacks when protection method and protection method and protection method and protection method and
compromised action taken deal with action taken deal with action taken deal with action taken deal with
(30 marks) the attacks when the attacks when the attacks when the attacks when
compromised – at least compromised – at least compromised – at least compromised – at
3 protection methods 2 protection methods 1 protection method least 1 protection
and 3 actions taken and 2 actions taken and 1 action taken method and 1 action
taken
TOTAL