Examine complex security problems and propose innovative solutions, incorporating scientific approaches, theoretical knowledge and relevant practical experiences taken from a variety of sources.
Critical Inquiry 2.1 Engage in effective critical inquiry through a process of problem definition, evidence gathering, and evaluation.
2.1.1. Definition – identify the problem and associated constraints; set the parameters of the inquiry.
2.1.2. Evidence – identify and gather sufficient relevant information of appropriate quality.
2.1.3. Evaluation – assess defined problem in the light of available evidence.
2.1.4. Discernment – distinguish fact from opinion
*this is for email forensics*
2.2 Examine complex security problems and propose innovative solutions, incorporating scientific approaches, theoretical knowledge and relevant practical experiences taken from a variety of sources.
2.2.1. Definition – identifying the overall problem and associated constraints; set the parameters of the inquiry.
2.2.2. Evidence – identify and gather sufficient relevant information of appropriate quality.
2.2.3. Innovation – recommend bespoke solutions.
2.2.4. Justification – explain pedigree, suitability and shortcomings of proposed solution.
SAMPLE ASSIGNMENT