Examine complex security problems and propose innovative solutions, incorporating scientific approaches, theoretical knowledge and relevant practical experiences taken from a variety of sources.

Critical Inquiry 2.1 Engage in effective critical inquiry through a process of problem definition, evidence gathering, and evaluation.

2.1.1. Definition – identify the problem and associated constraints; set the parameters of the inquiry.

2.1.2. Evidence – identify and gather sufficient relevant information of appropriate quality.

2.1.3. Evaluation – assess defined problem in the light of available evidence.

2.1.4. Discernment – distinguish fact from opinion

*this is for email forensics*

2.2 Examine complex security problems and propose innovative solutions, incorporating scientific approaches, theoretical knowledge and relevant practical experiences taken from a variety of sources.

2.2.1. Definition – identifying the overall problem and associated constraints; set the parameters of the inquiry.

2.2.2. Evidence – identify and gather sufficient relevant information of appropriate quality.

2.2.3. Innovation – recommend bespoke solutions.

2.2.4. Justification – explain pedigree, suitability and shortcomings of proposed solution.

SAMPLE ASSIGNMENT
Powered by WordPress