Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 12
Network Security Page 1 of 12
Level 2 Asia Pacific University of Technology and Innovation
In-course Assignment Information Sheet This assignment consists of TWO (2) sections: Section A and Section B. Section A is individual that contributes 30% of total 100% while Section B is the remaining 70%, consisting of 60% individual and 40% group. Section A 1. Learning Outcomes
This individual assignment carries 30% of your total module assessment marks. At the end of this assignment, student would be able to apply programming concepts with regards to Network Security
2. Assignment Questions
You are required to conduct research, design and develop your assignment.
3. Project Title Each group is to propose an Assignment Title (1 printed page) and submit it to the lecturer for approval before starting your work. Deadline for Project Title approval is on 9 th week. Students are expected to do the project independently with minimal supervision. Each student should have a unique title. The requirements of a title are that it should involve some network security research components.
Some possible areas are (you can propose your own title or choose one below): 1. IDS/IPS: Challenges and Deployment 2. HotSpot Weaknesses 3. Rootkits 4. SIP and Secure VoIP 5. Scanning & Security Auditing 6. Smartphone Security 7. Web Security and SSL Any other suitable title can also be accepted.
Guidelines for the Report:
Document the results of your work in a professional and systematic manner, in the form of a computerized report. One (1) softcopy and hardcopy of your documentation is to be submitted.
Your completed documentation should meet the following requirements (if applicable):
1. Marking Table 2. Introduction 3. Chapters / sections 4. Recommendations 5. Documentation of the configured device(s), if there is any 6. Conclusion 7. Appendices 8. Bibliography or References Network Security Page 2 of 12
Level 2 Asia Pacific University of Technology and Innovation In your document the report is to be written in a professional manner, paying due regard to the following aspects:
The report is to be written in the 3 rd person. The report should have a consistent layout and be divided into enumerated sections, sub-sections, sub-sub sections etc. The report should be fully referenced using the University standard. Your report must be typed using Microsoft Word with Times New Roman font and size 12. Expected length is 1,000 words for 1 topic (excluding diagrams, appendixes and references). You need use to include a word count at the end of the report and it should be in 1.5 spaces. Submission of reports that are unprofessional in its outlook (dirty, disorganised, inconsistent look, varying coloured paper and size) will not fare well when marks are allocated. Ensure that the report is printed on standard A4 (210 X 297 mm) sized paper. The report should have a one (1) margin all around the page as illustrated below:
1 inch The Typed Text 1 inch 1
i n c h 1
i n c h 1
i n c h 1
i n c h 1 inch 1 inch Network Security Page 3 of 12
Level 2 Asia Pacific University of Technology and Innovation Every report must have a front cover. A transparent plastic sheet can be placed in front of the report to protect the front cover. The front cover should have the following details:
o Name o Intake code. o Subject. o Project Title. o Date Assigned (the date the report was handed out). o Date Completed (the date the report is due to be handed in). Submission requirements A CD containing an electronic version of the document. The total word count of the main body of the document (excluding title & contents pages) is to be in the region of 3000 words. Marking Table Please note that during the preparation of your assignment, you must includethe following marking table. Ensure you fill in the details of your team members full names and their respective student IDs. The marking table must be placed on a single page, located as either the second or third page of your final assignment documentation. Each team members name must only appear once. The schedule for the presentation will be announced in due time. Assessment Criteria: Documentation 10% Referencing 10% Research and Investigation 10% Diagrams & Figures 10% Critical Thinking and Applicability 20% Analytical 20% Explanation 10% Presentation 10%
Network Security Page 4 of 12
Level 2 Asia Pacific University of Technology and Innovation
Individual (100%) Names and Intakes D o c u m e n t a t i o n
( 1 0 )
R e f e r e n c i n g
( 1 0 )
R e s e a r c h
a n d
I n v e s t i g a t i o n
( 1 0 )
D i a g r a m / F i g u r e s
( 1 0 )
C r i t i c a l
T h i n k i n g
a n d
A p p l i c a b i l i t y
( 2 0 )
A n a l y t i c a l
( 2 0 )
E x p l a n a t i o n
( 1 0 )
P r e s e n t a t i o n s
( 1 0 )
G r a n d
T o t a l
( 1 0 0 )
1 2 3 4 Network Security Page 5 of 12
Level 2 Asia Pacific University of Technology and Innovation
Section B
Instructions: This group assignment carries 70% of your total module assessment marks, with 60% of the total contributed by an individual component. A group consist of maximum 4 students. (Minimum 2 students). The total word count of the report should not exceed 5000 words. No marks will be awarded for the entire assignment if any part of it is found to be copied directly from printed materials or from another group. All submissions should be made on or before the due date. Any late submissions after the deadline will not be entertained. Zero (0) mark will be awarded for late submission, unless extenuating circumstances are upheld. Scenario: Company A is food manufacturer based in Kuala Lumpur. Its office consists of 3 departments: Sales, Engineering and Finance. It has a Sales office in Singapore located 350km away from Kuala Lumpur and hosts 50 employees. The following topology illustrates the network architecture and topology of the Kuala Lumpur office of Company-A and Singapore Company-B. The Kuala Lumpur office has simple network architecture. Clients workstations are connected to an access switch, then connected to a distributed switch and then to the routers inside interface. The firewalls outside interface connects directly to the internet service provider (ISP) router. The ISP completely manages this router and the company-A has no control over it. A third interface on the firewall hosts a demilitarised zone (DMZ) hosting several servers. These servers include web, email and FTP applications. The goal is to protect the internal and DMZ hosts from external threats. As a network security specialist, you are required to provide a security solution for company-A and company-B. There are some requirements in the above scenario that must be considered in this security design. 1. Client workstations (sales, engineering and finance) must be able to access the web server at the DMZ over HTTP and HTTPS. The web server should be reachable from the external clients over HTTP and HTTPS only. (Solution and configuration) 2. Clients should also be able to put and get files via FTP to the same server. The company requires implementing FTP with user and password is essential for each transaction. (Solution and configuration.) 3. Engineering and sales workstations must be able to access the Internet (to reach company B) over HTTP and HTTPS with DNS. No other protocol access is allowed to the Internet. (Solution and configuration.) 4. Client workstations must be able to check their e-mail on the e-mail server at the DMZ. (Solution and configuration.) Network Security Page 6 of 12
Level 2 Asia Pacific University of Technology and Innovation 5. The e-mail server should be able to receive e-mail from external hosts over the simple mail transfer protocol (SMTP). (Solution.) 6. No client from sales, engineering and finance department is able to access clients in the other departments. (Solution and configuration.) 7. Layer two securities is a requirement in the company-A LAN. (Solution and configuration.) 8. Bastion host works as an application proxy. You are required to explain the solution in detail. (Configuration is not required.) 9. Connectivity between company-A in Kuala Lumpur and company-B in Singapore is a requirement. What is the best solution? Elaborate on the solution. (Configuration is not required). 10. Data transmitted over the network must be kept disguised and only intended recipient can read it. Hackers are unable to understand the content even they are able to wiretap the communication. (Solution on the techniques, no configuration is required) 11. The company requires implementing intrusion detection systems (IDS). (Configuration is required.) 12. Implement VPN between Singapore and Kuala Lumpur. (Configuration is required.) 13. Implement SSL encryption between Singapore and Kuala Lumpur. (Solution)
Note: The solution in the parenthesis means that, you have to recommend, what should be done in order to fulfil the companys requirement. In this case, you do not have to configure any of the device(s) in the topology. The configuration in the parenthesis means that, in addition to the solution that you provide, you have to implement it by configuring the appropriate device with commands and setups. Network Security Page 7 of 12
Level 2 Asia Pacific University of Technology and Innovation
Network Security Page 8 of 12
Level 2 Asia Pacific University of Technology and Innovation Guidelines for the Report:
Document the results of your work in a professional and systematic manner, in the form of a computerized report. One (1) softcopy and hardcopy of your documentation is to be submitted.
Your completed documentation should meet the following requirements:
1. Table of contents for every detailed chapter/section. 2. Marking Table 3. Gantt Chart 4. Detailed Work Breakdown Structure 5. Introduction 6. Chapters / sections 7. Recommendations 8. Network configurations 9. Documentation of the configured device(s) 10. Conclusion 11. Contribution of each member 12. Appendices 13. Bibliography or References In your document the report is to be written in a professional manner, paying due regard to the following aspects:
The report is to be written in the 3 rd person. The report should have a consistent layout and be divided into enumerated sections, sub-sections, sub-sub sections etc. The report should be fully referenced using the University standard. Your report must be typed using Microsoft Word with Times New Roman font and size 12. Expected length is 5,000 words (excluding diagrams, appendixes and references). You need use to include a word count at the end of the report and it should be in 1.5 spaces. Submission of reports that are unprofessional in its outlook (dirty, disorganised, inconsistent look, varying coloured paper and size) will not fare well when marks are allocated. Ensure that the report is printed on standard A4 (210 X 297 mm) sized paper. The report should have a one (1) margin all around the page as illustrated below:
1 inch The Typed Text 1 inch 1
i n c h 1
i n c h 1
i n c h 1
i n c h 1 inch 1 inch Network Security Page 9 of 12
Level 2 Asia Pacific University of Technology and Innovation Every report must have a front cover. A transparent plastic sheet can be placed in front of the report to protect the front cover. The front cover should have the following details:
o Name o Intake code. o Subject. o Project Title. o Date Assigned (the date the report was handed out). o Date Completed (the date the report is due to be handed in). Submission requirements A CD containing an electronic version of the document and video presentation (15 minutes) of group member. The total word count of the main body of the document (excluding title & contents pages) is to be in the region of 5000 words. Marking Table Please note that during the preparation of your assignment, you must includethe following marking table. Ensure you fill in the details of your team members full names and their respective student IDs. The marking table must be placed on a single page, located as either the second or third page of your final assignment documentation. Each team members name must only appear once. The schedule for the presentation will be announced in due time. Assessment Criteria: Documentation 10% Group Referencing 10% Group Research and Investigation 10% Group Diagrams & Figures 10% Group Critical Thinking and Applicability 20% Individual Analytical 20% Individual Configurations 10% Individual Presentation 10% Individual
Network Security Page 10 of 12
Level 2 Asia Pacific University of Technology and Innovation
Group (40%) Individual (60%)
Names and Intakes D o c u m e n t a t i o n
( 1 0 )
R e f e r e n c i n g
( 1 0 )
R e s e a r c h
a n d
I n v e s t i g a t i o n
( 1 0 )
D i a g r a m / F i g u r e s
( 1 0 )
C r i t i c a l
T h i n k i n g
a n d
A p p l i c a b i l i t y
( 2 0 )
A n a l y t i c a l
( 2 0 )
C o n f i g u r a t i o n s
( 1 0 )
P r e s e n t a t i o n s
( 1 0 )
G r a n d
T o t a l
( 1 0 0 )
1 2 3 4 Network Security Page 11 of 12
Level 2 Asia Pacific University of Technology and Innovation Marking Scheme Rubrics 1 to 3 4 to 7 8 to 10 Documentation (10)
All submission requirements were not adhered or poor writing or poor quality of contents. All submission requirements were followed with well writing and proper formatting of document along with proper quality of the content.
All submission requirements were followed with very good writing and formatting. The quality of the content is very good. The document looks like a real world solution. 1 to 3 4 to 7 8 to 10 Referencing (10) None, very little, or wrong usage of citation or not following proper referencing format. Proper, well formatted referencing with needed citations in all required places. Including needed copyright sign for used software. Proper, well formatted referencing with needed citations in all required places. Including needed copyright sign for used software and terms with proper referencing for each one. Using a right bibliography 1 to 3 4 to 7 8 to 10 Research and Investigation (10) Poor research and investigation of the problem. Poor evaluation of the requirement. Well research and investigation is done. Good evaluation of the requirements with proper reasoning with proper project planning and management. Very well analysis and investigation of the problem. Outstanding evaluation of the requirements with proper reasoning. Outstanding project planning and management with the screenshots of used tools.
Network Security Page 12 of 12
Level 2 Asia Pacific University of Technology and Innovation 1 to 3 4 to 7 8 to 10 Diagrams / Figures (10) Failed to attach any diagrams and figures. Descriptions of diagrams are blurring. Few diagrams and figures attached. Diagrams are lack of descriptions and labeling. Proper and relevant diagrams and figures. Diagrams are labeled and well described. Sequence of diagrams is well organized. 1 to 5 6 to 10 11 to 15 16 to 20 Critical Thinking and Applicability (20) The judgment criteria are not relevant and the solution is not applicable. The judgment is somehow relevant. The solution is applicable though it lacks in some parts. The judgment is relevant.The solution is relevant though it lack of supporting factors. Provided relevant criteria for making the judgment. Applicable methods or techniques are used for forming the judgment. 1 to 5 6 to 10 11 to 15 16 to 20 Analytical (20) Very poor or minimal analysis of the problem is done. Analysis done with lack of tools and techniques. Insufficient descriptions on analysis results Analysis is accurate and good use of the analysis tools and technique is made Excellent analysis of the solution has been done. Proper usage of tools in analyzing and testing the accuracy of the solution. 1 to 3 4 to 7 8 to 10 Configurations (10) Failed to configure the required devices. Partial configuration is done; some of the devices are not configured properly. The documentation of the configured devices is not complete. Proper and full configuration of all of the devices with complete documentation of the configured devices.
1 to 3 4 to 7 8 to 10 Presentations (10) Fail to attend the presentations. Voice is hardly to be heard. Unable to answer questions Attended presentation but voice is hard to be heard. Able to answer question but failed to produce confirmed answers
Attended presentation and able to attract audiences attentions. Voice is clear and loud. Able to answer all the questions without referring to notes.