0% found this document useful (0 votes)
187 views4 pages

ITNE3013 Assignment Sem 2 2020 PDF

Uploaded by

Nabeel Hussain
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
187 views4 pages

ITNE3013 Assignment Sem 2 2020 PDF

Uploaded by

Nabeel Hussain
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

ITNE3013

Advanced Network and Infrastructure Security

Assignment

August 2020
ITNE3013 Advanced Network and Infrastructure Security

Enterprise Network Security Analysis - 25% (Due Session 12)

The assessment assesses the following learning outcomes:

LO 1 Describe the principles of systems and network security and apply them to evaluate risks,
threats and the goals of information security.
LO 5 Analyse various controls and evaluate their effectiveness for information security in an
enterprise.
LO 6 Evaluate the effectiveness (both in terms of performance and limitations) of individual control
techniques in network and information security.
LO 7 Critically evaluate the risk against controls and implement enterprise security policies.

INSTRUCTIONS

In this assessment you are required to carry out an analysis of Enterprise Network Security. You
are required to prepare a report using the IEEE Conference template provided on the LMS. The
report should not extend the length of the original template. A video presentation needs to be
submitted in which you are required to present your analysis. You should include references in
your report and these and must be in the IEEE style.

Submission Guidelines

The report is to be submitted through turn-it-in. link and the video presentation in the
assignment link. Drop-boxes linked to turn-it-in will be set up in the Unit of Study Moodle
account. Reports not submitted through these drop-boxes will not be considered.
Submissions must be made by the due date and time (which will be in the session detailed above)
and determined by the Unit facilitator. Submissions made after the due date and time will be
penalized at the rate of 10% per day (including weekend days).
The turn-it-in similarity score will be used in determining the level if any of plagiarism. Turn-it-in
will check conference web-sites, Journal articles, the Web and your own class member
submissions for plagiarism. You can see your turn-it-in similarity score when you submit your
assignment to the appropriate drop-box. If this is a concern you will have a chance to change
your assignment and re-submit. However, re-submission is only allowed prior to the submission
due date and time. After the due date and time have elapsed you cannot make re-submissions
and you will have to live with the similarity score as there will be no chance for changing. Thus,
plan early and submit early to take advantage of this feature. You can make multiple submissions,
but please remember we only see the last submission, and the date and time you submitted will
be taken from that submission. Your document should be a single word or pdf document
containing your report.

Copyright © 2015-2020 VIT, All Rights Reserved. 2


ITNE3013 Advanced Network and Infrastructure Security

Task

In this assessment you are required to prepare a research report that analyses the Enterprise Network
Security. The research report needs to be prepared in the IEEE Template provided on the LMS and the
content of your report should be limited to the template length, which is 4 pages. You are required to
select a paper on enterprise networks published no later than 2017, on one of the given areas and get an
approval from the Lecturer by the end of week 6, before you start working on your report. The research
report areas include:

• Cryptography: Key management, public key infrastructures, certification, revocation, and


authentication
• Implementation and evaluation of networked security systems
• Security and privacy policies in Enterprise networks
• Security and privacy in cyber-physical systems
• Internet Security: Protocols, standards, measurements
• Security and privacy for the Internet of Things
• Protocol security
• Computer and network forensics
• Intrusion detection, prevention, and response
• Physical-layer and cross-layer security technologies
• Security and privacy in emerging wireless technologies and applications
• Security for future Internet architectures and designs
• Usable security and privacy

In the report you are required to cite at least 5 articles and references for the article need to be provided
in IEEE Style as in the template. You are required to submit a video presentation with 10-15 slides, the
duration of the video presentation should be between 5-10 minutes. The video presentation could be
prepared using zoom, the video presentation should be like the way lectures are conducted with slides
running in the background and a small video of you presenting.

Copyright © 2015-2020 VIT, All Rights Reserved. 3


ITNE3013 Advanced Network and Infrastructure Security

Marking Guide: 100 Marks

Task Description Marks


Report Layout The report style, language and structure should be appropriate. The report 10
should follow the IEEE Template provided and should not exceed the page
limit
Abstract An abstract need to describe a complete synopsis of the paper. Abstract 10
should include research problem, methodology and highlights of the result.
Introduction In the introduction you should give the reader a general overview of the 5
topic and its related application. You should be able to deliver the
rationale of your work. You may emphasis on the background,
importance, limitations and assumption of your work.
Related Work The related work should include literature from reputed journals and 10
conferences. Note that, the reference should not be older than last three
years.
Critical Analysis You are required to critically analyse the security controls, which could be 15
implemented in an Enterprise network
Performance In this section you are required to evaluate the performance and 15
Evaluation constraints of the security controls.
Risk Evaluation A comprehensive risk evaluation is required to demonstrate the risks 15
associated with security controls.
Video The students are required to present their findings in a video presentation. 10
Demonstration The video could be recorded using zoom, and screen could be shared to
demonstrate.
Conclusion Summary of the report 5
References Follow the IEEE style 5

Copyright © 2015-2020 VIT, All Rights Reserved. 4

You might also like