0% found this document useful (0 votes)
86 views3 pages

1 - Unit 5 - Assignment 1 Guidance

This document provides guidance for an assignment broken into multiple tasks. Task 1 involves identifying security threats, a recent breach example, and consequences. Task 2 describes 3 organizational security procedures. Task 2.1 proposes a method to assess and treat IT security risks. Task 3 identifies the impact of incorrectly configured firewall policies and intrusion detection systems. Task 4 shows how a DMZ, static IP, and NAT can improve security using diagrams. Task 4.1 discusses benefits of network monitoring systems. Task 4.1.1 investigates how a trusted network can be part of an IT security solution.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
86 views3 pages

1 - Unit 5 - Assignment 1 Guidance

This document provides guidance for an assignment broken into multiple tasks. Task 1 involves identifying security threats, a recent breach example, and consequences. Task 2 describes 3 organizational security procedures. Task 2.1 proposes a method to assess and treat IT security risks. Task 3 identifies the impact of incorrectly configured firewall policies and intrusion detection systems. Task 4 shows how a DMZ, static IP, and NAT can improve security using diagrams. Task 4.1 discusses benefits of network monitoring systems. Task 4.1.1 investigates how a trusted network can be part of an IT security solution.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

Assignment 1 Guidance

Task 1 - Identify types of security threat to


organisations. Give an example of a recently
publicized security breach and discuss its
consequences (P1)
To answer this section, follow each of the steps below:
 Define threats
 Identify threats agents to organizations
 List type of threats that organizations will face
 What are the recent security breaches? List and give examples with dates
 Discuss the consequences of this breach
 Suggest solutions to organizations
(Word limit: 500 – 750 words)

Task 2 - Describe at least 3 organisational


security procedures (P2)
To answer this section, you need to mention and discuss 3 security procedures that an
organization uses to improve or provide organizations security.
(Word limit: 500 – 750 words)

Task 2.1 - Propose a method to assess and


treat IT security risks (M1)
To answer this section, follow each of the steps below:
 Discuss methods required to assess security threats? E.g., Monitoring tools
 What is the current weakness or threats of an organization?
 What tools will you propose to treat IT security risks?
(Word limit: 250 – 500 words)

1
Task 3 - Identify the potential impact to IT
security of incorrect configuration of firewall
policies and IDS (P3)
To answer this section, follow each of the steps below:
 Discuss briefly firewalls and policies, their usage and advantages in a network
 How does a firewall provide security to a network?
 Show with diagrams the example of how firewall works
 Define IDS, its usage, and show it with diagrams examples
 Write down the potential impact (Threat-Risk) of a firewall and IDS if they are
incorrectly configured in a network
(Word limit: 500 – 750 words)

Task 4 - Show, using an example for each,


how implementing a DMZ, static IP and NAT
in a network can improve Network Security
(P4)
To answer this section, follow each of the steps below:
 Define and discuss with the aid of diagram DMZ. Focus on its usage and security
function as advantage
 Define and discuss with the aid of diagram static IP. Focus on its usage and
security function as advantage
 Define and discuss with the aid of diagram NAT. Focus on its usage and security
function as advantage
(Word limit: 500 – 750 words)

Task 4.1 - Discuss three benefits to


implement network monitoring systems with
supporting reasons (M2)
To answer this section, follow each of the steps below:
 List some of the networking monitoring devices and discuss each of them.
 Why do you need to monitor networks?
 What are the benefits of monitoring a network?

2
(Word limit: 250 – 500 words)

Task 4.1.1 - Investigate how a ‘trusted


network’ may be part of an IT security
solution (D1)
To answer this section, follow each of the steps below:
 Discuss and explain what are trusted network
 Give brief details with an example on its uses
 How can it be a solution in IT security?
(Word limit: 250 – 500 words)

You might also like