Assessment 2 - Case Study Power Point Presentation
Assessment 2 - Case Study Power Point Presentation
FEEDBACK
Trainer: Date:
o The assessment tasks for the unit assume that you will work in the Information
Technology industry. Case studies/ exercises used in this assessment reflect a workplace
scenario.
o If you are not sure about any aspect of this assessment, please ask for clarification from
your assessor. If the assessment is not satisfactory, the trainer will allow one more attempt to
the assessment item.
o The responses to assessment questions should be in your own words and examples from
workplace should be used wherever possible.
The assessment of this Unit will be in a simulated environment where you will be
provided access to:
3. Specific instructions
Draw a complete network diagram using router, switches, firewalls and IPS/IDS
devices.
Explain the feature of those installed devices
Explain how the designed network avoids or reduces the information security
breaches.
Case Study:
Activity 1:
i. Research one of the enterprise businesses in Australia. Plan and design
complete network solution architecture of that company. ( Eg.
Commonwealth Bank, Australia). To cover this activity you will need to
include the following items.
Design a simple network diagram for that business. (Eg.
Commonwealth Bank Australia). Show the connectivity between its
main office (Data Center) and at least two branch offices.
Use routers, switches, firewalls, IPS/IDS devices and necessary servers
(Web server, Mail server, Database Server) as required by the bank.
Describe or write comments on each connectivity and devices you use
for.
Show private server and public server DMZ
Outline internet and intranet connectivity
Also show your log servers for monitoring your logs
Explain how your diagram mitigates the network attack issues.
Activity 3: Presentation
Students are required to do their power point presentation in class based on the following
topic and items.
References:
Satisfactory Assessor’s
performance comments
Yes/No
1. Define a process for designing security
Feedback to candidate:
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
___________________________