0% found this document useful (0 votes)
141 views

Network Security Assignment

The document outlines an assignment to assess a student's understanding of network security. It provides background on assessing different types of network security devices, protocols, and standards. It also involves designing, configuring, and testing the security of a network for a college based on specific learning outcomes and criteria.

Uploaded by

shomeshverma200
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
141 views

Network Security Assignment

The document outlines an assignment to assess a student's understanding of network security. It provides background on assessing different types of network security devices, protocols, and standards. It also involves designing, configuring, and testing the security of a network for a college based on specific learning outcomes and criteria.

Uploaded by

shomeshverma200
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 8

INTERNATIONAL SCHOOL OF

MANAGEMENT AND TECHNOLOGY


NEPAL

FACULTY OF COMPUTING
UNIT TITLE Unit 17: Network Security

UNIT CODE L/615/1646 LEVEL 5

STUDENT NAME CREDIT VALUE 15

ASSESSMENT
Omni College Security WORD COUNT
TITLE

ASSESSOR Johnson Timelsina I.V.

ASSIGNMENT ASSIGNMENT
15/03/2024 15/05/2024
ISSUE DATE SUBMISSION DATE

ORIGINAL
ASSIGNMENT NO. 1/1
SUBMISSION

ASSESSMENT CRITERIA TO BE ASSESSED IN THIS ASSIGNMENT


(Identify all criteria to be assessed in this assignment)
Assignment Criteria P1 P2 P3 P4 P5 P6

Achieved

Merit Criteria Distinction Criteria

Assignment Criteria M1 M2 M3 M3 M4 D1 D2

Achieved

Important:

● Read the plagiarism notice and requirements at Page 8

● Word-limit- 8000 words (excludes cover page, table of content, figures, graphs, reference
list, appendix and logbook)

1 | Page
● Accepted Sources: Research Papers (Journal Articles, Conference Proceedings, Thesis),
Text Books, Governmental Data, Websites (only a registered organization, an educational
institution, government agency)
● Information taken from unreliable sources will not be accepted

● Must follow Harvard Reference Style

● Assignment must be submitted through the Plagiarism Detection Tool

Assignment submission format

Each student has to submit their assignment as guided in the assignment brief. The students are
guided on what sort of information is to produce to meet the criteria targeted. You are required
to make use of headings, paragraphs, and subsections as appropriate, and all work must be
supported with research and referenced using the Harvard referencing system.

Learning outcomes covered

● LO1 Examine Network Security principles, protocols and standards

● LO2 Design a secure network for a corporate environment

● LO3 Configure Network Security measures for the corporate environment.

● LO4 Undertake the testing of a network using the test plans.

Scenario

You have been contracted by a prominent educational institution called "The Omni

2 | Page
College" which serves thousands of students and staff. The Omni College is known for
its cutting-edge research and technology programs. Recently, they have grown concerned
about the security of their network infrastructure due to several incidents of unauthorized
access to sensitive student data and research projects. Your mission is to conduct a
comprehensive network security assessment and propose measures to enhance their
network security.

3 | Page
ASSIGNMENT SCENARIO AND TASKS

Assignment Task – Part 1

You need to start by examining the different types of Network Security principles, protocols
and standards.

You need to prepare a short presentation, along with speaker notes that:

● Discusses the different types of Network Security devices available.

● Examine network security protocols and the use of different cryptographic types in
network security.

For a higher grade you could also compare and contrast at least two major Network Security
protocols.

Further prepare a requirement specification document

● With reference to the given scenario, investigate and list out the purpose and
requirements for a secured Network.

● Determine and list out the network hardware and software to use in this network.

For a higher grade you could

● Create a design of a secure network according to a given scenario.

● Evaluate the importance of network security to an organization.

4 | Page
Assignment Task – Part 2

Further Configure Network Security measures for the corporate environment. You will have to
create an implementation and testing document that contains the implementation details

● Configure Network Security for your network.

You could make your report comprehensive by

● provide detailed screenshots along with a short explanation of all the steps involved.
Provide Network security configuration script/ files and screenshots with detailed
comments.

Further Carry out a detailed testing and present a test report.

● Develop and implement a Test Plan for the Network you have designed for The Omni

College and test the Network using the plan you have developed.

For a higher grade you could:

● Provide screenshots/files/ scripts of the testing and analyze the results of testing to

recommend improvements for the network.

● Critically evaluate the design, planning, configuration and testing of the Network

designed for the Omni College

LEARNING OUTCOMES AND ASSESSMENT CRITERIA

Pass Merit Distinction

D1 Evaluate the
LO1 Examine Network Security principles, protocols and
importance of network
standards
security to an
P1 Discuss the different types M1 Compare and contrast at

5 | Page
of Network Security devices. least two major Network organization.
Security protocols.
P2 Examine network security
protocols and the use of
different cryptographic types in
network security.

LO2 Design a secure network for a corporate environment

P3 Investigate the purpose and M2 Create a design of a secure


requirements of a secure network according to a given
network according to a given scenario.
scenario.

P4 Determine which network


hardware and software to use in
this network.

D2 Critically evaluate the


LO3 Configure Network Security measures for the corporate
design, planning,
environment
configuration and testing
P5 Configure Network Security M3 Justify the choices made in
of the network.
for your network. the implemented network
security configuration.

LO4 Undertake the testing of a network using a Test

Plan

P6 Comprehensively test your M4 Analyze the results of


network using the devised Test testing to recommend
Plan. improvements to the network.

6 | Page
Plagiarism Notice

You are reminded that there exist Academic Misconduct Policy and Regulation concerning
Cheating and Plagiarism.

Extracts from the Policy:

Section 3.4.1: Allowing others to do assignments / Copying others assignment is an offence


Section 3.4.2: Plagiarism, using the views, opinion or insights / paraphrasing of another person’s
original phraseology without acknowledgement
Requirements

● It should be the student’s own work – Plagiarism is unacceptable.

● Clarity of expression and structure are important features.

● Your work should be submitted as a well presented, word-processed document with


headers and footers, and headings and subheadings.
● You are expected to undertake research on this subject using books from the Library, and
resources available on the Internet.
● Any sources of information should be listed as references at the end of your document
and these sources should be referenced within the text of your document using Harvard
Referencing style
● Your report should be illustrated with screen-prints, images, tables, charts and/or
graphics.
● All assignments must be typed in Times New Roman, font size 12, 1.5 spacing.

The center policy is that you must submit your work within due date to achieve “Merit”
and “Distinction”. Late submission automatically eliminates your chance of achieving
“Merit and Distinction”. Also, 80% attendance is required to validate this assignment.

Assignment Prepared By Signature Date

Siddhant Bhattarai 24/1/2024

Brief Checked By Signature Date

7 | Page
Dhruba Babu Joshi

8 | Page

You might also like