0% found this document useful (0 votes)
11 views4 pages

Assignment Brief 1

This document outlines the assignment brief for Unit 5: Security in the Pearson BTEC Level 5 Higher National Diploma in Computing. It includes tasks for assessing IT security risks, describing security solutions, and evaluating organizational procedures, along with guidelines for submission and formatting. The assignment requires a detailed report and presentation on various aspects of IT security, including risks, monitoring systems, firewall configurations, and security measures.

Uploaded by

huy557475
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views4 pages

Assignment Brief 1

This document outlines the assignment brief for Unit 5: Security in the Pearson BTEC Level 5 Higher National Diploma in Computing. It includes tasks for assessing IT security risks, describing security solutions, and evaluating organizational procedures, along with guidelines for submission and formatting. The assignment requires a detailed report and presentation on various aspects of IT security, including risks, monitoring systems, firewall configurations, and security measures.

Uploaded by

huy557475
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

Unit 5: Security

Assignment 1 Brief
Programme Title Pearson BTEC Level 5 Higher National Diploma in
Computing
Student Name/ID
Number

Unit Number and Unit 5 - Security


Title

Academic Year

Unit Tutor

Assignment Title Security – Assignment 1

Issue Date

Submission Date

Submission Format

 The submission is in the form of an individual written report. This should


be written in a concise, formal business style using single spacing and
font size 12. You are required to make use of headings, paragraphs and
subsections as appropriate, and all work must be supported with
research and referenced using the Harvard referencing system. Please
also provide a bibliography using the Harvard referencing system.
 The individual Assignment must be your own work, and not copied by or
from another student.
 If you use ideas, quotes or data (such as diagrams) from books, journals
or other sources, you must reference your sources, using the Harvard
style.
 Make sure that you understand and follow the guidelines to avoid
plagiarism. Failure to comply this requirement will result in a failed
assignment.

Unit Learning Outcomes

LO1 Assess risks to IT security.


LO2 Describe IT security solutions.
Vocational scenario

Assignment scenario
You work as a trainee IT Security Specialist for a leading Security consultancy
in Vietnam called FPT Information security FIS.
FIS works with medium sized companies in Vietnam, advising and

BTEC HN Assignment Brief Template


Issue Date: Jan 2024 Owner: HN QD
DCL1 Public (Unclassified) Version 2.0
implementing technical solutions to potential IT security risks. Most customers
have outsourced their security concerns due to lacking the technical expertise
in house. As part of your role, your manager Jonson has asked you to create
an engaging presentation to help train junior staff members on the tools and
techniques associated with identifying and assessing IT security risks together
with the organizational policies to protect business critical data and
equipment.

Tasks
In addition to your presentation, you should also provide a detailed report
containing a technical review of the topics covered in the presentation.
Your presentation should:
 Discuss types of security risks FIS secure may face if they have a
security breach. Give an example of a recently publicized security
breach and discuss its consequences
 Assess a variety of organizational procedures an organization can set up
to reduce the effects to the business of a security breach.
 Analyse three benefits to FIS of implementing network monitoring
system giving supporting reasons.
 Propose a method that FIS can use to assess and treat IT security risks.
 Discuss the potential impact to IT security of incorrect configuration of
firewall policies and third-party VPNs in FIS.
 Discuss, using an example for each, how implementing a DMZ, static IP
and NAT in a network can improve network security in FIS.
 Evaluate a range of physical and virtual security measures that can be
employed by FIS to ensure the integrity of organisational IT security.
Your detailed report should include a summary of your presentation as well as
additional, evaluated or critically reviewed technical notes on all of the
expected topics.

Assignment activity and guidance


General introduction: Main purposes and structure of the work
Task 1 - Discuss types of security risks to organisations (P1)
To answer this section, follow each of the steps below:
• Define IT risks
• Discuss types of risks to organizations
• What are the recent security breaches? List and give examples with dates
• Discuss the consequences of this breach
• Suggest solutions to organizations
(Word limit: 500 – 750 words)
Task 2 - Assess organisational security procedures (P2)
To answer this section, you need to mention and assess at least 3 security procedures
that an organization uses to improve or provide organizations security.
(Word limit: 500 – 750 words)
Task 2.1 - Analyse the benefits of implementing network monitoring systems
with supporting reasons (M1)
To answer this section, follow each of the steps below:

BTEC HN Assignment Brief Template


Issue Date: Jan 2024 Owner: HN QD
DCL1 Public (Unclassified) Version 2.0
• List some of the networking monitoring devices and discuss each of them.
• Why do you need to monitor networks?
• What are the benefits of monitoring a network?
(Word limit: 250 – 500 words)
Task 3 - Discuss the potential impact to IT security of incorrect configuration
of firewall policies and third-party VPNs (P3)
To answer this section, follow each of the steps below:
• Discuss briefly firewalls and policies, their usage and advantages in a
network
• How does a firewall provide security to a network?
• Show with diagrams the example of how firewall works
• Define VPN, its usage, and show it with diagrams examples
• Write down the potential impact (Threat-Risk) of a firewall and VPN if they
are incorrectly configured in a network
(Word limit: 500 – 750 words)
Task 4 - Discuss, using an example for each, how implementing a DMZ, static
IP and NAT in a network can improve network security (P4)
To answer this section, follow each of the steps below:
• Define and discuss with the aid of diagram DMZ. Focus on its usage and
security function as advantage
• Define and discuss with the aid of diagram static IP. Focus on its usage and
security function as advantage
• Define and discuss with the aid of diagram NAT. Focus on its usage and
security function as advantage
(Word limit: 500 – 750 words)
Task 4.1 - Propose a method to assess and treat IT security risks (M2)
To answer this section, follow each of the steps below:
• Discuss methods required to assess security threats? E.g., Monitoring tools
• What is the current weakness or threats of an organization?
• What tools will you propose to treat IT security risks?
(Word limit: 250 – 500 words)
Task 4.1.1 - Evaluate a range of physical and virtual security measures that
can be employed to ensure the integrity of organisational IT security (D1)
To answer this section, follow each of the steps below:
• Define and explain what are physical and virtual security measures
• Give brief details with an example on their uses
• How can they be a solution in IT security?
(Word limit: 250 – 500 words)

Learning Outcomes and Assessment Criteria

Pass Merit Distinction

BTEC HN Assignment Brief Template


Issue Date: Jan 2024 Owner: HN QD
DCL1 Public (Unclassified) Version 2.0
LO1 Assess risks to IT security.

P1 Discuss types of M1 Analyse the D1 Evaluate a range of


security risks to benefits of physical and virtual
implementing network security measures that can
organisations.
monitoring systems be employed to ensure the
with supporting integrity of organisational IT
P2 Assess
reasons. security.
organisational
security procedures.

LO2 Describe IT security solutions.

P3 Discuss the M2 Propose a method


potential to assess and treat IT
impact to IT security of security risks.
incorrect configuration
of firewall policies and
third-party VPNs.

P4 Discuss, using an
example for each, how
implementing a DMZ,
static IP and NAT in a
network can improve
network security.

BTEC HN Assignment Brief Template


Issue Date: Jan 2024 Owner: HN QD
DCL1 Public (Unclassified) Version 2.0

You might also like