Assignment and marking criteria included Just i want part A
Prepared by: Dr. Ammar Alazab Moderated by: A/Prof. Tony Jan March, 2019 Assessment Details and Submission Guidelines Trimester T1, 2020 Unit Code MN610 Unit Title Virtual Private Networks Assessment Author Dr Ammar Alazab (Unit Moderator) Dr Nirzhar Saha (Unit Coordinator) Assessment Type Individual (Assignment 1) Assessment Title Assignment 1 – VPN Technologies and Security issues Unit Learning Outcomes covered in this assessment Students should be able to demonstrate their achievements in the following unit learning outcomes: a. Analyse and discuss the significance of VPN for contemporary organisations and how it addresses their concerns and security issues. b. Explain the role of VPN, its limitations and works done to address these limitations as well as to supporting the security of businesses and corporations Weight Assignment 1A – 4.5% Assignment 1B – 10.5% Total Marks Total Marks 100 Assignment 1A – 30 Marks Assignment 1B – 70Marks Word limit See instructions Due Date Assignment 1a‐Week 3, Tuesday 6:00 PM, 31/03/2020 Assignment 1b‐Week 7, Tuesday 6:00 PM, 28/4/2020 Submission Guidelines All work must be submitted on Moodle by the due date along with a completed Assignment Cover Page. The assignment must be in MS Word format, 1.5 spacing, 11‐pt Calibri (Body) font and 2 cm margins on all four sides of your page with appropriate section headings. Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using IEEE referencing style for School of Information Technology and Engineering. Extension If an extension of time to submit work is required, a Special Consideration Application must be submitted directly through AMS. You must submit this application within three working days of the assessment due date. Further information is available at: http://www.mit.edu.au/about‐mit/institute‐ publications/policies‐procedures‐and‐guidelines/specialconsiderationdeferment Academic Misconduct Academic Misconduct is a serious offence. Depending on the seriousness of the case, penalties can vary from a written warning or zero marks to exclusion from the course or rescinding the degree. Students should make themselves familiar with the full policy and procedure available at: http://www.mit.edu.au/about‐mit/institute‐ publications/policies‐procedures‐and‐guidelines/Plagiarism‐Academic‐ Misconduct‐Policy‐Procedure. For further information, please refer to the Academic Integrity Section in your Unit Description. MN610 Virtual Private Networks Page 2 of total pages Prepared by: Dr Nirzhar Saha Moderated by: Dr Ammar Alazab March, 2020 Assignment Description Tasks: There are two parts to this assignment, i.e. part A and part B. A. Write a review article for the following topics depending on the last digit of your ID: select Topic 1 if it ends in an ‘odd’ number or Topic 2 if it ends in an ‘even’ number. 30 marks B. Presentation (to present in 8‐10 slides only in 6‐8 minutes during Laboratory time). Students should understand the work presented in part A and they should base their presentation based on their report in part A 70 marks Part A description: 1. Topic 1 ‐ Establishing Cloud Computing Security with VPN Cloud storage is a service model in which data is maintained, managed, backed up remotely and made available to users over a network or internet. It permits the client to store files online so that the user can access them from any location via the internet. The provider company makes them available to the user online by keeping the uploaded files on an external server. A major challenge for cloud computing providers is to deliver sufficient security levels to protect users' data. A lot of research has been carried out with this target. Discuss how to secure connectivity to public cloud networks with VPN with different scenarios. Evaluate public cloud performance considering varying security schemes of firewalls and VPNs under the four scenarios: no firewall no VPN, firewall‐only, VPN‐only and a combination of firewall and VPN. Investigate the impacts of using VPN together with firewall on cloud computing performance. Address the issue(s) of VPN security in details as described in common part section 2. Topic 2 – Secure remote access approaches and VPN Replacement Technologies Secure remote access is a method of monitoring which combines a hardware and software system to simplify remote network access. Discuss about their similarity and compare secure remote access approaches with VPN from the security standpoint. Legacy VPNs has had some major drawbacks and problems such as the ones described below. There have been attempts to resolve the issues, and some technologies are being deployed as alternatives, e.g. Microsoft DirectAccess, SoftEther VPN etc. Discuss the limitations/problems existed in legacy VPNs and recommend alternative options to resolve and overcome the problems of legacy VPNs. Address the issue of VPN security in details as described in common part section. Common Part – VPN Security Issues Fundamentally, VPN is known as being secure and safe; however, there are still many issues with regards to security aspects. A simple Google search of ‘VPN security’ displays 135 million results. Search the internet for relevant articles/papers, and compare and analyze what these security issues are and what solutions they propose. MN610 Virtual Private Networks Page 3 of total pages Prepared by: Dr Nirzhar Saha Moderated by: Dr Ammar Alazab March, 2020 http://www.pcworld.com/article/2943472/vpn‐users‐beware‐you‐may‐not‐be‐as‐safe‐as‐you‐ think‐you‐are.html https://www.digitaltrends.com/computing/commercial‐vpn‐huge‐security‐flaws/ https://security.stackexchange.com/questions/89017/what‐are‐security‐risks‐of‐connecting‐to‐ my‐home‐vpn‐from‐my‐work https://www.sans.org/reading‐room/whitepapers/vpns/remote‐access‐vpn‐security‐concerns‐ policy‐enforcement‐881 https://www.belden.com/blog/industrial‐ethernet/secure‐remote‐access‐vs‐vpns‐a‐guide‐to‐ the‐challenges‐and‐benefits https://securityboulevard.com/2019/08/types‐of‐remote‐access‐pros‐and‐cons/ Instructions: Prepare your article as below 1. Go to the IEEE website and download the WORD template for the format. https://www.ieee.org/publications_standards/publications/authors/author_templates.html 2. Another link for the template: https://www.ieee.org/publications_standards/publications/journmag/ieee_tj_template_17.pdf 3. Read and familiarize yourself with the instructions carefully. 4. Prepare a paper using the IEEE format and the example attached. Follow the template if there are any confusions. Also, refer to the link below to have ideas how to start (see section 6). (https://www.ieee.org/publications_standards/publications/authors/author_guide_interactive.pdf) 5. Complete the assignment (minimum 5 and maximum 8 pages) including all the sections below. The number of words will be counted thoroughly and you must keep the minimum number of words to avoid any penalties. Title (maximum 15 words) Abstract (200 – 250 words) Introduction (300 – 500 words) Literature Review (500 – 1000 words) Main body (500 – 100 words) Conclusion (200 – 300 words) Future Works (150 – 300 words) References (minimum 10 references) 6. The article must be a ‘Review’1 article including at least 5 references and not more than 25. 1 See http://www.editage.com/insights/6-article-types-that-journals-publish-a-guide-for-early-career-researchers MN610 Virtual Private Networks Page 4 of total pages Prepared by: Dr Nirzhar Saha Moderated by: Dr Ammar Alazab March, 2020 7. Strictly follow the IEEE reference format for in‐body citations and the references section. 8. See the attached files for guidance on how to prepare a review paper. You can also find thorough instructions from IEEE and the Internet. 9. Contents must include: History and background of the topic What are the challenges and drawbacks, what solutions and workouts they found Possible options (solutions) and future research areas proposed Scopes of topic, progress of developments such as requirements, benchmarking, purposes & objectives, stakeholders, owners, roles and responsibilities where applicable. Flowchart Include a minimum of two (2) figures to show the overall concept and summarized overview of the topic from the review of minimum 10 – 15 (but not limited to) papers. Include a couple of tables to summarize the result of findings How each organization approaches, initiates, develops procedures and ownerships, and what results they got, and how it affected their businesses. What you conclude in terms of the topic/solutions to implement in an organization. Consider other aspects to include for a good review paper. 10. Remember to strictly follow the template and the instructions above to avoid penalties. ieee_tj_template_17 .docx PAN final draft_revised.pdf Instruction for Presentation.docx Part B description: Prepare slides (between 8 – 10 slides) for presentation during the lab class. Read the instruction attached carefully. MN610 Virtual Private Networks Page 5 of total pages Prepared by: Dr Nirzhar Saha Moderated by: Dr Ammar Alazab March, 2020 Marking criteria: Example of marking criteria is shown in following table. Marks are allocated as follows: Note: The marking criteria varies for each assignment Section to be included in the report Detailed Description of the Criteria Marks Conforming to the template and format No marks will be given and severe penalties will apply for any breach of the format and template. Fonts, sizes, spacing, captions, headings etc. will also be checked thoroughly. Be thorough and follow fully when using the template and format instruction to avoid penalties. 2 Figures and tables created They should be created yourself and not copied from elsewhere. For full marks you should create at least 2 figures and 2 tables. 3 Main sections Main body structures and contents quality including word limit. 10 Literature review Severe penalties apply for simple listing and describing. It should be a logically support analysis that reaches the review conclusion that should be included at the end of the section. Check word limit. 10 In body citation Strictly follow the order and instruction by IEEE. Check when/where to put the citation. See attached files and search the internet for guidelines 3 References section Check whether they follow the instruction. Otherwise, no marks will be provided 2 Assignment part b Responses to Part A Addressing the feedback provided in Part 1 of the assignment 20 Assignment part B‐ Presentation Presentation skills and materials quality 50 Total 100 Example Marking Rubric for Assignment #: Total Marks 100 Note: The marking criteria varies for each assignment Marking Rubric Criteria/ Grades High Distinction (HD) [Excellent] >80% Distinction (D) [Very Good] 70%‐80% Credits (C) [Good] 60%‐70% Pass (P) [Satisfactory] 50%‐60% Fail (N) [Unsatisfactory] <50% criteria 1 concise and specific to the project topics are relevant and soundly analysed. generally relevant and analysed. some relevance and briefly presented. this is not relevant to the assignment topic. criteria 2 demonstrated excellent ability to think critically and sourced reference demonstrated excellent ability to think critically but did not source reference demonstrated ability to think critically and sourced reference material appropriately demonstrated ability to think critically and did not source reference material appropriately did not demonstrate ability to think critically and did not source reference mn610 virtual private networks page 6 of total pages prepared by: dr nirzhar saha moderated by: dr ammar alazab march, 2020 material appropriately material appropriately material appropriately criteria 3 demonstrated excellent ability to think critically and sourced reference material appropriately demonstrated excellent ability to think critically but did not source reference material appropriately demonstrated ability to think critically and sourced reference material appropriately demonstrated ability to think critically and did not source reference material appropriately did not demonstrate ability to think critically and did not source reference material appropriately criteria 4 all elements are present and very well integrated. components present with good cohesive components present and mostly well integrated most components present proposal lacks structure. criteria 5 logic is clear and easy to follow with strong arguments consistency logical and convincing mostly consistent logical and convincing adequate cohesion and conviction argument is confused and disjointed criteria 6 clear styles with excellent source of references. clear referencing style generally good referencing style sometimes clear referencing style lacks consistency with many errors criteria 1 ="" concise ="" and ="" specific ="" to ="" the ="" project ="" topics ="" are ="" relevant ="" and ="" soundly ="" analysed. ="" ="" generally ="" relevant ="" and ="" analysed. ="" ="" some ="" relevance ="" and ="" briefly ="" presented. ="" ="" this ="" is ="" not ="" relevant ="" to ="" the ="" assignment ="" topic. ="" ="" criteria 2 ="" demonstrated ="" excellent ="" ability to think ="" critically and ="" sourced ="" reference ="" demonstrated ="" excellent ="" ability ="" to ="" think ="" critically ="" but ="" did ="" not ="" source ="" reference ="" demonstrated ="" ability ="" to ="" think ="" critically ="" and ="" sourced ="" reference ="" material ="" appropriately ="" demonstrated ="" ability ="" to ="" think ="" critically ="" and ="" did ="" not ="" source ="" reference ="" material ="" appropriately ="" did ="" not ="" demonstrate ="" ability ="" to ="" think ="" critically and did ="" not ="" source ="" reference ="" mn610="" virtual="" private="" networks="" page="" 6="" of="" total="" pages="" prepared="" by:="" dr="" nirzhar="" saha="" moderated="" by:="" dr="" ammar="" alazab="" march,="" 2020="" material ="" appropriately ="" material ="" appropriately ="" ="" ="" material ="" appropriately ="" criteria 3 ="" demonstrated ="" excellent ="" ability ="" to ="" think ="" critically ="" and ="" sourced ="" reference ="" material ="" appropriately ="" demonstrated ="" excellent ="" ability ="" to ="" think ="" critically ="" but ="" did ="" not ="" source ="" reference ="" material ="" appropriately ="" demonstrated ="" ability ="" to ="" think ="" critically ="" and ="" sourced ="" reference ="" material ="" appropriately ="" ="" demonstrated ="" ability ="" to ="" think ="" critically ="" and ="" did ="" not ="" source ="" reference ="" material ="" appropriately ="" ="" did ="" not ="" demonstrate ="" ability ="" to ="" think ="" critically and did ="" not ="" source ="" reference ="" material ="" appropriately ="" criteria 4 ="" all ="" elements ="" are ="" present ="" and ="" very ="" well ="" integrated. ="" components ="" present ="" with ="" good cohesive ="" ="" components ="" present and ="" mostly well ="" integrated ="" most ="" components ="" present ="" ="" proposal ="" lacks ="" structure. ="" ="" ="" criteria 5 ="" logic ="" is ="" clear ="" and ="" easy ="" to ="" follow ="" with ="" strong ="" arguments ="" consistency ="" logical ="" and ="" convincing ="" ="" mostly ="" consistent ="" logical ="" and ="" convincing ="" adequate ="" cohesion and ="" conviction ="" ="" argument ="" is ="" confused ="" and ="" disjointed ="" ="" criteria 6 ="" clear ="" styles ="" with ="" excellent ="" source ="" of ="" references. ="" clear ="" referencing ="" style ="" generally ="" good ="" referencing ="" style ="" sometimes ="" clear ="" referencing ="" style ="" lacks ="" consistency ="" with ="" many ="">50% criteria 1 concise and specific to the project topics are relevant and soundly analysed. generally relevant and analysed. some relevance and briefly presented. this is not relevant to the assignment topic. criteria 2 demonstrated excellent ability to think critically and sourced reference demonstrated excellent ability to think critically but did not source reference demonstrated ability to think critically and sourced reference material appropriately demonstrated ability to think critically and did not source reference material appropriately did not demonstrate ability to think critically and did not source reference mn610 virtual private networks page 6 of total pages prepared by: dr nirzhar saha moderated by: dr ammar alazab march, 2020 material appropriately material appropriately material appropriately criteria 3 demonstrated excellent ability to think critically and sourced reference material appropriately demonstrated excellent ability to think critically but did not source reference material appropriately demonstrated ability to think critically and sourced reference material appropriately demonstrated ability to think critically and did not source reference material appropriately did not demonstrate ability to think critically and did not source reference material appropriately criteria 4 all elements are present and very well integrated. components present with good cohesive components present and mostly well integrated most components present proposal lacks structure. criteria 5 logic is clear and easy to follow with strong arguments consistency logical and convincing mostly consistent logical and convincing adequate cohesion and conviction argument is confused and disjointed criteria 6 clear styles with excellent source of references. clear referencing style generally good referencing style sometimes clear referencing style lacks consistency with many errors>