Assignment Details and Submission Guidelines
|
Unit Code
|
BN203
|
Unit Title
|
Network Security
|
Assignment Type
|
Assignment #02 (Individual)
|
Assignment Title
|
Secure Network Design
|
Purpose of theassignment(with ULO Mapping)
|
After completing this assignment, student’s should be able to:
-Understand network scanning and security policies to manage operational security at workplace. Then administer those policies to ensure compliance by users in an organization.
-Apply skills to analyse complex problems in network security under supervision.
|
Weight
|
20%
|
Total Marks
|
40
|
Word limit
|
1200 -1800
|
Due Date
|
11:55 PM,30th September, 2017
|
Submission Guidelines
|
?All work must be submittedon Moodle by the due date along with a“Title Page”.?The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body) font and 2.54 cm margins on all four sides of your page with appropriate section headings. ?Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using IEEE referencing style. |
Extension
|
?If an extension of time to submit work is required, a Special Consideration Application must be submitted directly to the School's Administration Officer, in Melbourne on Level 6 or in Sydney on Level 7. You must submit this application three working days prior to the due date of the assignment. Further information is available at: http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/specialconsiderationdeferment
|
Academic Misconduct
|
?Academic Misconduct is a serious offence. Depending on the seriousness of the case, penalties can vary from a written warning or zero marks to exclusion from the course or rescinding the degree. Students should make themselves familiar with the full policy and procedure available at:http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy-ProcedureFor further information, please refer to the Academic Integrity Section in your Unit Description. |
Assignment#02
In your role as a Network Security Architect at B2B solutions, you are leading a team of several Network Administrators. B2B solutions is a medium sized organisation and is currently expanding its operations.
The company has acquired six sites across Melbourne to accommodate its various departments. You have been asked to design a secure network across six sites. You have to ensure that the flow of data across networks must be confidential and that web-based filtering is in place. Another requirement is to have role-based access control for each department. The network should also span six buildings with a router in each building to join the networks. It is assumed that each building will have its own single subnet. Company expects approximately 500 workstation across all the sites with approximate numbers in each building as follows:
•Finance Office - 100 workstations•Transport Office - 50 workstations•Research Office - 25 workstations•Sales Office - 25 workstations•Information technology - 250 workstations•Head Office - 50 workstations
Write a report on a secure network plan including following:
1)Draw a complete network design for above scenario. (Include block diagram for each SITE)2)Without security, what are the possiblesecuritythreatsto network? Write down all assumptions you made during the design of securenetwork.3)Project hardware requirements such as name of the security network devices, with manufacturer’s name, series, model, type of cables etc. Also list cryptographic standards your prosed networking devices are able to use for security.4)With the help of cryptographicalgorithms, write justification ofhow this proposedsecure network designensureconfidentiality, integrity, availability and authentication.(CIAA).
(The report should be targeted towards your audience i.e. the board of directors who may not be technologically savvy. Therefore the report should be easy to read and contain step by step overview of the design that includes calculations and assumptions. Additionally, the report contents should be logically, systematically and succinctly structured to create a cohesive and coherent analytical piece of work, using formal academic language and should adhere to grammatical conventions.)
Marking Criteria:
Aspects
|
Description of the section
|
Marks
|
Project scope
|
Outline of the report
|
2
|
Project hardware and software requirements
|
Name of devices, Specification, Model number, software
|
8
|
SecureNetwork Design
|
Complete Diagram, Design, Detailed Description
|
15
|
Justification
|
Justification ofsecurenetwork design based on CIAA
|
10
|
Conclusion
|
Brief summary of your suggested design
|
3
|
Reference Style
|
Proper referencing is required
|
2
|
Total
|
40
|
Marking Rubric:
Grade
Mark
|
HD
32 - 40
|
D
28 - 31.75
|
C
24 – 27.75
|
P
20 – 23.75
|
Fail
|
Excellent
|
Very Good
|
Good
|
Satisfactory
|
Unsatisfactory
|
Project scope
|
Concise and specific to the project
|
Topics are relevant and soundly analysed.
|
Generally relevant and analysed.
|
Some relevance and briefly presented.
|
This is not relevant to the assignment topic.
|
Project hardwareand softwarerequirements
|
Demonstrated excellent ability to think critically and sourced reference material appropriately
|
Demonstrated excellent ability to think critically but did not source reference material appropriately
|
Demonstrated ability to think critically and sourced reference material appropriately
|
Demonstrated ability to think critically and did not source reference material appropriately
|
Did not demonstrate ability to think critically and did not source reference material appropriately
|
SecureNetwork Design
|
Logic is clear and easy to follow with strong arguments
|
Consistency logical and convincing
|
Mostly consistent logical and convincing
|
Adequate cohesion and conviction
|
Argument is confused and disjointed
|
Justification of secure network design
|
All elements are present and very well integrated.
|
Components present with good cohesive
|
Components present and mostly well integrated
|
Most components present
|
Proposal lacks structure.
|
Conclusion
|
Excellent use of creditable sources. Obvious that outstanding effort made.
|
Extremely good effort
|
Good effort made but not outstanding
|
Made some effort. For example, Web searches only
|
Very little attempt tosummarize.Lazy effort with inaccuracies
|
IEEE Reference style
|
Clear styles with excellent source of references.
|
Clear referencing style
|
Generally good referencing style
|