Assignment Details and Submission Guidelines Unit Code BN203 Unit Title Network Security Assignment Type Assignment #02 (Individual) Assignment Title Secure Network Design Purpose of...

1 answer below »
























































Assignment Details and Submission Guidelines



Unit Code



BN203



Unit Title



Network Security



Assignment Type



Assignment #02 (Individual)



Assignment Title



Secure Network Design



Purpose of theassignment(with ULO Mapping)



After completing this assignment, student’s should be able to:


-Understand network scanning and security policies to manage operational security at workplace. Then administer those policies to ensure compliance by users in an organization.


-Apply skills to analyse complex problems in network security under supervision.



Weight



20%



Total Marks



40



Word limit



1200 -1800



Due Date




11:55 PM,30th September, 2017



Submission Guidelines


?All work must be submittedon Moodle by the due date along with a“Title Page”.?The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body) font and 2.54 cm margins on all four sides of your page with appropriate section headings. ?Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using IEEE referencing style.

Extension


?If an extension of time to submit work is required, a Special Consideration Application must be submitted directly to the School's Administration Officer, in Melbourne on Level 6 or in Sydney on Level 7. You must submit this application three working days prior to the due date of the assignment. Further information is available at:

http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/specialconsiderationdeferment



Academic Misconduct


?Academic Misconduct is a serious offence. Depending on the seriousness of the case, penalties can vary from a written warning or zero marks to exclusion from the course or rescinding the degree. Students should make themselves familiar with the full policy and procedure available at:http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy-ProcedureFor further information, please refer to the Academic Integrity Section in your Unit Description.



Assignment#02


In your role as a Network Security Architect at B2B solutions, you are leading a team of several Network Administrators. B2B solutions is a medium sized organisation and is currently expanding its operations.


The company has acquired six sites across Melbourne to accommodate its various departments. You have been asked to design a secure network across six sites. You have to ensure that the flow of data across networks must be confidential and that web-based filtering is in place. Another requirement is to have role-based access control for each department. The network should also span six buildings with a router in each building to join the networks. It is assumed that each building will have its own single subnet. Company expects approximately 500 workstation across all the sites with approximate numbers in each building as follows:

•Finance Office - 100 workstations•Transport Office - 50 workstations•Research Office - 25 workstations•Sales Office - 25 workstations•Information technology - 250 workstations•Head Office - 50 workstations

Write a report on a secure network plan including following:

1)Draw a complete network design for above scenario. (Include block diagram for each SITE)2)Without security, what are the possiblesecuritythreatsto network? Write down all assumptions you made during the design of securenetwork.3)Project hardware requirements such as name of the security network devices, with manufacturer’s name, series, model, type of cables etc. Also list cryptographic standards your prosed networking devices are able to use for security.4)With the help of cryptographicalgorithms, write justification ofhow this proposedsecure network designensureconfidentiality, integrity, availability and authentication.(CIAA).

(The report should be targeted towards your audience i.e. the board of directors who may not be technologically savvy. Therefore the report should be easy to read and contain step by step overview of the design that includes calculations and assumptions. Additionally, the report contents should be logically, systematically and succinctly structured to create a cohesive and coherent analytical piece of work, using formal academic language and should adhere to grammatical conventions.)


Marking Criteria:













































Aspects



Description of the section



Marks



Project scope



Outline of the report



2



Project hardware and software requirements



Name of devices, Specification, Model number, software



8



SecureNetwork Design



Complete Diagram, Design, Detailed Description



15



Justification



Justification ofsecurenetwork design based on CIAA



10



Conclusion



Brief summary of your suggested design



3



Reference Style



Proper referencing is required



2



Total



40



Marking Rubric:



































































Grade


Mark



HD


32 - 40



D


28 - 31.75



C


24 – 27.75



P


20 – 23.75



Fail



Excellent



Very Good



Good



Satisfactory



Unsatisfactory



Project scope



Concise and specific to the project



Topics are relevant and soundly analysed.



Generally relevant and analysed.



Some relevance and briefly presented.



This is not relevant to the assignment topic.



Project hardwareand softwarerequirements



Demonstrated excellent ability to think critically and sourced reference material appropriately



Demonstrated excellent ability to think critically but did not source reference material appropriately



Demonstrated ability to think critically and sourced reference material appropriately



Demonstrated ability to think critically and did not source reference material appropriately



Did not demonstrate ability to think critically and did not source reference material appropriately



SecureNetwork Design



Logic is clear and easy to follow with strong arguments



Consistency logical and convincing



Mostly consistent logical and convincing



Adequate cohesion and conviction



Argument is confused and disjointed



Justification of secure network design



All elements are present and very well integrated.



Components present with good cohesive



Components present and mostly well integrated



Most components present



Proposal lacks structure.



Conclusion



Excellent use of creditable sources. Obvious that outstanding effort made.



Extremely good effort



Good effort made but not outstanding



Made some effort. For example, Web searches only



Very little attempt tosummarize.Lazy effort with inaccuracies



IEEE Reference style



Clear styles with excellent source of references.



Clear referencing style



Generally good referencing style


Answered Same DayDec 27, 2021

Answer To: Assignment Details and Submission Guidelines Unit Code BN203 Unit Title Network Security Assignment...

Robert answered on Dec 27 2021
125 Votes
REPORT
Secure Network Design
of
B2B Solutions
Student Name :
Student No :
TABLE OF CONTENTS
1. INTRODUCTION --------------------------------------------------------------------------03
2. THREATS TO NETWORK----------------------------------------------------- -----------03
3. NETWORK DESIGN----------------------------------------------------------------------04
4. DEVICE REQUIREMENT-----------------------------------------------------------------04
5. CRYPTOGRAPHY SECURITY-------------------------------------------------------------05
6. CONCLUSION ---------------------------------------------------------------------------06
7. REFERENCES ----------------------------------------------------------------------------07
1. INTRODUCTION
Due to the huge growth in the total number of internet users across the world, data security and its
management plays an important role in cyber security. It is very important to block the access of those
people who wants an authorized access of some service. Cyber security led to the creation of a term
known as cyber space which is basically an interconnection of people with the help of computers and
internet without belonging to any particular geography. We all know that computer information is made
up of Zero (0) and Ones (1). For reliable and genuine transfer of data additional information needs to be
carried out in the cyber space. As the number of digital applications is growing very rapidly, the chances
of cybercrimes have also increased [3]. Even if one commits a very small mistake in securing the data,
the hackers a very smart enough to catch this opportunity. If any accounts are not properly secured, the
hackers can easily gain access of it. Cyber security can be defined as protecting data, programs from
unauthorized access.
In this report as Network Security Architect of B2B solutions, my role is to design a secure network for
the company. B2B Solutions is a medium sized organization and is currently expanding its operations.
The company has acquired six sites across Melbourne to accommodate its various departments. The
network should span six buildings with a router in each building to join the networks. It is assumed that
each building will have its own single subnet. Company expects approximately 500 workstations across
all the sites with approximate numbers in each building as follows:
 Finance Office - 100 workstations
 Transport Office - 50 workstations
 Research Office - 25 workstations
 Sales Office - 25 workstations
 Information technology - 250 workstations
 Head Office - 50 workstations
2. THREATS TO...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here