Hi, I need this assignment by 28th September and the marking criteria is in the attached file. Thanks.
Prepared by: Dr Wanod Kumar Moderated by: Dr Tony Jan August, 2018 Assessment Details and Submission Guidelines Trimester 2, 2018 Unit Code MN502 Unit Title Overview of Network Security Assessment Type Individual Assignment (Assignment Two) Assessment Title Security Challenges in Emerging Networks Purpose of the assessment (with ULO Mapping) The purpose of this assignment is to develop skills to independently think of innovation. Students will be able to complete the following ULOs: c. Explain the major methodologies for secure networks and what threats they address; d. Identify and report network threats, select and implement appropriate countermeasures for network security. Weight 20% Total Marks 60 Word limit 1500 - 2000 Due Date 11:55PM, Friday 28/09/2018 Submission Guidelines All work must be submitted on Moodle by the due date along with a title Page. The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body) font and 2.54 cm margins on all four sides of your page with appropriate section headings. Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using IEEE referencing style. Extension If an extension of time to submit work is required, a Special Consideration Application must be submitted directly to the School's Administration Officer, in Melbourne on Level 6 or in Sydney on Level 7. You must submit this application three working days prior to the due date of the assignment. Further information is available at: http://www.mit.edu.au/about-mit/institute-publications/policies- procedures-and-guidelines/specialconsiderationdeferment Academic Misconduct Academic Misconduct is a serious offence. Depending on the seriousness of the case, penalties can vary from a written warning or zero marks to exclusion from the course or rescinding the degree. Students should make themselves familiar with the full policy and procedure available at: http://www.mit.edu.au/about-mit/institute-publications/policies- procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy- Procedure. For further information, please refer to the Academic Integrity Section in your Unit Description. http://www.mit.edu.au/about http://www.mit.edu.au/about http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy-Procedure http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy-Procedure http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy-Procedure Unit Code: MN502 Unit Name: Overview of Network Security Page#2 of 4 Prepared by: Dr Wanod Kumar Moderated by: Dr Tony Jan August, 2018 Assignment Description The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowledge based on current state of the art of an emerging knowledge domain. Then they will learn how to identify plausible security issues in this emerging network-based applications, and finally learn the skill of adding knowledge to existing domain by theoretically developing the corresponding protection mechanism for a particular issue. The use of network technologies is rapidly growing in healthcare sector. Now, healthcare is considered as one of the emerging application of network-based applications. Different network scenarios using wireless, wired, and mobile communications can provide efficient solutions to access electronic medical records (EMRs), medical management systems, imaging, biomedical information, material management, patient accounting, admitting information, and online claims submissions. Today, healthcare systems can combine these tools into one network-based infrastructure to more effectively communicate and collaborate, reduce errors, and improve patient care and efficiency. As healthcare providers adopt new technologies, they also face new security threats. Hackers, malicious software (malware), disgruntled employees, and human error present real dangers to healthcare networks [1]. Security of healthcare networks is a prime concern in today’s World. This assignment includes four parts 1. Literature review on Healthcare Networks. The literature review should be supported by at least three (3) academic (Journal/Conference) papers chosen from the current state of the art. Your discussion should include: i. Healthcare network architecture (consider networking devices such as routers, switches, firewalls, servers etc.) ii. Recent developments in healthcare networks iii. The importance of security in healthcare networks 2. Analyse critically, three current or possible future potential security issues in Healthcare Networks. In this section you will analyse critically, three security issues in Healthcare Networks. These issues should be taken from the current state of the art literature. This section must be supported by at least three (3) references. 3. Propose a possible solution for one of the threats identified in section-2. In this part you need to choose one of the issues identified in the previous section and propose a possible solution to the particular security issue. 4. Create a 3 - 5 minutes presentation and present your work during the Lab. You have to create a 3 - 5 minutes presentation to present your work in front of your class fellows and tutor during the Lab in Week 11. Unit Code: MN502 Unit Name: Overview of Network Security Page#3 of 4 Prepared by: Dr Wanod Kumar Moderated by: Dr Tony Jan August, 2018 [1] Cisco Healthcare Security Perspectives: Protect Your Patients, Your Practice, Yourself. [Online]. Available: https://www.cisco.com/c/dam/global/en_ca/solutions/strategy/healthcare/assets/docs/health _security_impgd.pdf, accessed July 25, 2018. Submission Guidelines The assignment should be submitted on the Moodle in two separate files: 1. The report should be submitted as a Word file 2. The presentation should be submitted as a PPT file Marking criteria: Section to be included in the report Description of the section Marks Introduction Introduction of Healthcare Networks. Introduction should also discusses the report outline. 5 Literature Review Literature review of Healthcare Networks Healthcare network architecture (consider networking devices such routers, switches, firewalls, servers etc.) Recent developments in healthcare networks The importance of security in healthcare networks 15 Analyse Critically Analyse critically, three potential security issues in Healthcare Networks. 12 Threat Mitigation Technique Discuss in detail a threat mitigation technique for one of the security threat 10 Report layout The report layout should be appropriate (following the submission guidelines and containing all the sections mentioned above) 3 Reference Style Follow IEEE reference style 5 Presentation Slides The presentation slides should be well organised and clear. 5 Oral Presentation Delivery of the presentation (quality of the presentation, depth of knowledge on the material presented and ability to answer questions asked by the audience) 5 Total 60 https://www.cisco.com/c/dam/global/en_ca/solutions/strategy/healthcare/assets/docs/health_security_impgd.pdf https://www.cisco.com/c/dam/global/en_ca/solutions/strategy/healthcare/assets/docs/health_security_impgd.pdf Unit Code: MN502 Unit Name: Overview of Network Security Page#4 of 4 Prepared by: Dr Wanod Kumar Moderated by: Dr Tony Jan August, 2018 Marking Rubric for Assignment #2: Total Marks 60 Grade Mark HD 80% D 70%-79% CR 60%-69% P 50%-59% Fail<50% excellent very good good satisfactory unsatisfactory introduction /5 introduction is very well written and the report outline is also discussed introduction is well written and the report outline is also discussed introduction is generally presented along with the report outline introduction is presented briefly and is missing the report outline poor introduction with irrelevant details literature review /15 excellent literature review with proper referencing well written literature review presented with correct references good literature review presented with references brief literature review with proper referencing poorly written literature review analyse critically /12 exceptional discussion on security issues in healthcare networks. identifying highly sophisticated and well referenced vulnerabilities exceptional discussion on security issues in healthcare networks. good discussion on three security issues discussion on two security issues unable to identify security issues threat mitigation technique /10 a very clear and in-depth discussion about threat mitigation technique very clear discussion about threat mitigation technique generally good discussion threat mitigation technique brief discussion about threat mitigation technique poor discussion about threat mitigation technique with irrelevant information report layout /3 well-designed layout and proper formatting following the submission guidelines and containing all the sections well-designed layout following the submission guidelines and containing all the sections good layout following the submission guidelines and containing all the sections report layout following the submission guidelines and missing some sections report lacks a proper layout reference style /5 clear styles with excellent source of references clear referencing style generally good referencing style sometimes clear referencing style lacks consistency with many errors presentation slides /5 well organised and resourceful organised and resourceful resourceful but could be better organised resourceful slides neither resourceful nor well organised oral presentation /5 good delivery, easy to follow and good interaction delivered, easy to follow and provided a level of interaction delivered and provided a level of interaction delivered no oral presentation excellent="" very="" good="" good="" satisfactory="" unsatisfactory="" introduction="" 5="" introduction="" is="" very="" well="" written="" and="" the="" report="" outline="" is="" also="" discussed="" introduction="" is="" well="" written="" and="" the="" report="" outline="" is="" also="" discussed="" introduction="" is="" generally="" presented="" along="" with="" the="" report="" outline="" introduction="" is="" presented="" briefly="" and="" is="" missing="" the="" report="" outline="" poor="" introduction="" with="" irrelevant="" details="" literature="" review="" 15="" excellent="" literature="" review="" with="" proper="" referencing="" well="" written="" literature="" review="" presented="" with="" correct="" references="" good="" literature="" review="" presented="" with="" references="" brief="" literature="" review="" with="" proper="" referencing="" poorly="" written="" literature="" review="" analyse="" critically="" 12="" exceptional="" discussion="" on="" security="" issues="" in="" healthcare="" networks.="" identifying="" highly="" sophisticated="" and="" well="" referenced="" vulnerabilities="" exceptional="" discussion="" on="" security="" issues="" in="" healthcare="" networks.="" good="" discussion="" on="" three="" security="" issues="" discussion="" on="" two="" security="" issues="" unable="" to="" identify="" security="" issues="" threat="" mitigation="" technique="" 10="" a="" very="" clear="" and="" in-depth="" discussion="" about="" threat="" mitigation="" technique="" very="" clear="" discussion="" about="" threat="" mitigation="" technique="" generally="" good="" discussion="" threat="" mitigation="" technique="" brief="" discussion="" about="" threat="" mitigation="" technique="" poor="" discussion="" about="" threat="" mitigation="" technique="" with="" irrelevant="" information="" report="" layout="" 3="" well-designed="" layout="" and="" proper="" formatting="" following="" the="" submission="" guidelines="" and="" containing="" all="" the="" sections="" well-designed="" layout="" following="" the="" submission="" guidelines="" and="" containing="" all="" the="" sections="" good="" layout="" following="" the="" submission="" guidelines="" and="" containing="" all="" the="" sections="" report="" layout="" following="" the="" submission="" guidelines="" and="" missing="" some="" sections="" report="" lacks="" a="" proper="" layout="" reference="" style="" 5="" clear="" styles="" with="" excellent="" source="" of="" references="" clear="" referencing="" style="" generally="" good="" referencing="" style="" sometimes="" clear="" referencing="" style="" lacks="" consistency="" with="" many="" errors="" presentation="" slides="" 5="" well="" organised="" and="" resourceful="" organised="" and="" resourceful="" resourceful="" but="" could="" be="" better="" organised="" resourceful="" slides="" neither="" resourceful="" nor="" well="" organised="" oral="" presentation="" 5="" good="" delivery,="" easy="" to="" follow="" and="" good="" interaction="" delivered,="" easy="" to="" follow="" and="" provided="" a="" level="" of="" interaction="" delivered="" and="" provided="" a="" level="" of="" interaction="" delivered="" no="" oral="">50% excellent very good good satisfactory unsatisfactory introduction /5 introduction is very well written and the report outline is also discussed introduction is well written and the report outline is also discussed introduction is generally presented along with the report outline introduction is presented briefly and is missing the report outline poor introduction with irrelevant details literature review /15 excellent literature review with proper referencing well written literature review presented with correct references good literature review presented with references brief literature review with proper referencing poorly written literature review analyse critically /12 exceptional discussion on security issues in healthcare networks. identifying highly sophisticated and well referenced vulnerabilities exceptional discussion on security issues in healthcare networks. good discussion on three security issues discussion on two security issues unable to identify security issues threat mitigation technique /10 a very clear and in-depth discussion about threat mitigation technique very clear discussion about threat mitigation technique generally good discussion threat mitigation technique brief discussion about threat mitigation technique poor discussion about threat mitigation technique with irrelevant information report layout /3 well-designed layout and proper formatting following the submission guidelines and containing all the sections well-designed layout following the submission guidelines and containing all the sections good layout following the submission guidelines and containing all the sections report layout following the submission guidelines and missing some sections report lacks a proper layout reference style /5 clear styles with excellent source of references clear referencing style generally good referencing style sometimes clear referencing style lacks consistency with many errors presentation slides /5 well organised and resourceful organised and resourceful resourceful but could be better organised resourceful slides neither resourceful nor well organised oral presentation /5 good delivery, easy to follow and good interaction delivered, easy to follow and provided a level of interaction delivered and provided a level of interaction delivered no oral presentation>