Assignment title: Information


BN203: Network Security 1/Overview of Network Security Assignment 2 (20%) BN203: Total 20 Marks Due Date: Friday of Week 11 Assignment Overview Purpose of the assessment: The purpose of this assignment is to develop skills to identify appropriate network security tools for various operating systems. Students will also have opportunity to explore the use of the tools on specific security risks and/or vulnerabilities. This exercise gives student the opportunity to build skills such as the ability to identify secure information strategy, and the ability to administrate system security commands. Description of the assessment: Answer the following points. This task requires you to do literature search on internet, magazines, publications of journal or conference, textbook etc. This is an individual assignment. Therefore, it is very important to write the findings in your own words. 1. Choose one of the following IT systems: 1) Cloud apps Security 2) Mobile apps Security 3) Data Centre Security 4) Enterprise Security 2. Find and discuss a case study on your chosen IT system. 3. Identify three (3) security vulnerabilities in the chosen case study. 4. Discuss how these threats can be mitigated using security policies and security tools. 5. Summarize the discussion and results. Trimester 1, 2016BN203/MN502 Page 2 of 3 Submission guidelines: 1. Submit softcopy of the assignment report with signed coversheet. 2. Your report should include the following:  The cover page must identify student (name and number), teaching staff, and assignment.  The assignment must be written using IEEE conference template and should be no more than four (4) pages.  Reference sources (IEEE style) must be cited in the text of the report, and listed appropriately at the end. Extensions: Requests for an extension, accompanied by supporting documentation, must be received by the student in writing before 3 working days from the due date else penalties may apply for late submission without an approved extension. Special consideration form is available on level 8 reception. Penalties: Academic misconduct such as cheating and plagiarism may incur penalties ranging from a reduced result to program exclusion.BN203/MN502 Page 3 of 3 Marking Rubric for Assignment #: Total Marks Marker's Name: Mark Achieved: Excellent Good Unsatisfactory Introduction All topics are pertinent and Generally This is not relevant to the covered in depth. Ability to relevant and assignment topic. /5 think critically and source analysed. material is demonstrated Find and discuss a Finding is clearly linked and Finding is linked Finding is not linked and case study relating justified and convincing unjustified to the issues /6 Three (3) security vulnerabilities /9 Exceptional discussion on Security vulnerabilities for the system. Identifying highly sophisticated and well referenced vulnerabilities. Two security threats for the system or a reasonable discussion Not related to the security threats Advance discussion on threats Good discussion Not related to network security. Discuss how these mitigation using latest on threats threats can be technologies and procedures. mitigation using mitigated technologies and /12 procedures. Summary/ Clear understanding and Basic Very little attempt to explain Demonstration confident demonstration with understanding all features, advantage and and /4 disadvantage. demonstration with all features, advantage and disadvantage of the tool Reference style /4 Clear styleswith excellent source of references. Generally good referencing style Lacks consistency with many errors Poor writing -5 Plagiarism -40