Assignment title: Information
BN203: Network Security 1/Overview of Network Security
Assignment 2 (20%)
BN203: Total 20 Marks
Due Date: Friday of Week 11
Assignment Overview
Purpose of the assessment:
The purpose of this assignment is to develop skills to identify appropriate network security tools for
various operating systems. Students will also have opportunity to explore the use of the tools on
specific security risks and/or vulnerabilities. This exercise gives student the opportunity to build skills
such as the ability to identify secure information strategy, and the ability to administrate system
security commands.
Description of the assessment: Answer the following points. This task requires you to do literature
search on internet, magazines, publications of journal or conference, textbook etc. This is an
individual assignment. Therefore, it is very important to write the findings in your own words.
1. Choose one of the following IT systems:
1) Cloud apps Security
2) Mobile apps Security
3) Data Centre Security
4) Enterprise Security
2. Find and discuss a case study on your chosen IT system.
3. Identify three (3) security vulnerabilities in the chosen case study.
4. Discuss how these threats can be mitigated using security policies and security tools.
5. Summarize the discussion and results.
Trimester 1, 2016BN203/MN502 Page 2 of 3
Submission guidelines:
1. Submit softcopy of the assignment report with signed coversheet.
2. Your report should include the following:
The cover page must identify student (name and number), teaching staff, and assignment.
The assignment must be written using IEEE conference template and should be no
more than four (4) pages.
Reference sources (IEEE style) must be cited in the text of the report, and listed
appropriately at the end.
Extensions: Requests for an extension, accompanied by supporting documentation, must be
received by the student in writing before 3 working days from the due date else penalties may
apply for late submission without an approved extension. Special consideration form is available
on level 8 reception.
Penalties: Academic misconduct such as cheating and plagiarism may incur penalties
ranging from a reduced result to program exclusion.BN203/MN502 Page 3 of 3
Marking Rubric for Assignment #: Total Marks
Marker's Name: Mark Achieved:
Excellent Good Unsatisfactory
Introduction All topics are pertinent and Generally This is not relevant to the
covered in depth. Ability to relevant and assignment topic.
/5 think critically and source analysed.
material is demonstrated
Find and discuss a Finding is clearly linked and Finding is linked Finding is not linked and
case study relating justified and convincing unjustified
to the issues
/6
Three (3) security
vulnerabilities
/9
Exceptional discussion on
Security vulnerabilities for
the system. Identifying highly
sophisticated and well
referenced vulnerabilities.
Two security
threats for the
system or a
reasonable
discussion
Not related to the security threats
Advance discussion on threats Good discussion Not related to network security.
Discuss how these mitigation using latest on threats
threats can be technologies and procedures. mitigation using
mitigated technologies and
/12 procedures.
Summary/ Clear understanding and Basic Very little attempt to explain
Demonstration confident demonstration with understanding
all features, advantage and and
/4 disadvantage. demonstration
with all features,
advantage and
disadvantage of
the tool
Reference style
/4
Clear styleswith excellent
source of references.
Generally good
referencing style
Lacks consistency with many
errors
Poor writing -5
Plagiarism -40