MPC (COMP 30019)–Spring –17–CW2 (ASSMNT)–ALL–QP
COMP 30019 (QP) Page 1 of 10
In Semester Coursework
Individual Assignment
Module: Network Security (COMP 30019)
Level: 3 Duration: 5 Weeks Max. Marks: 100
Proposal Submission Last Date: 6th May, 2017 Last Date of Submission: 27th May, 2017
Instructions to Student: • Present the relevant citation / references at the end of document • Marks will be awarded for the content written in your own words • All the tasks will be evaluated through viva. Students absent for viva will be awarded zero marks for the assignment. • Report must be uploaded on Moodle on or before the date of submission.
Objectives: Understanding Layered Security Architecture. Configuring TMG and implement NIS and IDS.
Tasks:
Task 1: (10 Marks)
Submit a work proposal for this assignment which must include: • Understanding of deliverables – a detail description of deliverables • General overview of proposed plan - initial understanding of solution to all the tasks • Resources identified
MPC (COMP 30019)–Spring –17–CW2 (ASSMNT)–ALL–QP
COMP 30019 (QP) Page 2 of 10
Task 2: This part evaluate students’ perceptive of Security Architecture. (50 Marks)
It is becoming increasingly critical that financial institutions ensure their banking customers are able to access their accounts with the highest reasonable security, using a process that is very straightforward and approachable. Technology has made it possible for hackers to extend their reach to vast number of potential victims through a wide variety of attack vectors. Therefore, banks are required to use a secure architecture to provide convenient and secure online services. Secure architecture can be achieved by having layered security. Layered security is a defensive strategy featuring multiple types of security measures, each protecting against a different vector for attack.
Students are required to do the following tasks:
a. Provide a literature review on layered Security Architecture. (20 marks)
(Hint: This should include: the understanding of layered security concept, detailed description of security layers, advantages and disadvantages of using layered security architecture)
b. As a network security consultant, suggest a layered security architecture for a small company’s network. (20 marks)
(Hint: Your architecture should include five levels of IT infrastructure)
c. The concept of layered security is commonly applied by banking system to provide a secure mobile banking services. From user side, Explore and identify what are security controls in your mBanking application. Evaluate the efficiency of these controls. (10 marks)
(Hint: provide screen shoots for all security messages appears in your application)
MPC (COMP 30019)–Spring –17–CW2 (ASSMNT)–ALL–QP
COMP 30019 (QP) Page 3 of 10
Task 3: (40 Marks)
You are the network administrator for 7colores Company. The company has implemented Microsoft Forefront TMG as the firewall. The company works 5 days a week (Sunday to Thursday) from 8am to 4pm. The company has the following requirements:
1. The Company management wants to implement Network Inspection System (NIS). The goal is to enable NIS to all networks except for servers located in the range 10.20.20.10 to 10.20.20.30. Those servers are considered administration servers, and do not require NIS traffic evaluation. TMG should check for updates every 25 minutes to obtain new signatures. The company wants to follow the default Microsoft policy when network traffic matches one of the active signatures.
2. The TMG intrusion detection should be able to detect Ping of death, UDP bomb and IP half scan attacks and all sorts of DNS attacks. TMG should filter the Time stamp and Loose Source Route during the IP options filtering. The Company management wants to block packets containing IP fragments, but wants to give the default settings for the SIP parameters.
You are required to complete the following configuration
a. Configure network Inspection System (NIS) as following : (20 marks) Configure an exception named ‘admin’ for the NIS Configure the address rule Element called ‘administration server’. Configure the excepted IP addresses range to be 10.20.20.10 to 10.20.20.30. Configure the signature update to be every 25 minutes
b. Configure an intrusion detection System (IDS): (20 marks) Enable detection for Ping of death, UDP bomb and IP half scan attacks Enable detection for all types of DNS attack. Configure Time stamp and Loose Source Route during the IP options filtering. Block packets containing IP fragments.
MPC (COMP 30019)–Spring –17–CW2 (ASSMNT)–ALL–QP
COMP 30019 (QP) Page 4 of 10
Evaluation Criteria:
The evaluation will be done on the strength of analysis presented in the assignment: • Task 1: Assignment work proposal submission: 10 Marks
Submit a work proposal for this assignment on or before, which must include:
Understanding of deliverables – a detail description of deliverables General overview of proposed plan - initial understanding of solution to all the tasks Resources identified Work proposal should be submitted in the form of word document in Moodle on or before 6th May, 2017.
• Assignment report submission 90 Marks
Submit the assignment report on or before 27th May, 2017, which must include:
Task 2:
Students are required to write a report, not more than 3,000 words, the report should include: • Understanding of layered security architecture. • A layered security architecture for a small company network.
• Listing and evaluating of security controls in an mBanking application
Task 3: TMG configuration • Configuration of NIS to satisfy the given requirements • Configuration of IDS to satisfy the given requirements
MPC (COMP 30019)–Spring –17–CW2 (ASSMNT)–ALL–QP
COMP 30019 (QP) Page 5 of 10
Guidelines:
Follow the guidelines mentioned below for your assignment: The document should not be more than 15 to 19 pages in (size A4) paper. The document should be well presented and neatly done. Assignment should be submitted through Moodle (Turnitin). Handwritten assignments will not be accepted. Assignment should have a title page. Title page should contain the following information: o Title of the assessment, o Names of the student, o Student ID, o Session, o Department Name, o Semester Name, Academic Year
It should have Table of Contents, references. Use page numbers Assignment should be computer typed using Calibri size 12 font and the Softcopy is to be submitted through Moodle (Turnitin). Heading should be with Font Size 14, Bold, Underline Use Diagrams and Examples to explain your topic. Copy paste from the Internet is strictly not acceptable. In-text citation and referencing using CU Harvard referencing Style.
Rules & Regulations • If any topic or diagram of an assignment is found copied from the other then marks will be deducted from both assignments. • The purpose of assignment is to do some research work so you can consult books in Library or use internet or computer magazines or any other source. • Zero Marks will be awarded if the student is absent from viva. The performance will be evaluated through viva and there is no mark for viva.
MPC (COMP 30019)–Spring –17–CW2 (ASSMNT)–ALL–QP
COMP 30019 (QP) Page 6 of 10
Late Submission Policy
Penalty for late report submission - 5% of the obtained marks for the assessment will be deducted for
each working day.
Document submitted beyond a period of one week after the last date of submission will not be accepted
and will be marked as zero for that assessment.
Feedback to Students Work proposal should be submitted through Moodle on or before 6th May, 2017. Feedback will be given by 9th April, 2017.
The student will obtain the final feedback on assignment through Moodle by 14th week.
MPC (COMP 30019)–Spring –17–CW2 (ASSMNT)–ALL–QP
COMP 30019 (QP) Page 7 of 10
Plagiarism Policy
As per MEC policy, any form of violation of academic integrity will invite severe penalty. Plagiarized
documents, in part or in whole, submitted by the students will be subject to this policy. A. First offence of plagiarism a. A student will be allowed to re-submit the assignment once, within a maximum period of one
week. However, a penalty of deduction of 25% of the marks obtained for the resubmitted work
will be imposed. b. Mark deduction: When the work is resubmitted, the marking will be undertaken according to the
marking criteria. In compliance with this policy, the 25% deduction is then made on the marks
obtained. For example, in an assessment that carries a maximum of 50 marks, suppose a student
were to obtain 30 marks for the resubmitted work, the final marks for that assessment will be
22.5 (after deducting 25% of the marks actually obtained for the resubmitted work). c. Period of resubmission: The student will have to resubmit the work one week from the date he or
she is advised to resubmit. For example, if the formal advice to resubmit was communicated to
the student on a Sunday (latest by 5 pm), the student will have to resubmit the work latest by
next Sunday 5 pm. d. If the re-submitted work is also detected to be plagiarized, then the work will be awarded a zero.
e. Resubmission of the work beyond the maximum period of one week will not be accepted and the
work will be awarded a zero.
B. Any further offence of plagiarism
a. If any student is again caught in an act of plagiarism during his/her course of study (either in the
same module, same semester or in any other semester), the student will directly be awarded
zero for the work in which plagiarism is detected. In such cases, the student will not be allowed to
re-submit the work.
MPC (COMP 30019)–Spring –17–CW2 (ASSMNT)–ALL–QP
COMP 30019 (QP) Page 8 of 10
C. Guidelines
a. Type 1: In case plagiarism is detected in any component or part submission (submitted at
different times) of one assessment (assignment), the deduction in marks will be applicable for the
whole assessment (assignment), even if only the component or part submission alone needs to
be resubmitted. b. Type 2: In case plagiarism is detected in a group assessment, all students of the group will be
considered as having committed an act of plagiarism irrespective of whether plagiarism is on
account of the act of all or a few or only one member. The policy will then be applied to all
students. c. Type 3: Combination of Type 1 and Type 2: In case plagiarism is detected in any component or
part submission (submitted at different times) of a group assessment (assignment), the deduction
in marks will be applicable for the whole assessment (assignment), even if only the component or
part submission alone needs to be resubmitted. All students of the group would be considered as
having committed an act of plagiarism irrespective of whether plagiarism is on account of the act
of all or a few or only one member. The policy will then be applied to all the students of the
group. d. Type 4: Variation of Type 1 and Type 2: In cases where the assessment consists of components or
part submissions that could be a group assessment component (e.g. group assignment) and an
individual assessment component (e.g. individual reflection), the following will be applicable:
1. If plagiarism is detected in the group assessment component, all students of the group
will be considered as having committed an act of plagiarism, irrespective of whether
plagiarism is on account of the act of all or a few or only one member. The policy will then
be applied to all students of the group. In such cases the group assessment component
will be resubmitted as per the policy.
2. If plagiarism is detected in the individual assessment component, the individual
assessment component will be resubmitted as per the policy. The policy will then be
applied to that student alone.
MPC (COMP 30019)–Spring –17–CW2 (ASSMNT)–ALL–QP
COMP 30019 (QP) Page 9 of 10
3. In both cases (a) and/or (b), the deduction in marks will be applicable for the whole assessment
(assignment).
D. Amount of similar material a. The total amount of similar material in any form of student work from all sources put together should
not exceed 30% (including direct quotations).
b. The total amount of quoted material (direct quotations) in any form of student work from all sources
put together should not exceed 10%.
c. The total amount of similar material in any form of student work from a single source should not exceed
7 percent. However, cases having a similarity of less than 7 percent in such cases may still be
investigated by the faculty depending on the seriousness of the case.
d. If faculty member find enough merit in the case of a student work with a similarity (with a single source)
of more than 7 percent as not a case of plagiarism, the faculty member should provide detailed
comments/remarks to justify the case.
MPC (COMP 30019)–Spring –17–CW2 (ASSMNT)–ALL–QP
COMP 30019 (QP) Page 10 of 10
COMP 30019 – Network Security (Assignment) – Spring 2017
ASSESSMENT EVALUATION SHEET Student Name: _________________________________________________ Student ID: ____________
Deliverables 0-10 Marks Task 1 : Submission of Work proposal Understanding of deliverables – a detail description of deliverables General overview of proposed plan - initial understanding of solution to all tasks Resources identified
0 1-8 9-16 17-20 Marks
Task2 .a : analyzing the layered security architecture
Not attempted/ Plagiarized Report
Partially correct Analyzed and missing in- text citations
Satisfactory Analyzed with some missing citations
Excellent work with complete and Accurate analyzation accompanied by diagrams
Task 2.b : layered security architecture for small company network
0 1-8 9-16 17-20 Marks
No Attempt / Plagiarized Report
Partially correct report with missing citations
Satisfactory report with some missing citations
Excellent work with complete and Accurate details
Task 2.c : mbanking application security controls
0 1-3 4-7 8 -10 Marks
No Attempt / Plagiarized Report
Partially correct report with missing citations
Satisfactory report with some missing citations
Excellent work with complete and Accurate details
Task 3. a : configure NIS
0 1-8 9-16 17-20 Marks
No Attempt / Plagiarized Report
Partially correct configuration with some missing configuration
Satisfactory correct configuration with some missing configuration
Excellent correct and complete configuration
Task 3.b: Configure IDS 0 1-8 9-16 17-20 Marks
No Attempt / Plagiarized Report
Partially correct configuration with some missing configuration
Satisfactory correct configuration with some missing configuration
Excellent correct and complete configuration
Comments: Total Marks Penalty Final Marks