Computer Network and Security Assessment-2 (NTW600) Assignment Help

 

Subject Code 

NTW 600

Subject Name 

Computer Network and Security

Assessment Number and Title 

Assessment 2: Cyber Security Threats to IT  Infrastructure of a real-world Organisation

Assessment Type 

Group Assessment 

Length / Duration 

1500 words

Weighting % 

30% 

Project Report: 20% 

Presentation :10% (Recorded)

Total Marks 

100

Submission 

Online Submission

Due Date 

Week-8 (Sunday at 23:59)

Mode 

Face-to-Face 

Group

Format 

a) Report  

b) Recorded Presentations 


Assessment Description and Instructions 

In this assessment students are required to choose a real-world organization (e.g.  hospital, bank, school etc) and critically evaluate its infrastructure for possible Cyber  Security threats and vulnerabilities. You will then propose appropriate security  technologies and tools to mitigate those threats and vulnerabilities. You will also  research the academic literature for various security risk management strategies and  select the strategies that are suitable for your organization. 

Submission Details 

This is a group assessment. Please make groups of 4 students. You must discuss and  finalize the chosen organization with the instructor. Do not start working on the  assessment before taking approval from the instructor. The report is to be submitted  in a word or pdf format. The assessment carries 30% weightage. The report length  should be not less than 1500 word and not more than 2000 words. The word count  does not include the title page, table of contents, list of references and figures. Ensure  all pages are numbered. Similarity index of your report should be less than 20%. The  deadline to submit the report is by midnight Sunday 

Assessment Details 

The details of the assessment are as follows: 

Each group will select an Organization of their choice. The Organization  should be a medium to large enterprise with branches in multiple  locations.  

Able to provide each group with access to information about the various  aspects of the ICT Infrastructure including user communities, network  operations, various servers and other devices (e.g. firewalls, load  balancers etc.). 

The current ICT infrastructure of the Organization should be critically  evaluated to find potential security vulnerabilities and threats. 

A revised ICT infrastructure for the Organization should be developed  with recommendations on the following aspects. 

Security tools that should be used by the Organization to protect from  different vulnerabilities and threats present in the current ICT  Infrastructure. 

Security technologies that will enable the Organization to use best  practices in information security. 

Security management strategies that can be developed by the  Organization to carry out planning, risk analysis, risk management,  incident handling and maintenance. 

Structure of Report 

1-Title page 

This must contain the title of the report (make title as informative as possible),  Names and IDs of all group members, unit code and name. 

2-Abstract 

The abstract provides an overview of the entire report. The purpose of the  abstract is to briefly explain vulnerabilities and threats faced by the current ICT  infrastructure of the organization. Key security tools and technologies used by  the organization in the new ICT infrastructure need to be briefly explained here.  Security management strategies utilized by the organization should also be  summarized here. The length of the abstract is between 200-300 words. Do not  use headings, figures or in-text citations in this section. 

3-Table of Contents 

Ideally, but not necessarily, constructed using the hyperlink functions in Word.  Lists of figures and tables are not required. 

4-Introduction

This section concerns the context and aims of the report. Mention (in just a few  paragraphs) the background of the organization e.g. type of organization, number of  employees, number of branch offices. Briefly explain the key security requirements of  the organization and possible repercussions if a security breach occurs. Given all of  this, state the main aim of the report together with a short account of the tasks required  to be carried out. 

5-Main Body 

5.1-Existing ICT Infrastructure of the organization 

In this section you should explain the key components of the current ICT  Infrastructure of the organization. You should draw a figure of the current  infrastructure clearly showing various components of the infrastructure such as  servers, firewalls, routers and other devices. The current infrastructure should  be critically evaluated to find various security threats and vulnerabilities. Each  security threat and vulnerability should be explained with citations of academic  resources. 

5.2-New ICT Infrastructure of the Organization 

In this section, you should first explain the various components of the new  infrastructure with the help of a figure. This new ICT infrastructure should  remove the security threats and vulnerabilities that are present in the old ICT  infrastructure. You should explain about tools, technologies and security  management strategies employed in the new ICT infrastructure in separate  subsections. The details about these subsections are given below. 

5.3-Security Tools and Technologies 

Research on various security tools and Technologies discussed in the  academic literature and recommend which tools can be used in the new ICT  infrastructure to overcome the threats and vulnerabilities. Explanation of each  tool is needed along with appropriate citations of academic resources. 

5.4-Security Management Strategies 

Research on various security management strategies discussed in the  academic literature and select the strategies that are suitable for your  organization. Explanation of security management strategies is needed along  with appropriate citations of academic resources. 

6-Conclusions 

Using an analysis of the preceding sections, the conclusions should summarize your  key findings. Conclusions are the results of your own critical thinking, they should be  justified through analysis of your findings and written in your own words with no  citations.

7-References 

These should be formatted in Harvard style. At least 15 recent and relevant academic  resources (i.e. peer-reviewed journal articles and conference papers, books) are  needed in the report. 

Submission Guidelines: 

Students are expected to use PIA template for report writing and complete a  report not less than 1500 words with a report structure as explained below: and evidence to support your implementation and testing efforts.

NTW600 Assessment # 2 Marking Rubric Assessment Title Cyber  Security Threats to IT Infrastructure of a real-world Organization

 

Marking 

F (Fail) 

0-49%

P (Pass) 

50-64%

C (Credit) 

65-74%

D (Distinction) 

75-84%

HD (High Distinction) 85-100%

Abstract/ Table of  Contents/  

Introduction 

(20)

Unsatisfactorily or  

unclearly conveys the  project topic. 

This is not relevant to  the assignment topic. Completely unable to  understand and/or  

current ICT 

infrastructure is  

explained with major  errors and omissions

Fairly conveys the  

project topic. 

Some relevance and  briefly presented. 

Poor intro of the  

project or  

poorly/partially  

implement and current ICT infrastructure 

is explained more than  one major error and/or  more than one major  omission

Accurately conveys  the project topic,  

methods. 

Generally relevant and  analysed. 

Fair analysis of the  analysis of the project and the current ICT  infrastructure 

is explained.  

one major error and/or  one major omission

Accurately conveys  the project topic,  

methods. 

Generally relevant and  analysed. 

Good analysis of the  project CurrentICT  

infrastructure is  

explained with. 

Minor errors and/or  omissions

Accurately Plus  

concisely conveys  the project topic,  

methods, and  

outcomes. 

All topics are  

pertinent and  

covered in depth.  Ability to think  

critically and source  material is  

demonstrated. 

Excellent analysis of  the project and  

ccurrent ICT  

infrastructure is  

clearly explained.

Main Body 

i)Threats and 

vulnerabilities in  Existing ICT  

Infrastructure. 

ii)Threats and 

vulnerabilities in  Current ICT  

Infrastructure 

iii) Security Tools  and Technologies 

Unable to design/  

develop/Implement/co mmence the major  issues related to  

current ICT  

infrastructure. New  ICT infrastructure is  not clearly explained  and has major errors  and omissions. 

Security  

tools/Technologies  and management  

strategies to overcome  threats and 

Poorly implement  

/commence the major  issues related to  

current ICT  

infrastructure. New  ICT infrastructure is  not clearly explained  and has major errors  and omissions.  

Security  

tools/Technologies  and management  

strategies to overcome  threats and  

vulnerabilities are 

Accurately implement  /commence the major  issues related to  

current ICT  

infrastructure. New  ICT infrastructure is  not clearly explained  and has major errors  and omissions.  

Security  

tools/Technologies  and management  

strategies to overcome  threats and  

vulnerabilities are

Accurately implement /commence the major  issues related to  

current ICT  

infrastructure. New  ICT infrastructure is  not clearly explained  and has major errors  and omissions.  

Security  

tools/Technologies  and management  

strategies to overcome  threats and  

vulnerabilities are 

Excellently 

commence the major  issues related to  

current ICT  

infrastructure. New  ICT infrastructure is  not clearly explained  

and has major errors  and omissions.  

Security  

tools/Technologies  and management  strategies to  

overcome threats  and vulnerabilities 

 

iv) Security  

Management  

Strategies  

(40)

vulnerabilities are  

explained with major  errors and omissions

explained with major  errors and omissions

explained with one  major error and/or one  major omission

explained well with  minor errors and/or  omissions

are explained well  without any error. 

Conclusion/  

Report  

Formatting/  

References 

(15)

Argument is confused  and disjointed. 

Lacks consistency with  many errors. Weak  Conclusion 

Adequate cohesion  and conviction. 

Sometimes clear  

referencing style.  

Weak Conclusion

Mostly consistent  

logical and convincing. Generally good  

referencing style. Well  augmented conclusion

Consistency logical  and convincing. 

Clear referencing  

style. Clear Conclusion

Logic is clear and  easy to follow with  strong arguments. Clear styles with  

excellent source of  references. Concrete  conclusion

Demonstration  

(25)

Demonstration is  

confused and  

disjointed. Lack of  

knowledge about the  design,  

implementation, and  development process 

Adequate cohesion  and conviction. Team  members show a poor  

knowledge about the  design,  

implementation, and  development process

Mostly consistent  

logical and convincing.  The student shows a  limited knowledge  

about the design 

implementation, and  development process

Consistency logical  and convincing. The  student shows a good  knowledge about the  design  

implementation, and  development process

Logic is clear and  easy to follow with  strong arguments. 

The student shows a  strong knowledge  about the design  

implementation, and  development  

process