Computer Networks and Security Trimester-1 (ICT5250) Assignment Help

Assessment Overview

Assessment Task

Type

Weighting

Due

Length

ULOs

Assessment 1:

Quiz

Quizzes assess students’ ability to  understand theoretical materials. The  quiz will be either multiple choice  questions or short questions which are  relevant to the lecture materials.

Individual

Invigilated

10%

Weeks

4, 8

15 minutes

(equiv.

500

words)

ULO1

ULO2

ULO4

Assessment 2: Laboratory Practicum Students will complete in-class

workshop assessments including online situation analyses and practical

applications of skills.

Individual

Invigilated

20%

Weeks

3, 5, 6, 7

(equiv.

2000

words)

ULO1

ULO2

ULO4

Assessment 3: Network simulation  Construct an efficient operating  network for a small organisation within  a simulation environment.

Individual

40%

Week

10

1000

words

+

Design

(equiv.

2000

words)

ULO2

Assessment 4: System vulnerabilities  and mitigation

Each group will research, share, and  report to on recent information security  attacks covering different types of  attacks. The report should detail the  mode and impact and outline potential  mitigation strategies and technologies  that could have prevented such attacks.

Students should discuss IT security, risk  threats and management to a selected  organization and implement simple  cryptography algorithms.

Group

30%

Week 12

3000

words

ULO3

ULO4

Note for all assessment tasks:

• Students can generate/modify/create text generated by AI. They are then asked to modify the  text according to the brief of the assignment.

• During the preparation and writing of an assignment, students use AI tools, but may not  include any AI-generated material in their final report.

• AI tools are used by students in researching topics and preparing assignments, but all AI generated content must be acknowledged in the final report as follows:

Format

I acknowledge the use of [insert the name of AI system and link] to [describe how it was  used]. The prompts used were entered on [enter the date in ddmmyyy:] [list the prompts  that were used]

Example

Tools

I acknowledge the use of ChatGPT to create content to plan and  brainstorm ideas for my assessment. The prompts used were entered on 18 March 2023: • What are some key challenges in running an online business?

Assessment 1: Quiz

Due date:

Week 4, 8

Group/individual:

Individual-Invigilated

Word count / Time provided:

500

Weighting:

10% quizzes

Unit Learning Outcomes:

ULO-1, ULO-2, ULO-4

Assessment Details:

This assessment also includes an invigilated quiz that will assess your ability to understand  theoretical materials and your knowledge of key content areas. The quiz will be either multiple  choice questions or short questions that are relevant to the lectures or lecture materials. For  successful completion of the quiz, you are required to study the material provided (lecture slides,  tutorials, and reading materials) and engage in the unit’s activities. The prescribed textbook is the  main reference along with the recommended reading materials.

Marking information: The assessment will be marked out of 100 and will be weighted 10%.

Assessment 2: Laboratory Practicum

Due date:

Weeks 3, 5, 6 7

Group/individual:

Individual-Invigilated

Word count / Time provided:

2000

Weighting:

20%

Unit Learning Outcomes:

ULO-1, ULO-2, ULO-4

Assessment Details:

Practical exercises assess students’ ability to apply theoretical learning to practical, real-world situations on a weekly basis. The practical exercises will improve student’s ability to practice  information security using Linux/Kali Linux platform such as phishing attacks, encryption and  steganography and other functions.

Students will be required to complete the practical exercises during the workshop and therefore,  attendance is required as part of this assessment. Students will not be assessed on work that is not  produced in the workshop, so attendance is required as part of this assessment. Students are  required to submit the work that they have completed during the workshop session only. The details  of the lab work and requirements are provided on the online learning system.

Assessment 2 Marking Criteria and Rubric

Multi-labs will have questions and activities to be completed for a total of 100 marks then  will be scaled to 20%.

Assessment 2 Marking Criteria and Rubric

Marking Criteria

Not Satisfactory  (0-49% of the

criterion mark)

Satisfactory

(50-84% of the

criterion mark)

Excellent

(85-100% of the  criterion mark)

Lab Screenshots

(40%)

All Necessary

Screenshots were

taken.

Very few

screenshots, or

screenshots taken  without time, day  and name shown

Not all necessary

screenshots have

been taken

Excellent

submission, all  necessary

screenshots were  taken.

Apply Lab

Reflections (60%)

Screenshots with

reflections

Very few

screenshots,

without

explanation or

reflection, just

click next

Not all screenshots  have been explained  and reflected upon

Excellent

submission, all  screenshots have  been explained  and reflected

upon

Assessment 3: Network simulation

Due date:

Week 10

Group/individual:

Individual

Word count / Time provided:

3000

Weighting:

40%

Unit Learning Outcomes:

ULO-2

APIC

Assessment Objective

• This assessment enables you to comprehend the fundamental concept of network design  and acquire the skills necessary to develop both logical and physical network designs. • The simulation of a Local Area Network (LAN) using Packet Tracer enables you to  comprehend the network architecture and acquire the necessary skills to successfully set up  a LAN.

Assessment Details:

ABC is a global IT company which mainly based in USA. Recently, the company has decided to move  to the Australian market. ABC has decided to establish two main branches (Brisbane and Sydney)  with three networks as follows:

• Brisbane (in a two-story structure):

o NET-A: 10.10.1XY.0/24, will have up to 300 employees.

• Sydney (in a three-story structure):

o NET-B: 172.16.1XY.0/24, will have up to 200 employees,

o NET-C: 192.168.1XY.0/24 will have up to 400 employees.

Every department has its own server. It is recognised that employees should be able to  communicate with and access data from various servers within the two locations. You are tasked to  design a network (LAN) for the Sydney branch (enterprise campus). The Sydney branch will be  connected to the Brisbane branch. Consequently, you need to incorporate WAN access into the  design of the LAN for the two branches.

The network will contain a data centre as well as an e-commerce edge. In addition, employees will  bring their own mobile devices to work (e.g., laptops, smartphones, tablets). Wireless  communication facilities (Wi-Fi access sites) will be used by employees to access necessary  information such as their work email, required documents, and the Internet.

Requirements

You have been recruited as an IT Administrator in the IT department and tasked with analysing,  designing, configuring, and simulating the new network for the Brisbane and Sydney branches.

There are two parts of the requirements for this assignment, network design and network  simulation.

a) Network Design Tasks [30 marks]

Task 1

Develop a logical design of the Sydney network branch using the building-block network design  process. Consider the anticipated expansion of NDC. You need to consider the following elements  for the logical design:

• Network architecture components.

• Application systems.

• Network users.

• Categorizing network needs

Task 2

Design the network’s physical architecture based on the logical architecture completed in Task 1.  Note that you are not required to alternative design. Regarding the physical construction, you need  to consider the following:

• Designing client and servers

• Designing circuits

• Network design tools

Note: The following drawing tools can be used to create both logical and physical layouts. • Concept Draw or

• SmartDraw

• Lucidchart

• Cisco Packet Tracer or any other network design software to draw the layout of logical and  physical network designs.

Task3

Briefly describe how you will minimise interference from Wi-Fi access points (APs) on separate  floors.

b) Simulation [70 marks]

You have been asked to use the Packet Tracer, as shown in Figure 1, for the simulation task.  Simulate and test the configuration using the ping command for both Local delivery (devices within  the same network) and remote delivery (devices within separate networks, such as Brisbane and  Sydney).

You can use the Lecture notes or VLSM to subnet the networks.

Prepare a report to provide the details configuration for the network for ABC company.

In this task, you will complete the required information using the IP network diagram shown in  Figure 1. To optimise your grade in this section, address the following points:

• List all assumptions and their explanation.

• Display each calculation for the number of subnets, IP addresses, valid hosts, gateways, and  subnet mask for Tables 1, 2, 3, and 4.

Table 1. Sydney branch Network (Net-C)

Allocated Subnet address and Subnet Mask

Network address

Default Gateway address

Valid host address range

Broadcast address

Table 2. Brisbane branch Network

Allocated Subnet address and Subnet Mask

Network address

 

Default Gateway address

Valid host address range

Broadcast address

 

Table 3. Network between Sydney to ISP

Allocated Subnet address and Subnet Mask

Network address

Valid host address range

Broadcast address

 

Table 4. Network between Brisbane and ISP

Allocated Subnet address and Subnet Mask

Network address

Valid host address range

Broadcast address

Place configuration of each device into a table like the one below. (40 Marks)

Sydney

(Copy and paste the device configuration, DO NOT use screenshot from  Packet Tracer)

S1: enable.

S1: configure terminal.

S1: . . .

Assessment submission

Your report must include a cover page that includes the student’s name and student ID. You need to submit the design document as outlined above with a working Packet Tracer file. DO NOT ZIP THE SUBMISSION FILES.

For successful completion of this assessment, you are required to study the material provided  (lecture slides, tutorials, and extra reading materials), engage in the unit’s activities, and in the  discussion forums. The prescribed textbook is the main reference along with the recommended  reading material. Students are expected to discuss their work with the lecturer and to seek support.  In completing this assessment successfully, you will be able to develop networking skills including  design, configuration and testing of a computer network using a simulator. This assessment helps in  achieving ULO-2.

Marking Criteria and Rubric: The assessment will be marked out of 100 and will be weighted 40%  of the total unit mark.

Marking

Criteria for

Task-B

Not satisfactory

(0-49%) of the

criterion mark)

Satisfactory

(50-64%) of the  criterion mark

Good

(65-74%) of the  criterion mark

Very Good

(75-84%) of the  criterion mark

Excellent

(85-100%) of the  criterion mark

Logical design

(need analysis)

(10 marks)

The design does not  meet minimum

requirements.

The design lacks in  multiple critical areas  and requires

significant

improvement.

The design meets  some objectives but  needs improvement in  certain areas.

The design meets  most objectives

effectively.

The design exceeds  expectations in all  areas.

Physical Design  (technology design) (10 marks)

The physical design does  not meet minimum  requirements.

The physical design  lacks in multiple

critical areas and

requires significant  improvement.

The physical design  meets some

objectives but needs  improvement in

certain areas.

The physical design  meets most objectives  effectively.

The physical design  exceeds expectations  in all areas.

Minimising the

interference from  Wi-Fi access points (10 marks)

The proposal does not  effectively address

interference challenges  and lacks an

understanding of the  topic.

The proposal lacks a  comprehensive

understanding of

interference or

provides incomplete  or ineffective

solutions.

The proposal partially  addresses

interference issues  but lacks depth or  innovation

The proposal

effectively addresses  most interference  challenges with well thought-out

strategies.

The proposal

demonstrates an

exceptional

understanding of

interference factors  and provides

comprehensive,

innovative solutions.

Subnet allocations,  IP addresses, valid  hosts, gateways subnet mask

(20 marks)

Lack of evidence of

understanding of IP  configuration for NET A,  B and C including the  interfaces for RA, RB and  RC with many errors.

Evidence of a basic  understanding of IP  configuration for NET  A, B and C.

Good IP configuration  for NET A, B and C  including the

interfaces for RA, RB  and RC with some  errors.

very well IP

configuration for NET  A, B and C including  the interfaces for RA,  RB and RC.

Excellent IP

configuration for NET  A, B and C including  the interfaces for RA,  RB and RC.

Routers

Configurations

(25 marks)

Lack of evidence of

understanding of

Configure router RA  interfaces with many  errors.

Evidence of a basic  understanding of

Configure router RA  interfaces

Good Configure router RA interfaces with  some errors.

Very well Configure  router RA interfaces

Excellent Configure  router RA interfaces

Routing

configuration

(15 marks)

Lack of evidence of

understanding of routing  configuration with no  connections between  hosts

Basic understanding of routing configuration  with errors in the  routing configuration  and no connection  between hosts

Well routing

configuration with  correct routing

configuration and  connection between the hosts

Very weak routing  configuration with  simple demonstration  of configuration, and  full network

connection.

Excellent explanation  and understudying of  routing protocols and  configuration with

excellent

demonstration of  configuration, testing  and full network

connection.

Verifications

(10 marks)

No testing results were  shown or with many  errors.

(Pinging the local area

Some connectivity  testing results showed some errors.

(Pinging is only

Full connectivity

testing results showed some errors.

(Pinging is only

Full connectivity

testing results are  shown with minor  errors.

Full connectivity

testing results are  shown with no errors. (Pinging the local area

 

network and remote  network is not

successful)

successful with local  area network packet  drops and not remote  networks)

successful with local  area network, not  remote network)

(Pinging the local area  network is successful  and the remote

network is successful  with packet drops)

network and remote  network is successful)

 

Assessment 4: System vulnerabilities and mitigation

Due date:

Week 12

Group/individual:

Group

Word count / Time provided:

3000

Weighting:

30%

Unit Learning Outcomes:

ULO-3, ULO-4

Assessment Details:

Your team has recently been hired by a car industry company that employs various types of robotic  systems for tasks ranging from assembly, welding, and painting to inspection. Internet of Things (IoT)  devices are utilized to control the robotic systems both locally and remotely.

In recent years, there has been a growing focus on the risks associated with the use of simple IoT  devices in services that have access to sensitive information or critical controls. To enhance the  resilience of commercial IoT devices against cyber-attacks, security considerations should be  integrated right from the design stage of new products. However, the wide heterogeneity of IoT  devices poses challenges to the development of well-established security-by-design methods for the  IoT. Choose one of the following IoT devices:

• Arduino

• Raspberry PI

• BeagleBone

• ESP32 and ESP8266

For the type of IoT device your group has selected, you will need to discuss the following:

1. Identify and discuss three security vulnerabilities specific to the selected IoT device. 2. Demonstrate the working mechanism of two types of attacks against the selected IoT device. 3. Demonstrate two techniques or security tools that can be used to mitigate/prevent the  identified attacks in point (2).

4. The objective of computer security is to protect the Integrity, Confidentiality, and Availability  (CIA) of information on the devices that store, manipulate, and transmit the information.  Analyze the attack methods identified in point 2 and the security tools identified in point 3  against CIA.

5. Demonstrate the main challenges in protecting the selected IoT device.

The importance of cryptography has increased over time, making it a key defense in securing data  from threat actors. Select one type of cryptographic algorithm that has been developed or proposed  for the selected IoT device and provide its working techniques and features.

In your report, you have to support your discussion with references from recent conferences and  articles published within the last 4 years that are related to the selected IoT device.

In completing this assessment successfully, you will be able to investigate IS security, risk threats and  propose the suitable security controls, which will help in achieving ULO-3, and ULO-4.

Marking Information: The applied project will be marked out of 100 and will be weighted 30% of  the total unit mark.

Marking

Criteria

Not satisfactory

(0-49%) of the

criterion mark)

Satisfactory

(50-64%) of the  criterion mark

Good

(65-74%) of the  criterion mark

Very Good

(75-84%) of the  criterion mark

Excellent

(85-100%) of the  criterion mark

Introduction

(10 marks)

Poor Introduction with irrelevant details

Introduction is

presented briefly

with some

relevance and

missing elements.

Introduction is

generally presented in good fashion,

however missing one  element.

Introduction is well  written with clear  discussion.

Introduction is very  well written with very  clear background,  discussion.

Discuss and

identified three  security

vulnerabilities

(15 mark)

Poor discussion with  irrelevant information

Brief discussion about  security vulnerabilities

Generally good

discussion about

security vulnerabilities

Very clear security  vulnerabilities

discussion supported  by recent references.

A very detailed

and very clear

security vulnerabilities discussion supported  by recent references.

The use of the

attack tool and  working

mechanism

(10 mark)

Poor discussion with  irrelevant information

Brief discussion about  attack tool and

working mechanism

Generally good

discussion about

attack tool and

working mechanism

Very clear attack tool  and working

mechanism

A very detailed

and very clear

attack tool and

working mechanism

Analysis the attack  tool and security  tool against CIA  (20 mark)

Poor analysis with

irrelevant details.

Brief discussion of the  attack tool and

security tool against  CIA

Generally good

discussion of the

attack tool and

security tool against  CIA

Very clear discussion of the attack tool and  security tool against  CIA

In-depth and very  clear discussion of the  attack tool and

security tool against  CIA

Main challenges in  protecting the

selected IoT device  (10 mark)

Lack of evidence of

understanding of the  main challenges

Very brief discussion  of the main challenges

Evidence of good

understanding of the  main challenges that  related to the selected IoT device with limited support references.

Very clear

understanding of the  main challenges that  related to the selected IoT device with

support references.

Excellent

understanding of the  main challenges that  related to the selected IoT device with recent support references.

Cryptography

developed/propos ed.

(30 marks)

Lack of evidence of

understanding of

Cryptography algorithm  related to the selected  IoT with poor working  techniques and features

Very brief description  of the Cryptography  algorithm related to selected IoT with poor  working techniques  and features.

Evidence of good

discussion of the

Cryptography

algorithm related to  selected IoT with good working techniques  and features.

Very clear discussion  of the Cryptography  algorithm related to  the selected IoT with

very good working  techniques and

features supported  with recent

references.

Excellent discussion of  the Cryptography  algorithm related to the selected IoT with  very good working  techniques and

features supported  with recent

references.

Summary

(5 marks)

Summary not

relating to the

report

Brief summary of the report with some

relevance

Generally good

summary of the

report

clearly

summarizing the

overall

contribution

very

clearly

summarizing the

overall

contribution