Assignment No Title: Coursework 1 (CW1)
Degree Foundation Please Specify: Masters
Module Title : Cyber Security in Network Systems
Word Limit : 3,000 (+/-10%)
Cyber Security In Network Systems Assignment – UK.
1.This assignment must be submitted electronically using Blackboard by 2 pm on the submission date
2.To submit electronically you must upload your work to the e-submission area within the Blackboard module concerned. Simple instructions are provided within the module.
3.Please do not attempt to submit assignments direct to lecturers as this is not allowed and will result in a non-submission being officially recorded
4.You will receive a digital receipt as proof of submission. This will be sent to your Bucks e-mail address; please keep this for reference.
5.You are reminded of the University’s regulations on cheating and plagiarism. In submitting your assignment you are acknowledging that you have read and understood these regulations.
6.Late submission within 10 working days of the deadline will result in the mark for the assignment being capped at 40%. Beyond this time the work will not be marked.
7.You are reminded that it is your responsibility to keep an electronic copy of your assignment for future reference
Assignment format and other relevant instructions to students:
Your assignment should be formatted as a 3,000 (+/-10%) word technical report, which is a formal report designed to convey technical information in a clear and easily accessible format.
As you are producing a technical report it is recommended that you refer to the following sections, as a possible structure :
1.Title page
a. Must include the title of the report, and the overall word count.
2. Summary
a.A summary of the whole report including important features, results and conclusions
3. Contents page
a.Numbers and lists all section and subsection headings with page numbers
4.Introduction
Stating the objectives of the report and comments on the way the topic of the report is to be treated, leading straight into the report itself.
5.The sections which make up the body of the report
Divided into numbered and headed sections. These sections separate the different main ideas of the topic of the report, presented in a logical order.
6.Conclusions
A short, logical summing up of the theme(s) developed in the sections of the report.
7.References
Details of published sources of material referred to or quoted in the text, presented in Harvard.
1.Summary
i. A summary of the whole report including important features, results and conclusions
ii. Contents page
iii. Numbers and lists all section and subsection headings with page numbers
iv. Introduction
v. Stating the objectives of the report and comments on the way the topic of the report is to be treated, leading straight into the report itself.
vi.The sections which make up the body of the report
vii.Divided into numbered and headed sections. These sections separate the different main ideas of the topic of the report, presented in a logical order.
A.Bibliography
Other published sources of material including websites not directly referred to in the report text but useful for background or further reading.
1. Acknowledgements
List of people who helped you research or prepare the report.
B. Appendices (if appropriate)
Any further material which is essential for full understanding of your report (e.g. large scale diagrams, computer code, raw data,specifications) but not required by a casual reader.
2.The Report Layout
The appearance of a report is no less important than its content. An attractive,clearly organised report stands a better chance of being read. Use a standard, 12 pt,font, such as Ariel, for the main text. Use different font sizes, bold, italic and underline where appropriate but not to excess. Too many changes of type style can look messy. Your report must have page numbers located in the bottom right corner
of each page, in the format of: Page X of Y. The Header of every page, apart from the Title Page should contain your Full Name and Student ID Number.
3.Headings
Use heading and sub-headings to break up the text and to guide the reader. They should be based on the logical sequence which you identified at the planning stage but with enough sub-headings to break up the material into manageable chunks.References to any Diagrams Charts and Tables In the main text you must always refer to any diagram, graph or table which you use.
Cyber Security In Network Systems Assignment – UK.
Label diagrams and charts as follows:
‘Figure 1.2 Graph of energy output as a function of wave height.’
In this example, the second diagram in section 1 would be referred to by “…see figure 1.2…”
Label tables in a similar fashion:
‘Table 3.1 Performance specifications of a range of commercially available Ga As FET devices’ In this example, the first table in section 3 might be referred to by “…with reference to the performance specifications provided in Table 3.1…”
Originality and Plagiarism
Whenever you make use of other people’s facts or ideas, you must indicate this in the text with a number which refers to an item in the list of references. Any phrases,sentences or paragraphs which are copied unaltered must be enclosed in quotation marks and referenced by a number. Material which is not reproduced unaltered should not be in quotation marks but must still be referenced. It is not sufficient to list the sources of information at the end of the report; you must indicate the sources of information individually within the report using the reference numbering system.
Information that is not referenced is assumed to be either common knowledge or your own work or ideas; if it is not, then it is assumed to be plagiarised i.e. you have knowingly copied someone else’s words, facts or ideas without reference, passing them off as your own. This is a serious offence. If the person copied from is a fellow student, then this offence is known as collusion and is equally serious.
The Summary :
The summary, with the title, should indicate the scope of the report and give the main results and conclusions. It must be intelligible without the rest of the report. Many people may read, and refer to, a report summary but only a few may read the full report, as often happens in a professional organisation.
1. Purpose – a short version of the report and a guide to the report.
2. Length – short, typically not more than 300-500 words
3. Content – provide information, not just a description of the report.
Proofreading :
This refers to the checking of every aspect of a piece of written work from the content to the layout and is an absolutely necessary part of the writing process. You should acquire the habit of never sending or submitting any piece of written work, from email to course work, without at least one and preferably several processes of proofreading. In addition, it is not possible for you, as the author of a long piece of
writing, to proofread accurately yourself; you are too familiar with what you have written and will not spot all the mistakes.
When you have finished your report you must check it very carefully yourself. You should then give it to someone else, e.g. one of your fellow students or a friend, to read carefully and check for any errors in content, style, structure and layout. You should record the name of this person in your acknowledgements.
This assignment tests the following Learning Outcomes for the module:
1.Demonstrate a detailed knowledge and understanding of the concepts and terminology of network security.
2. Design complex solutions for managing and configuring secure enterprise networks.
5.The Assignment Task:
1.Your objective for this assignment is to produce a 3,000 word technical report on your research, design and technical documentation for a viable secure network solution for a small business. Including a simulation of your proposed network solution produced in Cisco Packet Tracer version 7, to be submitted
along with the technical report.
2. The purpose of the assignment is to allow you to demonstrate your detailed knowledge and under standing of the concepts and terminology of network security that you have explored within the module. It is also an opportunity for you design a complex solution for managing and configuring a secure
enterprise network for a small business, utilising that knowledge and understanding.
The small business scenario to be used for this assignment is as follows:
The small business (Company X) is about to move from being a part-time start-up venture, run from the owners’ current home, to being a full enterprise taking possession of its own business unit on an industrial estate in High Wy com be.Company X also have an agreement with Company Y to share certain services via a WAN established between them.
The owner has asked you to create a technical report that fully describes and justifies a secure design for an IP v 4 network to be installed inside their new premises.
The owner has asked you to create a technical report that fully describes and justifies a secure design for an IPv4 network to be installed inside their new premises.
A secured guest WLAN only allowing access to the Internet
1.Accounting
a. 2 client machines (Accountant and Assistant Accountant)
b. 1 FTP server with internal department access only
c. Access to network printer in Customer Services
2.Customer Services
i. 3 client machines (Manager and two Customer Services Representatives)
ii. 1 network printer (Shared with HR and Accounting)
iii. 1 FTP server (Shared with Marketing)
iv. Access to Web server managed by IT
3.Human Resources (HR)
1. 1 client machine (Manager)
2. 1 FTP server with internal department access only
3. Access to network printer in Customer Services
4.Information Technology (IT)
1. 2 client machines (Network Manager and IT Services Manager)
2.1 FTP server
3. 1 Syslog server
4. 1 AAA server
5. 1 NTP server
6. 1 DHCP server
7. 1 TFTP server
8. 1 DNS server
9. 1 Web server (shared with Customer Services and Marketing)
10. 1 network printer
11.Provision of network connection to the Internet via ISP
12. Provision of WAN to Company Y (shared with Procurement)
13. Both the Network Manager and the IT Services Manager also require external VPN access to the network.
Marketing :
i. 1 client machine (Marketing Manager)
ii. Access to FTP server in Customer Services
iii. Access to Web server managed by IT
Cyber Security In Network Systems Assignment – UK.
Procurement :
i. 2 client machines (Procurement Manager and Assistant)
ii. 1 FTP server with internal department access only
iii. Access to Company Y via WAN
Sales
i. 3 client machines (Sales Manager, Sales Representative and Sales Assistant)
ii. 1 FTP server (Shared with Warehousing)
iii. Access to FTP server in Procurement
iv. The Sales Representative also has a laptop and needs network access whilst external via secure VPN
v. 1 network printer (shared with Warehousing)
Warehousing
1. 2 client machines (Warehouse Manager and two Assistants (shared access to PC terminal in ware house))
2. Access to network printer in Sales
3. Access to FTP server in Sales
Your technical report should:
1. Outline potential security threats, including common layer 2 threats (VLAN hopping, DHCP, ARP, and address spoofing), and how you are mitigating against them in your proposed network design
2. Make specific reference to Cisco Secure X Architecture and 802.1X
3. Make specific reference to hashing and encryption standards as appropriate
4. Demonstrate a consideration the Cisco modular framework (MPF) in relation to determining Cisco ASA device policies as appropriate
5. Describe an applicable approach to testing the security of your proposed network design.
6.Include a comprehensive network security policy that would be implemented along with your proposed network design
Cyber Security In Network Systems Assignment – UK.
Your proposed network design must include specific provision for:
1. IPv4 addressing
2. OSPF and static routes as appropriate
3. Server-based authentication, authorisation and accounting (AAA);
4. Secure monitoring (Syslog) and managing (VLANs, SSH, secure groups etc.)of devices;
5. Secure routing protocol authentication
6. A zone-based policy firewall
7. A DMZ
8. A Cisco IOS intruder protection system (IPS)
9. A site-to-site IPsec VPN
Cyber Security In Network Systems Assignment – UK.
Assessment Criteria :
The work produced will be assessed in-line with the following criteria: Grade A 70% to 100%:
The submitted work has reached an excellent standard exceeding that of the previous grade. The technical report contents indicate clear evidence of considerable attention to research and fully
demonstrates a detailed knowledge and under standing of the concepts and terminology of network security. The technical report fully documents a professional standard design for a complex solution to managing and configuring a secure enterprise network, fully meeting the requirements of the assignment brief. The simulated network file has been developed to a professional level, fully supporting the technical report.
ORDER This Cyber Security In Network Systems Assignment NOW And Get Instant Discount
Read More :