Assignment Details and Submission Guidelines
Unit Code BN203
Unit Title Network Security
Assignment Type Assignment #02 (Individual)
Assignment Title Secure Network Design
Purpose of the assignment (with ULO Mapping) After completing this assignment, student’s should be able to:
– Understand network scanning and security policies to manage operational security at workplace. Then administer those policies to ensure compliance by users in an organization.
– Apply skills to analyse complex problems in network security under supervision.
Total Marks 40
Word limit 1200 – 1800
Due Date 11:55 PM, 27th September, 2017
Submission Guidelines ? All work must be submitted on Moodle by the due date along with a “Title Page”.
? The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body) font and 2.54 cm margins on all four sides of your page with appropriate section headings.
? Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using IEEE referencing style.
Extension ? If an extension of time to submit work is required, a Special Consideration Application must be submitted directly to the Schools Administration Officer, in Melbourne on Level 6 or in Sydney on Level 7. You must submit this application three working days prior to the due date of the assignment. Further information is available at:
? Academic Misconduct is a serious offence. Depending on the seriousness of the case, penalties can vary from a written warning or zero marks to exclusion from the course or rescinding the degree. Students should make themselves familiar with the full policy and procedure available at: http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy-Procedure For further information, please refer to the Academic Integrity Section in your Unit Description.
In your role as a Network Security Architect at B2B solutions, you are leading a team of several Network Administrators. B2B solutions is a medium sized organisation and is currently expanding its operations.
The company has acquired six sites across Melbourne to accommodate its various departments. You have been asked to design a secure network across six sites. You have to ensure that the flow of data across networks must be confidential and that web-based filtering is in place. Another requirement is to have role-based access control for each department. The network should also span six buildings with a router in each building to join the networks. It is assumed that each building will have its own single subnet. Company expects approximately 500 workstation across all the sites with approximate numbers in each building as follows:
• Finance Office – 100 workstations
• Transport Office – 50 workstations
• Research Office – 25 workstations
• Sales Office – 25 workstations
• Information technology – 250 workstations
• Head Office – 50 workstations
Write a report on a secure network plan including following:
1) Draw a complete network design for above scenario. (Include block diagram for each SITE)
2) Without security, what are the possible security threats to network? Write down all assumptions you made during the design of secure network.
3) Project hardware requirements such as name of the security network devices, with manufacturer’s name, series, model, type of cables etc. Also list cryptographic standards your prosed networking devices are able to use for security.
4) With the help of cryptographic algorithms, write justification of how this proposed secure network design ensure confidentiality, integrity, availability and authentication. (CIAA).
(The report should be targeted towards your audience i.e. the board of directors who may not be technologically savvy. Therefore the report should be easy to read and contain step by step overview of the design that includes calculations and assumptions. Additionally, the report contents should be logically, systematically and succinctly structured to create a cohesive and coherent analytical piece of work, using formal academic language and should adhere to grammatical conventions.)
Aspects Description of the section Marks
Project scope Outline of the report 2
Project hardware and software requirements Name of devices, Specification, Model number, software 8
Secure Network Design Complete Diagram, Design, Detailed Description 15
Justification Justification of secure network design based on CIAA 10
Conclusion Brief summary of your suggested design 3
Reference Style Proper referencing is required 2
32 – 40 D
28 – 31.75 C
24 – 27.75 P
20 – 23.75 Fail
Excellent Very Good Good Satisfactory Unsatisfactory
Project scope Concise and specific to the project Topics are relevant and soundly analysed. Generally relevant and analysed. Some relevance and briefly presented. This is not relevant to the assignment topic.
Project hardware and software requirements
Demonstrated excellent ability to think critically and sourced reference material appropriately Demonstrated excellent ability to think critically but did not source reference material appropriately Demonstrated ability to think critically and sourced reference material appropriately Demonstrated ability to think critically and did not source reference material appropriately Did not demonstrate ability to think critically and did not source reference material appropriately
Secure Network Design
Logic is clear and easy to follow with strong arguments Consistency logical and convincing Mostly consistent logical and convincing Adequate cohesion and conviction Argument is confused and disjointed
Justification of secure network design All elements are present and very well integrated. Components present with good cohesive Components present and mostly well integrated Most components present Proposal lacks structure.
Conclusion Excellent use of creditable sources. Obvious that outstanding effort made. Extremely good effort Good effort made but not outstanding Made some effort. For example, Web searches only Very little attempt to summarize. Lazy effort with inaccuracies
IEEE Reference style Clear styles with excellent source of references. Clear referencing style Generally good referencing style Sometimes clear referencing style Lacks consistency with many errors