Write My Paper Button

WhatsApp Widget

NTW 600 Computer Network and Security

Assessment 2 Information and Rubric

Subject Code NTW 600Subject NameComputer Network and SecurityAssessment Number and TitleAssessment 2: Cyber Security Threats to IT Infrastructure of a real-world OrganisationAssessment TypeGroup AssessmentLength / Duration 1500 wordsWeighting % 30% Project Report: 20% Presentation :10% (Recorded)Total Marks 100SubmissionOnline SubmissionDue DateWeek-8 (Sunday at 23:59)ModeFace-to-Face GroupFormata) Report b) Recorded Presentations

Assessment Description and Instructions

In this assessment students are required to choose a real-world organization (e.g. hospital, bank, school etc) and critically evaluate its infrastructure for possible Cyber Security threats and vulnerabilities. You will then propose appropriate security technologies and tools to mitigate those threats and vulnerabilities. You will also research the academic literature for various security risk management strategies and select the strategies that are suitable for your organization.

Submission Details

This is a group assessment. Please make groups of 4 students. You must discuss and finalize the chosen organization with the instructor. Do not start working on the assessment before taking approval from the instructor. The report is to be submitted in a word or pdf format. The assessment carries 30% weightage. The report length should be not less than 1500 word and not more than 2000 words. The word count does not include the title page, table of contents, list of references and figures. Ensure all pages are numbered. Similarity index of your report should be less than 20%. The deadline to submit the report is by midnight Sunday

Assessment Details

The details of the assessment are as follows:

Each group will select an organisation of their choice. The organisation should be a medium to large enterprise with branches in multiple locations.

Able to provide each group with access to information about the various aspects of the ICT Infrastructure including user communities, network operations, various servers and other devices (e.g. firewalls, load balancers etc.).

The current ICT infrastructure of the organisation should be critically evaluated to find potential security vulnerabilities and threats.

A revised ICT infrastructure for the organisation should be developed with recommendations on the following aspects.

Security tools that should be used by the organisation to protect from different vulnerabilities and threats present in the current ICT Infrastructure.

Security technologies that will enable the organisation to use best practices in information security.

Security management strategies that can be developed by the organisation to carry out planning, risk analysis, risk management, incident handling and maintenance.

Structure of Report

1-Title page

This must contain the title of the report (make title as informative as possible), Names and IDs of all group members, unit code and name.

2-Abstract

The abstract provides an overview of the entire report. The purpose of the abstract is to briefly explain vulnerabilities and threats faced by the current ICT infrastructure of the organization. Key security tools and technologies used by the organization in the new ICT infrastructure need to be briefly explained here. Security management strategies utilized by the organization should also be summarized here. The length of the abstract is between 200-300 words. Do not use headings, figures or in-text citations in this section.

3-Table of Contents

Ideally, but not necessarily, constructed using the hyperlink functions in Word. Lists of figures and tables are not required.

4-Introduction

This section concerns the context and aims of the report. Mention (in just a few paragraphs) the background of the organization e.g. type of organization, number of employees, number of branch offices. Briefly explain the key security requirements of the organization and possible repercussions if a security breach occurs. Given all of this, state the main aim of the report together with a short account of the tasks required to be carried out.

5-Main Body

          5.1-Existing ICT Infrastructure of the organization

In this section you should explain the key components of the current ICT Infrastructure of the organization. You should draw a figure of the current infrastructure clearly showing various components of the infrastructure such as servers, firewalls, routers and other devices. The current infrastructure should be critically evaluated to find various security threats and vulnerabilities. Each security threat and vulnerability should be explained with citations of academic resources.

5.2-New ICT Infrastructure of the Organization

In this section, you should first explain the various components of the new infrastructure with the help of a figure. This new ICT infrastructure should remove the security threats and vulnerabilities that are present in the old ICT infrastructure. You should explain about tools, technologies and security management strategies employed in the new ICT infrastructure in separate subsections. The details about these subsections are given below.

5.3-Security Tools and Technologies

Research on various security tools and Technologies discussed in the academic literature and recommend which tools can be used in the new ICT infrastructure to overcome the threats and vulnerabilities. Explanation of each tool is needed along with appropriate citations of academic resources.

5.4-Security Management Strategies

Research on various security management strategies discussed in the academic literature and select the strategies that are suitable for your organization. Explanation of security management strategies is needed along with appropriate citations of academic resources.

6-Conclusions

Using an analysis of the preceding sections, the conclusions should summarize your key findings. Conclusions are the results of your own critical thinking, they should be justified through analysis of your findings and written in your own words with no citations.

7-References

These should be formatted in Harvard style. At least 15 recent and relevant academic resources (i.e. peer-reviewed journal articles and conference papers, books) are needed in the report.

Submission Guidelines:

Students are expected to use PIA template for report writing and complete a report not less than 1500 words with a report structure as explained below:

and evidence to support your implementation and testing efforts.

NTW600 Assessment # 2  Marking Rubric Assessment Title Cyber Security Threats to IT Infrastructure of a real-world Organisation

Marking  F (Fail) 0-49%P (Pass) 50-64%C (Credit) 65-74%D (Distinction) 75-84%HD (High Distinction) 85-100%Abstract/ Table of Contents/ Introduction     (20)Unsatisfactorily or unclearly conveys the project topic. This is not relevant to the assignment topic. Completely unable to understand and/or current            ICT infrastructure   is explained with major errors and omissionsFairly conveys the project topic. Some relevance and briefly presented. Poor intro of the project or poorly/partially implement and current ICT infrastructure is explained more than one major error and/or more than one major omissionAccurately conveys the project topic, methods. Generally relevant and analysed. Fair analysis of the analysis of the project and the current ICT infrastructure is explained. one major error and/or one major omissionAccurately conveys the project topic, methods. Generally relevant and analysed. Good analysis of the project Current ICT infrastructure is explained with. Minor errors and/or omissionsAccurately Plus concisely conveys the project topic, methods, and outcomes. All topics are pertinent and covered in depth. Ability to think critically and source material is demonstrated. Excellent analysis of the project and ccurrent ICT infrastructure is clearly explained.  Main Body i)Threats and vulnerabilities in Existing ICT Infrastructure. ii)Threats and vulnerabilities in Current ICT Infrastructure iii) Security Tools and Technologies iv) Security Management Strategies (40)Unable to design/ develop/Implement/commence the major issues related to current ICT infrastructure.  New ICT infrastructure is not clearly explained and has major errors and omissions.  Security tools/Technologies and management strategies to overcome threats and vulnerabilities are explained with major errors and omissionsPoorly implement /commence the major issues related to current ICT infrastructure.  New ICT infrastructure is not clearly explained and has major errors and omissions.  Security tools/Technologies and management strategies to overcome threats and vulnerabilities are explained with major errors and omissionsAccurately implement /commence the major issues related to current ICT infrastructure.  New ICT infrastructure is not clearly explained and has major errors and omissions.  Security tools/Technologies and management strategies to overcome threats and vulnerabilities are explained with one major error and/or one major omissionAccurately implement /commence the major issues related to current ICT infrastructure.  New ICT infrastructure is not clearly explained and has major errors and omissions.  Security tools/Technologies and management strategies to overcome threats and vulnerabilities are explained well with minor errors and/or omissionsExcellently commence the major issues related to current ICT infrastructure.  New ICT infrastructure is not clearly explained and has major errors and omissions.  Security tools/Technologies and management strategies to overcome threats and vulnerabilities are explained well without any error.Conclusion/ Report Formatting/ References (15)  Argument is confused and disjointed. Lacks consistency with many errors. Weak ConclusionAdequate cohesion and conviction. Sometimes clear referencing style.  Weak ConclusionMostly consistent logical and convincing. Generally good referencing style. Well augmented conclusionConsistency logical and convincing. Clear referencing style. Clear ConclusionLogic is clear and easy to follow with strong arguments. Clear styles with excellent source of references. Concrete conclusionDemonstration (25)Demonstration is confused and disjointed. Lack of knowledge about the design, implementation, and development processAdequate cohesion and conviction. Team members show a poor knowledge about the design, implementation, and development processMostly consistent logical and convincing. The student shows a limited knowledge about the design implementation, and development processConsistency logical and convincing. The student shows a good knowledge about the design implementation, and development processLogic is clear and easy to follow with strong arguments. The student shows a strong knowledge about the design implementation, and development process

Get expert help for NTW 600 Computer Network and Security and many more. 24X7 help, plag free solution. Order online now!

The post NTW 600 Computer Network and Security appeared first on Universal Assignment.

Scroll to Top