0% found this document useful (0 votes)
61 views

05 - Security - Assignment Brief 1 - Final

The document provides an assignment brief for a security course. It outlines tasks for a presentation and report on security risks, organizational procedures, network monitoring benefits, firewall and VPN configuration impact, and implementing DMZ, static IP, and NAT. It also lists learning outcomes and assessment criteria.

Uploaded by

nhatphamvan454
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
61 views

05 - Security - Assignment Brief 1 - Final

The document provides an assignment brief for a security course. It outlines tasks for a presentation and report on security risks, organizational procedures, network monitoring benefits, firewall and VPN configuration impact, and implementing DMZ, static IP, and NAT. It also lists learning outcomes and assessment criteria.

Uploaded by

nhatphamvan454
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

Unit 5: Security

Assignment Brief

Student Name/ID
Number

Unit Number and Title # 5 - Security

Academic Year

Unit Tutor

Assignment Title Security – Assignment 1

Issue Date

Submission Date

Submission Format

 The submission is in the form of an individual written report. This should be


written in a concise, formal business style using single spacing and font size
12. You are required to make use of headings, paragraphs and subsections as
appropriate, and all work must be supported with research and referenced
using the Harvard referencing system. Please also provide a bibliography using
the Harvard referencing system.
 The individual Assignment must be your own work, and not copied by or from
another student.
 If you use ideas, quotes or data (such as diagrams) from books, journals or
other sources, you must reference your sources, using the Harvard style.
 Make sure that you understand and follow the guidelines to avoid plagiarism.
Failure to comply this requirement will result in a failed assignment.

Unit Learning Outcomes

LO1 Assess risks to IT security.


LO2 Describe IT security solutions.
Vocational scenario

Assignment scenario
You work as a trainee IT Security Specialist for a leading Security consultancy in
Vietnam called FPT Information security FIS.
FIS works with medium sized companies in Vietnam, advising and implementing
technical solutions to potential IT security risks. Most customers have outsourced
their security concerns due to lacking the technical expertise in house. As part of
your role, your manager Jonson has asked you to create an engaging presentation to
help train junior staff members on the tools and techniques associated with
identifying and assessing IT security risks together with the organizational policies to
protect business critical data and equipment.

Tasks
In addition to your presentation, you should also provide a detailed report containing
a technical review of the topics covered in the presentation.
Your presentation should:
 Discuss types of security risks FIS secure may face if they have a security
breach. Give an example of a recently publicized security breach and discuss
its consequences
 Assess a variety of organizational procedures an organization can set up to
reduce the effects to the business of a security breach.
 Analyse three benefits to FIS of implementing network monitoring system
giving supporting reasons.
 Propose a method that FIS can use to assess and treat IT security risks.
 Discuss the potential impact to IT security of incorrect configuration of firewall
policies and third-party VPNs in FIS.
 Discuss, using an example for each, how implementing a DMZ, static IP and
NAT in a network can improve network security in FIS.
 Evaluate a range of physical and virtual security measures that can be
employed by FIS to ensure the integrity of organisational IT security.
Your detailed report should include a summary of your presentation as well as
additional, evaluated or critically reviewed technical notes on all of the expected
topics.

Assignment activity and guidance


General introduction: Main purposes and structure of the work
Task 1 - Discuss types of security risks to organisations (P1)
To answer this section, follow each of the steps below:
• Define IT risks
• Discuss types of risks to organizations
• What are the recent security breaches? List and give examples with dates
• Discuss the consequences of this breach
• Suggest solutions to organizations
(Word limit: 500 – 750 words)
Task 2 - Assess organisational security procedures (P2)
To answer this section, you need to mention and assess at least 3 security procedures that an
organization uses to improve or provide organizations security.
(Word limit: 500 – 750 words)
Task 2.1 - Analyse the benefits of implementing network monitoring systems with
supporting reasons (M1)
To answer this section, follow each of the steps below:
• List some of the networking monitoring devices and discuss each of them.
• Why do you need to monitor networks?
• What are the benefits of monitoring a network?
(Word limit: 250 – 500 words)
Task 3 - Discuss the potential impact to IT security of incorrect configuration of firewall
policies and third-party VPNs (P3)
To answer this section, follow each of the steps below:
• Discuss briefly firewalls and policies, their usage and advantages in a network
• How does a firewall provide security to a network?
• Show with diagrams the example of how firewall works
• Define VPN, its usage, and show it with diagrams examples
• Write down the potential impact (Threat-Risk) of a firewall and VPN if they are
incorrectly configured in a network
(Word limit: 500 – 750 words)
Task 4 - Discuss, using an example for each, how implementing a DMZ, static IP and NAT
in a network can improve network security (P4)
To answer this section, follow each of the steps below:
• Define and discuss with the aid of diagram DMZ. Focus on its usage and security
function as advantage
• Define and discuss with the aid of diagram static IP. Focus on its usage and
security function as advantage
• Define and discuss with the aid of diagram NAT. Focus on its usage and security
function as advantage
(Word limit: 500 – 750 words)
Task 4.1 - Propose a method to assess and treat IT security risks (M2)
To answer this section, follow each of the steps below:
• Discuss methods required to assess security threats? E.g., Monitoring tools
• What is the current weakness or threats of an organization?
• What tools will you propose to treat IT security risks?
(Word limit: 250 – 500 words)
Task 4.1.1 - Evaluate a range of physical and virtual security measures that can be
employed to ensure the integrity of organisational IT security (D1)
To answer this section, follow each of the steps below:
• Define and explain what are physical and virtual security measures
• Give brief details with an example on their uses
• How can they be a solution in IT security?
(Word limit: 250 – 500 words)

Learning Outcomes and Assessment Criteria

Pass Merit Distinction

LO1 Assess risks to IT security.

P1 Discuss types of M1 Analyse the benefits D1 Evaluate a range of


security risks to of implementing network physical and virtual
organisations. monitoring systems with security measures that can be
supporting reasons. employed to ensure the
P2 Assess organisational integrity of organisational IT
security.
security procedures.

LO2 Describe IT security solutions.

P3 Discuss the potential M2 Propose a method to


impact to IT security of assess and treat IT
incorrect configuration of security risks.
firewall policies and
third-party VPNs.

P4 Discuss, using an
example for each, how
implementing a DMZ,
static IP and NAT in a
network can improve
network security.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy