ITNE2002 Assessment GuideFile
ITNE2002 Assessment GuideFile
Semester 1, 2025
Page | 1
Victorian Institute of Technology www.vit.edu.au CRICOS Provider No. 02044E, RTO No: 20829
Assessment Overview
Assessment tasks Learning Outcome Mapping
Assessment ID Assessment Item When due Weighting ULO# CLO# for BITS
Tutorial / Laboratory Session 4 10%
Reports Part A
(Individual) A, B, C, D, E, H, I, J,
1 1, 2, 3, 4
Tutorial / Laboratory Session 9 10% K
Reports Part B
(Individual)
Assignment 1
2 Session 7 20% 1, 2, 3 A, B, C, D, H, I, J, K
(Individual)
Assignment 2
3 Session 10 20% 1, 2, 3 A, B, C, D, H, I, J, K
(Individual)
Project Report (Group) Session 12 25%
4* Project Demonstration Session 13 1, 2, 3, 4 A, B, C, D, H, I, J, K
15%
(Group) (Study Week)
Note: * denotes ‘Hurdle Assessment Item’ that students must achieve at least 40% in this item to pass the unit.
Page | 2
Victorian Institute of Technology www.vit.edu.au CRICOS Provider No. 02044E, RTO No: 20829
Referencing guides
You must reference all the sources of information you have used in your assessments. Please
use the IEEE referencing style when referencing in your assessments in this unit. Refer to
the library’s referencing guides for more information.
• https://elearning.vit.edu.au/pluginfile.php/473840/block_html/content/VIT%20Library%20Refer
encing%20-%20IEEE%20-%2007042020.pdf
Academic misconduct
VIT enforces that the integrity of its students’ academic studies follows an acceptable level
of excellence. VIT will adhere to its VIT Policies, Procedures and Forms where it explains the
importance of staff and student honesty in relation to academic work. It outlines the kinds of
behaviours that are "academic misconduct", including plagiarism.
Late submissions
In cases where there are no accepted mitigating circumstances as determined through VIT
Policies, Procedures and Forms, late submission of assessments will lead automatically to
the imposition of apenalty. Penalties will be applied as soon as the deadline is reached.
• Extensions of the due date for an assessment, other than an examination (e.g.
assignment extension).
• Special Consideration (Special Consideration in relation to a Completed assessment,
including an end-of-unit Examination).
Students wishing to request Special Consideration in relation to an assessment the due date
of which has not yet passed must engage in written emails to the teaching team to Request
for Special Consideration as early as possible and prior to start time of the assessment due
date, along with any accompanying documents, such as medical certificates.
For more information, visit VIT Policies, Procedures and Forms.
Contract Cheating
Contract cheating usually involves purchasing an assignment or piece of research from
another party. This may be facilitated by a fellow student or friend or purchased on a
Page | 3
Victorian Institute of Technology www.vit.edu.au CRICOS Provider No. 02044E, RTO No: 20829
website. The unauthorized use of generative Artificial Intelligence (AI) is also considered
cheating. Other forms of contract cheating include paying another person to sit an exam in
the student's place.
Contract cheating warning:
• By paying someone else to complete your academic work, you don’t learn as much
as possible if you did the work yourself.
• You are not prepared for the demands of your future employment.
• You could be found guilty of academic misconduct.
• Many of for pay-contract cheating companies recycle assignments despite
guarantees of “original, plagiarism-free work”, so the similarity is easily detected by
Turnitin.
• Penalties for academic misconduct include suspension and exclusion.
• Students in some disciplines are required to disclose any findings of guilt for
academic misconduct before being accepted into certain professions (e.g., law).
• You might disclose your personal and financial information unsafely, leaving yourself
open to many risks, including possible identity theft.
• You also leave yourself open to blackmail - if you pay someone else to do an
assignment, they know you have engaged in fraudulent behaviour and can always
blackmail you.
Grades
We determine your grades to the following Grading Scheme:
Grade Percentage
A 80% – 100%
B 70% – 79%
C 60% – 69%
D 50% – 59%
F 0% – 49%
Page | 4
Victorian Institute of Technology www.vit.edu.au CRICOS Provider No. 02044E, RTO No: 20829
Assessment Details for Assessment Item 1:
Overview
Assessment tasks Learning Outcome Mapping
Assessment ID Assessment Item When due Weighting ULO# CLO# for BITS
Tutorial / Laboratory Session 4 10%
Reports Part A
(Individual) A, B, C, D, E, H, I, J,
1 1, 2, 3, 4
Tutorial / Laboratory Session 9 10% K
Reports Part B
(Individual)
Introduction
This is an individual assessment, consisting of two parts, A and B. You will submit tutorial/laboratory reports.
Page | 5
Victorian Institute of Technology www.vit.edu.au CRICOS Provider No. 02044E, RTO No: 20829
identifying and addressing cybersecurity threats?
Lab 2: Install and configure Kalin Linux VM. To complete this Lab, please follow these steps:
• Log in to your VIT Learning Management System (LMS) account.
• Access the ITNE2002 Network & Information Security course page.
• Go to Session 3.
• Download the file named ITNE2002-Lab2.pdf.
• Complete all lab tasks, providing screenshots with date, time, and your details for each completed activity. HINT: You
can use the snipping tool or Sticky Notes to capture the screenshot with the date and time.
Tutorial 3: Describe the four phases of a typical virus lifecycle.
Lab 3: Use Nmap to scan open ports in Windows and public IP address. To complete this Lab, please follow these steps:
• Log in to your VIT Learning Management System (LMS) account.
• Access the ITNE2002 Network & Information Security course page.
• Go to Session 4.
• Download the file named ITNE2002-Lab3.pdf.
• Complete all lab tasks, providing screenshots with date, time, and your details for each completed activity. HINT: You
can use the snipping tool or Sticky Notes to capture the screenshot with the date and time.
Page | 6
Victorian Institute of Technology www.vit.edu.au CRICOS Provider No. 02044E, RTO No: 20829
Tutorial 5: What are the key vulnerabilities associated with mobile devices, and how can they be mitigated?
Lab 5: Installs and configure pfSense. To complete this Lab, please follow these steps:
• Log in to your VIT Learning Management System (LMS) account.
• Access the ITNE2002 Network & Information Security course page.
• Go to Session 6.
• Download the file named ITNE2002-Lab5.pdf.
• Complete all lab tasks, providing screenshots with date, time, and your details for each completed activity. HINT: You
can use the snipping tool or Sticky Notes to capture the screenshot with the date and time.
Tutorial 6: Explain the concept of ARP poisoning and its impact on a local network.
Lab 6: Install and configure Snort in pfSense. To complete this Lab, please follow these steps:
• Log in to your VIT Learning Management System (LMS) account.
• Access the ITNE2002 Network & Information Security course page.
• Go to Session 7.
• Download the file named ITNE2002-Lab6.pdf.
• Complete all lab tasks, providing screenshots with date, time, and your details for each completed activity. HINT: You
can use the snipping tool or Sticky Notes to capture the screenshot with the date and time.
Tutorial 7: Describe the different types of firewalls and their functions.
Lab 7: Create Snort Rules to trigger alerts in a dashboard. To complete this Lab, please follow these steps:
• Log in to your VIT Learning Management System (LMS) account.
• Access the ITNE2002 Network & Information Security course page.
• Go to Session 8.
• Download the file named ITNE2002-Lab7.pdf.
• Complete all lab tasks, providing screenshots with date, time, and your details for each completed activity. HINT: You
can use the snipping tool or Sticky Notes to capture the screenshot with the date and time.
Submission Instructions
All submissions are to be submitted through Turnitin. Drop-boxes linked to Turnitin will be set up in Learning Management System (LMS).
Assessments not submitted through these drop- boxes will not be considered.
Page | 7
Victorian Institute of Technology www.vit.edu.au CRICOS Provider No. 02044E, RTO No: 20829
The Turnitin similarity score will be used to determine any plagiarism of your submitted assessment. Turnitin will check conference websites,
Journal articles, online resources, and your peer’s submissions for plagiarism. You can see your Turnitin similarity score when you submit your
assessments to the appropriate drop-box. If your similarity score is of concern, you can change your assessment and resubmit. However, re-
submission is only allowed before the submission due date and time.
The report should have a consistent, professional, and well‐organized appearance. Also:
• The cover page must identify student name, ID number, unit details, and assignment details.
• Assignments must adhere to the following formatting guidelines: 12-point font size, single line spacing, and clear section headings (e.g.,
Tutorial 1, Lab 1, Tutorial 2, Lab 2).
• Reports are to be submitted electronically as a single Microsoft Word document, encompassing all tutorial/laboratory reports and
screenshots, through the Turnitin-enabled submission link on the Learning Management System (LMS).
• Submissions in zip file format will not be accepted.
• Assignments submitted on the LMS will only be accepted.
Note: All work is due by the due date and time. Late submissions will be penalized at 20% of the assessment final grade per day, including
weekends. You cannot make re-submissions after the cut-off date.
Marking Criteria/Rubric
You will be assessed on the following marking criteria/Rubric:
Assessment criteria Exceptional >=80% Good 70% – 79% Average 55% - 69% Poor 30% - 54% Unsatisfactory 0%
Demonstrated some
Did not complete the
Demonstrated advanced Demonstrated some advanced and some Limited or Not
Tutorial Reports Part A laboratory. Show some
techniques by completing advanced techniques by basic techniques by basic techniques by Submitted or Academic
4 marks the tutorial completing the tutorial completing the Misconduct.
completing the tutorial.
tutorial
Demonstrated some Did not complete the
Demonstrated some
Demonstrated advanced advanced and some laboratory. Show some Limited or Not
Laboratory Reports Part A advanced techniques by basic techniques by
techniques by completing basic techniques by Submitted or Academic
6 marks completing the completing the
the Laboratory completing the Misconduct.
Laboratory Laboratory.
Laboratory
Page | 8
Victorian Institute of Technology www.vit.edu.au CRICOS Provider No. 02044E, RTO No: 20829
Demonstrated some
Did not complete the
Demonstrated advanced Demonstrated some advanced and some Limited or Not
Tutorial Reports Part B laboratory. Show some
techniques by completing advanced techniques by basic techniques by basic techniques by Submitted or Academic
4 marks the tutorial completing the tutorial completing the Misconduct.
completing the tutorial.
tutorial
Demonstrated some Did not complete the
Demonstrated advanced Demonstrated some
advanced and some laboratory. Show some Limited or Not
Laboratory Reports Part B techniques by advanced techniques by
basic techniques by basic techniques by Submitted or Academic
6 marks completing the completing the
completing the completing the Misconduct.
Laboratory Laboratory
Laboratory Laboratory.
Page | 9
Victorian Institute of Technology www.vit.edu.au CRICOS Provider No. 02044E, RTO No: 20829
Assessment Details for Assessment Item 2:
Overview
Assessment tasks Learning Outcome Mapping
Assessment ID Assessment Item When due Weighting ULO# CLO# for BITS
Assignment 1
2 Session 7 20% 1, 2, 3 A, B, C, D, H, I, J, K
(Individual)
Introduction
This individual assignment focuses on vulnerability assessment, network security analysis, and practical application of security tools.
Network Environment Setup (Building on Labs 1-5):
• Ensure your virtual network environment, including Windows 10 Enterprise VM, Kali Linux VM, and pfSense firewall with Snort, is
fully operational. This is the base for your assessment.
• Document your network topology (diagram) and the configurations of each virtual machine.
Vulnerability Scanning (Building on Lab 4):
• Utilize Nessus Essentials (or OpenVAS if you prefer) from your Kali Linux VM to perform a vulnerability scan of your Windows 10
Enterprise VM.
• Critically analyse the scan results. Specifically address the following:
o Identify and categorize the detected vulnerabilities.
o Discuss the potential impact of each vulnerability.
o Explain the difference between false positives and real vulnerabilities.
o Demonstrate your ability to filter and optimize scan results to minimize false positives.
o Provide screenshots of your scans and the results.
Submission Instructions
All submissions are to be submitted through Turnitin. Drop-boxes linked to Turnitin will be set up in Learning Management System (LMS).
Assessments not submitted through these drop- boxes will not be considered.
The Turnitin similarity score will be used to determine any plagiarism of your submitted assessment. Turnitin will check conference websites,
Page | 10
Victorian Institute of Technology www.vit.edu.au CRICOS Provider No. 02044E, RTO No: 20829
Journal articles, online resources, and your peer’s submissions for plagiarism. You can see your Turnitin similarity score when you submit your
assessments to the appropriate drop-box. If your similarity score is of concern, you can change your assessment and resubmit. However, re-
submission is only allowed before the submission due date and time.
The report should have a consistent, professional, and well‐organized appearance. Also:
• The total word count of the report must be between 1,000 and 1,500 words.
• The cover page must identify student name, ID number, unit details, and assignment details.
• The assignment must adhere to the following formatting guidelines: 12-point font size, single line spacing, and clear section headings.
• Submit a single Microsoft Word document containing all required screenshots via the Turnitin-enabled submission link on the LMS.
• Submissions in zip file format will not be accepted.
• Assignments submitted on the LMS will only be accepted.
Note: All work is due by the due date and time. Late submissions will be penalized at 20% of the assessment final grade per day, including
weekends. You cannot make re-submissions after the cut-off date.
Marking Criteria/Rubric
You will be assessed on the following marking criteria/Rubric:
Assessment criteria Exceptional >=80% Good 70% – 79% Average 55% - 69% Poor 30% - 54% Unsatisfactory 0%
Generally accurate
Network Environment Meticulous and accurate
Accurate and detailed documentation with Incomplete or inaccurate Limited or Not
Setup and documentation;
Documentation documentation; strong some omissions; basic documentation; limited Submitted or Academic
comprehensive understanding of setup
understanding of setup understanding of Misconduct.
5 marks understanding of setup
setup
Thorough and effective Effective scans with Scans with noticeable Scans with significant
Vulnerability Scanning Limited or Not
scans; comprehensive minor errors; strong errors; moderate errors; limited
Execution and Analysis Submitted or Academic
understanding of understanding of understanding of understanding of
5 marks vulnerability impact. Misconduct.
vulnerability impact. vulnerability impact. vulnerability impact
Page | 11
Victorian Institute of Technology www.vit.edu.au CRICOS Provider No. 02044E, RTO No: 20829
False Positive
Excellent ability to Moderate ability to Limited or Not
Management and Good ability to manage Limited ability to manage
Optimization manage false positives manage false false positives. Submitted or Academic
false positives.
and optimize results. positives. Misconduct.
5 marks
Page | 12
Victorian Institute of Technology www.vit.edu.au CRICOS Provider No. 02044E, RTO No: 20829
Assessment Details for Assessment Item 3:
Overview
Assessment tasks Learning Outcome Mapping
Assessment ID Assessment Item When due Weighting ULO# CLO# for BITS
Assignment 2
3 Session 10 20% 1, 2, 3 A, B, C, D, H, I, J, K
(Individual)
Introduction
This individual assessment task requires you to demonstrate your practical skills in implementing and configuring an Enterprise Antivirus solution
within your virtual network environment. You will create a video presentation showcasing the installation, configuration, and effectiveness of
your chosen antivirus solution in detecting and blocking malware.
1. Antivirus Implementation (Building on Lab 5):
o Install and configure an Enterprise Antivirus solution, such as the HAVP package with ClamAV, within your pfSense
firewall.
o Clearly demonstrate the installation process and explain the key configuration settings.
2. Malware Detection and Blocking (Building on Lab 4):
o Utilize a source of known malware, such as VirusShare or VirusTotal, to obtain sample virus files.
o Demonstrate the antivirus solution's ability to detect and block these virus files within your Windows 10 Enterprise VM.
o Show the antivirus logs and dashboard, highlighting the detected threats and the actions taken.
3. Video Presentation:
o Record a video presentation that clearly and concisely demonstrates the following:
▪ The installation and configuration of your chosen antivirus solution.
▪ The process of obtaining and testing malware samples.
▪ The antivirus solution's detection and blocking capabilities.
▪ An explanation of the key configuration settings and their impact.
▪ Speak clearly and provide a logical flow to your presentation.
▪ Include screen recordings of your virtual machines and antivirus dashboards.
Page | 13
Victorian Institute of Technology www.vit.edu.au CRICOS Provider No. 02044E, RTO No: 20829
Submission Instructions
• It is recommended to record the video using Zoom or MS Teams.
• The video presentation should be 5 to 10 minutes long, focusing on key points.
• Compress the video to below 100MB whenever possible to facilitate easy uploading.
• Submit a single video file (MP4 preferred). If the file exceeds 100MB and is too large for direct LMS upload, provide a link to the video.
Note: All work is due by the due date and time. Late submissions will be penalized at 20% of the assessment final grade per day, including
weekends. You cannot make re-submissions after the cut-off date.
Marking Criteria/Rubric
You will be assessed on the following marking criteria/Rubric:
Assessment criteria Exceptional >=80% Good 70% – 79% Average 55% - 69% Poor 30% - 54% Unsatisfactory 0%
Demonstrates a
Shows a strong
comprehensive Demonstrates a basic
understanding; Demonstrates a limited
understanding; understanding; some
Antivirus Installation and installation and understanding; many Limited or Not
Configuration installation and configurations are configurations are
configurations are Submitted or Academic
configurations are correct and incorrect or not
5 marks mostly correct and Misconduct.
accurate and fully explained; adequate explained; poor settings.
explained; effective
explained; effective settings.
settings.
settings.
Adequate
Successful and clear Successful
demonstration of Limited demonstration of
demonstration of demonstration of
detection and detection and blocking;
Malware Detection and detection and blocking; detection and blocking; Limited or Not
blocking; some significant inaccuracies in
Blocking Demonstration accurate log/dashboard mostly accurate Submitted or Academic
inaccuracies in log/dashboard
5 marks interpretation; log/dashboard interpretation; limited Misconduct.
log/dashboard
comprehensive interpretation; good understanding.
interpretation; basic
understanding. understanding.
understanding.
Page | 14
Victorian Institute of Technology www.vit.edu.au CRICOS Provider No. 02044E, RTO No: 20829
Ability to explain
Ability to explain key some key settings;
Ability to explain key Limited ability to explain
settings with depth; shows a basic
Demonstrated settings clearly; shows a key settings; shows a Limited or Not
Understanding shows a clear and understanding of limited understanding of
good understanding of Submitted or Academic
thorough understanding antivirus antivirus functionality;
5 Marks antivirus functionality; Misconduct.
of antivirus functionality; functionality; poor explanations.
clear explanations.
insightful explanations. adequate
explanations.
Clear speech, organized
Clear speech, well- Adequate speech,
presentation; effective
organized presentation; some organizational Poor speech, poorly
Video Presentation screen recordings and Limited or Not
effective screen issues; adequate organized; ineffective
Quality visual aids; logical flow; Submitted or Academic
recordings and visual screen recordings; screen recordings; poor
5 marks professional quality; flow; poor quality. Misconduct.
aids; logical flow; good generally logical flow;
engaging and
quality; informative. adequate quality.
informative.
Page | 15
Victorian Institute of Technology www.vit.edu.au CRICOS Provider No. 02044E, RTO No: 20829
Assessment Details for Assessment Item 4:
Overview
Assessment tasks Learning Outcome Mapping
Assessment ID Assessment Item When due Weighting ULO# CLO# for BITS
Project Report (Group) Session 12 25%
4* Project Demonstration Session 13 1, 2, 3, 4 A, B, C, D, H, I, J, K
15%
(Group) (Study Week)
Note: * denotes ‘Hurdle Assessment Item’ that students must achieve at least 40% in this item to pass the unit
Introduction
This group assessment, consisting of two parts, Project Report and Project Demonstration.
This group project requires teams of 3-4 students to design, implement, and demonstrate an advanced network security solution. You will focus
on enhancing your pfSense firewall with a robust Intrusion Detection and Prevention System (IDPS) using Snort.
• The group leader will submit the Project Report to the LMS. The rest of the group members should submit the "Individual participation
form".
• The group will prepare a face-to-face presentation to demonstrate the system's defenses. The group leader will also submit the Project
PowerPoint presentation to the LMS. The rest of the group members should submit the "Individual participation form".
Page | 16
Victorian Institute of Technology www.vit.edu.au CRICOS Provider No. 02044E, RTO No: 20829
2. IDPS Testing and Validation:
• Develop comprehensive test cases to validate the effectiveness of your Snort rules.
• Simulate various attack scenarios to trigger your Snort rules and demonstrate the IDPS's detection and prevention
capabilities.
• Capture and analyze Snort logs and alerts to evaluate the performance of your IDPS.
• Document the test cases, attack simulations, and analysis of Snort logs and alerts.
• Provide screenshots of your experiments.
3. Project Report and Documentation:
• Compile a comprehensive report that includes:
o Network topology and configurations.
o Detailed documentation of custom Snort rules and templates.
o Test cases, attack simulations, and analysis of Snort logs and alerts.
o Analysis of the effectiveness of the implemented security measures.
o Discussion of challenges encountered and solutions implemented.
o Screenshots of your experiments.
• Ensure the report is well-organized, clearly written, and professionally formatted.
Submission Instructions
All submissions are to be submitted through Turnitin. Drop-boxes linked to Turnitin will be set up in Learning Management System (LMS).
Assessments not submitted through these drop- boxes will not be considered.
The Turnitin similarity score will be used to determine any plagiarism of your submitted assessment. Turnitin will check conference websites,
Page | 17
Victorian Institute of Technology www.vit.edu.au CRICOS Provider No. 02044E, RTO No: 20829
Journal articles, online resources, and your peer’s submissions for plagiarism. You can see your Turnitin similarity score when you submit your
assessments to the appropriate drop-box. If your similarity score is of concern, you can change your assessment and resubmit. However, re-
submission is only allowed before the submission due date and time.
The report should have a consistent, professional, and well‐organized appearance. Also:
• The total word count of the report must be between 2,000 and 2,500 words.
• The cover page must identify student names, ID numbers, group number, unit details, and assignment details.
• The assignment must adhere to the following formatting guidelines: 12-point font size, single line spacing, and clear section headings.
• Submit a single Microsoft Word report containing all required screenshots via the Turnitin-enabled submission link on the LMS in Session 12.
• Submit a single Microsoft PowerPoint presentation file via the Turnitin-enabled submission link on the LMS in Session 13.
• Submissions in zip file format will not be accepted.
• Assignments submitted on the LMS will only be accepted.
Note 1: The Individual participation form is to be completed by each group member except the one who submits the assessment document(s).
1. The leader should submit the assessment document(s).
2. The rest of the group members should submit the "Individual participation form" in the submission section. Failure to do so will give
you 0 marks.
Note 2: All work is due by the due date and time. Late submissions will be penalized at 20% of the assessment final grade per day, including
weekends. You cannot make re-submissions after the cut-off date.
Marking Criteria/Rubric
You will be assessed on the following marking criteria/Rubric:
Page | 18
Victorian Institute of Technology www.vit.edu.au CRICOS Provider No. 02044E, RTO No: 20829
comprehensive network and complete network network topology
topology documentation. topology documentation.
documentation.
Page | 20
Victorian Institute of Technology www.vit.edu.au CRICOS Provider No. 02044E, RTO No: 20829