Network Security Assignment IncourseAssignment 1310

download Network Security Assignment IncourseAssignment 1310

of 12

description

Group and individual

Transcript of Network Security Assignment IncourseAssignment 1310

Network Security Page 1 of 12

In-course Assignment Information SheetThis assignment consists of TWO (2) sections: Section A and Section B. Section A is individual that contributes 30% of total 100% while Section B is the remaining 70%, consisting of 60% individual and 40% group.Section A1. Learning Outcomes

This individual assignment carries 30% of your total module assessment marks. At the end of this assignment, student would be able to apply programming concepts with regards to Network Security

2. Assignment Questions

You are required to conduct research, design and develop your assignment.

3. Project TitleEach group is to propose an Assignment Title (1 printed page) and submit it to the lecturer for approval before starting your work. Deadline for Project Title approval is on 9th week. Students are expected to do the project independently with minimal supervision. Each student should have a unique title. The requirements of a title are that it should involve some network security research components.

Some possible areas are (you can propose your own title or choose one below):1. IDS/IPS: Challenges and Deployment2. HotSpot Weaknesses3. Rootkits4. SIP and Secure VoIP5. Scanning & Security Auditing6. Smartphone Security7. Web Security and SSLAny other suitable title can also be accepted.

Guidelines for the Report:

Document the results of your work in a professional and systematic manner, in the form of a computerized report. One (1) softcopy and hardcopy of your documentation is to be submitted.

Your completed documentation should meet the following requirements (if applicable):

1. Marking Table2. Introduction3. Chapters / sections 4. Recommendations5. Documentation of the configured device(s), if there is any6. Conclusion7. Appendices 8. Bibliography or ReferencesIn your document the report is to be written in a professional manner, paying due regard to the following aspects:

The report is to be written in the 3rd person. The report should have a consistent layout and be divided into enumerated sections, sub-sections, sub-sub sections etc. The report should be fully referenced using the University standard. Your report must be typed using Microsoft Word with Times New Roman font and size 12. Expected length is 1,000 words for 1 topic (excluding diagrams, appendixes and references). You need use to include a word count at the end of the report and it should be in 1.5 spaces. Submission of reports that are unprofessional in its outlook (dirty, disorganised, inconsistent look, varying coloured paper and size) will not fare well when marks are allocated. Ensure that the report is printed on standard A4 (210 X 297 mm) sized paper. The report should have a one (1) margin all around the page as illustrated below:

Every report must have a front cover. A transparent plastic sheet can be placed in front of the report to protect the front cover. The front cover should have the following details:

Name Intake code. Subject. Project Title. Date Assigned (the date the report was handed out). Date Completed (the date the report is due to be handed in).Submission requirementsA CD containing an electronic version of the document. The total word count of the main body of the document (excluding title & contents pages) is to be in the region of 3000 words.Marking TablePlease note that during the preparation of your assignment, you must include the following marking table. Ensure you fill in the details of your team members full names and their respective student IDs.The marking table must be placed on a single page, located as either the second or third page of your final assignment documentation. Each team members name must only appear once. The schedule for the presentation will be announced in due time.Assessment Criteria: Documentation10% Referencing10% Research and Investigation10% Diagrams & Figures10% Critical Thinking and Applicability20% Analytical20% Explanation 10% Presentation10%

Individual (100%)

Names and IntakesDocumentation (10)Referencing (10)Research and Investigation (10)Diagram/Figures (10)Critical Thinking and Applicability (20) Analytical (20)Explanation (10)Presentations (10)Grand Total (100)

1

2

3

4

Section B

Instructions:This group assignment carries 70% of your total module assessment marks, with 60% of the total contributed by an individual component. A group consist of maximum 4 students. (Minimum 2 students). The total word count of the report should not exceed 5000 words. No marks will be awarded for the entire assignment if any part of it is found to be copied directly from printed materials or from another group. All submissions should be made on or before the due date. Any late submissions after the deadline will not be entertained. Zero(0) mark will be awarded for late submission, unless extenuating circumstances are upheld.Scenario:Company A is food manufacturer based in Kuala Lumpur. Its office consists of 3 departments: Sales, Engineering and Finance. It has a Sales office in Singapore located 350km away from Kuala Lumpur and hosts 50 employees. The following topology illustrates the network architecture and topology of the Kuala Lumpur office of Company-A and Singapore Company-B.The Kuala Lumpur office has simple network architecture. Clients workstations are connected to an access switch, then connected to a distributed switch and then to the routers inside interface. The firewalls outside interface connects directly to the internet service provider (ISP) router. The ISP completely manages this router and the company-A has no control over it. A third interface on the firewall hosts a demilitarised zone (DMZ) hosting several servers. These servers include web, email and FTP applications.The goal is to protect the internal and DMZ hosts from external threats. As a network security specialist, you are required to provide a security solution for company-A and company-B.There are some requirements in the above scenario that must be considered in this security design.1. Client workstations (sales, engineering and finance) must be able to access the web server at the DMZ over HTTP and HTTPS. The web server should be reachable from the external clients over HTTP and HTTPS only. (Solution and configuration)2. Clients should also be able to put and get files via FTP to the same server. The company requires implementing FTP with user and password is essential for each transaction. (Solution and configuration.)3. Engineering and sales workstations must be able to access the Internet (to reach company B) over HTTP and HTTPS with DNS. No other protocol access is allowed to the Internet. (Solution and configuration.)4. Client workstations must be able to check their e-mail on the e-mail server at the DMZ. (Solution and configuration.)5. The e-mail server should be able to receive e-mail from external hosts over the simple mail transfer protocol (SMTP). (Solution.)6. No client from sales, engineering and finance department is able to access clients in the other departments. (Solution and configuration.)7. Layer two securities is a requirement in the company-A LAN. (Solution and configuration.)8. Bastion host works as an application proxy. You are required to explain the solution in detail. (Configuration is not required.) 9. Connectivity between company-A in Kuala Lumpur and company-B in Singapore is a requirement. What is the best solution? Elaborate on the solution. (Configuration is not required).10. Data transmitted over the network must be kept disguised and only intended recipient can read it. Hackers are unable to understand the content even they are able to wiretap the communication. (Solution on the techniques, no configuration is required)11. The company requires implementing intrusion detection systems (IDS). (Configuration is required.)12. Implement VPN between Singapore and Kuala Lumpur. (Configuration is required.) 13. Implement SSL encryption between Singapore and Kuala Lumpur. (Solution)

Note: The solution in the parenthesis means that, you have to recommend, what should be done in order to fulfil the companys requirement. In this case, you do not have to configure any of the device(s) in the topology. The configuration in the parenthesis means that, in addition to the solution that you provide, you have to implement it by configuring the appropriate device with commands and setups.

Guidelines for the Report:

Document the results of your work in a professional and systematic manner, in the form of a computerized report. One (1) softcopy and hardcopy of your documentation is to be submitted.

Your completed documentation should meet the following requirements:

1. Table of contents for every detailed chapter/section.2. Marking Table3. Gantt Chart4. Detailed Work Breakdown Structure5. Introduction6. Chapters / sections 7. Recommendations8. Network configurations9. Documentation of the configured device(s)10. Conclusion11. Contribution of each member12. Appendices 13. Bibliography or ReferencesIn your document the report is to be written in a professional manner, paying due regard to the following aspects:

The report is to be written in the 3rd person. The report should have a consistent layout and be divided into enumerated sections, sub-sections, sub-sub sections etc. The report should be fully referenced using the University standard. Your report must be typed using Microsoft Word with Times New Roman font and size 12. Expected length is 5,000 words (excluding diagrams, appendixes and references). You need use to include a word count at the end of the report and it should be in 1.5 spaces. Submission of reports that are unprofessional in its outlook (dirty, disorganised, inconsistent look, varying coloured paper and size) will not fare well when marks are allocated. Ensure that the report is printed on standard A4 (210 X 297 mm) sized paper. The report should have a one (1) margin all around the page as illustrated below:

Every report must have a front cover. A transparent plastic sheet can be placed in front of the report to protect the front cover. The front cover should have the following details:

Name Intake code. Subject. Project Title. Date Assigned (the date the report was handed out). Date Completed (the date the report is due to be handed in).Submission requirementsA CD containing an electronic version of the document and video presentation (15 minutes) of group member. The total word count of the main body of the document (excluding title & contents pages) is to be in the region of 5000 words.Marking TablePlease note that during the preparation of your assignment, you must include the following marking table. Ensure you fill in the details of your team members full names and their respective student IDs.The marking table must be placed on a single page, located as either the second or third page of your final assignment documentation. Each team members name must only appear once. The schedule for the presentation will be announced in due time.Assessment Criteria: Documentation10%Group Referencing10%Group Research and Investigation10%Group Diagrams & Figures10%Group Critical Thinking and Applicability20%Individual Analytical20%Individual Configurations10%Individual Presentation10%Individual

Group (40%)Individual (60%)

Names and IntakesDocumentation (10)Referencing (10)Research and Investigation (10)Diagram/Figures (10)Critical Thinking and Applicability (20) Analytical (20)Configurations (10)Presentations (10)Grand Total (100)

1

2

3

4

Marking Scheme Rubrics1 to 34 to 78 to 10

Documentation (10)

All submission requirements were not adhered or poor writing or poor quality of contents.All submission requirements were followed with well writing and proper formatting of document along with proper quality of the content.

All submission requirements were followed with very good writing and formatting. The quality of the content is very good. The document looks like a real world solution.

1 to 34 to 78 to 10

Referencing (10)None, very little, or wrong usage of citation or not following proper referencing format.Proper, well formatted referencing with needed citations in all required places. Including needed copyright sign for used software. Proper, well formatted referencing with needed citations in all required places. Including needed copyright sign for used software and terms with proper referencing for each one. Using a right bibliography

1 to 34 to 78 to 10

Research and Investigation (10)Poor research and investigation of the problem. Poor evaluation of the requirement.Well research and investigation is done. Good evaluation of the requirements with proper reasoning with proper project planning and management.Very well analysis and investigation of the problem. Outstanding evaluation of the requirements with proper reasoning. Outstanding project planning and management with the screenshots of used tools.

1 to 34 to 78 to 10

Diagrams / Figures (10)Failed to attach any diagrams and figures. Descriptions of diagrams are blurring.Few diagrams and figures attached. Diagrams are lack of descriptions and labeling. Proper and relevant diagrams and figures. Diagrams are labeled and well described. Sequence of diagrams is well organized.

1 to 56 to 1011 to 1516 to 20

Critical Thinking and Applicability (20)The judgment criteria are not relevant and the solution is not applicable.The judgment is somehow relevant. The solution is applicable though it lacks in some parts.The judgment is relevant.The solution is relevant though it lack of supporting factors.Provided relevant criteria for making the judgment. Applicable methods or techniques are used for forming the judgment.

1 to 56 to 1011 to 1516 to 20

Analytical (20)Very poor or minimal analysis of the problem is done.Analysis done with lack of tools and techniques. Insufficient descriptions on analysis resultsAnalysis is accurate and good use of the analysis tools and technique is madeExcellent analysis of the solution has been done. Proper usage of tools in analyzing and testing the accuracy of the solution.

1 to 34 to 78 to 10

Configurations (10)Failed to configure the required devices.Partial configuration is done; some of the devices are not configured properly. The documentation of the configured devices is not complete.Proper and full configuration of all of the devices with complete documentation of the configured devices.

1 to 34 to 78 to 10

Presentations (10)Fail to attend the presentations.Voice is hardly to be heard.Unable to answer questionsAttended presentation but voice is hard to be heard. Able to answer question but failed to produce confirmed answers

Attended presentation and able to attract audiences attentions. Voice is clear and loud. Able to answer all the questions without referring to notes.

Level 2Asia Pacific University of Technology and Innovation