Professional Documents
Culture Documents
To ensure that you are not accused of plagiarism, look at the sections
on Plagiarism Support and Turnitin support.
I. Assessment Requirements
Network and cloud security aim to ensure the confidentiality, integrity and
availability of interconnected systems and information. Due to the wide-ranging
environments and platforms that are in use, and the lack of security awareness by
many users, network security is a complex task. This has resulted in a high level of
traffic/data loss or theft amongst business users, particularly in relation to
information or networked systems accessed via physical or virtual networks and
systems interfaces. This assignment allows you to build your knowledge and
understanding of the theoretical and practical issues in network and cloud security.
In particular, you will demonstrate the threats to networked computers and ways
in which these threats may be mitigated by the deployment of appropriate security
countermeasures.
Equal marks will be given whichever option is chosen because there are different
challenges involved in each option. Some options may be more suitable for
computers with limited capacity.
Several tools and hackers’ techniques (which were introduced in the lab sessions
and should find out more by your research) can be used to test your network or
system security performance. You should use Snort IDPS to test your system’s
security (analysis, detection and prevention performance). The result should be
reported and discussed.
3. You must detail your testing strategy, for example, discussing the
implementation of tools and techniques (introduced in lab sessions and
identified by your research) that would aid you in this task.
4. Then you should implement your security testing strategy for your system
(VM) security, detail the results obtained, and evaluate the security of
system.
You are encouraged to make recommendations on (a) how the networking
and systems may have its security improved. (b) how to raise the level of
security of OS to meet the needs for Internet readiness and to demonstrate
that the system is secure by employing appropriate tools and techniques
introduced in the lab sessions and identified by your research. This section
should consider 2 or 3 issues such as access control, remote access
applications, OS, network interfaces, network security architecture and
maybe others. The level of security required is ‘medium’, i.e. it provides an
appropriate level of security (ensuring confidentiality, integrity and
availability) for systems providing services over networks. You will
demonstrate that the required level of security of your Ubuntu IDPS has been
achieved by employing appropriate tools and techniques. This part of the
coursework will use screenshots and textual descriptions to illustrate any
practical work undertaken. This section will be supported with references to
papers in journals, conference proceedings, Web sites or books on securing
computer systems.
5
5. You are required to write a reflective statement based on skills learned from
the module and coursework. Your reflective statements should be
approximately 200 words. It will reflect on the skills learned in completing
this coursework.
6. You must give a demonstration of your overall system and its network
security. This part of the coursework should use screenshots and textual
descriptions to illustrate any practical work undertaken.
Your report including your reflective statement should not exceed 3000 words
(excluding references and appendices).
You are encouraged to link any references in the practical elements of the
assignment to relevant and related academic literature. Particular care should be
made to ensure that the report contains correct references to all cited work in an
appropriate style, e.g., the Harvard Referencing System.
You should submit your final report including your reflective statements to the
Dropbox in NOW before the submission deadline.
6
reference to the
wider literature.
Design and Exceptional Excellent demonstration Very Good demonstration of Competent Attempt but marginally Absent or no merit.
implementati demonstration of of security security countermeasures demonstration of insufficient meaningful no understanding,
on: Set up security countermeasures related related to confidentiality, security tools and content; demonstration of and application of
prototype countermeasures to confidentiality, integrity or availability techniques sufficient to relevant skills over a reduced the area of study;
network and related to integrity and availability applied to the OS focusing on deal with basic facts or range (FMARG). Highly weak technical and
system confidentiality, applied to the OS some the taught with notable concepts; pass to make insufficient knowledge, practical competence
security integrity and going beyond the taught limitations; evidence of meaningful synthesis or understanding, and hampers ability to
architecture availability applied with minor limitations or appropriate selection and related to the OS with application of the area of demonstrate
VM. to the OS going omissions; evidence of evaluation of background notable limitations or study; weak technical and achievement of
beyond what has appropriate selection and information but generally omissions; some ability practical competence outcomes.
been taught; critical evaluation/ reliant on set sources to to select and evaluate hampers ability to
evidence of synthesis/ research with advance arguments; very tools but application is demonstrate achievement of
extensive and some beyond the good demonstration of very general or outcomes.
appropriate prescribed range; security implementation with incomplete but
selection and critical Excellent demonstration some notable inaccuracies, sufficient; adequate
evaluation/ of security errors, or omissions; very demonstration of
synthesis/ research implementation with good demonstration of security
beyond the breadth, focus, and relevant skills although implementation with
prescribed range; critical analysis but may limited in range. some notable
excellent rely on some set sources; inaccuracies, errors, or
demonstration of very good demonstration omissions; adequate
security of relevant skills. demonstration of
implementation relevant skills over a
with breadth, focus, limited range.
and critical analysis;
excellent
demonstration of
relevant skills.
Reflective Excellent written Very good written Mostly very well presented Good presented but Marginally inadequate Absent or no merit.
statement: language and language and but notable omissions; good notable omissions or (FMARG). Very Weak Very Weak
Contribution presentation with presentation with few written language and errors; adequate competence hampers ability competence
to task, skills few very minor minor structural or presentation with some attempt at evaluation of to communicate hampers ability to
achieved. structural or typographical errors; structural or maybe minor performance and skills; achievement of outcomes. communicate
typographical very good critical typographical errors; very good detail and/or achievement of
errors; excellent evaluation of good evaluation of incomplete or notable outcomes.
critical evaluation of performance and skills performance and skills and inaccuracies but
performance and with some awareness of some awareness of otherwise sufficient;
skills whilst limitations with some notable written communication
recognising
8
Demonstrati Fully contextualises Contextualises work with Attempt at contextualising Good Knowledge and Attempt but marginally Absent or no merit.
on of work with appropriate, relevant, the work with appropriate understanding insufficient meaningful
network and appropriate, accurate background; background information sufficient to deal with content; demonstration of No understanding,
cloud relevant, accurate excellent knowledge and perhaps with some errors or terminology, good facts relevant skills over a reduced and application of
security and background; understanding of threats omissions; very good and concepts; pass to range (FMARG). Highly the area of study;
overall Exceptional and vulnerabilities knowledge and make meaningful insufficient knowledge, very weak technical
system: knowledge and relating facts/concepts understanding of threats and synthesis; descriptive understanding, and and practical
understanding of together with ability to vulnerabilities analytical; and limited attempt at application of the area of competence
Demonstration threats and apply to taught contexts; evidence of appropriate analysis of threats and study; weak technical and hampers ability to
of security vulnerabilities as evidence of critical selection and evaluation of vulnerabilities, and practical competence demonstrate
tools the student is evaluation/ synthesis/ background information but application of hampers ability to achievement of
implementatio typically able to go research with some generally reliant on set appropriate tools; demonstrate achievement of outcomes.
n. beyond what has beyond the prescribed sources to advance strong reliance on outcomes.
Demonstration been taught; range; excellent arguments; very good available support set
that the evidence of demonstration of the attempt to demonstrate the sources to advance
desired level extensive and security of network and security of overall systems work; adequate
of security is critical evaluation/ overall systems from with some notable attempt to demonstrate
achieved. synthesis/ research breadth of research but inaccuracies, errors, or the security of overall
beyond the may rely on some set omissions; very good systems in general,
prescribed range; sources; very good demonstration of relevant with notable
outstanding demonstration of skills although limited in inaccuracies, errors,
demonstration of relevant skills. range. limitations, or
the security of the omissions; adequate
network and overall demonstration of
systems with relevant skills over a
breadth, focus, and limited range.
critical analysis and
is well supported by
reference to the
wider literature;
excellent
demonstration of
relevant skills.
Testing Exceptional Excellent knowledge of Demonstrates a very good Good Knowledge and Attempt but marginally Absent or no merit.
strategy: knowledge of the the range of options knowledge of the range of understanding insufficient meaningful Highly insufficient
Discussion of range of options available to test security options to test security; sufficient to deal with content; demonstration of knowledge and
appropriate available to test with some minor evidence of appropriate terminology, basic facts relevant skills over a reduced understanding of the
security; evidence omissions or errors; selection and evaluation of and concepts; pass to range (FMARG). Insufficient area of study to
9
tools and of extensive and evidence of critical background information but make meaningful knowledge and produce meaningful
techniques. critical evaluation/ synthesis/ generally reliant on set strategy; strong understanding of the area of strategy.
evaluation/synthesi research some beyond sources to advance reliance of available study to produce meaningful
s/research beyond the prescribed range; arguments; provides support set sources to strategy.
the prescribed recommendations to test recommendations to test advance work;
range; security have breadth, security for potential issues arguments for
recommendations focus, evaluation and but have some limitations or recommendations to
to test security of some critical analysis and inaccuracies. test security have
systems have are well supported. notable weaknesses,
excellent breadth, limitations and/or are
focus, evaluation poorly constructed.
and critical analysis
and are well
supported by
reference to the
wider literature.
Test and Exceptional excellent knowledge and Demonstrates a very good Good Knowledge and Attempt but marginally Absent or no merit.
evaluation of knowledge and application of the range knowledge and application of understanding insufficient meaningful Highly insufficient
results: application of the of options available to the range of options to test sufficient to deal with content; demonstration of knowledge and
Discussion of range of options test security; evidence of security with some terminology, basic facts relevant skills over a reduced understanding of the
test results available to test critical limitations; evidence of and concepts; Pass to range (FMARG). Insufficient area of study to
and security; evidence evaluation/synthesis/ appropriate selection and make meaningful knowledge and produce meaningful
recommendati of extensive and research some beyond evaluation of background application; strong understanding of the area of results and
ons to raise critical the prescribed range; information but generally reliance of available study to produce meaningful evaluation; very
the level of evaluation/synthesi recommendations to reliant on set sources to support set sources to results and evaluation; weak weak or no technical
network and s/research beyond improve security have advance arguments; results, advance work; results, technical and practical and practical
cloud security the prescribed breadth, focus, and some evaluation, and evaluation, and competence hampers ability competence
for internet range; results and critical analysis; excellent recommendations have recommendations have to demonstrate achievement hampers ability to
readiness. evaluation have demonstration of described and discussed notable weaknesses, of outcomes. demonstrate
excellent breadth, relevant skills. well; very good limitations and/or are achievement of
focus, and critical demonstration of relevant poorly constructed; outcomes.
analysis; excellent skills although limited in adequate
demonstration of range. demonstration of
relevant skills. relevant skills over a
limited range.
10
IV. Assessment Criteria
Assessment criteria:
V. Feedback Opportunities
Formative (Whilst you’re working on the coursework)
You will be given the opportunity to book appointments to discuss the
assessment outside of class time.
VII. Moderation
Waleed Bul’ajoul
Module Leader