You are on page 1of 2

ASSIGNMENT 1 GUIDE

Assignment report structure :


Fonts : Calibri, Font size 12, Line spacing 1.5, use of : Headings, Paragraphs, Subsections
and illustrations as appropriate is required.

- Complete and fill all required data in the Front page with scan digital signature.
o Table of contents
o List of Figures
o List of Tables

o Introduction
 Introduce the project and explain what the project is all about
 Explain the problems that requires address and give solutions to the
problems
 Talk about what the important parts of the assignment you will
address

o Body of the report


 P1,P2,P3,P4,M1,M2,D1
 Write down all questions, followed by answers sequentially.

o Conclusion
 The summary of the entire assignment that brings the report to a
satisfying and logical end.

o Evaluation
 you must provide your opinion or verdict on whether an argument, or
set of research findings, is accurate.
 You can provide a SWOT about the course.

o References
 Inline text citations are required (Sources of information)
 You must use Harvard referencing style for this report.

Criteria to pass
P1 Identify types of security threat to organisations.
 Define threats
 Identify threats agents to organizations
 List type of threats that organizations will face
Give an example of a recently publicized security breach and discuss its consequences.

 What are the recent 2018/2019/2020 security breach? List and give
examples with dates
 Discuss the consequences of this breach?
 Suggest solutions to organizations.

P2 Describe at least 3 organizational security procedures.

 Mention and discuss about 3 procedures organization uses to improve or provide


organizations security

M1 Propose a method to assess and treat IT security risks.

 Discuss methods required to assess it security threat? E.g. Monitoring tools


 What are the current weakness or threat of the organization ?
 What tools will you propose to treat the IT security risk?

D1 Investigate how a ‘trusted network’ may be part of an IT security solution.

 Discuss and explain what are trusted network


 Give brief details with an example on how its use.
 How can it be a solution in IT security

P3 Identify the potential impact to IT security of incorrect configuration of


firewall policies and IDS.

 Discuss briefly firewall and policies, its usage and advantages in a network.
 How does a firewall provides a security to a network
 Show with diagrams the example of how firewall works
 Define IDS, its usage, show with diagrams examples
 Write down the potential impact(Threat-Risk) of FIREWALL and IDS incorrect
configuration to the network.

P4 Show, using an example for each, how implementing a DMZ, static IP and NAT
in a network can improve Network Security

 Define and discuss with the aid of a diagram DMZ focus on usage and security
function as advantage
 Define and discuss with the aid of a diagram static IP focus on usage and security
function as advantage
 Define and discuss with the aid of a diagram NAT focus on usage and security
function as advantage

M2 Discuss three benefits to implement network monitoring systems with


supporting reasons

 List some of the networking monitoring devices and discuss each.


 Why do you need to monitor network?
 What are the benefits of monitoring a network ?

You might also like