Professional Documents
Culture Documents
Assignment 1 Guide Assignment Report Structure: Fonts:: Problems Address
Assignment 1 Guide Assignment Report Structure: Fonts:: Problems Address
- Complete and fill all required data in the Front page with scan digital signature.
o Table of contents
o List of Figures
o List of Tables
o Introduction
Introduce the project and explain what the project is all about
Explain the problems that requires address and give solutions to the
problems
Talk about what the important parts of the assignment you will
address
o Conclusion
The summary of the entire assignment that brings the report to a
satisfying and logical end.
o Evaluation
you must provide your opinion or verdict on whether an argument, or
set of research findings, is accurate.
You can provide a SWOT about the course.
o References
Inline text citations are required (Sources of information)
You must use Harvard referencing style for this report.
Criteria to pass
P1 Identify types of security threat to organisations.
Define threats
Identify threats agents to organizations
List type of threats that organizations will face
Give an example of a recently publicized security breach and discuss its consequences.
What are the recent 2018/2019/2020 security breach? List and give
examples with dates
Discuss the consequences of this breach?
Suggest solutions to organizations.
Discuss briefly firewall and policies, its usage and advantages in a network.
How does a firewall provides a security to a network
Show with diagrams the example of how firewall works
Define IDS, its usage, show with diagrams examples
Write down the potential impact(Threat-Risk) of FIREWALL and IDS incorrect
configuration to the network.
P4 Show, using an example for each, how implementing a DMZ, static IP and NAT
in a network can improve Network Security
Define and discuss with the aid of a diagram DMZ focus on usage and security
function as advantage
Define and discuss with the aid of a diagram static IP focus on usage and security
function as advantage
Define and discuss with the aid of a diagram NAT focus on usage and security
function as advantage