ITNE2005R
NETWORK SECURITY IMPLEMENTATION
Project – Assignment 1
March 2021
INTE2005R NETWORK SECURITY IMPLEMENTATION
Copyright © 2021 VIT, All Rights Reserved.
__________________________________________________________________________________
Objective(s)
The purpose of this assessment is to assess students on the following Learning
Outcomes:
LO1: Analyse network security issues and develop a comprehensive network security policy to
counter threats against information security.
LO6: Monitor network traffic and implement security policies to control access, resist attacks,
and protect network devices
The purpose of this assignment is to enable students to work in teams and expand their
thinking through reading and sharing ideas.
__________________________________________________________________________________
Case Study
In 2018, FunTech (PRIVATE) Limited is recorded as a the top 10 fastest growing company with
800% EPS growth in a year. Recently, the company has added 50 part time and 100 full time
employees. The company has expanded 3 new branches in different cities. The network
expansion is almost completed, and all the offices are connected with each other via WAN
(Internet). Data’s from all the offices are stored and executed from the main data centre
which is located in the head office. This data centre even holds highly confidential and
sensitive data. The CTO of the company is worried since there are only few security devices
installed in the network and there is a high risk of the network getting compromised.
Based on the report presented by IT department, some abnormal incoming and outgoing
traffic pattern was monitored in company’s network. Initial investigation shows that 1) some
of the company’s hardware has some major loopholes (not secured) which was not expected
2) the head office network is being constantly receiving a ransomware message 3) strange
network traffic patterns can be seen. It’s also observed that the capacity of mail server is 30
mails per second, but the server is sometimes receiving more than 100 mails in a second
which is not normal. IT department is highly suspicious about this abnormal traffic and to
clarify what is going on, the company is hiring a third-party security company to conduct a
risk assessment. Implementing an IT security risk assessment is highly recommended and can
prevent security breaches and its impacts.
* 1 main office (Melbourne)
*5 regional office across Australia
Weightage: 10% (Individual Assignment)
Assignment 1: Due Session 5
INTE2005R NETWORK SECURITY IMPLEMENTATION
Copyright © 2021 VIT, All Rights Reserved.
Imagine you are a third-party security company and you are asked to do risk assessment of
this company. Provide an answer to all the provided questions.
(Please note that your answer should relate to the provided case study. Necessary
assumptions can be made by student if required)
1. How do you conduct a cyber security risk assessment?
2. Analyse the correlation between assets, threats, and vulnerabilities in FunTech.
3. Suggest a brief countermeasure to mitigate the existing threat and control similar kind
of threat in future.
4. Its observed that there is some abnormal behaviour in the traffic in the office network.
Identify and Justify the type of possible attack that might have occurred in this
network.
5. Write down the countermeasures that can be taken to prevent from it.
INTE2005R NETWORK SECURITY IMPLEMENTATION
Copyright © 2021 VIT, All Rights Reserved.
Submission Guidelines
• Assignment 1 is an Individual assessment.
• Your report should include the following:
o The word limit of the report is 1500 words.
o The report should have a consistent, professional, and well-organized
appearance with 12point font size and at least single line spacing with
appropriate section headings.
o The cover page must identify student names and the ID number(s), unit
details, assignment details and lecturer details.
o Answers to all the provided questions (in your own word)
• In-text referencing in IEEE style must be cited in the text of the report and listed
appropriately at the end in a reference list (if required).
• The report must be submitted in soft (electronic) copy as a Microsoft Word
document on the LMS in Turnitin dropbox. Assignments submitted on the LMS will
only be accepted.
• The assignments will go through Turnitin and plagiarism penalty will be applied.
__________________________________________________________________________________
Marking Guide: 100 Marks
| Description | Marks | |
| Q1: Risk Assessment |
How do you conduct a cyber security risk assessment | 20 |
| Q2: Analyse the correlation |
Analyse the correlation between assets, threats, and vulnerabilities, in FunTech. |
40 |
| Q3: Mitigate and control threat |
Suggest a brief countermeasure to mitigate the existing threat and control similar kind of threat in future |
10 |
| Q4 and Q5: Identification and countermeasure of the attack |
Identify and Justify the type of possible attack. Write down the countermeasure of such attack. |
30 |
| Total | 100 |
AssignmentTutorOnline