Unit 29 – L5_Network Security – June 05, 2025 – Nirajan Ghimire

Unit 29 - L5_Network Security - June 05, 2025 - Nirajan Ghimire

INTERNATIONAL SCHOOL OF MANAGEMENT AND TECHNOLOGY
NEPALweSiDbIr7DRdgAAAABJRU5ErkJggg==

FACULTY OF COMPUTING

UNIT TITLE

Unit 29: Network Security

UNIT CODE

M/618/7443

LEVEL

5

STUDENT NAME

CREDIT VALUE

15

ASSESSMENT TITLE

Nobel College Security

WORD COUNT

ASSESSOR

Nirajan Ghimire

I.V.

ASSIGNMENT ISSUE DATE

June 05, 2025

ASSIGNMENT SUBMISSION DATE

August 05, 2025

ORIGINAL SUBMISSION

ASSIGNMENT NO.

1/1

ASSESSMENT CRITERIA TO BE ASSESSED IN THIS ASSIGNMENT
(Identify all criteria to be assessed in this assignment)

Assignment Criteria

P1

P2

P3

P4

P5

P6

Achieved

Merit Criteria

Distinction Criteria

Assignment Criteria

M1

M2

M3

M3

M4

D1

D2

Achieved

Important:

  • Read the plagiarism notice and requirements at Page 8
  • Word-limit- 8000 words(excludes cover page, table of content, figures, graphs, reference list, appendix and logbook)
  • Accepted Sources: Research Papers(Journal Articles, Conference Proceedings, Thesis), Text Books, Governmental Data, Websites (only a registered organization, an educational institution, government agency)
  • Information taken from unreliable sources will not be accepted
  • Must follow Harvard Reference Style
  • Assignment must be submitted through the Plagiarism Detection Tool

Assignment submission format

Each student has to submit their assignment as guided in the assignment brief. The students are guided on what sort of information is to produce to meet the criteria targeted. You are required to make use of headings, paragraphs, and subsections as appropriate, and all work must be supported with research and referenced using the Harvard referencing system.

Learning outcomes covered

  • LO1 Examine Network Security principles, protocols and standards
  • LO2 Design a secure network for a corporate environment
  • LO3 Configure Network Security measures for the corporate environment.
  • LO4 Undertake the testing of a network using the test plans.

Scenario

You have been contracted by a prominent educational institution called “The Nobel College” which serves thousands of students and staff. The Nobel College is known for its cutting-edge research and technology programs. Recently, they have grown concerned about the security of their network infrastructure due to several incidents of unauthorized access to sensitive student data and research projects. Your mission is to conduct a comprehensive network security assessment and propose measures to enhance their network security.

ASSIGNMENT SCENARIO AND TASKS

Assignment Task – Part 1

You need to start by examining the different types of Network Security principles, protocols and standards.

You need to prepare a short presentation, along with speaker notes that:

  • Discusses the different types of Network Security devices available.
  • Examine network security protocols and the use of different cryptographic types in network security.

For a higher grade you could also compare and contrast at least two major Network Security protocols.

Further prepare a requirement specification document

  • With reference to the given scenario, investigate and list out the purpose and requirements for a secured Network.
  • Determine and list out the network hardware and software to use in this network.

For a higher grade you could

  • Create a design of a secure network according to a given scenario.
  • Evaluate the importance of network security to an organization.

Assignment Task – Part 2

Further Configure Network Security measures for the corporate environment. You will have to create an implementation and testing document that contains the implementation details

  • Configure Network Security for your network.

You could make your report comprehensive by

  • provide detailed screenshots along with a short explanation of all the steps involved. Provide Network security configuration script/ files and screenshots with detailed comments.

Further Carry out a detailed testing and present a test report.

  • Develop and implement a Test Plan for the Network you have designed for The Nobel College and test the Network using the plan you have developed.

For a higher grade you could:

  • Provide screenshots/files/ scripts of the testing and analyze the results of testing to recommend improvements for the network.
  • Critically evaluate the design, planning, configuration and testing of the Network designed for The Nobel College

LEARNING OUTCOMES AND ASSESSMENT CRITERIA

Pass

Merit

Distinction

LO1 Examine Network Security principles, protocols and standards

D1 Evaluate the importance of network security to an organization.

P1 Discuss the different types of Network Security devices.

P2 Examine network security protocols and the use of different cryptographic types in network security.

M1Compare and contrast at least two major Network Security protocols.

LO2 Design a secure network for a corporate environment

P3 Investigate the purpose and requirements of a secure network according to a given scenario.

P4 Determine which network hardware and software to use in this network.

M2 Create a design of a secure network according to a given scenario.

LO3 Configure Network Security measures for the corporate environment

D2Critically evaluate the design, planning, configuration and testing of the network.

P5 Configure Network Security for your network.

M3 Justify the choices made in the implemented network security configuration.

LO4 Undertake the testing of a network using a Test

Plan

P6 Comprehensively test your network using the devised Test Plan.

M4 Analyze the results of testing to recommend improvements to the network.

Plagiarism Notice

You are reminded that there exist Academic Misconduct Policy and Regulation concerning Cheating and Plagiarism.

Extracts from the Policy:

Section 3.4.1: Allowing others to do assignments / Copying others assignment is an offence

Section 3.4.2: Plagiarism, using the views, opinion or insights / paraphrasing of another person’s original phraseology without acknowledgement

Requirements

  • It should be the student’s own work – Plagiarism is unacceptable.
  • Clarity of expression and structure are important features.
  • Your work should be submitted as a well presented, word-processed document with headers and footers, and headings and subheadings.
  • You are expected to undertake research on this subject using books from the Library, and resources available on the Internet.
  • Any sources of information should be listed as references at the end of your document and these sources should be referenced within the text of your document using Harvard Referencing style
  • Your report should be illustrated with screen-prints, images, tables, charts and/or graphics.
  • All assignments must be typed in Times New Roman, font size 12, 1.5 spacing.

The center policy is that you must submit your work within due date to achieve “Merit” and “Distinction”. Late submission automatically eliminates your chance of achieving “Merit and Distinction”. Also, 80% attendance is required to validate this assignment.

Assignment Prepared By

Siddhant Bhattarai

806dCn9EKmgAAAAASUVORK5CYII=Signature

Date

March 25, 2025

Brief Checked By

Dhruba Babu Joshi

Signature

9k=

Date

March 27, 2025

Leave a Reply

Your email address will not be published. Required fields are marked *