100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
HND Network Security $19.26
Add to cart

Case

HND Network Security

4 reviews
 528 views  1 purchase
  • Course
  • Institution

This is an Assignment Created For the Network Security Module in Pearson HND in Computing.

Preview 10 out of 42  pages

  • April 18, 2020
  • 42
  • 2019/2020
  • Case
  • Unknown
  • Unknown

4  reviews

review-writer-avatar

By: KNicole • 3 year ago

review-writer-avatar

By: KhanH12 • 3 year ago

review-writer-avatar

By: denniskosmak • 3 year ago

Had all the info I needed. Recomended

review-writer-avatar

By: antonperera • 3 year ago

The document is not fully completed. There are lot of missing things especially configuration screenshots. higly dissapointed.

reply-writer-avatar

By: Mahela • 3 year ago

Can you Let me know which parts were missing. The Assignment was done according to the Assignment Brief & Lecturer Guidelines and all the required configuration screenshots are included.

avatar-seller
Higher Nationals

Internal verification of assessment decisions – BTEC (RQF)

INTERNAL VERIFICATION – ASSESSMENT DECISIONS
Programme title Higher National Diploma in Computing

Assessor Internal Verifier
Unit 17- Network Security
Unit(s)

Assignment title

Student’s name
List which assessment criteria Pass Merit Distinction
the Assessor has awarded.

INTERNAL VERIFIER CHECKLIST
Do the assessment criteria awarded match
those shown in the assignment brief? Y/N
Is the Pass/Merit/Distinction grade awarded
justified by the assessor’s comments on the Y/N
student work?
Has the work been assessed
Y/N
accurately?
Is the feedback to the student:
Give details:
• Constructive? Y/N
• Linked to relevant assessment criteria? Y/N
• Identifying opportunities for Y/N
improved performance?
• Agreeing actions? Y/N
Does the assessment decision need
Y/N
amending?

Assessor signature Date

Internal Verifier signature Date
Programme Leader signature (if required)
Date
Confirm action completed
Remedial action taken
Give details:

Assessor signature Date
Internal Verifier
Date
signature
Programme Leader
Date
signature (if required)

,Higher Nationals - Summative Assignment Feedback Form

Student Name/ID
Unit 17- Network Security
Unit Title
Assignment Number 1 Assessor
Date Received
Submission Date
1st submission
Date Received 2nd
Re-submission Date
submission
Assessor Feedback:
LO1 Examine Network Security principles, protocols and standards
Pass, Merit & Distinction P1 P2 M1 D1
Descripts

LO2 Design a secure network for a corporate environment
Pass, Merit & Distinction P3 P4 M2 D1
Descripts

LO3 Configure Network Security measures for the corporate environment
Pass, Merit & Distinction P5 P6 M3 D2
Descripts
LO4 Undertake the testing of a network using a Test Plan

Pass, Merit & Distinction P7 P8 M4 M5 D3
Descripts

Grade: Assessor Signature: Date:

Resubmission Feedback:


Grade: Assessor Signature: Date:

Internal Verifier’s Comments:



Signature & Date:
* Please note that grade decisions are provisional. They are only confirmed once internal and external moderation has taken place and
grades decisions have been agreed at the assessment board.


Assignment Feedback

Formative Feedback: Assessor to Student




Page | 2
Unit 17- Network Security

, Action Plan




Summative feedback




Feedback: Student to Assessor




Assessor Date
signature



Student signature Date




Page | 3
Unit 17- Network Security

, Pearson Higher Nationals in
Computing
Unit 17- Network Security




General Guidelines


1. A Cover page or title page – You should always attach a title page to your assignment. Use
previous page as your cover sheet and make sure all the details are accurately filled.
2. Attach this brief as the first section of your assignment.
3. All the assignments should be prepared using a word processing software.
4. All the assignments should be printed on A4 sized papers. Use single side printing.

Page | 4
Unit 17- Network Security

, 5. Allow 1” for top, bottom , right margins and 1.25” for the left margin of each page.

Word Processing Rules


1. The font size should be 12 point, and should be in the style of Time New Roman.
2. Use 1.5 line spacing. Left justify all paragraphs.
3. Ensure that all the headings are consistent in terms of the font size and font style.
4. Use footer function in the word processor to insert Your Name, Subject, Assignment No,
and Page Number on each page. This is useful if individual sheets become detached for any
reason.
5. Use word processing application spell check and grammar check function to help editing
your assignment.

Important Points:


1. Carefully check the hand in date and the instructions given in the assignment. Late
submissions will not be accepted.
2. Ensure that you give yourself enough time to complete the assignment by the due date.
3. Excuses of any nature will not be accepted for failure to hand in the work on time.
4. You must take responsibility for managing your own time effectively.
5. If you are unable to hand in your assignment on time and have valid reasons such as illness,
you may apply (in writing) for an extension.
6. Failure to achieve at least PASS criteria will result in a REFERRAL grade .
7. Non-submission of work without valid reasons will lead to an automatic RE FERRAL. You will
then be asked to complete an alternative assignment.
8. If you use other people’s work or ideas in your assignment, reference them properly using
HARVARD referencing system to avoid plagiarism. You have to provide both in-text citation
and a reference list.
9. If you are proven to be guilty of plagiarism or any academic misconduct, your grade could be
reduced to A REFERRAL or at worst you could be expelled from the course




Page | 5
Unit 17- Network Security

,Student Declaration




I hereby, declare that I know what plagiarism entails, namely to use another’s work and to present it
as my own without attributing the sources in the correct form. I further understand what it means to
copy another’s work.




1. I know that plagiarism is a punishable offence because it constitutes theft.
2. I understand the plagiarism and copying policy of Edexcel UK.
3. I know what the consequences will be if I plagiarise or copy another’s work in any of the
assignments for this program.
4. I declare therefore that all work presented by me for every aspect of my program, will be my
own, and where I have made use of another’s work, I will attribute the source in the correct
way.
5. I acknowledge that the attachment of this document signed or not, constitutes a binding
agreement between myself and Edexcel UK.
6. I understand that my assignment will not be considered as submitted if this document is not
attached to the assignment.




Student’s Signature: Date:
(Provide E-mail ID) (Provide Submission Date)




Page | 6
Unit 17- Network Security

,Higher National Diploma in Business

Assignment Brief

Student Name /ID Number
Unit Number and Title Unit 17- Network Security
Academic Year 2018/19
Unit Tutor
Assignment Title
Issue Date
Submission Date
IV Name & Date



Submission format

The submission should be in the form of an individual written report. This should be written in a
concise, formal business style using single spacing and font size 12. You are required to make use of
headings, paragraphs and subsections as appropriate, and all work must be supported with
research. You must provide in-text citations and the reference list using Harvard referencing system.



The recommended word count is 4,000–4,500 words excluding annexures.




Unit Learning Outcomes:

Learning Outcomes

By the end of this unit students will be able to:

LO1. Examine Network Security principles, protocols and standards.
LO2. Design a secure network for a corporate environment.
LO3. Configure Network Security measures for the corporate environment.
LO4 Undertake the testing of a network using a Test Plan.



Page | 7
Unit 17- Network Security

, Assignment Brief and Guidance:

EMC Finance is a well-known Finance company established in Kandy with more than 5000
customers and 8 branches island wide. Director board of EMC Finance has decided to restructure
and enhance the computer network at Head office with up to date security measures to face the
emerging security threats worldwide. You have been appointed as the Network Security
Engineer for EMC Finance and it is now your responsibility to plan and implement a secure
network that fulfils the company’s expectations.
Main requirements are as follows but NOT limited to;
1. Head office LAN need to be a Gigabit Ethernet and all Network devices need to be
compatible with each other for maximum performance.
2. All the network devices such as Routers, Switches, Firewalls etc. should be manageable
and only secure logins need be allowed on all devices.
3. AAA should use for Network Device login Authentication where possible and Syslog
Server should use for record logging events, while having NTP server for time.
4. All publicly available resources including public web servers need to be separated from
the main network and should move to a separate subnet. Only Secure Web Access should
be enabled for web servers.
5. Design a SAN (Storage Area Network) implementation for saving Data for the Internal
Network.

Page | 8
Unit 17- Network Security

, 6. Network design should follow the Hierarchical Network Design Model.
7. End user authentication and managing of security polices need to centralized.
8. Internet usage management and URL filtering need to be enforced.
9. Communication between the Head office and the Branch offices need to be highly
secured.
10. Quality of service (QoS) should be implemented where possible.




EMC Finance Head office consists of the following departments;
Department Number of Users
Customer Care 25
Sales and Marketing 35
Finance 60
Legal 5
HR 20
IT Team 25
Internal Server Room 8 Servers + SAN
Servers for Public users 4
Note:
Clearly state your assumptions. You are allowed to design the network according your
assumptions, but main requirements should not be violated

Task 1
Examine Network Security principles, protocols and standards.
1.1. Discuss the importance of Network Security in present socio-economic world.
1.2. Describe devices and their characteristics that are used to enhance the security of a
Network.
1.3. Differentiate Symmetric and Asymmetric Encryption with examples.


Page | 9
Unit 17- Network Security

, 1.4. Explain the purpose of a Digital Certificate in secure web access.

Task 2
Design a secure network for a corporate environment.
2.1. Provide a suitable Virtual LAN design for internal network and IP Design for the
network. (Public servers should be separated from the Internal Network)
2.2. Explain the Technologies /concepts that are required to accomplish the objectives of the
above scenario.
2.3. Determine which security devices and software are needed to design this network and
justify your selections.
2.4. Provide a suitable detailed Diagram of above Network Design including WAN
connections.

Task 3
Configure Network Security measures for the corporate environment.
3.1. Configure all the network devices to achieve the highest level of security for the network
with the requirements given by the scenario. (Provide Network Security configuration
scripts/files/screenshots with comments.)
3.2. Explain how QoS can be integrated in to Network security configurations.



Task 4
Undertake the testing of a network using a Test Plan
4.1 Develop test cases and test the above LAN and WAN designs to verify whether the design
objectives are met.
(Provide Network Security configuration scripts/files/screenshots with comments.)
4.2 Suggest how you can improve the performance and security of this network in the Future.




Page | 10
Unit 17- Network Security

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller Mahela. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $19.26. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

53068 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$19.26  1x  sold
  • (4)
Add to cart
Added