Higher Nationals
Internal verification of assessment decisions – BTEC (RQF)
INTERNAL VERIFICATION – ASSESSMENT DECISIONS
Programme title Higher National Diploma in Computing
Assessor Internal Verifier
Unit 17- Network Security
Unit(s)
Assignment title
Student’s name
List which assessment criteria Pass Merit Distinction
the Assessor has awarded.
INTERNAL VERIFIER CHECKLIST
Do the assessment criteria awarded match
those shown in the assignment brief? Y/N
Is the Pass/Merit/Distinction grade awarded
justified by the assessor’s comments on the Y/N
student work?
Has the work been assessed
Y/N
accurately?
Is the feedback to the student:
Give details:
• Constructive? Y/N
• Linked to relevant assessment criteria? Y/N
• Identifying opportunities for Y/N
improved performance?
• Agreeing actions? Y/N
Does the assessment decision need
Y/N
amending?
Assessor signature Date
Internal Verifier signature Date
Programme Leader signature (if required)
Date
Confirm action completed
Remedial action taken
Give details:
Assessor signature Date
Internal Verifier
Date
signature
Programme Leader
Date
signature (if required)
,Higher Nationals - Summative Assignment Feedback Form
Student Name/ID
Unit 17- Network Security
Unit Title
Assignment Number 1 Assessor
Date Received
Submission Date
1st submission
Date Received 2nd
Re-submission Date
submission
Assessor Feedback:
LO1 Examine Network Security principles, protocols and standards
Pass, Merit & Distinction P1 P2 M1 D1
Descripts
LO2 Design a secure network for a corporate environment
Pass, Merit & Distinction P3 P4 M2 D1
Descripts
LO3 Configure Network Security measures for the corporate environment
Pass, Merit & Distinction P5 P6 M3 D2
Descripts
LO4 Undertake the testing of a network using a Test Plan
Pass, Merit & Distinction P7 P8 M4 M5 D3
Descripts
Grade: Assessor Signature: Date:
Resubmission Feedback:
Grade: Assessor Signature: Date:
Internal Verifier’s Comments:
Signature & Date:
* Please note that grade decisions are provisional. They are only confirmed once internal and external moderation has taken place and
grades decisions have been agreed at the assessment board.
Assignment Feedback
Formative Feedback: Assessor to Student
Page | 2
Unit 17- Network Security
, Action Plan
Summative feedback
Feedback: Student to Assessor
Assessor Date
signature
Student signature Date
Page | 3
Unit 17- Network Security
, Pearson Higher Nationals in
Computing
Unit 17- Network Security
General Guidelines
1. A Cover page or title page – You should always attach a title page to your assignment. Use
previous page as your cover sheet and make sure all the details are accurately filled.
2. Attach this brief as the first section of your assignment.
3. All the assignments should be prepared using a word processing software.
4. All the assignments should be printed on A4 sized papers. Use single side printing.
Page | 4
Unit 17- Network Security
, 5. Allow 1” for top, bottom , right margins and 1.25” for the left margin of each page.
Word Processing Rules
1. The font size should be 12 point, and should be in the style of Time New Roman.
2. Use 1.5 line spacing. Left justify all paragraphs.
3. Ensure that all the headings are consistent in terms of the font size and font style.
4. Use footer function in the word processor to insert Your Name, Subject, Assignment No,
and Page Number on each page. This is useful if individual sheets become detached for any
reason.
5. Use word processing application spell check and grammar check function to help editing
your assignment.
Important Points:
1. Carefully check the hand in date and the instructions given in the assignment. Late
submissions will not be accepted.
2. Ensure that you give yourself enough time to complete the assignment by the due date.
3. Excuses of any nature will not be accepted for failure to hand in the work on time.
4. You must take responsibility for managing your own time effectively.
5. If you are unable to hand in your assignment on time and have valid reasons such as illness,
you may apply (in writing) for an extension.
6. Failure to achieve at least PASS criteria will result in a REFERRAL grade .
7. Non-submission of work without valid reasons will lead to an automatic RE FERRAL. You will
then be asked to complete an alternative assignment.
8. If you use other people’s work or ideas in your assignment, reference them properly using
HARVARD referencing system to avoid plagiarism. You have to provide both in-text citation
and a reference list.
9. If you are proven to be guilty of plagiarism or any academic misconduct, your grade could be
reduced to A REFERRAL or at worst you could be expelled from the course
Page | 5
Unit 17- Network Security
,Student Declaration
I hereby, declare that I know what plagiarism entails, namely to use another’s work and to present it
as my own without attributing the sources in the correct form. I further understand what it means to
copy another’s work.
1. I know that plagiarism is a punishable offence because it constitutes theft.
2. I understand the plagiarism and copying policy of Edexcel UK.
3. I know what the consequences will be if I plagiarise or copy another’s work in any of the
assignments for this program.
4. I declare therefore that all work presented by me for every aspect of my program, will be my
own, and where I have made use of another’s work, I will attribute the source in the correct
way.
5. I acknowledge that the attachment of this document signed or not, constitutes a binding
agreement between myself and Edexcel UK.
6. I understand that my assignment will not be considered as submitted if this document is not
attached to the assignment.
Student’s Signature: Date:
(Provide E-mail ID) (Provide Submission Date)
Page | 6
Unit 17- Network Security
,Higher National Diploma in Business
Assignment Brief
Student Name /ID Number
Unit Number and Title Unit 17- Network Security
Academic Year 2018/19
Unit Tutor
Assignment Title
Issue Date
Submission Date
IV Name & Date
Submission format
The submission should be in the form of an individual written report. This should be written in a
concise, formal business style using single spacing and font size 12. You are required to make use of
headings, paragraphs and subsections as appropriate, and all work must be supported with
research. You must provide in-text citations and the reference list using Harvard referencing system.
The recommended word count is 4,000–4,500 words excluding annexures.
Unit Learning Outcomes:
Learning Outcomes
By the end of this unit students will be able to:
LO1. Examine Network Security principles, protocols and standards.
LO2. Design a secure network for a corporate environment.
LO3. Configure Network Security measures for the corporate environment.
LO4 Undertake the testing of a network using a Test Plan.
Page | 7
Unit 17- Network Security
, Assignment Brief and Guidance:
EMC Finance is a well-known Finance company established in Kandy with more than 5000
customers and 8 branches island wide. Director board of EMC Finance has decided to restructure
and enhance the computer network at Head office with up to date security measures to face the
emerging security threats worldwide. You have been appointed as the Network Security
Engineer for EMC Finance and it is now your responsibility to plan and implement a secure
network that fulfils the company’s expectations.
Main requirements are as follows but NOT limited to;
1. Head office LAN need to be a Gigabit Ethernet and all Network devices need to be
compatible with each other for maximum performance.
2. All the network devices such as Routers, Switches, Firewalls etc. should be manageable
and only secure logins need be allowed on all devices.
3. AAA should use for Network Device login Authentication where possible and Syslog
Server should use for record logging events, while having NTP server for time.
4. All publicly available resources including public web servers need to be separated from
the main network and should move to a separate subnet. Only Secure Web Access should
be enabled for web servers.
5. Design a SAN (Storage Area Network) implementation for saving Data for the Internal
Network.
Page | 8
Unit 17- Network Security
, 6. Network design should follow the Hierarchical Network Design Model.
7. End user authentication and managing of security polices need to centralized.
8. Internet usage management and URL filtering need to be enforced.
9. Communication between the Head office and the Branch offices need to be highly
secured.
10. Quality of service (QoS) should be implemented where possible.
EMC Finance Head office consists of the following departments;
Department Number of Users
Customer Care 25
Sales and Marketing 35
Finance 60
Legal 5
HR 20
IT Team 25
Internal Server Room 8 Servers + SAN
Servers for Public users 4
Note:
Clearly state your assumptions. You are allowed to design the network according your
assumptions, but main requirements should not be violated
Task 1
Examine Network Security principles, protocols and standards.
1.1. Discuss the importance of Network Security in present socio-economic world.
1.2. Describe devices and their characteristics that are used to enhance the security of a
Network.
1.3. Differentiate Symmetric and Asymmetric Encryption with examples.
Page | 9
Unit 17- Network Security
, 1.4. Explain the purpose of a Digital Certificate in secure web access.
Task 2
Design a secure network for a corporate environment.
2.1. Provide a suitable Virtual LAN design for internal network and IP Design for the
network. (Public servers should be separated from the Internal Network)
2.2. Explain the Technologies /concepts that are required to accomplish the objectives of the
above scenario.
2.3. Determine which security devices and software are needed to design this network and
justify your selections.
2.4. Provide a suitable detailed Diagram of above Network Design including WAN
connections.
Task 3
Configure Network Security measures for the corporate environment.
3.1. Configure all the network devices to achieve the highest level of security for the network
with the requirements given by the scenario. (Provide Network Security configuration
scripts/files/screenshots with comments.)
3.2. Explain how QoS can be integrated in to Network security configurations.
Task 4
Undertake the testing of a network using a Test Plan
4.1 Develop test cases and test the above LAN and WAN designs to verify whether the design
objectives are met.
(Provide Network Security configuration scripts/files/screenshots with comments.)
4.2 Suggest how you can improve the performance and security of this network in the Future.
Page | 10
Unit 17- Network Security