INTERNATIONAL SCHOOL OF MANAGEMENT AND TECHNOLOGY
NEPAL
FACULTY OF COMPUTING
UNIT TITLE |
Unit 29: Network Security |
||
UNIT CODE |
M/618/7443 |
LEVEL |
5 |
STUDENT NAME |
CREDIT VALUE |
15 |
|
ASSESSMENT TITLE |
Nobel College Security |
WORD COUNT |
|
ASSESSOR |
Nirajan Ghimire |
I.V. |
|
ASSIGNMENT ISSUE DATE |
June 05, 2025 |
ASSIGNMENT SUBMISSION DATE |
August 05, 2025 |
ORIGINAL SUBMISSION |
ASSIGNMENT NO. |
1/1 |
ASSESSMENT CRITERIA TO BE ASSESSED IN THIS ASSIGNMENT
(Identify all criteria to be assessed in this assignment)
Assignment Criteria |
P1 |
P2 |
P3 |
P4 |
P5 |
P6 |
||||
Achieved |
||||||||||
Merit Criteria |
Distinction Criteria |
|||||||||
Assignment Criteria |
M1 |
M2 |
M3 |
M3 |
M4 |
D1 |
D2 |
|||
Achieved |
Important:
- Read the plagiarism notice and requirements at Page 8
- Word-limit- 8000 words (excludes cover page, table of content, figures, graphs, reference list, appendix and logbook)
- Accepted Sources: Research Papers (Journal Articles, Conference Proceedings, Thesis), Text Books, Governmental Data, Websites (only a registered organization, an educational institution, government agency)
- Information taken from unreliable sources will not be accepted
- Must follow Harvard Reference Style
- Assignment must be submitted through the Plagiarism Detection Tool
Assignment submission format |
Each student has to submit their assignment as guided in the assignment brief. The students are guided on what sort of information is to produce to meet the criteria targeted. You are required to make use of headings, paragraphs, and subsections as appropriate, and all work must be supported with research and referenced using the Harvard referencing system. |
Learning outcomes covered |
|
Scenario |
You have been contracted by a prominent educational institution called “The Nobel College” which serves thousands of students and staff. The Nobel College is known for its cutting-edge research and technology programs. Recently, they have grown concerned about the security of their network infrastructure due to several incidents of unauthorized access to sensitive student data and research projects. Your mission is to conduct a comprehensive network security assessment and propose measures to enhance their network security. |
ASSIGNMENT SCENARIO AND TASKS
Assignment Task โ Part 1 |
You need to start by examining the different types of Network Security principles, protocols and standards. You need to prepare a short presentation, along with speaker notes that:
For a higher grade you could also compare and contrast at least two major Network Security protocols. Further prepare a requirement specification document
For a higher grade you could
|
Assignment Task โ Part 2 |
Further Configure Network Security measures for the corporate environment. You will have to create an implementation and testing document that contains the implementation details
You could make your report comprehensive by
Further Carry out a detailed testing and present a test report.
For a higher grade you could:
|
LEARNING OUTCOMES AND ASSESSMENT CRITERIA
Pass |
Merit |
Distinction |
LO1 Examine Network Security principles, protocols and standards |
D1 Evaluate the importance of network security to an organization. |
|
P1 Discuss the different types of Network Security devices. P2 Examine network security protocols and the use of different cryptographic types in network security. |
M1 Compare and contrast at least two major Network Security protocols. |
|
LO2 Design a secure network for a corporate environment |
||
P3 Investigate the purpose and requirements of a secure network according to a given scenario. P4 Determine which network hardware and software to use in this network. |
M2 Create a design of a secure network according to a given scenario. |
|
LO3 Configure Network Security measures for the corporate environment |
D2 Critically evaluate the design, planning, configuration and testing of the network. |
|
P5 Configure Network Security for your network. |
M3 Justify the choices made in the implemented network security configuration. |
|
LO4 Undertake the testing of a network using a Test Plan |
||
P6 Comprehensively test your network using the devised Test Plan. |
M4 Analyze the results of testing to recommend improvements to the network. |
Plagiarism Notice
You are reminded that there exist Academic Misconduct Policy and Regulation concerning Cheating and Plagiarism.
Extracts from the Policy:
Section 3.4.1: Allowing others to do assignments / Copying others assignment is an offence
Section 3.4.2: Plagiarism, using the views, opinion or insights / paraphrasing of another personโs original phraseology without acknowledgement
Requirements
- It should be the studentโs own work โ Plagiarism is unacceptable.
- Clarity of expression and structure are important features.
- Your work should be submitted as a well presented, word-processed document with headers and footers, and headings and subheadings.
- You are expected to undertake research on this subject using books from the Library, and resources available on the Internet.
- Any sources of information should be listed as references at the end of your document and these sources should be referenced within the text of your document using Harvard Referencing style
- Your report should be illustrated with screen-prints, images, tables, charts and/or graphics.
- All assignments must be typed in Times New Roman, font size 12, 1.5 spacing.
The center policy is that you must submit your work within due date to achieve โMeritโ and โDistinctionโ. Late submission automatically eliminates your chance of achieving โMerit and Distinctionโ. Also, 80% attendance is required to validate this assignment.
Assignment Prepared By Siddhant Bhattarai |
|
Date March 25, 2025 |
Brief Checked By Dhruba Babu Joshi |
Signature |
Date March 27, 2025 |