Network Security Concepts

Objectives

This assessment item is designed to test your understanding of network security fundamentals, administering a secure network, mobile security, access control, identity management and wireless network security relating to the contents in weeks 6-11.

 

 

Assessment task

Assessment task contains two parts; part A is writing a report on the given topic (weighting: 30%) and part B is the presentation on the written report (weighting: 15%).

Part A: The report must focus on the case study scenario related questions given in the assessment task section. Any assessment items that do not address the case study scenario and the given questions may be awarded 0 (zero) marks.

Your report should include (detailed marking criteria is given at the end):

  1. Executive Summary
  2. Table of Contents
  3. Introduction
  4. Discussion (on the given tasks).
  5. Conclusion
  6. Reflection on the assessment task
  7. Reference list (please use at least four sources for your discussion)

Note: You must follow the Harvard citation and referencing guidelines when writing your report. Executive summary, Table of contents and Reference list are not included in the word count.

Part B: Part B of this assessment task is a presentation component.

Your presentation should include:

  1. Introduction
  2. Brief description of your proposed solution with justification (referring to the unit material as appropriate)
  3. Your reflection on completing this assessment (your reflection may include how you attempted the task, method used, what you have learnt, any hurdle faced and how those were solved).
  4. References

Check the unit website regularly for further information relating to this assessment task. Please ensure that you write your report in your own words to avoid possible plagiarism and copyright violation. Please go through the Academic integrity policy very carefully (the corresponding link could be found in the CQUniversity Policies section of the Unit Profile).

Case scenario:

XYZ hospital (XYZH) is a top-ranking national hospital that has 4 branches nationwide in Brisbane, Canberra, Melbourne and Sydney with the administrative office in Canberra.  XYZH consists of different medical departments, finance, administration and IT departments. Staff among different sites need to regularly communicate with each other through an internal network. During the current COVID-19 pandemic some of the non-medical staff are working from home on a roster basis and connect to the hospital’s network through a VPN. Each location also provides free wireless LAN access to the patients and visitors/guests.

XYZH also provide tele-health service where patients communicate with the doctors via phone (including mobile phones), video/audio conferencing and e-mail.  During the COVID-19 pandemic online doctor-patient consultation has become a norm for majority of the cases (where the patients do not necessarily need to meet the doctors or get treated in person). Pathology reports (of patients) are sent to the hospital via Internet as well. Therefore, it is essential for XYZH to provide high-performance secure network connectivity at every site. Since patients regularly communicate with XYZH through a web interface, it is very important to protect the web and application servers as well.

All the patients’ data/information/medical report and images are stored in the database server; XYZH uses local and cloud-based storage to store their data.

The Chief Security Officer (CSO) of XYZH and their team are currently looking into all the possible ways of securing XYZH’s network, applications and data/information.

 

  1. Identify two types of wireless or mobile attacks from the unit lecture material that might occur in the above-mentioned scenario. Describe each of them and explain how these types of attack could occur in XYZH’s case (explain with diagram if applicable). Provide your suggestion for securing XYZH’s wireless network.
  2. Propose at least three networking technologies/methods/protocols that could have been used to enhance the network (wired and/or wireless) security in the above case. Explain in detail how these technologies that you proposed would enhance the XYZ’s security (justify your answer).
  3. Various devices and technologies should be used to protect a network; firewall is one such device. Explain the use of a firewall and how it can improve network security. Explain with a simple diagram where you would put the firewall/s in XYZH’s network.
  4. Propose an access control technique that could have been employed to improve the security in the given case scenario. Please include an appropriate access control model, implementation and related policies in your report. Justify why you are choosing this model over any two of the other options that were discussed in the lecture materials.

 

  1. Name two of the biometric authentication techniques that you recommend for XYZH (choose any two from the lecture material). Do some research and explain those two techniques. Your explanation should include brief description of the techniques, advantages and disadvantages (if any) of those two techniques and the justification of your choice for XYZH.

Please note that you might need to make some assumptions about the organisation in order to write this report. These assumptions should match the information in the case study and not contradict with the objectives of the report. They should be incorporated in the introduction of your report when you describe the organisation and outline the problem to be solved. To avoid loss of marks, do not make assumptions that are not relevant or contradictory, or will not be used in your report discussion.

Please refer to external source as needed. Please use at least 4 good references.

Assessment Submission

For this assessment you need to submit the following:

  • The written report (word document),
  • The presentation slides, and
  • Video recording of the presentation (you may upload the video file on Moodle or store the video file online and upload the link in a word document on Moodle)

The report, presentation slides and video file (or the file with the link of the video file) must be submitted using the COIT21220 Moodle Unit website on or before the due date/time.  The submission link can be accessed through the Assessment block.

Before submitting your assignment, you should check it against the detailed assessment criteria in the following table to ensure that you have satisfactorily addressed all the criteria that will be used to mark your report. It is your responsibility to ensure that your report is submitted for grading.

At the due date of the assessment Moodle auto-submits draft files that are in Moodle at the originally set deadlines. Files that are auto submitted will not be reverted to draft status except in extenuating circumstances (evidence required). However, any files uploaded after the due date must be manually submitted. This means that if you have been granted an extension or are uploading a late assessment (after the due date) you must complete the Moodle submission process.

It is your responsibility not to leave draft assessments in Moodle at the due date and time if the files are not ready to be submitted for marking. If your report is left as a draft in Moodle after the due date it will accrue a late penalty. Late submissions attract a penalty of 5% per day of the total available mark for the individual assessment item. See the Assessment Policy and Procedure – Higher Education Coursework for details of the policy.

Academic Integrity

Students must write the Report themselves. You may be asked to prove that you have written the Report. You should keep evidence that you have written the Report yourself, for example, early drafts of your Report, and notes taken during the assignment.

ALL assignments will be checked for plagiarism (material copied from other students and/or material copied from other sources) using TurnItIn. If you are found to have plagiarised material or used someone else’s words without appropriate referencingor falsified references/information, you will be penalised for plagiarism.

All plagiarism cases will be dealt as per the University’s academic integrity policy. Please go through the Academic integrity policy very carefully (the corresponding link could be found in the CQUniversity Policies section of the Unit Profile).

Once the assessment is marked, the Unit Coordinator (or nominee) may request additional written information and/or an oral discussion to clarify the student’s understanding of the submitted work. Failure to comply and/or to demonstrate an understanding of the Report’s content could result in 0 marks for the Report.