| Assessment Details and Submission Guidelines | |
| Unit Code | MN502 |
| Unit Title | Overview of Network Security |
| Assessment Type | Individual Assessment (Assignment one) |
| Assessment Title | Demonstration of network security tools |
| Purpose of the assessment (with
ULO Mapping) |
The purpose of this assignment is to evaluate and compare two security tools. Student will discuss common threats and attacks on networked information systems, and how to mitigate them. Students should be able to demonstrate their achievements in the following unit learning outcomes:
b. Analyse and discuss common emerging threats, attacks, mitigation and countermeasures in networked information systems; |
| Weight | 15% |
| Total Marks | 20 |
| Word limit | No word limit as there is no written report, but the length of the video should be no more than 8 minutes |
| Due Date | 5 PM, Friday Week 7 (2/5/2019) |
| Submission Guidelines | • All work must be submitted on Moodle by the due date along with a completed Assignment Cover Page.
• The assignment must be in MS Word format, 1.5 spacing, 11‐pt Calibri (Body) font and 2.54 cm margins on all four sides of your page with appropriate section headings. • Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using IEEE referencing style. |
| Extension | If an extension of time to submit work is required, a Special Consideration Application must be submitted directly on AMS. You must submit this application three working days prior to the due date of the assignment. Further information is available at:
http://www.mit.edu.au/about‐mit/institute‐publications/policiesprocedures‐and‐guidelines/specialconsiderationdeferment |
| Academic
Misconduct
|
Academic Misconduct is a serious offence. Depending on the seriousness of the case, penalties can vary from a written warning or zero marks to exclusion from the course or rescinding the degree. Students should make themselves familiar with the full policy and procedure available at: http://www.mit.edu.au/about‐mit/institute‐publications/policiesprocedures‐and‐guidelines/Plagiarism‐Academic‐Misconduct‐Policy‐
Procedure. For further information, please refer to the Academic Integrity Section in your Unit Description. |
Assignment Description
For this assignment you will evaluate two Network Security Software. Marks will be awarded based on the sophistication and the difficulties the demonstration explored.
Your task is to complete and make a 6‐7 min video presentation on the following:
- Download and install (on your computer or on MIT Virtual box) any two of the Security Tool from Table 1.
- Outline of your presentation should include description of the tools.
- Demonstrate (narration of your actions recorded by video) 4 tasks that each of the software/security tools can perform. Your demonstration should include:
- Discussion on the threats that these tools could be used for mitigating (name and brief description of the threats should be included in your discussion), and
- Explanation of how to use these tool to monitor
security threats.
- Comparison of the tools that you used in this work. Your comparison could include:
- Security features (range/level)
- Time taken to detect any threat
- Ease of usage
- Analyse the following scenario and give your opinion on which of the tools that you investigated could be more suitable for this scenario. In your analysis, please consider the following:
- Discuss the business requirement for JKL in terms of security?
- What are the probable Security threat for JKL?
- Propose better suited tool (between the two tools that you have worked on).
- Justify your answer for question iii.
- You should appear in the video at the first and last 30 secs to introduce yourself and draw a conclusion on your experience with the Security Tool.
Case Scenario: JKL is a small software development company with two sites in Brisbane and Adelaide. The head office of JKL is in Adelaide. The servers are located in Adelaide. Each office has approximately 50 staff and they have 5 departments, Technology, Finance, Operations, Customer service and Administration. Staff from both sites need to communicate with each other on a daily basis on various office matter. Development work is done in collaboration with staff from both sites. Some of the clients of JKL require highest level of security and confidentiality of their data and information. So, network and information security is very important for JKL. The challenge of JKL is to maintain high level of security within a small budget.
Length of Video: Introduction (20 secs approximately, your appearance should be in the video) + Outline of the presentation (20 secs approximately) + Demonstration of the task (240 seconds approximately) + Comparison of the Tools (30 seconds approximately) +Analysis of the scenario (30 secs approximately) + Conclusion (15 secs approximately, with appearance). The total length of the presentation should not more than 6 minutes (mark would be deducted for over‐length presentation).
Table 1: Network Security Tools (You can choose any two network security tools for your demonstration with your tutor’s consent)
| Serial # | Name of the security tool |
| 1 | Metasploit Framework |
| 2 | Nessus |
| 3 | Snort |
| 4 | Hydra |
You may use any of the available open source software for screen capture. Please find the following as an example.
- Software:‐ http://camstudio.org/
The following resources may be of use:
- Textbooks
- Youtube Videos
Submission Guidelines:
- Name your video with your student number and name.
- Upload Video on your Youtube account
- Copy the Video Link to a file (word document) and
- Upload it into the MOODLE
To upload on Youtube, you must create your account on youtube. If you have a google account (gmail), you already have one on youtube. Videos must be of one of the following formats: .MOV, .MPEG4, MP4, .AVI, .WMV, .MPEGPS, .FLV, .3GPP, and .WebM. Once you have an account, to upload your video, click on the ‘upload’ button located at the top right‐hand corner of your youtube.com webpage. To keep your uploaded video unsearchable by people so that random people cannot view your video(s), you have to select the privacy mode from the drop‐down menu on the upload screen to be ‘Unlisted’. This way, your video is viewable by only those who have got the URL of your video. Make sure you copy and paste your video URL in the file submitted on MOODLE for your marker to be able to watch and mark it!
Marking criteria:
Example of marking criteria is shown in following table. Marks are allocated as follows:
| Section to be included in the report | Description of the section | Marks |
| Introduction | Student should introduce with his/her physical appearance in the video. | 2 |
| Outline | Outline of the whole presentation including tool description. | 1 |
| Demonstration | Demonstrate (narration of your actions recorded by video) all steps from the respective project. | 8 |
| Comparison | Compare the two tools investigated. | 3 |
| Analysis | Analysis of the scenario. | 4 |
| Conclusion | With appearance, draw a conclusion on your experience with the Security Software. | 2 |
| Total | 20 |
Example Marking Rubric for Assignment #: Total Marks 20
| Grade Mark | HD
16‐20 |
DI 14‐15 | CR 12‐13 | P 10‐11 | Fail
<10 |
| Excellent | Very Good | Good | Satisfactory | Unsatisfactory | |
| Introduction
/2 |
Appearance is clear, easy to follow, well prepared and professional | Appearance is clear and easy to follow. | Appearance is clear and understandable | Makes an appearance and provides an introduction. | Does not make an appearance in the video at the start of video |
| Outline
/1 |
Create a very nice bullet point outline and well presented it before the demonstration started | A bullet point outline is provided and presented before the start of the presentation |
Explained and there is screen showing a written outline but there is room for improvement. |
Explained but no screen showing a written outline. |
The outline is not done properly. |
| Demonstrati
on /8 |
Very professional, clear and easy to follow. | Professional, clear and easy to follow | Clear and easy to follow but lacks professionalism | Demonstration is done but there is Difficult to follow | Tasks have not been demonstrated
properly (difficult to follow) |
| Comparison
/3 |
Clear
comparison with valid justification and very easy to follow |
Clear comparison with some justification and easy to follow | Clear comparison with little justification. | Some comparison is there but there is room for improvement. | The comparison is very poorly done. |
| Analysis
/4 |
Clear analysis with valid justification and very easy to follow | Clear analysis with some justification and easy to follow | Clear analysis with little justification. | Some analysis is there but there is room for improvement. | The analysis is very poorly done. |
| Conclusion
/2 |
A very powerful conclusion with full confidence. | Very Good
Conclusion |
Appearance made and good conclusion provided | Appearance made and conclusion provided. | Barely appear at the end of the video. |