HI6044 Computer Network Security Assignment Help

Final Individual Assessment 

 

Unit

Details

NameComputer Network Security
CodeHI6044
Year, TrimesterTrimester 2, 2024

 

Assessment

Details

NameFinal Individual Assessment
Due Date & Time

10 October, 2024

10.59 pm - Gold Coast students

11:59 pm - Melbourne & Sydney students

 

Student

Details

Student Number 
First Name 
Family Name 

 

Submission

Declaration

Integrity DeclarationI have read and understand academic integrity policies and practices and my assessment does not violate these.

 

Full Name

 
Submission Date 

 

 

ALL SUBMISSIONS MUST INCLUDE YOUR STUDENT DETAILS AND SUBMISSION DECLARATION.  

IF THESE DETAILS ARE NOT COMPLETED YOU RISK BEING PENALISED

 

 

Instructions

Academic 

Integrity

Information

Holmes Institute is committed to ensuring and upholding academic integrity. All assessment must comply with academic integrity guidelines. Important academic integrity breaches include plagiarism, collusion, copying, impersonation, contract cheating, data fabrication and falsification. Please learn about academic integrity and consult your teachers with any questions. Violating academic integrity is serious and punishable by penalties that range from deduction of marks, failure of the assessment task or unit involved, suspension of course enrolment, or cancellation of course enrolment.

 

Format & submission  

instructions

  • All answers must be entered in the answer boxes provided after each question.
  • Your assessment must be in MS Word format only.
  • You must name your file with the Unit Code and Student ID 
    example:  HI6044 –  EMV5678
  • Check that you submit the correct document as special consideration is not granted if you make a mistake.
  • Your student ID & name must be entered on the first page.
  • Submission declaration must be completed on the first page.
  • All work must be submitted on Blackboard by the due date and time. 
    Late submissions are not accepted.
  • You have two attempts to submit.  The final submission will be marked only.

 

Penalties
  • Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using Holmes Institute Adapted Harvard Referencing. Penalties are associated with incorrect citation and referencing.
  • For all other penalties, please refer to the Final Assessment Instructions section on Blackboard.

 

 

 

All responses must be entered in the answer boxes at the end of each question

 

Question 1 (10 marks)

Network Firewall Design

Below is a diagram of a simple internal network connected to the internet:

 

A computer screen shot of a computer network

Description automatically generated

 

 

 

 

 

 

 

 

 

 

 

 

 

Required:

  1. Based on the network shown, explain how a firewall would be implemented to protect the internal network.  (2.5 marks)

ANSWER (box will enlarge as you enter your response)

 

 

 

 

 

 

 

  1. What type of firewall, stateful inspection or packet filtering would you recommend, and why?   (2.5 marks)

ANSWER:

 

 

 

  1. Describe the rules that should be applied to the firewall to secure both incoming and outgoing traffic.  (5 marks)

ANSWER:

 

 

 

 

 

Question 2 (10 marks)

Wireless Network Security

 

Consider the wireless network diagram below, which includes access points, clients, and the internet gateway:

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Required:

  1. Explain in detail the security risks associated with this wireless network architecture. (2.5 marks)

ANSWER:

 

 

 

  1. Describe at least two security measures that should be implemented to secure wireless communications.  (2.5 marks)

ANSWER:

 

 

 

  1. Compare the implementation of WPA3 to improve security compared to WPA2 in this setup.  (5 marks)

ANSWER

 

 

 

 

 

 

 

Question 3 (10 marks)

 

Explain the concept of zero trust architecture in network security and its advantages in modern network infrastructures.

 

ANSWER

 

 

 

 

 

 

Question 4 (10 marks) 

Analyse the security challenges in wireless networks and propose strategies for securing wireless communications.

 

ANSWER

 

 

 

 

 

 

Question 5 (10 marks) 

 

How does Transport Layer Security (TLS) work in securing network connections?

 

ANSWER

 

 

 

 

 

 

END OF FINAL INDIVIDUAL ASSESSMENT

Example invalid form file feedback

Join our 150К of happy users

Get original papers written according to your instructions and save time for what matters most.