NTW203 Network Security Individual Report assignment help

NTW203 Network Security assignment help

Assessment 3

Information and Rubric

Subject Code

NTW203

Subject Name

Network Security

Assessment Number and Title

  • Assessment 3a: Network Security Incident Analysis Report
  • Assessment 3b: 5 Minutes in Class Invigilated Presentation/Viva

Assessment Type

Individual Report

Length / Duration

1500 words +/-10%

Weighting

  • Total: 30%
  • Assessment 3a: 20%
  • Assessment 3b: 10%

Purpose of the Assessment

Purpose of the assessment is to build the students’ skills in analyzing network security incidents, evaluating threats, applying security solutions, and drafting policies. It enhances critical thinking and practical problem-solving essential for a Network Security Analyst.

Total Marks

100

Due Date

  • Assessment 3a: Report/Presentation slides submission, Week 10 – Sunday at 23:59
  • Assessment 3b: 5 minutes in-class invigilated Presentation/VIVA, Week 11 – during the class time

Submission Guidelines

  • All work must be submitted on Moodle by the due date along with a completed Assignment Cover Page.
  • The report must include clear headings and subheadings for all requirements mentioned below in the assessment description and instructions.
  • The assignment must be in MS Word format, 1.5 spacing, 12-pt, Times New Roman (Body) font, and 2 cm margins on all four sides of your page.

Assessment Description and Instructions

In this individual assessment, students will take on the role of a Network Security Analyst for a medium-sized enterprise. They are given a simulated incident involving a potential security breach across multiple network platforms (wired, wireless, mobile). Students must conduct a detailed incident analysis and produce a formal security report.

Case Scenario

A manufacturing company has reported unusual network behavior, triggering multiple alerts on its Intrusion Prevention System (IPS). The company relies on both wired and wireless networks, including remote access for mobile devices. Suspicious activity includes:

  • Unrecognized login attempts from international IP addresses
  • Several anomalies in internal traffic patterns detected by anomaly-based monitoring tools
  • Attempted access to encrypted files without proper credentials

The incident poses risks to confidentiality, integrity, and availability (CIA) of the company’s sensitive data.

Assessment Requirements

You are required to submit an incident analysis report that:

  • Evaluates the key security concepts related to the case
  • Identifies and evaluates network security threats, focusing on wireless, mobile, and remote platforms
  • Applies and explains anomaly detection techniques relevant to the incident
  • Describes potential solutions using public key and symmetric cryptography and their management
  • Recommends and discusses firewall and IPS solutions appropriate for the company’s network
  • Outlines steps for monitoring network security devices to prevent future incidents
  • Provides a draft of a network security policy to improve future security practices

Report Structure

  • Introduction: Overview of the incident, purpose of the report, and scope
  • Incident Evaluation: Detailed threat identification, including screenshots or data samples
  • Security Solutions and Recommendations: Encryption, firewall configurations, and anomaly detection
  • Network Policy: Suggested network security policy for future prevention
  • Conclusion: Summary of findings and actionable steps

NTW203 Network Security
Assessment 3a – Rubric for Network Security Incident Analysis Report (20%)

Marking CriteriaFail (0–49)Pass (50–64)Credit (65–74)Distinction (75–84)High Distinction (85–100)
Evaluation of Key Security Concepts (20%)Incomplete or incorrect evaluationIdentifies basic security concepts with limited depthExplains key concepts adequatelyThorough explanation with critical insightsExceptional evaluation with advanced critical insights
Threat Identification and Analysis (20%)Fails to identify threats or provides minimal analysisIdentifies some threats with limited depthProvides clear identification and adequate analysisIn-depth analysis with good insightsComprehensive analysis with innovative approaches
Use of Anomaly Detection Techniques (10%)Minimal or incorrect use of techniquesDemonstrates basic understanding of anomaly detectionClear application of detection techniquesCritical application with insightful observationsAdvanced and creative detection methods
Explanation of Cryptography Principles (10%)Incorrect or incomplete descriptionDescribes cryptography but lacks clarity or depthExplains principles accuratelyDemonstrates deep understanding with examplesExceptional understanding with applied insights
Firewall and IPS Recommendations (10%)No recommended or suitable solutionsRecommends basic firewall or IPS solutionsRecommends effective solutions with explanationsProvides justified recommendationsExceptional solutions with innovative suggestions
Device Installation and Monitoring (10%)Poor or missing steps for monitoringDescribes basic installation and monitoring stepsExplains effective monitoring proceduresProvides detailed steps with examplesExceptional techniques with applied scenarios
Development of Network Security Policy (10%)Lacks policy or incorrect sectionsPresents basic policy with missing elementsStructured policy with clear sectionsDevelops a comprehensive policyExceptional policy with innovative and realistic strategies
Structure and Organization of Report (5%)Report lacks organisation and clarity; missing sectionsReport follows basic structure with some disorganisationWell-organised report covering all required sectionsClear, concise, and logically structuredExceptional organisation, polished, and professional
Referencing and Citation (5%)No referencingSome referencingMostly accurate referencingReferencing is accuratePerfect APA referencing

 

Assessment 3b – Rubric for Presentation/Viva on Network Security Systems (10%)

Marking CriteriaFail (0–49)Pass (50–64)Credit (65–74)Distinction (75–84)High Distinction (85–100)
Presentation Content and Relevance (20%)Content is irrelevant or unclear; key points missingBasic content covers some important points but lacks depthGood content covering key elements of network securityWell-developed content with clear focusOutstanding, insightful, and highly relevant content
Explanation of Implementation (20%)Inaccurate or insufficient explanation of security implementationsBasic explanation with limited detail on implementationSound explanation with most aspects covered adequatelyDetailed explanation of implementation processComprehensive, clear, and innovative explanation
Oral Communication and Engagement (20%)Limited engagement with audience; voice unclear or difficult to followSome engagement but with limited clarity in speechEngages audience with clear communication and minor inconsistenciesConfident delivery with clear communication throughoutExceptional delivery; engaging, confident, and persuasive
Use of Visual Aids (Slides) (10%)Visual aids are missing or unclearBasic slides provided but lack visual appeal or claritySlides are well-organised and support the presentationSlides are visually appealing and enhance the presentationExceptional slides; visually engaging and highly supportive
Questions / Answers (Viva) (30%)Unable to answer questions or respond meaningfullyAnswers some questions with difficulty or limited knowledgeHandles most questions competently with adequate responsesConfidently answers questions with well-considered responsesExceptional handling of questions with insightful response

 

Example invalid form file feedback

Join our 150К of happy users

Get original papers written according to your instructions and save time for what matters most.