SIT716: COMPUTER NETWORKS AND SECURITY
SIT716: COMPUTER NETWORKS AND SECURITY
Assessment 1d: Bi-weekly Report (Weeks 7-8)
Due: Sunday September 5th 8pm
Weight: 6% of total mark for this unit
Approximate length: 1 to 2 pages
Short answer questions to assess and reinforce learning of the concepts of Weeks 7-8 by exploring firewalls and VPNs for securing networks, and SNMP and IPFIX for identifying cybersecurity attacks.
- Consider a scenario where you are working for a Small-Medium Enterprise (SME) and business which wishes to improve its security capability by installing a single firewall or router to fully protect both the infrastructure and data stored on-premises and at the location of the online shopping site. Explain why a single firewall in this configuration will not fully secure the network and briefly describe an example of an attack that could succeed.
- The SNMP and IPFIX (a modern NetFlow standard) protocols and associated systems provide important telemetry data that can be used to identify potential cybersecurity attacks occurring on a network. Explain the differences between SNMP and IPFIX and give an example of data obtained from these systems (one example each) that might identify an anomaly that could be a sign of an active security attack and explain how such anomalous data could indicate that the identified attack is active.
Your answers should be submitted via CloudDeakin to the TurnItIn-enabled Assignment Folder for the Assignment 1d – Weeks 7-8 Bi-Weekly Report. Your answers to each question and sub-question must be clearly identified in your submission. Acceptable file formats are Word documents, PowerPoint documents, PDF documents, text and rich text files, and HTML. Compressed files, such as ZIP files or RAR files are not accepted and will not be marked.
After submitting your assignment you should receive an email to your Deakin email address confirming that it has been submitted. You should check that you can see your assignment in the Submissions view of the Assignment folder after upload, and check for, and keep, the email receipt for the submission.
Academic misconduct and plagiarism is subjected to penalties.
Plagiarism includes and not limited to:
- Copying others’ work without appropriate referencing
- Re-using assignment material completed by other students
- Contracting others to do assessment tasks on your behalf.
This assignment assesses the following Graduate Learning Outcomes (GLO) and related Unit Learning Outcomes (ULO):
|Graduate Learning Outcome (GLO)||Unit Learning Outcome (ULO)|
|GLO1: You will be required to work with content relevant to computer networks, network security, and the IT discipline in general.||ULO1: You will be required to explain the architecture and operation of computer networks, security attacks, and defensive measures.|
|ULO2: You will be required to explain normal and abnormal behaviour of network protocols.|
|ULO3: You will be required to explain how cybersecurity activity can be identified.|
No extensions will be considered for this assessment unless a request is submitted through the CloudDeakin and approved by the Unit Chair (enter SIT716 unit page and click Assessment -> Extension request). Assignment Extensions are normally only approved when students apply before the due date. The Unit Chair may ask you to supply supporting documentation about the difficulties you are facing, and evidence of the work you have completed so far.
A marking penalty will be applied where the assessment task is submitted after the due date without an approved extension as follows:
- 5% will be deducted from available marks for each day up to five days
- where work is submitted more than five days after the due date, the task will not be marked and the student will receive 0% for the task.
‘Day’ means working day for paper submissions and calendar day for electronic submissions.
(This assessment task uses electronic submission)
SIT716 Computer Networks and Security
Assessment 1d: Bi-Weekly Report (Weeks 7-8)
|Criteria||Advanced answer (4 marks)||Clear answer (3 marks)||Reasonable answer (2 marks)||Flawed answer (1 mark)||No merit (0 marks)|
|Criteria 1: 50% i. SME single firewall and successful attack.||The reasons why a single firewall is not sufficient to secure the SME infrastructure and data are provided. An example of a successful attack on the SME is given. There are no major misunderstandings or errors in the answer.||A valid reason why a single firewall will not prevent attacks on the SME infrastructure/data is given with a valid example of a successful attack on the SME. There are no major misunderstandings or errors in the answer.||A valid reason why a single firewall will not prevent attacks on the SME infrastructure/data and a valid example of and success attack on the SME is given. Minor inaccuracies may be present in the answer.||Some valid assumptions on the limitations of a single firewall are presented or a limited discussion on a successful attack on the SME is given, however the answers are clearly incomplete or only partially explained.||Question not attempted, your explanation does not address the question, or your explanation is incorrect.|
|Criteria 2: 50% ii. SNMP and IPFIX difference and the security attack.||A complete understanding of the differences between SNMP and IPFIX is presented with valid examples of data obtained from each are given. No misunderstandings or errors in the answer is found.||Valid assumptions on the differences between SNMP and IPFIX have been given with valid examples of data obtained from each are presented. There are no major misunderstandings or errors in the answer.||Valid assumptions on the differences between SNMP and IPFIX is given amd valid examples of data obtained from each are presented. Minor inaccuracies may be present in the answer.||Some valid assumptions on the difference between SNMP and IPFIX are presented or either of the example of the data obtained from at least one of them is provided. The answers are clearly incomplete or only partially explained.||Question not attempted, your explanation does not address the question, or your explanation is incorrect.|
 Approximate length is only an estimate and does not include title page, contents page, references, or illustrations, i.e., the length is indicative of the text of your answer only. Indicated length is based on sensible settings, e.g., 2cm margins, 12 point font, reasonable spacing. Whilst there is no penalty for an over-sized answer, note that excessively large answers are likely to lack clarity and can even demonstrate a lack of understanding.