BTEC - L4 - Unit05 - Assignment 1 - 23,24stbatch
BTEC - L4 - Unit05 - Assignment 1 - 23,24stbatch
Academic Year:
Issue Date:
Submission Date:
Date:
Submission Format:
The submission is in the form of an individual written guidebook or detailed report. This should be
written in a concise, formal business style using single spacing and font size 12. You are required to
make use of headings, paragraphs and subsections as appropriate, and all work must be supported
with research and referenced using the Harvard referencing system. Please also provide a
bibliography using the Harvard referencing system. The recommended word limit is 2,000–2,500
words, although you will not be penalised for exceeding the total word limit.
Prepared by: Higher Education Qualifications (HEQ) Approved by: HEQ, QDAM (HE)
Version 1.0 – November 2017
DCL 1 – Public (Unclassified)
1
Assignment Brief and Guidance:
Scenario
You work for a new cyber security company called ‘Cyber Protect Security’ who is delivering security
products and services. The company develops cyber security software including firewalls, anti-virus,
intrusion detection and protection, and endpoint security. Cyber Protect Security is tasked with
protecting companies’ networks, clouds, web applications and emails. It also offers advanced threat
protection and secure unified access.
Your role is a trainee IT Security Specialist for a leading Security consultancy at Cyber Protect. As part
of your role, your manager has asked you to create a guidebook or a report to train junior staff
members on techniques associated with identifying and assessing IT security risks together with the
organisational security policies and solutions to protect business critical data and equipment.
1. Organizational security threats, vulnerabilities and risks and the relation between these
three factors in security P1
2. Types of assets that can be attacked in an organization M1
3. Security policy, technology solutions and the management associated with operating
effective IT security procedures P2
4. Firewall, Virtual Private Network (VPN) and Demilitarized Zone (DMZ) for your organizational
network P4
5. Implementing a DMZ, static IP and NAT in a network to improve Network Security P4
6. The potential impact to IT security of incorrect configuration of firewall policies and
third-party VPNs P3
7. The benefits to implement network monitoring systems with supporting reasons that would
prevent future attacks M1
8. Evaluate a range of Physical and virtual security measures. D1
9. Access and threat methology M2
Your extended guidebook or detailed report should include additional, evaluated or critically reviewed
technical notes on all of the expected topics.
Prepared by: Higher Education Qualifications (HEQ) Approved by: HEQ, QDAM (HE)
Version 1.0 – November 2017
DCL 1 – Public (Unclassified)
2
Learning Outcomes and Assessment Criteria:
Prepared by: Higher Education Qualifications (HEQ) Approved by: HEQ, QDAM (HE)
Version 1.0 – November 2017
DCL 1 – Public (Unclassified)
3