0% found this document useful (0 votes)
55 views3 pages

BTEC - L4 - Unit05 - Assignment 1 - 23,24stbatch

The document provides an assignment brief for a unit on security for a Higher National Certificate/Diploma in Computing. Students are asked to create a guidebook or report to train junior staff members on identifying and assessing IT security risks and organizational security policies and solutions. The guidebook should cover organizational security threats, vulnerabilities, and risks; types of attackable assets; security policies and technology solutions; firewalls, VPNs, and DMZs; configuring firewall policies and VPNs; network monitoring systems; and physical and virtual security measures. Learning outcomes include discussing security risks and procedures, analyzing network monitoring benefits, discussing firewall and VPN impacts, explaining DMZ, IP, and NAT implementations, and evaluating security measures.

Uploaded by

Soe Yazar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
55 views3 pages

BTEC - L4 - Unit05 - Assignment 1 - 23,24stbatch

The document provides an assignment brief for a unit on security for a Higher National Certificate/Diploma in Computing. Students are asked to create a guidebook or report to train junior staff members on identifying and assessing IT security risks and organizational security policies and solutions. The guidebook should cover organizational security threats, vulnerabilities, and risks; types of attackable assets; security policies and technology solutions; firewalls, VPNs, and DMZs; configuring firewall policies and VPNs; network monitoring systems; and physical and virtual security measures. Learning outcomes include discussing security risks and procedures, analyzing network monitoring benefits, discussing firewall and VPN impacts, explaining DMZ, IP, and NAT implementations, and evaluating security measures.

Uploaded by

Soe Yazar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

Assignment Brief (RQF)

Higher National Certificate/Diploma in Computing


Student Name/ID Number:

Unit Number and Title: Unit 5: Security

Academic Year:

Unit Assessor: Phyoe Hein Kyaw

Assignment Title: Assignment 1: Managing Network Security for an Organization

Issue Date:

Submission Date:

Internal Verifier Name:

Date:

Submission Format:

The submission is in the form of an individual written guidebook or detailed report. This should be
written in a concise, formal business style using single spacing and font size 12. You are required to
make use of headings, paragraphs and subsections as appropriate, and all work must be supported
with research and referenced using the Harvard referencing system. Please also provide a
bibliography using the Harvard referencing system. The recommended word limit is 2,000–2,500
words, although you will not be penalised for exceeding the total word limit.

Unit Learning Outcomes:


LO1 Assess risks to IT security

LO2 Describe IT security solutions

Prepared by: Higher Education Qualifications (HEQ) Approved by: HEQ, QDAM (HE)
Version 1.0 – November 2017
DCL 1 – Public (Unclassified)
1
Assignment Brief and Guidance:

Scenario

You work for a new cyber security company called ‘Cyber Protect Security’ who is delivering security
products and services. The company develops cyber security software including firewalls, anti-virus,
intrusion detection and protection, and endpoint security. Cyber Protect Security is tasked with
protecting companies’ networks, clouds, web applications and emails. It also offers advanced threat
protection and secure unified access.

Your role is a trainee IT Security Specialist for a leading Security consultancy at Cyber Protect. As part
of your role, your manager has asked you to create a guidebook or a report to train junior staff
members on techniques associated with identifying and assessing IT security risks together with the
organisational security policies and solutions to protect business critical data and equipment.

Your guidebook or report should include:

1. Organizational security threats, vulnerabilities and risks and the relation between these
three factors in security P1
2. Types of assets that can be attacked in an organization M1
3. Security policy, technology solutions and the management associated with operating
effective IT security procedures P2
4. Firewall, Virtual Private Network (VPN) and Demilitarized Zone (DMZ) for your organizational
network P4
5. Implementing a DMZ, static IP and NAT in a network to improve Network Security P4
6. The potential impact to IT security of incorrect configuration of firewall policies and
third-party VPNs P3
7. The benefits to implement network monitoring systems with supporting reasons that would
prevent future attacks M1
8. Evaluate a range of Physical and virtual security measures. D1
9. Access and threat methology M2

Your extended guidebook or detailed report should include additional, evaluated or critically reviewed
technical notes on all of the expected topics.

Prepared by: Higher Education Qualifications (HEQ) Approved by: HEQ, QDAM (HE)
Version 1.0 – November 2017
DCL 1 – Public (Unclassified)
2
Learning Outcomes and Assessment Criteria:

Pass Merit Distinction

LO1 Assess risks to IT security

P1 Disucss types of security risks


to organisations. M1 Analyse the benefits of
implementing network monitroing
P2 Access organisational security systems with supporting reasons.
procedures.
LO1 & 2
LO2 Describe IT security solutions D1 Evaluate a range of physical and
virtual security measures that can
P3 Discuss the potential impact be employed to ensure the integrity
to IT security of incorrect of organisational IT security.
configuration of firewall policies M2 Purpose a method to access and
and third-party VPNs. treat IT security risks.

P4 Discuss, using an example for


each, how implementing a DMZ,
static IP and NAT in a network
can improve Network Security.

Prepared by: Higher Education Qualifications (HEQ) Approved by: HEQ, QDAM (HE)
Version 1.0 – November 2017
DCL 1 – Public (Unclassified)
3

You might also like