diff_months: 14

COIT20246 Networking and Cyber Security Project

Flat 50% Off Order New Solution
Added on: 2023-04-19 10:49:21
Order Code:
Question Task Id: 0
  • Subject Code :

    COIT20246

1 Summary 

Design a network that meets the provided scenario requirements. Then conduct a cyber security risk  assessment for the scenario and recommend security controls. Finally, evaluate social/ethical issues you  are likely to meet as the network designer and operator. 

2 Scenario 

The scenario extends upon the security camera network designed in Week 03 Tutorial (see the tutorial  instructions for introduction of the scenario). The tutorial asked you to consider just the wired network for  the security cameras. In this project you need to extend the security camera network, considering the  following: 

  1. The multi-storey house is now being used as a mix of short-term and long-term rental accommodation. The owner does not live in the house, but rather rents the 6 bedrooms to up to 12  people. The renters do not necessarily know each other, and rental contracts start/end at different  times.  
  2. The house includes multiple shared indoor spaces (e.g., kitchen, living area, home cinema), as well  as large outdoor spaces (e.g., patio, BBQ area, pool, tennis court).  
  3. A mixed wired/wireless network for the occupants is required (e.g., connecting PCs, laptops,  phones, media devices). This needs to be connected with the existing security camera network. 4. Security video must be recorded and stored locally in the house, however a cloud-based network  management application is also needed. This application may be used by the owner, rental  agencies and the occupants.  

You have been consulted to design the network for the owner. The owner wants to see the design, and  hear your inputs on a variety of issues (including cyber security and ethical issues). Then the owner will  decide whether to further engage your services for the network build, operation and maintenance.  

3 Groups 

Conduct this project in a group of two (2) students, where both students must be in the same tutorial class.  Only when there are left-over students (i.e., odd number of students in a class), will a group of three (3) be  allowed (at the discretion of the Unit Coordinator). The expectations of details and quality will be higher for  a group of three than a group of two. 

All group members should contribute to all tasks, however a group member may contribute more than the  other(s) on a specific task. Overall, the contributions of each group should be about the same.  

4 Tasks 

4.1 Task 1: List assumptions and requirements 

The scenario is quite open-ended; many details are not specified. You need to list any assumptions you  made and all requirements that you are considering (including the requirements from the scenario and the  requirements arising from your assumptions).  

4.2 Task 2: Design the network 

Design the entire network. Your design should include:

Project Specification 1

COIT20246 Networking and Cyber Security 

- One or more network diagrams (using diagrams.net); - Explanation of key design decisions, e.g., why you chose to design as you did; 

- Address allocations, e.g., IPv4 address ranges to be used; 

- Table of recommended hardware, e.g., recommended minimum specifications for equipment;  

4.3 Task 3: Conduct cyber security risk assessment 

You are to conduct a mini cyber security risk assessment of your network. By “mini” we mean you only  conduct a subset of steps of a typical full risk assessment (due to lack of time and information available to  you).  

Identify the important assets for your network and the key threats, and then assign a risk level to the assets  (relative to the threats).  

4.4 Task 4: Recommend security controls 

Based on the highest risks identified in the previous task, as well as any relevant standards or industry best  practices, recommend a set of security controls for your network. Where relevant, update your network  design to include security controls. For each security control, explain which asset/threat it protects and  how. Refer to specific recommendations or controls from standards or industry best practice, such as NIST  Cybersecurity framework or the ACSC Essential Eight. 

4.5 Task 5: Evaluate ethical/social issues 

Identify ethical/social issues that should be considered when designing, building and operating the  network, and give recommendations to the owner as to strategies with addressing those issues. Issues not  related to the network and its usage are outside of the scope (e.g., the social issue of housing affordability,  while important, is not within the scope of your evaluation).  

4.6 Task 6: Reflect on Teamwork 

In this project you worked in a group. Consider what worked well in a group, and what issues you  encountered. Recommended techniques you (or others) should use in future group projects (e.g. in units  next term) to ensure successful team work. For each technique, explain what problem the technique is  likely to solve or how it will help teamwork.  

5 Reporting 

There are two deliverables for the project: 

  1. Report 
  2. Presentation 

5.1 Report Format 

The report will be Microsoft Word document. It must be presented as a professional technical report (e.g.,  title page, auto-generated table of contents) and should include sections for each of the tasks. You may use  sub-sections where relevant. Include your own pictures and tables where relevant; do not use images from  other sources.  

There is no word limit or page limit. Several of the tasks involve design and explanation, and therefore the  level of detail (and length of the report) may vary significantly across groups.  

There is no recommended number of references. It is not expected you will need to read research papers  to complete this project, however you may need to research information from standards, industry best  practices and websites (e.g., technical documentation, specifications). When you do gain key knowledge 

Project Specification 2

COIT20246 Networking and Cyber Security 

from other sources, acknowledge that source (by referencing). Relevance and consistency  (in format) of references is much more important than number of references or following a specific format.  

5.2 Presentation Format 

The presentation will be a recorded video with the following requirements: 

  • Focus on Tasks 2, 3, 4 and 5. Do not present about Task 1 or 6 (they are covered in your report  only). 
  • PowerPoint slides (or similar) should be used. 
  • All students in the group must present (approximately equal time). 
  • The presenters must be visible on the screen most of the time when speaking.  • Duration of at least 5 minutes and no more than 8 minutes. 
  • Save your file in a common video format, e.g., mp4. 

6 Draft and Final Submissions 

There are two submissions required: 

  1. Draft Submission: report only (no presentation), 10%. Must contain Tasks 1 and 2 completed (or at  least very close to completion). Submit a single Word document only. 
  2. Final Submission: both report and presentation, 20%. Must contain all tasks completed. Submit a  single Word document (report), a single video file (presentation) and a single PowerPoint file  (presentation).  

The deadlines for the submissions are given on Moodle. 

7 Marking Criteria 

7.1 Project Draft [10%] 

  • Assumptions and requirements [1 mark]: relevant. 
  • Network diagram(s) [3 marks]: clear, correct and capturing most of the components necessary  based on the scenario and assumptions. 
  • Design justifications [2 marks]: relevant and clear explanations of why you have chosen this  particular design. 
  • Address allocations [2 marks]: correct and appropriate for the scenario. 
  • Table of hardware [1 mark]: lists relevant equipment for the given design. 
  • Report [1 mark]: professional, e.g., title page, spell-check completed. 

7.2 Project Final [20%] 

The following items will be marked based on what is in the report and video. If one is not submitted or is  very poor, or they are inconsistent (e.g., report presents on network design but video presents a  completely different network design), then the maximum you can achieve for the following is 50%. For  example, if you do not submit a video presentation, then the maximum you can achieve for Network design  is 1 mark, and for Risk assessment is 2 marks. 

  • Network design [2 marks]: diagrams, justification, addressing and equipment meet the  requirements of the scenario. Feedback from draft incorporated (if relevant). 
  • Risk assessment [4 marks]: appropriate assets identify and methodology applied correctly. • Security controls [4 marks]: appropriate controls chosen and justified based on risk assessment,  standards or best practice.

Project Specification 3

COIT20246 Networking and Cyber Security 

  • Ethical and social issues [4 marks]: appropriate issues identified and  recommendations given are clear. 

In addition: 

  • Teamwork reflection [2 marks]: demonstrates genuine reflection and identified practical/useful techniques for the future. 
  • Report presentation [2 marks]: professional, e.g. title page, table of contents, sections, clear  writing. 
  • Video presentation [2 marks]: suitable format and shows all team members presenting in a  professional manner; slides are appropriate. 

Project Specification 4

  • Uploaded By : Katthy Wills
  • Posted on : April 19th, 2023
  • Downloads : 0
  • Views : 117

Order New Solution

Can't find what you're looking for?

Whatsapp Tap to ChatGet instant assistance

Choose a Plan

Premium

80 USD
  • All in Gold, plus:
  • 30-minute live one-to-one session with an expert
    • Understanding Marking Rubric
    • Understanding task requirements
    • Structuring & Formatting
    • Referencing & Citing
Most
Popular

Gold

30 50 USD
  • Get the Full Used Solution
    (Solution is already submitted and 100% plagiarised.
    Can only be used for reference purposes)
Save 33%

Silver

20 USD
  • Journals
  • Peer-Reviewed Articles
  • Books
  • Various other Data Sources – ProQuest, Informit, Scopus, Academic Search Complete, EBSCO, Exerpta Medica Database, and more