1 - Unit 5 - Assignment Brief 1
1 - Unit 5 - Assignment Brief 1
Submission Format:
Format:
● The submission is in the form of an individual written report. This should be written in a concise,
formal business style using single spacing and font size 12. You are required to make use of
headings, paragraphs and subsections as appropriate, and all work must be supported with
research and referenced using the Harvard referencing system. Please also provide a bibliography
using the Harvard referencing system.
Submission
● Students are compulsory to submit the assignment in due date and in a way requested by the
Tutor.
● The form of submission will be a soft copy posted on http://cms.greenwich.edu.vn/.
● Remember to convert the word file into PDF file before the submission on CMS.
Note:
● The individual Assignment must be your own work, and not copied by or from another student.
● If you use ideas, quotes or data (such as diagrams) from books, journals or other sources, you
must reference your sources, using the Harvard style.
● Make sure that you understand and follow the guidelines to avoid plagiarism. Failure to comply
this requirement will result in a failed assignment.
1
LO1 Assess risks to IT security.
LO2 Describe IT security solutions.
Assignment scenario
You work as a trainee IT Security Specialist for a leading Security consultancy in Vietnam called FPT
Information security FIS.
FIS works with medium sized companies in Vietnam, advising and implementing technical solutions to
potential IT security risks. Most customers have outsourced their security concerns due to lacking the
technical expertise in house. As part of your role, your manager Jonson has asked you to create an
engaging presentation to help train junior staff members on the tools and techniques associated with
identifying and assessing IT security risks together with the organizational policies to protect business
critical data and equipment.
Tasks
In addition to your presentation, you should also provide a detailed report containing a technical review
of the topics covered in the presentation.
Your presentation should:
Identify the security threats FIS secure may face if they have a security breach. Give an example
of a recently publicized security breach and discuss its consequences
Describe a variety of organizational procedures an organization can set up to reduce the effects
to the business of a security breach.
Propose a method that FIS can use to prioritize the management of different types of risk
Discuss three benefits to FIS of implementing network monitoring system giving suitable
reasons.
Investigate network security, identifying issues with firewalls and IDS incorrect configuration
and show through examples how different techniques can be implemented to improve network
security.
Investigate a ‘trusted network’ and through an analysis of positive and negative issues determine
how it can be part of a security system used by FIS.
Your detailed report should include a summary of your presentation as well as additional, evaluated or
critically reviewed technical notes on all of the expected topics.
2
Learning Outcomes and Assessment Criteria (Assignment 1):
Learning Outcome Pass Merit Distinction
LO1 P1 Identify types of M1 Propose a method D1 Investigate how a
security threat to to assess and treat IT ‘trusted network’ may
organisations. security risks. be part of an IT
Give an example of a security solution.
recently publicized
security breach and
discuss its
consequences.
P2 Describe at least 3
organisational security
procedures.
LO2 P3 Identify the M2 Discuss three
potential impact to IT benefits to implement
security of incorrect network monitoring
configuration of systems with
firewall policies and supporting reasons.
IDS.
P4 Show, using an
example for each, how
implementing a DMZ,
static IP and NAT in a
network can improve
Network Security.