0% found this document useful (0 votes)
43 views

1 - Unit 5 - Assignment Brief 1

This document provides an assignment brief for a security presentation. It outlines that students should identify security threats, describe organizational security procedures, propose a method to prioritize risk management, discuss benefits of network monitoring, and investigate network security issues. It also provides learning outcomes, assessment criteria, and submission requirements for the assignment, which involves creating a presentation and detailed report on security topics.
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
43 views

1 - Unit 5 - Assignment Brief 1

This document provides an assignment brief for a security presentation. It outlines that students should identify security threats, describe organizational security procedures, propose a method to prioritize risk management, discuss benefits of network monitoring, and investigate network security issues. It also provides learning outcomes, assessment criteria, and submission requirements for the assignment, which involves creating a presentation and detailed report on security topics.
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

Assignment Brief 1 (RQF)

Higher National Certificate/Diploma in Computing

Student Name/ID Number:


Unit Number and Title: Unit 5: Security
Academic Year: 2021 – 2022
Unit Assessor: Van Ho
Assignment Title: Security Presentation
Issue Date: April 1st, 2021
Submission Date:
Internal Verifier Name:
Date:

Submission Format:

Format:
● The submission is in the form of an individual written report. This should be written in a concise,
formal business style using single spacing and font size 12. You are required to make use of
headings, paragraphs and subsections as appropriate, and all work must be supported with
research and referenced using the Harvard referencing system. Please also provide a bibliography
using the Harvard referencing system.
Submission
● Students are compulsory to submit the assignment in due date and in a way requested by the
Tutor.
● The form of submission will be a soft copy posted on http://cms.greenwich.edu.vn/.
● Remember to convert the word file into PDF file before the submission on CMS.
Note:
● The individual Assignment must be your own work, and not copied by or from another student.
● If you use ideas, quotes or data (such as diagrams) from books, journals or other sources, you
must reference your sources, using the Harvard style.
● Make sure that you understand and follow the guidelines to avoid plagiarism. Failure to comply
this requirement will result in a failed assignment.

Unit Learning Outcomes:

1
LO1 Assess risks to IT security.
LO2 Describe IT security solutions.

Assignment Brief and Guidance:

Assignment scenario
You work as a trainee IT Security Specialist for a leading Security consultancy in Vietnam called FPT
Information security FIS.
FIS works with medium sized companies in Vietnam, advising and implementing technical solutions to
potential IT security risks. Most customers have outsourced their security concerns due to lacking the
technical expertise in house. As part of your role, your manager Jonson has asked you to create an
engaging presentation to help train junior staff members on the tools and techniques associated with
identifying and assessing IT security risks together with the organizational policies to protect business
critical data and equipment.
Tasks
In addition to your presentation, you should also provide a detailed report containing a technical review
of the topics covered in the presentation.
Your presentation should:
 Identify the security threats FIS secure may face if they have a security breach. Give an example
of a recently publicized security breach and discuss its consequences
 Describe a variety of organizational procedures an organization can set up to reduce the effects
to the business of a security breach.
 Propose a method that FIS can use to prioritize the management of different types of risk
 Discuss three benefits to FIS of implementing network monitoring system giving suitable
reasons.
 Investigate network security, identifying issues with firewalls and IDS incorrect configuration
and show through examples how different techniques can be implemented to improve network
security.
 Investigate a ‘trusted network’ and through an analysis of positive and negative issues determine
how it can be part of a security system used by FIS.
Your detailed report should include a summary of your presentation as well as additional, evaluated or
critically reviewed technical notes on all of the expected topics.

2
Learning Outcomes and Assessment Criteria (Assignment 1):
Learning Outcome Pass Merit Distinction
LO1 P1 Identify types of M1 Propose a method D1 Investigate how a
security threat to to assess and treat IT ‘trusted network’ may
organisations. security risks. be part of an IT
Give an example of a security solution.
recently publicized
security breach and
discuss its
consequences.

P2 Describe at least 3
organisational security
procedures.
LO2 P3 Identify the M2 Discuss three
potential impact to IT benefits to implement
security of incorrect network monitoring
configuration of systems with
firewall policies and supporting reasons.
IDS.

P4 Show, using an
example for each, how
implementing a DMZ,
static IP and NAT in a
network can improve
Network Security.

You might also like