Final Individual Assessment
Unit Details | Name | Computer Network Security |
| Code | HI6044 | |
| Year, Trimester | Trimester 2, 2024 |
Assessment Details | Name | Final Individual Assessment |
| Due Date & Time | 10 October, 2024 10.59 pm - Gold Coast students 11:59 pm - Melbourne & Sydney students |
Student Details | Student Number | |
| First Name | ||
| Family Name |
Submission Declaration | Integrity Declaration | I have read and understand academic integrity policies and practices and my assessment does not violate these. |
Full Name | ||
| Submission Date |
ALL SUBMISSIONS MUST INCLUDE YOUR STUDENT DETAILS AND SUBMISSION DECLARATION.
IF THESE DETAILS ARE NOT COMPLETED YOU RISK BEING PENALISED
Instructions
Academic Integrity Information | Holmes Institute is committed to ensuring and upholding academic integrity. All assessment must comply with academic integrity guidelines. Important academic integrity breaches include plagiarism, collusion, copying, impersonation, contract cheating, data fabrication and falsification. Please learn about academic integrity and consult your teachers with any questions. Violating academic integrity is serious and punishable by penalties that range from deduction of marks, failure of the assessment task or unit involved, suspension of course enrolment, or cancellation of course enrolment.
|
Format & submission instructions |
|
| Penalties |
|
All responses must be entered in the answer boxes at the end of each question
Question 1 (10 marks)
Network Firewall Design
Below is a diagram of a simple internal network connected to the internet:
Required:
- Based on the network shown, explain how a firewall would be implemented to protect the internal network. (2.5 marks)
ANSWER (box will enlarge as you enter your response)
- What type of firewall, stateful inspection or packet filtering would you recommend, and why? (2.5 marks)
ANSWER:
- Describe the rules that should be applied to the firewall to secure both incoming and outgoing traffic. (5 marks)
ANSWER:
Question 2 (10 marks)
Wireless Network Security
Consider the wireless network diagram below, which includes access points, clients, and the internet gateway:
Required:
- Explain in detail the security risks associated with this wireless network architecture. (2.5 marks)
ANSWER:
- Describe at least two security measures that should be implemented to secure wireless communications. (2.5 marks)
ANSWER:
- Compare the implementation of WPA3 to improve security compared to WPA2 in this setup. (5 marks)
ANSWER
Question 3 (10 marks)
Explain the concept of zero trust architecture in network security and its advantages in modern network infrastructures.
ANSWER
Question 4 (10 marks)
Analyse the security challenges in wireless networks and propose strategies for securing wireless communications.
ANSWER
Question 5 (10 marks)
How does Transport Layer Security (TLS) work in securing network connections?
ANSWER
END OF FINAL INDIVIDUAL ASSESSMENT