Get HI6044 Computer Network Security Assignment Help

Get HI6044 Computer Network Security Assignment Help

HI6044 Computer Network Security

Unit DetailsNameComputer Network Security
CodeHI6044
Year, Trimester2023, Trimester 2
Assessment DetailsNameTasks and Research Project
Due Date and WeekWeek 10
Individual Student DetailsStudent Number 
First Name 
Family Name 
Submission DeclarationIntegrity DeclarationI have read and understand academic integrity policies and practices and my assessment does not violate these.
Full Name 
Submission Date 

Instructions-HI6044 Computer Network Security

Academic Integrity InformationHolmes Institute is committed to ensuring and upholding academic integrity. All assessments must comply with academic integrity guidelines. Important academic integrity breaches include plagiarism, collusion, copying, impersonation, contract cheating, data fabrication and falsification. Please learn about academic integrity and consult your teachers with any questions. Violating academic integrity is serious and punishable by penalties that range from deduction of marks, failure of the assessment task or unit involved, suspension of course enrolment, or cancellation of course enrolment.
Format InstructionsMost assessments must be in MS Word format with no spacing, 12-pt Arial font and at least 2cm margins on all four sides with appropriate section headings and page numbers. You must name your file with the Unit Code and Student ID (e.g. “HI5003-GWA1995”). Check that you submit the correct document as special consideration is not granted if you make a mistake. Student ID needs to be indicated on the cover page.
PenaltiesAll work must be submitted on Blackboard by the due date and time along with a completed Assessment Cover Page. Late penalties apply. Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using Holmes Institute Adapted Harvard Referencing. Penalties are associated with incorrect citation and referencing.

Assignment Specifications-HI6044 Computer Network Security

You are a Network and Security Engineer for the NetSol Consulting Private Limited, which is a leading network and security provider for the small and medium scaled offices.

Task 1: The company is utilizing a layer-by-layer approach to implement the security. Using your expert knowledge on TCP/IP Model and its layers, sketch the TCP/IP protocols and identify at least one protocol used by each layer.

Task 2: At each level of the TCP/IP model, there are security vulnerabilities and therefore, security prevention measures that can be taken to ensure that enterprise applications are protected. As a network and security engineer, your task is to identify the security threats, requirements and propose a solution on each layer.

Task 3: Your task is to propose a network design for the small, scaled company and sketch a basic logical network diagram of the office with 5 departments. You are free to assume:

• Name of the Office and Departments

• Networking Hardware’s such as routers, switches, hubs, modems wireless access points, firewalls etc.

The report should be prepared in Microsoft word and uploaded on to the Blackboard. The word limit of the report is 2000 words. The report should be a properly constructed as an academic report. The report should include references in IEEE style.

Instructions-HI6044 Computer Network Security

Prepare your article as below

  1. Go to the IEEE website and download the WORD template for the format. https://www.ieee.org/publications_standards/publications/authors/author_templates.html
  2. Another link for the template: https://www.ieee.org/publications_standards/publications/journmag/ieee_tj_template_17.pdf
  3. Read and familiarise yourself with the instructions carefully.
  4. Prepare a paper using the IEEE format and the example attached. Follow the template if there are any confusions. Also, refer to the link below to have ideas about how to start (see section 6). (https://www.ieee.org/publications_standards/publications/authors/author_guide_interactive.pdf)
  5. Complete the assignment including all the sections below. The number of words will be counted thoroughly and you must keep the minimum number of words to avoid any penalties.
  6. Title                                                                                                               (maximum 15 words)
  7. Abstract                                                                                                       (100 – 250 words)
  8. Introduction                                                                                               (500 – 1000 words)
  9. Literature Review                                                                                    (500 – 1000 words)
  10. Main body                                                                                                  (400 – 1000 words)
  11. Conclusion                                                                                                  (200 – 300 words)
  12. Future Works                                                                                            (150 – 300 words)
  13. References                                                                                                                 (minimum 5 references)
  14. The article must be a ‘Review’[1] article, including at least 5 references and not more than 25.
  15. Strictly follow the IEEE reference format for in-body citations and the references section.
  16. See the attached files for guidance on how to prepare a review paper. You can also find thorough instructions from IEEE and the Internet.
  17. Contents must include:
  18. History and background of the topic
  19. Challenges and drawbacks
  20. Examine the security tools based on your selected topic.
  21. Possible options (solutions) and future research areas proposed
  22. Include a minimum of two (2) figures to show the overall concept and summarised overview of the topic from the review of minimum 10 – 15 (but not limited to) papers
  23. Remember to strictly follow the template and the instructions above to avoid penalties.

Submission Guidelines For HI6044 Computer Network Security

  • The assignment should be submitted on the Moodle in two separate files:
    • The report should be submitted as a Word file
  • Do not use Wikipedia as a source or a reference.
  • Make sure you properly reference any diagram/graphics used in the assignment.

X