7CS093 Securing Networks Group Presentations and Report Assignment UOD

Published: 27 Jan, 2025
Category Assignment Subject Computer Science
University University of Derby Module Title 7CS093 Securing Networks

Description of the assessment

You are required to design and protect a network from external and internal threats and discuss different methods of system breach. Apply or amend the taught techniques to provide mechanisms necessary for detecting and protecting against them, e.g., Firewalls, Anti-malware and Intrusion Detection, and Prevention Systems (IDPS).  You will be assessed on your ability to demonstrate your ability to design a network and an understanding of how the attacks can be detected, and how mitigation techniques can be applied.

Task: You have just joined a company ABC as security analysist and IoT architect. The first project you have been tasked with is the setup of a demo IoT Smart Office, with a link to the company offices. The project is divided into 3 parts:

  1. Create a smart office with the criteria and devices given
  2. Control these smart devices from the branch office which is in the same city.
  3.  Secure this SmartOffice from attacks by applying variety of techniques.

The Main Smart Office includes, but is not limited to the following smart devices:

  • Ceiling Fan
  • Lamp
  •  Front Door Lock
  • Motion Detector
  • Lawn Sprinkler System
  • Smoke Detector
  • Temperature Monitor
  • Anemometer (Wind Speed Detector)

These devices are linked to a Wireless Router, which is linked via an Ethernet cable to a Cable Modem. The modem is connected to the Internet via an ISP. All the devices registered on the Remote Server can be controlled locally by a Tablet which is also connected to the wireless network. There is a Remote Server connected to the Company's Cloud Cluster service, as well as an external server that the Smart office uses for backups. Ensure that you add all necessary screenshots with the documentation and submit your packet tracer file along with the report on Turnitin. 

Step 1: Build and configure a smart office.

  • Add, connect, enable, and configure the registration server, tablet and wireless router as shown in the diagram below
  •  Add, configure the smart devices mentioned in the case study and name these as given in the Figure 1. Note that these devices should be connected to a wireless router wirelessly and should be encrypted using AES by using WPA-PSK (PSK pass phrase must be only your student ID.
  • Connect and activate the devices with username and password as Student ID only.
  • Set up all the smart device attributes through the tablet web browser for the devices to work as shown in the diagram below
  • Show the protocols that are used in transmitting a simple PDU from the tablet to the Server.

7CS093  Figure 1: Smart devices interconnection

Figure 1: Smart devices interconnection

Step 2: Add a new branch office in the same city. Either move the same tablet to the branch office or use your smart phone and connect to the main smart office server. You can use any connecting and intermediary devices of your choice. Log on to the web browser on your tablet/smart phone and manage the devices.
Use your tablet/smart phone to:

  • Turn off the Sprinkler
  •  Turn off the ceiling fan
  •  Lock the door
  • Dim the lamp
  •  Turn on the smoke alarm
  •   Turn on the motion detector
  •   Turn on the wind detector

Step 3: Assess the network and protect it from external and internal threats and discuss different methods of system breach. Apply or amend the taught techniques to provide mechanisms necessary for detecting and protecting against them. You can use the following tools and equipment:

  • Firewalls,
  • Anti-malware
  • Encryption
  • VPN
  •  Intrusion Detection
  • Prevention Systems (IDPS).

Also discusses any other conceptual techniques and approaches that can be used to detect attacks and explain mitigation techniques to secure the SmartOffice.

Assessment Content

This portfolio assignment has THREE components, you must attempt all three components. If the implication of this is unclear, please ask!

Component 1 – Presentation 1 - 20% of grade (Group)
In this part of the assignment, you are required to prepare and deliver a PowerPoint presentation that clearly defines and explains the concepts and components of a Smart office. You should consider every possibility of the environment / devices that could be controlled or monitored. You should identify how devices will co-exist on the network. You should include detail of the control / monitoring process and procedure and include details of how the controlled / monitored and controlling / monitoring / reporting components communicate.

Component 2 – Presentation 2 - 20% of grade (Group)
This part of the assignment, you are required to prepare and deliver a PowerPoint presentation that clearly defines and explains the vulnerabilities of the Smart office network defined in presentation 1. You should include direct and indirect vulnerability concepts as well as remote, local, and physical attack vectors. You should include potential / conceptual as well as reported vulnerabilities and present various mitigation techniques.

Component 3 – Final Report - 60% of grade (Group Work)
The final part of the assignment is to construct a well written report which

  1. Introduces the subject and the aim of the report
  2. Defines the scope of the report (using a summary of Presentation 1)
  3. Identifies the problems to be resolved (using a summary of Presentation 2)
  4. Critically discusses the problems, solutions, and mitigations. Documented vulnerabilities must include details of date of disclosure, equipment affected, solutions implemented and likelihood of being exploited. 
  5. Concludes with the findings of the research and any recommendations. 

At this level, it should be very clear that none of these stages are optional. For absolute clarity: in addition to scoring zero for the component, your final mark will be reduced by 20% for each missed component. Submit your packet tracer file along with the report on Turnitin, it is worth noticing that only submitting a packet tracer file while not submitting the report may result in a grade "FAIL". The report must have all the scenarios, results, and investigations. It is intended that the presentations will be held in the normal practical / tutorial period however you may be expected to attend outside of this period to make your presentation. This is to ensure that everyone has adequate time to present and be given feedback.

Learning Outcomes:

1.    Demonstrate through evaluation, analysis, and critical comparison, detailed comprehension of the mechanisms of system breach, perimeter defence and intrusion detection.
2.    Develop creative thinking to apply or amend the techniques taught, to address issues within the research domain, and offer innovative solutions.

Are you a  University of Derby student and facing problems with your 7CS093 Securing Networks Group Presentations and Report Assignment? Don't worry! We’re here to provide assignment help! Our workingment experts provide AI-free, 100% plagiarism-free solutions according to your needs. With years of experience and over 5,000 students helped, we specialize in assisting with report writing, presentations, and computer science assignments. Get free samples, detailed AI reports, and reliable guidance. Let our UK-based experts support you—pay for professional assistance and ace your course today!

LSC-40049 Medical Microbiology Assessment Brief | Keele University

LSC-40049: 1. To provide you an opportunity to develop and evidence your ability to evaluate the current and future diagnostics for a specific disease/organism. 2. Introduce you to the benefits and limitations of using artificial intelligence (AI) technology to assist your work.

COM7032M Artificial Intelligence Concepts Assignment Guidance

COM7032M Artificial Intelligence Concepts: Task One: GROUP BASED TASK (Group of three students maximum) This assignment aims at preparing you to develop a critical understanding in Artificial Intelligence in general, and Intelligent Tutoring Systems in specific.

L7 Project and Organisational Strategy Assignment Brief | University of Law

1. Understand how organisations deliver their strategic objectives through projects. 2. Understand the different approaches to project design and the situations where these approaches are more (or less) relevant.

MK998 International Services Marketing Sm2 Assignment Brief

MK998 Assignment Task: Develop a photo essay on the St Mungo Museum of Religious Life and Art which captures the following pre-defined elements of the experience

ARC 156 Massing Model of Building & Site: Drafting & Detailing – Steel & Masonry Assignment 4

This assignment asks students to make a massing model of the building and site with sustainable strategies. A massing model is a dimensionally accurate summary of the fundamental exterior forms of a building and how it relates to its site.

CHEM1136 – Forensic Science : Final Year Design Project 2024-25 | UoG

The objective is to produce ADO10 Industry specification diesel for sale to the UK market.  Process Safety & Reliability are essential.  Teams should aim to minimise product specification ‘giveaway’, an indication of over processing.

LCMB723 Human Capital Management L7 Assessment 1 Brief

Identify the factors that are more important to Gen X, Gen Y, and Gen Z in their receptivity to international assignments. (1,500 words). Critically discusses how factors such as culture, personality and skills/experience may impact generational differences. (1,000 words).

LBR7456 Global Public Health: A Social Context Approach Module Assessment Information

LBR7456: LO1: Define and appraise the term global health and critically discuss the role of globalization, global institutions and global health governance that influence health at global, national and local levels

LCMB7002 Financial Management L7 Essay Assessment Brief

This assignment is comprised of two discrete tasks that each align with one of the learning outcomes described above. One is an informal report based on a five-year evaluation of the financial management and performance of a London Stock Exchange (LSE) FTSE 100 listed company. This report relates to learning outcome one. The second task, covering learning outcome two, is an essay on a particular aspect of financial making and the main issues and theoretical frameworks related to the topic.

Fundamentals of Senior Management, Assessment Portfolio | UWS

This module is assessed through a Portfolio weighted 70% and an Individual Essay weighted at 30%. To pass the module you need to pass each component with at least 40% but overall

Online Assignment Help in UK