7CS093 Securing Networks Assessment Brief | University of Derby

Published: 27 Jan, 2025
Category Assignment Subject Computer Science
University University of Derby (UOD) Module Title 7CS093 Securing Networks
Assessment Type: Group Presentations and Report (group work, up to 5 students)
Assessment weighting:  100%-Portfolio Presentation 1 contributes 20%, 
Presentation 2 contributes 20% and the final Report contributes the remaining 60%.
Word count/Length : Presentation (10 minutes) and maximum word count for the Report is 4000 words, including all images, tables, charts, and references.

7CS093 Securing Networks Assessment

7CS093 Description of the assessment

You are required to design and protect a network from external and internal threats and discuss different methods of system breach. Apply or amend the taught techniques to provide mechanisms necessary for detecting and protecting against them, e.g., Firewalls, Anti-malware and Intrusion Detection, and Prevention Systems (IDPS).  You will be assessed on your ability to demonstrate your ability to design a network and an understanding of how the attacks can be detected, and how mitigation techniques can be applied.

7CS093 Task:

You have just joined a company ABC as security analysist and IoT architect. The first project you have been tasked with is the setup of a demo IoT Smart Office, with a link to the company offices. The project is divided into 3 parts:

  1. Create a smart office with the criteria and devices given
  2. Control these smart devices from the branch office which is in the same city.
  3.  Secure this SmartOffice from attacks by applying variety of techniques.

The Main Smart Office includes, but is not limited to the following smart devices:

  • Ceiling Fan
  • Lamp
  •  Front Door Lock
  • Motion Detector
  • Lawn Sprinkler System
  • Smoke Detector
  • Temperature Monitor
  • Anemometer (Wind Speed Detector)

These devices are linked to a Wireless Router, which is linked via an Ethernet cable to a Cable Modem. The modem is connected to the Internet via an ISP. All the devices registered on the Remote Server can be controlled locally by a Tablet which is also connected to the wireless network. There is a Remote Server connected to the Company's Cloud Cluster service, as well as an external server that the Smart office uses for backups. Ensure that you add all necessary screenshots with the documentation and submit your packet tracer file along with the report on Turnitin. 

Step 1: Build and configure a smart office.

  • Add, connect, enable, and configure the registration server, tablet and wireless router as shown in the diagram below
  •  Add, configure the smart devices mentioned in the case study and name these as given in the Figure 1. Note that these devices should be connected to a wireless router wirelessly and should be encrypted using AES by using WPA-PSK (PSK pass phrase must be only your student ID.
  • Connect and activate the devices with username and password as Student ID only.
  • Set up all the smart device attributes through the tablet web browser for the devices to work as shown in the diagram below
  • Show the protocols that are used in transmitting a simple PDU from the tablet to the Server.

7CS093 Securing Networks Assessment

Figure 1: Smart devices interconnection

Do You Need Assignment of 7CS093 Presentations and Report

Order Non Plagiarized Assignment

Step 2:

Add a new branch office in the same city. Either move the same tablet to the branch office or use your smart phone and connect to the main smart office server. You can use any connecting and intermediary devices of your choice. Log on to the web browser on your tablet/smart phone and manage the devices.
Use your tablet/smart phone to:

  • Turn off the Sprinkler
  •  Turn off the ceiling fan
  •  Lock the door
  • Dim the lamp
  •  Turn on the smoke alarm
  •   Turn on the motion detector
  •   Turn on the wind detector

Step 3: Assess the network and protect it from external and internal threats and discuss different methods of system breach. Apply or amend the taught techniques to provide mechanisms necessary for detecting and protecting against them. You can use the following tools and equipment:

  • Firewalls,
  • Anti-malware
  • Encryption
  • VPN
  •  Intrusion Detection
  • Prevention Systems (IDPS).

Also discusses any other conceptual techniques and approaches that can be used to detect attacks and explain mitigation techniques to secure the SmartOffice.

7CS093 Assessment Content

This portfolio assignment has THREE components, you must attempt all three components. If the implication of this is unclear, please ask!

Component 1 – Presentation 1 - 20% of grade (Group)

In this part of the assignment, you are required to prepare and deliver a PowerPoint presentation that clearly defines and explains the concepts and components of a Smart office. You should consider every possibility of the environment / devices that could be controlled or monitored. You should identify how devices will co-exist on the network. You should include detail of the control / monitoring process and procedure and include details of how the controlled / monitored and controlling / monitoring / reporting components communicate.

Component 2 – Presentation 2 - 20% of grade (Group)

This part of the assignment, you are required to prepare and deliver a PowerPoint presentation that clearly defines and explains the vulnerabilities of the Smart office network defined in presentation 1. You should include direct and indirect vulnerability concepts as well as remote, local, and physical attack vectors. You should include potential / conceptual as well as reported vulnerabilities and present various mitigation techniques.

Component 3 – Final Report - 60% of grade (Group Work)

The final part of the assignment is to construct a well written report which 

  1. Introduces the subject and the aim of the report
  2. Defines the scope of the report (using a summary of Presentation 1)
  3. Identifies the problems to be resolved (using a summary of Presentation 2)
  4. Critically discusses the problems, solutions, and mitigations. Documented vulnerabilities must include details of date of disclosure, equipment affected, solutions implemented and likelihood of being exploited. 
  5. Concludes with the findings of the research and any recommendations. 

At this level, it should be very clear that none of these stages are optional. For absolute clarity: in addition to scoring zero for the component, your final mark will be reduced by 20% for each missed component. Submit your packet tracer file along with the report on Turnitin, it is worth noticing that only submitting a packet tracer file while not submitting the report may result in a grade "FAIL". The report must have all the scenarios, results, and investigations. It is intended that the presentations will be held in the normal practical / tutorial period however you may be expected to attend outside of this period to make your presentation. This is to ensure that everyone has adequate time to present and be given feedback.

Learning Outcomes of 7CS093:

  1. Demonstrate through evaluation, analysis, and critical comparison, detailed comprehension of the mechanisms of system breach, perimeter defence and intrusion detection.
  2. Develop creative thinking to apply or amend the techniques taught, to address issues within the research domain, and offer innovative solutions.

Buy Answer of 7CS093 Presentations and Report & Raise Your Grades

Order Non Plagiarized Assignment

Are you a  University of Derby student and facing problems with your 7CS093 Securing Networks Group Presentations and Report Assignment? Don't worry! We’re here to provide assignment help! Our workingment experts provide AI-free, 100% plagiarism-free solutions according to your needs. With years of experience and over 5,000 students helped, we specialize in assisting with report writing, presentations, and computer science assignments. Get free samples, detailed AI reports, and reliable guidance. Let our UK-based experts support you—pay for professional assistance and ace your course today!

Workingment Unique Features

Hire Assignment Helper Today!


BUS3029 Operating in Emerging Markets Assignment 01 Brief 2025 | UON

Propose a detailed plan for how the brand will operate sustainably in the chosen market. Focus on areas such as ethical sourcing and reducing environmental impact. Highlight how these practices align with the brand's values, contribute to competitive advantages, and help the business to grow.

BBSC4103 Assignment: Strategic Supply Chain Management Question Semester 2025 | OUM

BBSC4103 Part 1: The purpose of this assignment is to help learners study the important of strategic alliances by focusing on inter-organisational relationships and the challenges in managing them.

BBHI4103 Industrial Relation Assignment Question | Open University Malaysia

BBHI4103 Part 1: The purpose of this assignment is to enhance learners' ability to discuss the perspectives in industrial relations and evaluate which perspective is the best for the selected organisation

Scientific Research Review Assignment 4 | USM

You are required to write an individual review paper on a topic of advancements in your area of study. This paper must demonstrate your ability to plan, execute, and present a scholarly task ethically and professionally.

BTEC Level 5 Unit 16: Computing Research Project Assignment Part 1 Brief

BTEC Level 5 Unit 16: Assignment Brief: Artificial intelligence is at the forefront of innovation within Computer Science that uses a combination of logic, algorithms and large data sets to produce an AI model.

ACC210 Accounting for Decision Making and Control TMA Assignment Question | SUSS

ACC210 Question 1  Cool Strokes Pte Ltd ("CS") manufactures white board markers for educational use. The company's markers are sold by the box at $50 each in 20x3.

BM414 Financial Decision Making CW1 Assignment Brief (SIG) | BNU

Suppose you are part of the Accounting and Finance team at Sheffield Insulation Group (SIG) plc. You are required to write a report to the senior management team of SIG plc, discussing the importance of accounting and finance functions.

7167EXQ Environmental Management Systems and Auditing CW1 Brief | CU

7167EXQ Assignment Task: Essay on the relevance of organisational behaviour on environmental management in an organisation You may approach this essay in one of two ways depending on your experience and knowledge.

BENV1015 History of Design Thinking Assignment 1 Brief Term 2 2025 | UNSW

The assignment develops your knowledge of historical design ideas and communication skills corresponding to the course learning outcomes below. It aims to give an appreciation of the implications of past movements, practitioners, and projects for current challenges.

7ME500 Advanced Mechanical Design and Manufacturing Engineering CW1 Report Assessment Brief | UoD

An integrated design, material selection, and manufacturing approach provides one of the key enabling capabilities needed to effectively evaluate specific areas of initial concept development and perform detailed engineering design and analysis throughout a product development cycle.

Online Assignment Help in UK