Looking for Plagiarism-Free Answers for Your US, UK, Singapore, New Zealand, and Ireland College/University Assignments?
Talk to an Expert| Category | Assignment | Subject | Computer Science |
|---|---|---|---|
| University | Arden University | Module Title | COM7013 Network Security |
| Word Count | 3000 words |
|---|---|
| Academic Year | 2026/27 |

As part of the formal assessment for the programme you are required to submit a
Network Security assignment. Please refer to your Student Handbook for full details of the programme assessment scheme and general information on preparing and submitting assignments.
After completing the module, you should be able to:
All learning outcomes must be met to pass the module.
Your assignment should include: a title page containing your student number, the module name, the submission deadline and the exact word count of your submitted document; the appendices if relevant; and a reference list in (see referencing section for more information). You should address all the elements of the assignment task listed below. Please note that tutors will use the assessment criteria set out below in assessing your work.
You must not include your name in your submission because Arden University operates anonymous marking, which means that markers should not be aware of the identity of the student. However, please do not forget to include your STU number.
Maximum word count: 3000 words
Please refer to the full word count policy which can be found in the Student Policies section here: Arden University | Regulatory Framework
The word count includes everything in the main body of the assessment (including in text citations and references). The word count excludes numerical data in tables, figures, diagrams, footnotes, reference list and appendices. All other printed words ARE included in the word count.
Students who exceed the wordcount up to a 10% margin will not be penalised. Students should note that no marks will be assigned to work exceeding the specified limit once the maximum assessment size limit has been reached.
Your manager has just returned from a conference on network security and has asked youto investigate the organisational network security posture. The current network consists of a flat network design over 2 sites consisting of a Head Office(HQ) and a separate site (S1). The locations are currently interconnected via point to pointleased lines. HQ has a single-homed connection to the Internet that contains internal clientand server devices as well as the external facing webserver.
HQ has recently suffered from a recent security breach that led to unauthorised changes toconfiguration settings on HQR1 which is causing communication issues across the locations. There is also evidence that some of the LAN device may have been accessed. It is uncertainhow this occurred, but it is imperative that the configuration is corrected and appropriatemitigations put in place to protect from further breaches as well as reduce the attack surfaceif another breach does occurs.
Due to this, there has been a decision to use a DMZ for internal and external access to the Corp Web Server and access needs to be configured appropriately to allow this to occur. Configuration for this has already started on HQR1 which you are to complete as part of the project.
You have been tasked to build a PoC network design to minimise vulnerabilities taking into consideration current guidance and best practices. You are to run appropriate tests to validate this has been achieved.
Below are the security requirements:
S1 LAN
Within the given packet tracer file, create a secure network design to demonstrate a solution in the selection and configuration of network security controls and measures for the above scenario.
Create appropriate network design documentation that records the security controls implemented, including models of secure configuration for the components and devices. This should also include screenshots of the tests undertaken to validate security controls. Include this as Appendix A in the Part 2 Technical report.
(1800 Words Equivalent)
(60 Marks)
(LOS: LO1, LO4)
Write a report containing a critical appraisal of the solution given in Part 1 evaluated against both current and emerging network attack vectors and the changing threat landscape.
The report should:
(1200 Words)
(40 Marks)
(LOs: LO2, LO3)
| Grade | Mark Bands | Generic Assessment Criteria |
|---|---|---|
| Distinction | 80%+ | Outstanding analysis of key issues and concepts. Outstanding development of conceptual structures and argument, making consistent use of scholarly conventions. Outstanding research skills, independence of thought, an extremely high level of intellectual rigour and consistency, exceptional expressive/professional skills, and outstanding creativity and originality. Demonstrates excellent academic/intellectual skills. Work pushes the boundaries of the discipline and demonstrates awareness of relevant ethical considerations. Work may be considered for publication. |
| Distinction | 70–79% | Excellent analysis of key issues and concepts. Excellent development of conceptual structures and argument, making consistent use of scholarly conventions. Excellent research skills, independence of thought, and high intellectual rigour. Excellent expressive/professional skills and substantial creativity and originality. Demonstrates excellent academic/intellectual skills and awareness of ethical considerations. Work may be considered for publication. |
| Merit | 60–69% | Very good level of competence demonstrated. High level of theory application. Very good analysis of key issues and concepts. Development of conceptual structures and argument with consistent use of scholarly conventions. Some evidence of original thought and awareness of ethical considerations. |
| Pass | 55–59% | A good performance. Good knowledge of key issues and concepts. Fairly descriptive, with some analysis of scholarly material and argument development. Limited evidence of original thought. Some awareness of ethical considerations. Good professional skills. |
| Pass | 50–54% | A satisfactory performance. Basic knowledge of key issues and concepts. Generally descriptive, with restricted analysis. Limited scholarly material and argument development. Use of scholarly conventions inconsistent. Limited awareness of ethical considerations. |
| Marginal Fail | 40–49% | Limited research skills and poor use of learning resources. Significant problems with structure and expression. Very weak academic/professional skills. Limited use of scholarly conventions. Errors in expression and lack of overall structure. |
| Clear Fail |
39% and below | A poor performance in which there are substantial gaps in knowledge and understanding,underpinning theory and ethical considerations.Little evidence of research skills, use of learning resources and problem solving. Major problems with structure/ accuracy in expression. Professional skills not present. Very weak academic professional skills. No evidence of use of scholarly conventions. |
Buy Custom Answer Of COM7013 Network Security Assignment & Raise Your Grades
Get A Free QuoteStruggling with COM7013 Network Security Portfolio Assignment at Arden University? Get expert Assignment Help UK tailored to boost your grades and understanding. Our Computer Science Assignment Help provides well-researched, plagiarism-free solutions designed as per university guidelines. Access a Free List of Assignment Samples Answers to see high-quality work before you order. Whether it’s essays, case studies, or reports, our professionals ensure timely delivery and top-notch content that helps your assignment rank higher and stand out. Join thousands of students who trust our services to excel academically and achieve success in their computer science studies with confidence and ease.
Hire Assignment Helper Today!
Let's Book Your Work with Our Expert and Get High-Quality Content