Assignment 1 Guidance
Task 1 - Identify types of security threat to
organisations. Give an example of a recently
publicized security breach and discuss its
consequences (P1)
To answer this section, follow each of the steps below:
Define threats
Identify threats agents to organizations
List type of threats that organizations will face
What are the recent security breaches? List and give examples with dates
Discuss the consequences of this breach
Suggest solutions to organizations
(Word limit: 500 – 750 words)
Task 2 - Describe at least 3 organisational
security procedures (P2)
To answer this section, you need to mention and discuss 3 security procedures that an
organization uses to improve or provide organizations security.
(Word limit: 500 – 750 words)
Task 2.1 - Propose a method to assess and
treat IT security risks (M1)
To answer this section, follow each of the steps below:
Discuss methods required to assess security threats? E.g., Monitoring tools
What is the current weakness or threats of an organization?
What tools will you propose to treat IT security risks?
(Word limit: 250 – 500 words)
1
Task 3 - Identify the potential impact to IT
security of incorrect configuration of firewall
policies and IDS (P3)
To answer this section, follow each of the steps below:
Discuss briefly firewalls and policies, their usage and advantages in a network
How does a firewall provide security to a network?
Show with diagrams the example of how firewall works
Define IDS, its usage, and show it with diagrams examples
Write down the potential impact (Threat-Risk) of a firewall and IDS if they are
incorrectly configured in a network
(Word limit: 500 – 750 words)
Task 4 - Show, using an example for each,
how implementing a DMZ, static IP and NAT
in a network can improve Network Security
(P4)
To answer this section, follow each of the steps below:
Define and discuss with the aid of diagram DMZ. Focus on its usage and security
function as advantage
Define and discuss with the aid of diagram static IP. Focus on its usage and
security function as advantage
Define and discuss with the aid of diagram NAT. Focus on its usage and security
function as advantage
(Word limit: 500 – 750 words)
Task 4.1 - Discuss three benefits to
implement network monitoring systems with
supporting reasons (M2)
To answer this section, follow each of the steps below:
List some of the networking monitoring devices and discuss each of them.
Why do you need to monitor networks?
What are the benefits of monitoring a network?
2
(Word limit: 250 – 500 words)
Task 4.1.1 - Investigate how a ‘trusted
network’ may be part of an IT security
solution (D1)
To answer this section, follow each of the steps below:
Discuss and explain what are trusted network
Give brief details with an example on its uses
How can it be a solution in IT security?
(Word limit: 250 – 500 words)