PENYERAHAN DAN PENILAIAN TUGASAN

ASSIGNMENT SUBMISSION AND ASSESSMENT

______

CBSN4103

NETWORK SECURITY AND DESIGN

MAY2014 SEMESTER

______

ARAHAN KEPADA PELAJAR / INSTRUCTIONS TO STUDENTS

  1. This assignment contains only ONE (1) question that is set in both Malay and English.

2. Answer in Malay or English.

3.Download the language version of the assignmenttemplate concerned from the MyVLE for preparation and submission of your assignment. Your assignment should be typed using 12 point Times New Roman font and 1.5 line spacing.

4.Your assignment should be between 2500 to 3000 wordsexcluding references. Do not copy the assignment question and instructions to your answer. The number of words should be shown at the end of your assignment. Only assignment answer developed within the approximate word limit will be assessed.

5. You must submit your assignment ON-LINE via the MyVLE. Refer to the portal forinstructions on the procedures to submit your assignment on-line. You are advised to keep a copy of your submitted assignment and proof of the submission for personal reference.

6.You can submit your assignment ONCE only in a SINGLE file. The file must be in MS-WORD format. Please ensure that you submit the CORRECT and latest version of file. File which is wrongly submitted must be re-submitted on-line before the deadline.

7.Your assignment mustbe submitted between 24th Juneuntil 6th July 2014. Submission after 6th July 2014will NOT be accepted.

8. Your assignment should be prepared individually. You should not copy another person’s assignment. You should also not plagiarise another person’s work as your own.

EVALUATION

This assignment accounts for 40% of the total marks for the course and shall be assessed based on the Rubrics attached .

You would be given feedback on the assignment before the Final Semester Examination commences.

PLAGIARISM: MARKS DEDUCTION

Warning: The submitted assignment will automatically undergo a similarity check. If plagiarism is detected, marks would be deducted as follows:

  • Assignments with 10 - 30% overlap with others: 20% deduction from the total marks scored.
  • Assignments with 31 - 50% overlap with others: 40% deduction from the total marks scored.
  • Assignments with more than 50% overlap with others:Zero mark would be given.

ASSIGNMENT QUESTION/ SOALAN TUGASAN

PURPOSE

The purpose of this assignment is to analyse the security attacks involved in a given scenario.

REQUIREMENT / ASSIGNMENT QUESTION

BrightIdea is in the file storage business. They provide file storage to free and paid clients all over the world. At present, they have three server farms for data storage which are located in Malaysia, Sweden and Hong Kong. BrightIdea performs backup and data synchronisation between these three server farms every six hours.

As the Network Security Engineer for BrightIdea, you are tasked with analysing FOUR potential attacks during backup and synchronisation between these three server farms. Once you have analysed the attacks, you are required to propose ONE solution for eachof the attacks.

(40)

MUKA SURAT TAMAT / END OF PAGE

ATTACHMENT

ASSIGNMENT RUBRICS

CBCN4103 NETWORK SECURITY AND DESIGN/MAY2014

Criteria / Weight-age / Bad / Low / Fair / Above average / Excellent / Max Marks
0 / 1 / 2 / 3 / 4
Analysis of the 1st potential attack / 1.25 / Wrong answer / Poor analysis with factual errors / Minimal analysis
Many of the important points were missing / Good analysis but can be improved further / Excellent analysiswith clear facts and correct examples
A very convincing answer / 5
Discussion on the solution for the 1st potential attack / 1.25 / Wrong answer / Poor discussion with factual errors / Minimal discussion
Many of the important points were missing / Good discussion but can be improved further / Excellent discussionwith clear facts and correct examples
A very convincing answer / 5
Analysis of the 2nd potential attack / 1.25 / Wrong answer / Poor analysis with factual errors / Minimal analysis
Many of the important points were missing / Good analysis but can be improved further / Excellent analysiswith clear facts and correct examples
A very convincing answer / 5
Discussion on the solution for the 2nd potential attack / 1.25 / Wrong answer / Poor discussion with factual errors / Minimal discussion
Many of the important points were missing / Good discussion but can be improved further / Excellent discussionwith clear facts and correct examples
A very convincing answer / 5
Analysis of the 3rd potential attack / 1.25 / Wrong answer / Poor analysis with factual errors / Minimal analysis
Many of the important points were missing / Good analysis but can be improved further / Excellent analysiswith clear facts and correct examples
A very convincing answer / 5
Discussion on the solution for the 3rd potential attack / 1.25 / Wrong answer / Poor discussion with factual errors / Minimal discussion
Many of the important points were missing / Good discussion but can be improved further / Excellent discussionwith clear facts and correct examples
A very convincing answer / 5
Analysis of the 4th potential attack / 1.25 / Wrong answer / Poor analysis with factual errors / Minimal analysis
Many of the important points were missing / Good analysis but can be improved further / Excellent analysiswith clear facts and correct examples
A very convincing answer / 5
Discussion on the solution for the 4th potential attack / 1.25 / Wrong answer / Poor discussion with factual errors / Minimal discussion
Many of the important points were missing / Good discussion but can be improved further / Excellent discussionwith clear facts and correct examples
A very convincing answer / 5
Total / 10 / 40