联系方式

  • QQ:99515681
  • 邮箱:99515681@qq.com
  • 工作时间:8:00-23:00
  • 微信:codehelp

您当前位置:首页 >> C/C++程序C/C++程序

日期:2024-01-17 08:27

Assignment 1

Exercise Objectives: make a presentation about specific security topics that have been covered in class
Submission Deadline: Final Lesson, i.e. Lesson 10
Submission Method:
(i) You will be given 10 minutes to make a presentation in your finding at Lesson 10.
(ii) Upload your powerpoint file to Assignment folder in Moodle.
Marks: 30%

Requirement:
Select any topic(s) below to make a presentation powerpoint file:

(1) OSI model – security attack at different layers
(2) CIA triad
(3) Hardware used in Internet Security (e.g. firewall)
(4) Software used in Internet Security (e.g. firewall)
(5) Policies set in Internet Security
(6) How to perform network security management
(7) How to handle security incident and recover planning
(8) Workplace security
(9) PC security (e.g. Server security, desktop security)
Assignment 2

Exercise Objectives: use simulator to simulate a company network with security rules setup.
Submission Deadline: within 7 days after the final Lesson, i.e. Lesson 10
Submission Method:
(i) The cover page of the report should be filled with your personal information, or you may
make use of the cover sheet from the College:
http://www.scs.cuhk.edu.hk/cuscs/commfiles/AD029-ALL-AsgmtSubmit.pdf
(ii) Upload your project file (Cisco packet tracer file) and a written report (in word or pdf format)
to Assignment folder in Moodle.
Requirement of Project file:

(1) You may choose any 1 diagram above to construct your network.
(2) The company must have connection(s) to Internet
(3) The company must have 3 departments and 1 department (as public area) as the LAN area.
(4) One department is assigned as public area for visitors to use, e.g. open reception area.
(5) a WAN connection to a subsidiary or branch office is also required, and the branch office can get access to
the Internet (separate line or connected via the main office’s Internet line)

(6) ACL must be applied. The ACL rule(s) can be defined arbitrarily by yourself. Your written report should
mention what and why this/these ACL(s) (with description) have been applied.

Requirement of Written Report:
(1) Company background, e.g. briefly describe what kind of business.
(2) Network diagram with all IP stated.
(3) Your network – briefly describe the network(s), e.g. how many departments, where is the branch office?
(4) ACL(s) used (with brief explanation – what are they? Functions? What is the importance of the assigned
ACL(s)?)
(5) Screen cap of Routing Table(s) in router (with brief explanation – what are they? Functions?)
(6) Screen cap of Config file(s) in router (with brief explanation – what are they? Functions?)
(7) Screen cap the testing (e.g. PING tests) you have done (the PING results)
(8) Short conclusion – briefly describe what you have done in the project

版权所有:留学生编程辅导网 2021,All Rights Reserved 联系方式:QQ:99515681 电子信箱:99515681@qq.com
免责声明:本站部分内容从网络整理而来,只供参考!如有版权问题可联系本站删除。