BHI & CAE ASSESSMENT COVER SHEET This form must be attached to the front of all submitted hard copy assessments. Student Details: Student to complete Student Name: Xuan Yu(Faith) Tiong Student ID : s...

1 answer below »
BHI & CAE ASSESSMENT COVER SHEET
This form must be attached to the front of all submitted hard copy assessments.
Student Details: Student to complete
Student Name:
Xuan Yu(Faith) Tiong
Student ID :
s XXXXXXXXXX
Student Declaration:
By signing below, I declare that the work submitted here is my own work and it does not include work which is plagiarised, copied in whole or in part from another student or other source such as published books, internet or journals without due acknowledgement in the text.
Student Signature:
Xuan Yu Tiong
Date:
4/3/2021
Assessment Details: Teacher to complete
Course National ID and Title
22334VIC Certificate IV in Cyber Security
Unit/s National ID and Title
VU XXXXXXXXXXImplement Network Security Infrastructure for an Organization Instructor Guide
Assessment Task number and name
Assessment Task 1: An anatomy of a cyber attack
Date due:
Sunday after session 3 class
Date submitted:
Assessor Name:
TBA
Assessment Result and Feedback
Result
|_| Satisfactory
|_| Not yet Satisfactory
Re-submit date if required:

Feedback:
Assessor’s signature:

Date:

Assessment Review
If you believe that you have been assessed unfairly, you have the right to request an informal assessment review. When your assessment cover sheet is returned to you, you can request an informal review by filling in the section below and returning it to your assessor or the Operations Manager of your area. If you are not satisfied with the outcome, you can apply for a formal review of assessment on the application form located on the Box Hill Institute Website https://goo.gl/Pb3Rtx
VCE courses: VCAA rules and regulations replace the above assessment review. Please see your VCE Teacher or VCE Coordinator for further discussion.
I request a review of my assessment for the following reasons (not applicable to VCE courses):
Student Signature

Date

Instructions to Student
Assessment task name
Assessment Task 1: An anatomy of a cyber attack
Assessment task type
Report/Questioning/Meeting
Time allowed
Week 1 – 3 in class and at home as required
Where the assessment will take place
In timetabled classroom
Personal protective equipment required
N/A
Emergency procedures
Report Issues to Teacher or coordinators as appropriate
Equipment provided
PC on campus during class time
Individual or group work
Individual & Group Work
Support equipment allowed i.e.: calculator, dictionary
All tools as appropriate for the assessment
Context and conditions of assessment
Assessment must be conducted in a safe environment where evidence gathered demonstrates consistent performance of typical activities experienced in the knowledge management – research field of work and include access to:
· workplace information systems, equipment and resources
· workplace policies and procedures
· Case studies and, where possible, real situations.
Assessors must satisfy NVR/AQTF assessor requirements.
What to submit
The completed report is to be submitted to StudentWeb under the Assessment Task 1: An anatomy of a cyber attack
How to submit
Submit the completed document (this document) to the Assessment Task 1: An anatomy of a cyber attack section on StudentWeb.
How to present your work
Complete this word document and answer all questions in the spaces provided. The coversheet must be submitted when uploading to StudentWeb.
How many attempts at assessment are permitted
Students will be given 2 attempts to resubmit an assessment; additional attempts must be organized with teacher and student prior to submission.
Naming protocol for electronic files
ID_AT1_API.doc
E.g.: S10054440_AT1_ API.doc
All files that do not have this naming convention will be sent back to you as it resembles part of you assessment that the information is corrected handled and stored.
How will the assessment judgement be made
|_| Observation checklist
|_| Exemplar

|_|Performance checklist
|_| Rubric

|_| Answer guide
|_| -
Safety
If at any time during the learning and assessment process, your Trainer/Assessor considers that the safety of any person is at risk they will abort the session.
Reasonable Adjustment
Students identifying as having a disability may access reasonable adjustment to enable them to participate in training and assessment on the same basis as other students. Students can learn more about this through the Learners with a disability policy and procedure on the Box Hill Institute website http://www.boxhill.edu.au/for-students/student-support or by calling Student Life on XXXXXXXXXX, by emailing the Disability liaison service on XXXXXXXXXX or by calling into the Student Life office at Elgar Campus in E3.G56, just near the cafeteria.
Special Consideration
Where a student anticipates that a result will be impacted by special circumstances such as ill health or bereavement, application can be made for special consideration. Forms can be accessed from the Student Life office at Elgar Campus in E3.G56 or downloaded at: http://www.boxhill.edu.au/for-students/student-information/forms-and-downloads.
VCE courses: Supplementary exam procedures apply. Please see your VCE Teacher or VCE Coordinator for further discussion.
VU21991 AT1 – An Anatomy of a Cyber Attack
The following criteria will be used for this assessment:
Examine modern network security threats and attacks
Network security architectures is identified
Select group of modern cyber security threats and attacks are examined in detail.
Tools and procedures to mitigate the effects of malware and common network attacks are identified
Background Information:
Using the information from the ABC Widgets Franchise company, you have been approached to provide a briefing report for them to help them make an informed decision regarding improving and hardening their security systems:
Your Task:
Is to develop a briefing report for the company that:
1. Provide an overview of different security architectures ABC Widgets Franchise to deploy. Give some advantages and disadvantages of each solution
2. To describe in detail a typical security threat or attack (examples may include Trojans, Spoofing, Phishing, Spear phishing, Man in the middle, Password attacks, emerging, others)
3. To provide a summary of tools and procedures that can be used to mitigate such attacks
VU21991 Implement network security infrastructure for an organization AT1
Version 2 Jan 2020
Answered 1 days AfterMay 12, 2021VU21991Box Hill Institute

Solution

Deepti Garg answered on May 13 2021
20 Votes

Overview
Network Architecture
Network architecture proposed in this report includes framework of the structure, standards, policies and functional behavior of the network of the target company...

Submit New Assignment

Copy and Paste Your Assignment Here