0% found this document useful (0 votes)
7 views2 pages

IE3032 - Assignment and Marking Guide - Feb 2024

The document outlines an individual assignment for a BSc Honors in Information Technology course focusing on Network Security, due on April 19, 2024. Students must form groups of four to analyze five current vulnerabilities affecting networking devices or protocols, detailing their nature, impact, and mitigation strategies. The assignment contributes 20% to the final grade and requires a professional 2500-word report formatted according to specified guidelines.

Uploaded by

deemdraco
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views2 pages

IE3032 - Assignment and Marking Guide - Feb 2024

The document outlines an individual assignment for a BSc Honors in Information Technology course focusing on Network Security, due on April 19, 2024. Students must form groups of four to analyze five current vulnerabilities affecting networking devices or protocols, detailing their nature, impact, and mitigation strategies. The assignment contributes 20% to the final grade and requires a professional 2500-word report formatted according to specified guidelines.

Uploaded by

deemdraco
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Sri Lanka Institute of Information Technology

BSc Honors in Information Technology Specializing in Cyber Security

IE3032- Network Security


Feb 2024

Individual Assignment

Vulnerability Analysis Report

Anticipated Learning Outcomes


LO1: Evaluate security threats and countermeasures of the network devices.

Important Dates
• Assignment Declaration – 13th March 2024
• Assignment Deadline - 19th April 2024

Contribution to Final Grade


• CA Weightage - 20%

You are required to,


▪ Form a group of 4 members.
▪ Register the group using the ‘Group Registration’ Microsoft form given in Course web before
15th March 2024
▪ If you are not working in a group of 4 you must get prior permission. Otherwise, your marks
will be penalized by 30%.
Scenario
You are required to identify 5 vulnerabilities that are currently affecting networking devices or networking
protocols. This can be done by researching recent cyber security attacks that have taken place and
identifying the vulnerabilities that allowed those attacks to be mounted. Once you have identified 5
vulnerabilities you will be required to do a full analysis of each vulnerability and identify further details
including but not limited

• Device or protocol affected.


• Nature of the vulnerability and severity
• The exact component of the network devices it affects.
• Reason for the vulnerability to exist.
• Type of ways in which it can be exploited.
• Example attacks that can be mounted due to that vulnerability.
• Impact of those attacks

Once the vulnerabilities have been fully analyzed you are expected to identify and recommend mitigation
strategies/countermeasures that can be employed by companies using that network device to minimize
the threat posed by using that device.

Submission
You are expected to submit a 2500-word document that looks professional and meets the formatting
standards below.

• Font – Ariel
• Size - 12
• Spacing – 1.5

Rename your submission with the Student ID.

Marking Guide
• Identification and analysis of 5 vulnerabilities (20 Marks)
• Identification and analysis of attacks and their impact (40 Marks)
• Recommendation of suitable mitigation strategies and countermeasures (40 Marks)

You might also like