MN502 代写

Assessment Details and Submission Guidelines

Trimester

2, 2018

Unit Code

MN502

Unit Title

Overview of Network Security

Assessment Type

Individual Assignment (Assignment Two)

Assessment Title

Security Challenges in Emerging Networks

Purpose of the assessment (with ULO Mapping)

The purpose of this assignment is to develop skills to independently think of innovation. Students will be able to complete the following ULOs:

c. Explain the major methodologies for secure networks and what threats they address;
d. Identify and report network threats, select and implement appropriate countermeasures for network security.

Weight

20%

Total Marks

60

Word limit

1500 – 2000

Due Date

11:55PM, Friday 28/09/2018

Submission Guidelines

  •   All work must be submitted on Moodle by the due date along with a title Page.
  •   The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body) font and 2.54 cm margins on all four sides of your page with appropriate section headings.
  •   Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using IEEE referencing style.

Extension

 If an extension of time to submit work is required, a Special Consideration Application must be submitted directly to the School’s Administration Officer, in Melbourne on Level 6 or in Sydney on Level 7. You must submit this application three working days prior to the due date of the assignment. Further information is available at: http://www.mit.edu.au/about-mit/institute-publications/policies- procedures-and-guidelines/specialconsiderationdeferment

Academic Misconduct

 Academic Misconduct is a serious offence. Depending on the seriousness of the case, penalties can vary from a written warning or zero marks to exclusion from the course or rescinding the degree. Students should make themselves familiar with the full policy and procedure available at: http://www.mit.edu.au/about-mit/institute-publications/policies- procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy- Procedure. For further information, please refer to the Academic Integrity Section in your Unit Description.

Prepared by: Dr Wanod Kumar Moderated by: Dr Tony Jan August, 2018

Unit Code: MN502 Unit Name: Overview of Network Security Page#2 of 4

Assignment Description

The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowledge based on current state of the art of an emerging knowledge domain. Then they will learn how to identify plausible security issues in this emerging network-based applications, and finally learn the skill of adding knowledge to existing domain by theoretically developing the corresponding protection mechanism for a particular issue.

The use of network technologies is rapidly growing in healthcare sector. Now, healthcare is considered as one of the emerging application of network-based applications. Different network scenarios using wireless, wired, and mobile communications can provide efficient solutions to access electronic medical records (EMRs), medical management systems, imaging, biomedical information, material management, patient accounting, admitting information, and online claims submissions. Today, healthcare systems can combine these tools into one network-based infrastructure to more effectively communicate and collaborate, reduce errors, and improve patient care and efficiency. As healthcare providers adopt new technologies, they also face new security threats. Hackers, malicious software (malware), disgruntled employees, and human error present real dangers to healthcare networks [1]. Security of healthcare networks is a prime concern in today’s World.

This assignment includes four parts

  1. Literature review on Healthcare Networks.

    The literature review should be supported by at least three (3) academic (Journal/Conference) papers chosen from the current state of the art.

    Your discussion should include:

    1. Healthcare network architecture (consider networking devices such as routers,

      switches, firewalls, servers etc.)

    2. Recent developments in healthcare networks
    3. The importance of security in healthcare networks
  2. Analyse critically, three current or possible future potential security issues in Healthcare Networks.

    In this section you will analyse critically, three security issues in Healthcare Networks. These issues should be taken from the current state of the art literature. This section must be supported by at least three (3) references.

  3. Propose a possible solution for one of the threats identified in section-2.

    In this part you need to choose one of the issues identified in the previous section and propose a possible solution to the particular security issue.

  4. Create a 3 – 5 minutes presentation and present your work during the Lab.

    You have to create a 3 – 5 minutes presentation to present your work in front of your class fellows and tutor during the Lab in Week 11.

Prepared by: Dr Wanod Kumar Moderated by: Dr Tony Jan August, 2018

Unit Code: MN502 Unit Name: Overview of Network Security Page#3 of 4

[1] Cisco Healthcare Security Perspectives: Protect Your Patients, Your Practice, Yourself. [Online]. Available:

https://www.cisco.com/c/dam/global/en_ca/solutions/strategy/healthcare/assets/docs/health _security_impgd.pdf, accessed July 25, 2018.

Submission Guidelines
The assignment should be submitted on the Moodle in two separate files:

  1. The report should be submitted as a Word file
  2. The presentation should be submitted as a PPT file

Marking criteria:

Section to be included in the report

Description of the section

Marks

Introduction

Introduction of Healthcare Networks. Introduction should also discusses the report outline.

5

Literature Review

Literature review of Healthcare Networks

  •   Healthcare network architecture (consider

    networking devices such routers, switches,

    firewalls, servers etc.)

  •   Recent developments in healthcare networks
  •   The importance of security in healthcare networks

15

Analyse Critically

Analyse critically, three potential security issues in Healthcare Networks.

12

Threat Mitigation Technique

Discuss in detail a threat mitigation technique for one of the security threat

10

Report layout

The report layout should be appropriate (following the submission guidelines and containing all the sections mentioned above)

3

Reference Style

Follow IEEE reference style

5

Presentation Slides

The presentation slides should be well organised and clear.

5

Oral Presentation

Delivery of the presentation (quality of the presentation, depth of knowledge on the material presented and ability to answer questions asked by the audience)

5

Total

60

Prepared by: Dr Wanod Kumar Moderated by: Dr Tony Jan August, 2018

Unit Code: MN502 Unit Name: Overview of Network Security

Page#4 of 4

Marking Rubric for Assignment #2: Total Marks 60

Grade Mark

HD 80%

D 70%-79%

CR 60%-69%

P 50%-59%

Excellent

Very Good

Good

Satisfactory

Introduction /5

Introduction is very well written and the report outline is also discussed

Introduction is well written and the report outline is also discussed

Introduction is generally presented along with the report outline

Introduction is presented briefly and is missing the report outline

Literature review /15

Excellent literature review with proper referencing

Well written literature review presented with correct references

Good literature review presented with references

Brief literature review with proper referencing

Analyse critically /12

Exceptional discussion on security issues in healthcare networks. Identifying highly sophisticated and well referenced vulnerabilities

Exceptional discussion on security issues in healthcare networks.

Good Discussion on three security issues

Discussion on Two security issues

Threat Mitigation Technique

/10

A very clear and in-depth discussion about threat mitigation technique

Very clear discussion about threat mitigation technique

Generally good discussion threat mitigation technique

Brief discussion about threat mitigation technique

Report Layout /3

Well-designed layout and proper formatting following the submission guidelines and containing all the sections

Well-designed layout following the submission guidelines and containing all the sections

Good layout following the submission guidelines and containing all the sections

Report layout following the submission guidelines and missing some sections

Reference Style /5

Clear styles with excellent source of references

Clear referencing style

Generally good referencing style

Sometimes clear referencing style

Presentation slides

/5

Well organised and resourceful

Organised and resourceful

Resourceful but could be better organised

Resourceful slides

Oral Presentation

/5

Good delivery, easy to follow and good interaction

Delivered, easy to follow and provided a level of interaction

Delivered and provided a level of interaction

Delivered

Fail <50%

Unsatisfactory

Poor Introduction with irrelevant details

Poorly written literature review

Unable to identify security issues

Poor discussion about threat mitigation technique with irrelevant information

Report lacks a proper layout

Lacks consistency with many errors

Neither resourceful nor well organised

No oral presentation

Prepared by: Dr Wanod Kumar

Moderated by: Dr Tony Jan

August, 2018