Assessment Details and Submission Guidelines |
|
Trimester |
2, 2018 |
Unit Code |
MN502 |
Unit Title |
Overview of Network Security |
Assessment Type |
Individual Assignment (Assignment Two) |
Assessment Title |
Security Challenges in Emerging Networks |
Purpose of the assessment (with ULO Mapping) |
The purpose of this assignment is to develop skills to independently think of innovation. Students will be able to complete the following ULOs: c. Explain the major methodologies for secure networks and what threats they address; |
Weight |
20% |
Total Marks |
60 |
Word limit |
1500 – 2000 |
Due Date |
11:55PM, Friday 28/09/2018 |
Submission Guidelines |
|
Extension |
If an extension of time to submit work is required, a Special Consideration Application must be submitted directly to the School’s Administration Officer, in Melbourne on Level 6 or in Sydney on Level 7. You must submit this application three working days prior to the due date of the assignment. Further information is available at: http://www.mit.edu.au/about-mit/institute-publications/policies- procedures-and-guidelines/specialconsiderationdeferment |
Academic Misconduct |
Academic Misconduct is a serious offence. Depending on the seriousness of the case, penalties can vary from a written warning or zero marks to exclusion from the course or rescinding the degree. Students should make themselves familiar with the full policy and procedure available at: http://www.mit.edu.au/about-mit/institute-publications/policies- procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy- Procedure. For further information, please refer to the Academic Integrity Section in your Unit Description. |
Prepared by: Dr Wanod Kumar Moderated by: Dr Tony Jan August, 2018
Unit Code: MN502 Unit Name: Overview of Network Security Page#2 of 4
Assignment Description
The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowledge based on current state of the art of an emerging knowledge domain. Then they will learn how to identify plausible security issues in this emerging network-based applications, and finally learn the skill of adding knowledge to existing domain by theoretically developing the corresponding protection mechanism for a particular issue.
The use of network technologies is rapidly growing in healthcare sector. Now, healthcare is considered as one of the emerging application of network-based applications. Different network scenarios using wireless, wired, and mobile communications can provide efficient solutions to access electronic medical records (EMRs), medical management systems, imaging, biomedical information, material management, patient accounting, admitting information, and online claims submissions. Today, healthcare systems can combine these tools into one network-based infrastructure to more effectively communicate and collaborate, reduce errors, and improve patient care and efficiency. As healthcare providers adopt new technologies, they also face new security threats. Hackers, malicious software (malware), disgruntled employees, and human error present real dangers to healthcare networks [1]. Security of healthcare networks is a prime concern in today’s World.
This assignment includes four parts
- Literature review on Healthcare Networks.
The literature review should be supported by at least three (3) academic (Journal/Conference) papers chosen from the current state of the art.
Your discussion should include:
- Healthcare network architecture (consider networking devices such as routers,
switches, firewalls, servers etc.)
- Recent developments in healthcare networks
- The importance of security in healthcare networks
- Healthcare network architecture (consider networking devices such as routers,
- Analyse critically, three current or possible future potential security issues in Healthcare Networks.
In this section you will analyse critically, three security issues in Healthcare Networks. These issues should be taken from the current state of the art literature. This section must be supported by at least three (3) references.
- Propose a possible solution for one of the threats identified in section-2.
In this part you need to choose one of the issues identified in the previous section and propose a possible solution to the particular security issue.
- Create a 3 – 5 minutes presentation and present your work during the Lab.
You have to create a 3 – 5 minutes presentation to present your work in front of your class fellows and tutor during the Lab in Week 11.
Prepared by: Dr Wanod Kumar Moderated by: Dr Tony Jan August, 2018
Unit Code: MN502 Unit Name: Overview of Network Security Page#3 of 4
[1] Cisco Healthcare Security Perspectives: Protect Your Patients, Your Practice, Yourself. [Online]. Available:
https://www.cisco.com/c/dam/global/en_ca/solutions/strategy/healthcare/assets/docs/health _security_impgd.pdf, accessed July 25, 2018.
Submission Guidelines
The assignment should be submitted on the Moodle in two separate files:
- The report should be submitted as a Word file
- The presentation should be submitted as a PPT file
Marking criteria:
Section to be included in the report |
Description of the section |
Marks |
Introduction |
Introduction of Healthcare Networks. Introduction should also discusses the report outline. |
5 |
Literature Review |
Literature review of Healthcare Networks
|
15 |
Analyse Critically |
Analyse critically, three potential security issues in Healthcare Networks. |
12 |
Threat Mitigation Technique |
Discuss in detail a threat mitigation technique for one of the security threat |
10 |
Report layout |
The report layout should be appropriate (following the submission guidelines and containing all the sections mentioned above) |
3 |
Reference Style |
Follow IEEE reference style |
5 |
Presentation Slides |
The presentation slides should be well organised and clear. |
5 |
Oral Presentation |
Delivery of the presentation (quality of the presentation, depth of knowledge on the material presented and ability to answer questions asked by the audience) |
5 |
Total |
60 |
Prepared by: Dr Wanod Kumar Moderated by: Dr Tony Jan August, 2018
Unit Code: MN502 Unit Name: Overview of Network Security
Page#4 of 4
Marking Rubric for Assignment #2: Total Marks 60
Grade Mark |
HD 80% |
D 70%-79% |
CR 60%-69% |
P 50%-59% |
Excellent |
Very Good |
Good |
Satisfactory |
|
Introduction /5 |
Introduction is very well written and the report outline is also discussed |
Introduction is well written and the report outline is also discussed |
Introduction is generally presented along with the report outline |
Introduction is presented briefly and is missing the report outline |
Literature review /15 |
Excellent literature review with proper referencing |
Well written literature review presented with correct references |
Good literature review presented with references |
Brief literature review with proper referencing |
Analyse critically /12 |
Exceptional discussion on security issues in healthcare networks. Identifying highly sophisticated and well referenced vulnerabilities |
Exceptional discussion on security issues in healthcare networks. |
Good Discussion on three security issues |
Discussion on Two security issues |
Threat Mitigation Technique /10 |
A very clear and in-depth discussion about threat mitigation technique |
Very clear discussion about threat mitigation technique |
Generally good discussion threat mitigation technique |
Brief discussion about threat mitigation technique |
Report Layout /3 |
Well-designed layout and proper formatting following the submission guidelines and containing all the sections |
Well-designed layout following the submission guidelines and containing all the sections |
Good layout following the submission guidelines and containing all the sections |
Report layout following the submission guidelines and missing some sections |
Reference Style /5 |
Clear styles with excellent source of references |
Clear referencing style |
Generally good referencing style |
Sometimes clear referencing style |
Presentation slides /5 |
Well organised and resourceful |
Organised and resourceful |
Resourceful but could be better organised |
Resourceful slides |
Oral Presentation /5 |
Good delivery, easy to follow and good interaction |
Delivered, easy to follow and provided a level of interaction |
Delivered and provided a level of interaction |
Delivered |
Fail <50%
Unsatisfactory
Poor Introduction with irrelevant details
Poorly written literature review
Unable to identify security issues
Poor discussion about threat mitigation technique with irrelevant information
Report lacks a proper layout
Lacks consistency with many errors
Neither resourceful nor well organised
No oral presentation
Prepared by: Dr Wanod Kumar
Moderated by: Dr Tony Jan
August, 2018