COMP1321 Digital Infrastructure– ass2
Assessment 2 / Practical Assignment/ReportWord Limit or equivalent (e.g. time) / 3000
Weighting / 50%
Learning Outcomes Assessed / 4. Apply networking principles to provide connectivity between digital devices on a range of platforms that can be used for sharing data and control of processes
5. Use penetration testing software, in accordance with relevant standards and legislation, to identify vulnerabilities in a digital network
Submission date / 9th May 2018
Feedback date / 7th June 2018
Module Leader / Richard Henson
Verified by / Oran Devilly
Contents
What you need to do
How you should present your work
How we’ll give you guidance
How and when to hand the assessment in
How the assessment will be marked
How you will get feedback
If you have problems submitting work or submitting work on time
If you are ill or have personal problems
If you engage in academic misconduct (cheating)
If you don’t pass at the first attempt
Grading Matrix
If anything about this assignment is not clear to you, please contact the module leader.
You are expected to plan your time and work to manage your overall assessment workload.
What you need to do
/ You have been appointed as the network manager for a start-up company, Buynow, a general on-line retailer specializing in digital appliances. Buynow have had a very good year, with turnover exceeding their expectations in difficult economic times. The management is aware that they need to expand their infrastructure beyond their current desktop machine, 2 laptops, smartphone and wireless router for connectivity to a more permanent presence in a factory unit with good broadband links.Buynow are taking on additional staff and want to upgrade to a “proper” network with six desktop and laptop computers, but already have security concerns about their confidential client data being potentially available to the Internet. The recent high profile breaches reported in the media have alarmed them, and they are prepared to make an extra investment in data security.
They have decided that a cabled internal infrastructure to connect devices, with access controlled by active directory, presents the best way to achieve their flexibility and security objectives. However, they are looking for advice on how best to administer their network so appropriate access is allowed to employees, partners, and customers, and how best to test the security of the completed infrastructure.
Assignment task(s)
With regard to the scenario above, this assignment requires you to:- Explain how Buynow’s current IT arrangement could run an online business.
- Explain with diagrams how Buynow’s current peer-peer network of 3 machines plus smartphone could become a client-server network with controlled access to the Internet.
- What software would be needed to achieve a client-server network, and how could installation and connectivity be achieved and tested?
- Explain how Buynow could use the network software to allow different levels of access to different employees, to assist in the keeping of sensitive company data confidential.
- To ensure integrity of their network, Buynow could employ a penetration tester to see how well their internet router/firewall is configured, and their network is protected against external threats. Explain how penetration testing works, and the differences between “passive” and “active” vulnerability testing.
- Buynow would also like the smartphone to participate as a client in the client-server network. Use diagrams to help your explanation as to how best this could be achieved.
Assessment criteria
In addition to the general points that apply to all assessed work as outlined in the Course Handbook, the following specific criteria will be used for this work:- Explanation how a computer could manage the data requirements of shopping online
- Explanation of the components and device management of a client-server network
- Explanation of how active directory can be installed and configured to run a client-server network
- Explanation of why penetration testing is often considered essential nowadays for businesses with personal and financial data, and the ethics involved with such practices
- Explanation of how secure wireless client-server networking can be achieved in practice
- Referencing, using the Harvard system (see the link to ‘Referencing’ from for more information.)
How you should present your work
Report Template / On the title page list the following:Module name and code
Student number
Submission date
Assignment Number/Title
Rest of assignment:
Grading Matrix
Table of Contents
Introduction
Body
Conclusion
References (use the University Harvard referencing system, support is available through the library
How we’ll give you guidance
/ You will receive detailed information about how to approach this assignment in session 16 from the module weekly schedule (see module outline). In addition to this, you can hand in a sample of up to 20% of your assignment as a practice, to be marked as formative assessment. A blackboard “drop box” will be available for you to do this, but there will be a cut-off point 10 days before actual hand-in date, so arrange your time carefully and don’t miss out.If you want to check if your work will fall foul of plagiarism (copying someone else’s work without an appropriate attribution) check out this library guide for support
How and when to hand the assessment in
/ Work must be word-processed/typed and should clearly show your student number.You are required to keep a copy of work handed in. You should submit your work by the 3pm deadline on9th May 2018. You should submit your work to SOLE, which is available via your student portal.See the University’s guide to uploading and submitting assessment items at the University of Worcester via SOLE in under 60 seconds on You Tube
If you have issues uploading your assessment to sole you will need to contact
How the assessment will be marked
/ Specific criteria are in the Grading Matrix for this assignment, which can be found on page 6You should also ensure you adhere to the word limit / word count stated in your assessment brief document, details of which can be found in the University’s Assessment Policy
How you will get feedback
/ Your formative feedback will be available via blackboard, in good time for you to apply any advice given to the writing of your assignment itself. Summative feedback will be provided within four working weeks via your SOLE page.If you have problems submitting work or submitting work on time
/ Firstly, contact someone, your Module Leader or personal Academic Tutor.It is essential that you submit your work, in order to be able to pass the module. Work which is submitted late will be subject to grade penalties as below.
- Students who submit course work late but within 5 days of the due date will have work marked, but the grade will be capped at the minimum pass grade unless an application for mitigating circumstances is accepted.
- Students who submit work later than 5 days but within 14 days of the due date will not have work marked unless they have submitted a valid claim of mitigating circumstances.
If you are ill or have personal problems
/ The University has a system for applying for mitigating circumstances where things happen, beyond your control, which affect your assessments. Don’t suffer in silence. Speak to your Module Leader, your Personal Academic Tutor or a Programme Advisor.Full details of Procedures for Dealing with Exceptional Mitigating Circumstances are available at
If you engage in academic misconduct (cheating)
/ Do not use material from sources without acknowledging them using a recognised referencing system. Do not copy another student’s work. If you do you will be referred to the School’s Academic Integrity Tutor and may face further penalties. Details in your Course Handbook accessible via SOLE and at llegedacademicmisconduct.pdfIf you don’t pass at the first attempt
/ DON’T PANIC. In the event you are required to take reassessment you will receive formal notification of this via a letter from Registry Services posted on the SOLE page after the meeting of the Board of Examiners. The letter will normally include a copy of the reassessment task(s). Deadlines for re-assessment can be found in the University Calendar at1
COMP1321 assignment 2
Grading Matrix
This matrix captures the assessment criteria for this part of the coursework.
Student Number: / Academic Year and Semester:2017-18, 1-2 / Learning Outcomes:- Apply networking principles to provide connectivity between digital devices on a range of platforms that can be used for sharing data and control of processes
- Use penetration testing software, in accordance with relevant standards and legislation, to identify vulnerabilities in a digital network
Module Code/Title:COMP1321 Digital Infrastructures / Assignment No/Weighting:
2, 50%
Occurrence: / Assessment Title:Report on infrastructure expansion for a real business scenario
Assessment Criteria
GRADE / Explanation how a computer could manage the data requirements of shopping online / Explanation of the components and device management of a client-server network / Explanation of how active directory can be installed and configured to run a client-server network / Explanation of why penetration testing is often considered essential for businesses with personal/financial data; ethics involved with such practices / Explanation of how secure wireless client-server networking can be achieved in practice / Referencing, using the Harvard system
A / With diagrams, clearly explain client-server networking and explain explicitly how data, including transaction data can be captured on a local computer and sent to remote servers so the local user can safely and securely buy things / List all the relevant components of a secure client-server application, and explain how each component works with the aid of diagrams / Full explanation, with diagrams, and explaining all terms used, how a domain, client-server user authentication and a web server can be used together to manage private transactions across networks. / Full explanation, with diagrams, of internal and external network, and an explanation of named techniques that can be used to find out how information about an organisation, and which are legal/illegal, ethical/unethical / With diagrams, a detailed explanation of client-server networking using wireless media, including a detailed explanation of each of the components needed to complete the system / Typically, at least six relevant, and mostly up-to-date references should be included, and cited appropriately
B / With diagrams, explain client-server networking and how data can be captured on a local computer and sent to remote servers so the local user can buy things / List all the relevant components of client-server networking, and explain how they work with the aid of diagrams / Explanation, with diagrams, of how a domain, client-server user authentication and a web server can be used to manage transactions. / Explanation, with diagrams, of internal and external network, and the various techniques that can be used to find out how information about an organisation, and which are legal/illegal, ethical/unethical / A detailed and illustrated explanation of client-server networking using wireless media, including a detailed explanation of each of the components needed to complete the system / Typically, at least four relevant and mostly up-to-date references should be included, and cited appropriately.
C / Describe client-server networking and explain how data can be captured on a local computer and sent to remote servers so the local user can buy things / List the most important components of client-server networking, and explain how they work with the aid of diagrams / Description of a domain, client-server authentication and a web server, and explanation how they can be used to manage financial transactions. / Description of internal and external network, and of the various techniques that can be used to find out how information about an organisation, and some indication which are legal/illegal, ethical/unethical / An illustrated description of client-server networking using wireless media, including some explanation of each of the components needed to complete the system / Fewer than four relevant and up-to-date references, cited appropriately.
D / Describe client-server networking and how data can be captured on a local computer and sent to remote servers so the local user can buy things / List components for client-server networking, and explain how each works with the aid of diagrams / Description of a domain, client-server authentication and a web server, and description how they can be used to manage financial transactions. / Description of internal and external network, and of some techniques that can be used to find out how information about an organisation, including something about whether legal/illegal, ethical/unethical / A description of client-server networking using wireless media, and a description of the components needed to complete the system / Some referencing in use, but no Harvard and not appropriately cited.
Fail (E-G) / Superficial descriptions of client-server networking and data capture and sending data through the Internet / List some components, and describe how they work in superficial terms / Superficial descriptions of domain, client-server authentication and unclear on how they are used to manage financial transactions. / Superficial description of internal and external network, and an insufficient description of tools available and whether legal/illegal, ethical/unethical / A superficial description of client-server networking using wireless media, and a description of some components used in a wireless networking system / Shows a lack of understanding of the purpose of referencing and makes no attempt to use any time of end-of-document linking to external sources
General comment:
What you can do better in future assignments:
How successful completion of this assignment helps your employability:
Marker: R. Henson / Moderator*: O. Devilly
* This person is responsible for moderating a sample of student work for this module. Your work may, or may not, have been included in this sample
RESULTS ARE PROVISIONAL UNTIL AGREED BY THE BOARD OF EXAMINERS
1