HI6044 COMPUTER NETWORK SECURITY FINAL ASSESSMENT - Exam
HI6044 - Exam
Computer Network Security
Trimester 1, 2022
Assessment Weight: 40 total marks
All questions must be answered by using the answer boxes provided in this paper.
Completed answers must be submitted to Blackboard by the published due date and time.
Please ensure you follow the submission instructions at the end of this paper.
This assessment consists of six (6) questions and is designed to assess your level of knowledge of the key topics covered in this unit.
Question 1 (5 marks)
For asymmetric cryptography, if a sender wants to send an encrypted message to a recipients, what type of (which and whose) key should be used?.
ANSWER: ** Answer box will enlarge as you type
Question 2 Case Study (3*5= 15 marks)
“It’s Late” is a regional coffee shop that serves “quick, casual food” such as sandwiches, soups, and salads. Each location also provides free wireless LAN access to its customers. Recently one of the location’s networks was successfully attacked and personal customer information was stolen, such as names, email addresses, birthdates, and similar information. It was found that the attack was a password attack and as a consequence the attacker broke into a manager’s account and got all the information.
[Source: M. Ciampa, Security+ Guide to Network Security Fundamentals, 5th ed. Cengage, 2018.]
Answer the following questions for the above case study:
Identify the possible reasons behind this attack for being successful.
Propose your suggestion to the manager as defence mechanism for password attack to avoid future attack.
After this attack the management is considering to use different type of authentication mechanism (instead of password authentication). Propose two possible alternates of password authentication and justify your answer for suitability in the above mentioned scenario.
Question 3 (5 marks)
Explain how risk is assessed based on the likelihood of adverse events and the effects on information assets when events occur.
Question 4 (5 marks)
Explain the benefit of using the Network Intrusion Detection System (NIDS) over Host Intrusion Detection System (HIDS) deployment models.
Question 5 (5 marks)
Explain in detail with examples when you need to use inbound and outbound firewall rules.
Question 6 (5 marks)
Analyse figure 1 and explain how Demilitarised Zone (DMZ) is improving the network security in the diagram below.
Figure 1: DMZ with a firewall
END OF FINAL ASSESSMENT
Save submission with your STUDENT ID NUMBER and UNIT CODEg. AAZ1234 HI6044
Submission must be in MICROSOFT WORD format only
Upload your submission to the appropriate link on Blackboard
You have two attempts to submit your assessment with only the final submission being marked.
Please ensure your submission is the correct document as special consideration is not given if you make a mistake.
All submissions are automatically passed through SafeAssign to assess academic integrity.