Need Solution - Download from here

    HI6044 – Exam
    Computer Network Security
    final assessment

    Trimester 1, 2022

    Assessment Weight:   40 total marks


    • All questions must be answered by using the answer boxes provided in this paper.
    • Completed answers must be submitted to Blackboard by the published due date and time.

    Please ensure you follow the submission instructions at the end of this paper.


    This assessment consists of six (6) questions and is designed to assess your level of knowledge of the key topics covered in this unit.

    Question 1                                                                                                              (5 marks)

    For asymmetric cryptography, if a sender wants to send an encrypted message to a recipients, what type of (which and whose) key should be used?.

    ANSWER:  ** Answer box will enlarge as you type 

    Question 2   Case Study                                      (3*5= 15 marks)

    “It’s Late” is a regional coffee shop that serves “quick, casual food” such as sandwiches, soups, and salads. Each location also provides free wireless LAN access to its customers. Recently one of the location’s networks was successfully attacked and personal customer information was stolen, such as names, email addresses, birthdates, and similar information. It was found that the attack was a password attack and as a consequence the attacker broke into a manager’s account and got all the information.

    [Source:  M. Ciampa, Security+ Guide to Network Security Fundamentals, 5th ed. Cengage, 2018.]


    Answer the following questions for the above case study:

    1. Identify the possible reasons behind this attack for being successful.

    ANSWER a): 

    1. Propose your suggestion to the manager as defence mechanism for password attack to avoid future attack.

    ANSWER b): 

    1. After this attack the management is considering to use different type of authentication mechanism (instead of password authentication). Propose two possible alternates of password authentication and justify your answer for suitability in the above mentioned scenario.

    ANSWER c):

    Question 3                                                                                                              (5 marks)

    Explain how risk is assessed based on the likelihood of adverse events and the effects on information assets when events occur.


    Question 4                                                                                                              (5 marks)

    Explain the benefit of using the Network Intrusion Detection System (NIDS) over Host Intrusion Detection System (HIDS) deployment models.


    Question 5                                                                                                              (5 marks)

    Explain in detail with examples when you need to use inbound and outbound firewall rules.


    Question 6                                                      (5 marks)

    Analyse figure 1 and explain how Demilitarised Zone (DMZ) is improving the network security in the diagram below.

    Figure 1: DMZ with a firewall



    Submission instructions:

    • Save submission with your STUDENT ID NUMBER and UNIT CODEg. AAZ1234 HI6044
    • Submission must be in MICROSOFT WORD format only
    • Upload your submission to the appropriate link on Blackboard
    • You have two attempts to submit your assessment with only the final submission being marked.
      Please ensure your submission is the correct document as special consideration is not given if you make a mistake.
    • All submissions are automatically passed through SafeAssign to assess academic integrity.
    By |2023-01-11T12:01:53+00:00October 1st, 2022|Categories: computer science|0 Comments

    Leave A Comment