Reference no: EM132987043 , Length: word count:600
SIT716 COMPUTER NETWORKS AND SECURITY
Learning Outcome 1: You will be required to explain the architecture and operation of computer networks, security attacks, and defensive measures.
Learning Outcome 2: You will be required to explain normal and abnormal behaviour of network protocols.
Learning Outcome 3: You will be required to explain how cybersecurity activity can be identified.
Assessment: Bi-weekly Report
PURPOSE
Short answer questions to assess and reinforce learning of the concepts of Weeks 7-8 by exploring firewalls and VPNs for securing networks, and SNMP and IPFIX for identifying cybersecurity attacks.
TASKS
i. Consider a scenario where you are working for a Small-Medium Enterprise (SME) and business which wishes to improve its security capability by installing a single firewall or router to fully protect both the infrastructure and data stored on-premises and at the location of the online shopping site. Explain why a single firewall in this configuration will not fully secure the network and briefly describe an example of an attack that could succeed.
ii. The SNMP and IPFIX (a modern NetFlow standard) protocols and associated systems provide important telemetry data that can be used to identify potential cybersecurity attacks occurring on a network. Explain the differences between SNMP and IPFIX and give an example of data obtained from these systems (one example each) that might identify an anomaly that could be a sign of an active security attack and explain how such anomalous data could indicate that the identified attack is active.
Attachment:- COMPUTER NETWORKS AND SECURITY.rar