Assessment Brief
Qualification BTEC Level 5 HND Diploma in Computing
Unit number Unit 5: Security
Assignment title Security Presentation
Academic Year 2020
Unit Tutor
Issue date Submission date
IV name and date Khoa Canh Nguyen, Michael Omar, Nhung 9th/01/2020
Submission Format
The submission is in the form of two documents/files:
1. A ten-minute Microsoft® PowerPoint® style presentation to be presented to your colleagues.
The presentation can include links to performance data with additional speaker notes and a
bibliography using the Harvard referencing system. The presentation slides for the
findings should be submitted with speaker notes as one copy.
2. A detailed report that provides more thorough, evaluated or critically reviewed technical
information on all of the topics.
You are required to make use of the font Calibri, Font size 12, Line spacing 1.5, Headings, Paragraphs, Subsections
and illustrations as appropriate, and all work must be supported with research and referenced using the Harvard
referencing system.
Unit Learning Outcomes
LO1 Assess risks to IT security.
LO2 Describe IT security solutions.
Assignment Brief and Guidance
You work as a trainee IT Security Specialist for a leading Security consultancy in Vietnam called FPT
Information security FIS.
FIS works with medium sized companies in Vietnam, advising and implementing technical solutions to
potential IT security risks. Most customers have outsourced their security concerns due to lacking the
technical expertise in house. As part of your role, your manager Jonson has asked you to create an engaging
presentation to help train junior staff members on the tools and techniques associated with identifying and
assessing IT security risks together with the organizational policies to protect business critical data and
equipment.
In addition to your presentation you should also provide a detailed report containing a technical review of the
topics covered in the presentation.
Your presentation should:
1. Identify the security threats FIS secure may face if they have a security breach. Give an example of
a recently publicized security breach and discuss its consequences
2. Describe a variety of organizational procedures an organization can set up to reduce the effects to
the business of a security breach.
3. Propose a method that FIS can use to prioritize the management of different types of risk
4. Discuss three benefits to FIS of implementing network monitoring system giving suitable reasons.
5. Investigate network security, identifying issues with firewalls and IDS incorrect configuration and
show through examples how different techniques can be implemented to improve network
security.
6. Investigate a ‘trusted network’ and through an analysis of positive and negative issues determine
how it can be part of a security system used by FIS.
Your detailed report should include a summary of your presentation as well as additional, evaluated or
critically reviewed technical notes on all of the expected topics.
Learning Outcomes and Assessment Criteria
Pass Merit Distinction
LO1 Assess risks to IT security
P1 Identify types of security threat to M1 Propose a method to LO1 & 2
organisations. assess and treat IT security D1 Investigate how a ‘trusted
Give an example of a recently publicized risks. network’ may be part of an
security breach and discuss its IT security solution.
consequences.
P2 Describe at least 3 organisational
security procedures.
LO2 Describe IT security solutions
P3 Identify the potential impact to IT M2 Discuss three benefits to
security of incorrect configuration of implement network
firewall policies and IDS. monitoring systems with
supporting reasons.
P4 Show, using an example for each,
how implementing a DMZ, static IP
and NAT in a network can improve
Network Security.