+1-617-874-1011 (US)
+44-117-230-1145 (UK)
+61-7-5641-0117 (AU)

Network Security and Mitigation Strategies

Assessment Instructions


The purpose of this assessment task is to apply the student’s understanding and knowledge gained from the weekly content in articulating and writing a report that:

  1. analyses contemporary network security issues and develops appropriate mitigation strategies, and
  2. evaluates a contemporary network for vulnerabilities.


Internet of Things (IoT) devices can be used to sense and share data from its surrounding environment for various purposes that can be useful for both humans and machines. These can be as simple as measuring the temperature of a room or more critical tasks such as monitoring the heart-rate of a sick patient in a hospital. The advances in hardware design, communication protocols, and computing technologies have created an ecosystem of a variety of IoT devices by numerous vendors and underlying infrastructure.

The network diagram provided (FIgure 1- see below) illustrates the various IoT devices integrated in a medium sized organisation’s IT network. Table 1 (see below) provides detailed specifications of the devices including hardware, software, and firmware details. Although the network is already secured with various defences, there are several problems that can lead to the organisation being compromised by cyber criminals.


You have been hired as an external cyber security consultant to analyse the network for security issues and recommend solutions to mitigate these risks in the form of a technical report. The report is intended to be submitted to the management committee of the organisation. Therefore, highly technical concepts must be further described to a level understood by a novice audience.

Your report should consist of the following:

  1. Identify and contextualise two (2) security issues related to the IoT devices and two (2) security issues related to the IT infrastructure. You may consider aspects related to hardware, software, firmware, and protocols.
  2. Further support the above security issues by describing an actual attack that has occurred for both IoT and IT.
  3. Explain two vulnerabilities including the CVE that exist in this organisation.
  4. Propose and justify solutions to address the issues that you have identified in the task (1).

Please note that discussions related to security policies are beyond the scope of this assessment and therefore should be excluded from your report.

Marking Criteria

Each of the following criteria are worth 8 marks, with a total of 40 marks for the whole assessment.

  1. Identification of security issues (two for IoT and two for IT)
  2. Actual attacks described for IoT and IT
  3. Two vulnerabilities/CVE explained
  4. Solutions proposed and justified to address the four security issues identified
  5. Quality of report based on sources and referencing, depth of research, critique, and writing


  1. PDF/SVG/draw.io File
  2. Report Network Security and Mitigation Strategies

The above diagram has been created using draw.io for broader compatibility instead of Visio. You can download the file in various formats as indicated below.

Table 1:

Cisco ASA 5585-X

Used as the edge firewall for the organisation.

Last software/firmware update unknown.

Netgear GS116PP-100AJSUnmanaged network switch.
Linksys WRT1900ACWireless router using WEP shared key authentication.
Wireless Temperature Sensor
Custom built temperature sensor.
Waterproof DS18B20 Digital temperature sensor connected to an ESP8266 board.
Using MQTT to communicate to an Ubuntu desktop installed in LAN1.
File ServerWindows Server 2016
Directory ServerWindows Server 2016
Proxy Server
Ubuntu Server 16.04 LTS
Squid proxy
Mail Server
Ubuntu Server 16.04 LTS
Postfix 3.2
SquirrelMail 1.4.23
Apache 2
Various Desktop configurations
9 x Windows 10 PCs
1 x Ubuntu Desktop 18.10 running the MQTT broker software for the temperature sensor
Various Desktop configurations
15 x Windows 10 PCs
Perdisco Assignment Help


The report should be properly word processed and formatted accordingly to a professional standard and suitable to the target audience. As a minimum, the report should have the following sections. You may add sub-headings or other content as required.

  • Cover Page
  • Table of Contents
  • Introduction
  • Security Issues
  • Attack Scenarios
  • Vulnerabilities
  • Proposed Countermeasure(s)/Solution(s)
  • References
  • Appendices (as needed)
Network Security and Mitigation Strategies, Networking Assignment Help, Networking Homework Help, Networking Management Assignment Help
Simple Calculator
Scientific Calculator
EMI Calculator
Mortgage Calculator
Love Calculator
Percentage Calculator
Currency Calculator
Units Converter
Graph Calculator
Financial Lease Calculator
Temperature Converter
24 x 7 Availability.
Trained and Certified Experts.
Deadline Guaranteed.
Plagiarism Free.
Privacy Guaranteed.
Free download.
Online help for all project.

Urgenthomework helped me with finance homework problems and taught math portion of my course as well. Initially, I used a tutor that taught me math course I felt that as if I was not getting the help I needed. With the help of Urgenthomework, I got precisely where I was weak:


  Urgent HomeWork

Disclaimer: The study tools and academic assistance/guidance through online tutoring sessions provided by Urgenthomework.com is to help and enable students to compete academically. The website does not provide ghostwriting services and has ZERO TOLERANCE towards misuse of the services. In case any user is found misusing our services, the user's account will be immediately terminated.
Copyright © 2009-2022 UrgentHomework.com, All right reserved.