$20 Bonus + 25% OFF
Securing Higher Grades Costing Your Pocket? Book Your Assignment at The Lowest Price Now!
Add File

Error goes here

CIS119 Systems And Network Security

tag 0 Download25 Pages / 6,250 Words tag Add in library Click this icon and make it bookmark in your library to refer it later. GOT IT
  • Course Code: CIS119
  • University: University Of Bedfordshire
  • Country: United Kingdom


Please note: Work presented in an assessment must be the student's own. Plagiarism is where a student copies work from another source, published or unpublished (including the work of a fellow student) and fails to acknowledge the influence of another's work or to attribute quotes to the author. Plagiarism is an academic offence.Work presented in an assessment must be your own and must not be submitted as part of another unit’s assessment. Plagiarism is where a student copies work from another source, published or unpublished (including the work of another student) and fails to acknowledge the influence of another’s work or to attribute quotes to the author. Plagiarism is an academic offence and the penalty can be serious. Self-plagiarism, or duplication, is the act of using your own work that is submitted for more than one assessment.
The University’s policies relating to Plagiarism and Self-plagiarism can be found in the regulations at To detect possible plagiarism we may submit your work to the national plagiarism detection facility. This searches the Internet and an extensive database of reference material including other students’ work to identify. Once your work has been submitted to the detection service it will be stored electronically in a database and compared against work submitted from this and other universities. It will therefore be necessary to take electronic copies of your materials for transmission, storage and comparison purposes and for the operational back-up process. This material will be stored in this manner indefinitely.

All assignments must be electronically submitted via BREO by 10:00 am on the due date. Please leave sufficient time to meet this deadline and do not leave the handing-in of assignments to the last minute. You need to allow time for any system problems or other issues. Do not include this page and the following ones in your submission Referral Assignment You are required to address the issues identified in the comments of your markers on BREO and their
feedback to complete this assessment to a passable grade.

Rationale and Learning Outcomes The case study is an individual piece of coursework.In this assessment, you will be able to evidence in-depth working knowledge of computer and network security, security threats and mitigations, ethical and legal aspects, and disaster recovery planning. This will be demonstrated by responding to the following case study and the consequent tasks as part of an individual report. The assignment aims to test your ability to apply, analyse, evaluate and criticise existing methods and tools in the domain of computer and network security and present
business solutions.
Assessment Specifications
Report Word Count 5000 words (excl. references, appendices and Tables) with a single file submitted electronically with your student details on the front cover.Font Type and Size Arial 11pts – Single spacing Referencing Style Harvard

You are asked to study a small private microbiology laboratory that is located in Luton and collaborates with 2 big hospitals. The examinations performed are ordered either by a registered GP (in which case the patient needs to have a referral in order for the tests to be paid), or privately (in which case the patient pays himself, in cash).The laboratory consists of 8 employees:
• 2 secretaries, that are responsible for answering phones, making appointments for blood tests and taking payment information from the patients. They are also responsible for posting the results (either using Royal Mail or a courier service).

• 2 GPs, that are responsible for checking the blood test results and making recommendations. • 4 microbiologists that are responsible for processing the blood samples in order to get results.
• Lately, the laboratory’s reputation has spread and it receives a lot of private patients that wish to have check-ups. This has resulted in a great increase in telephone calls, asking to book appointments or get information of alternative methods of paying (for now only cash is accepted).
The laboratory’s computer network consists of 10 PCs on a simple Wi-Fi network:
• Computers 1 and 2 - used by the secretaries to book appointments and hold transaction details.
• Computers 3 and 4 - used by the GPs to access patients’ files, update them adding medication prescriptions and recommendations.
• Computers 5 to 8 - used by the microbiologists to access patients’ files and add the blood test results.
• Computers 9 and 10 - used as a backup solution, to store all patients’ files and transactions,for extra security. These PCs are also connected to the hospital’s network, to exchange patient information.

For security, the company uses AVG free and the default Windows firewall on all machines. The company wishes to create an online prescription request system, in which the patients will be able to access specific parts of their files, order repeat prescriptions and order new tests (e.g. blood tests).You are hired as an IT professional in order to investigate how this can be done, in the most cost effective way. You will also be investigating what damage can be done by losing the patients’ files and also produce a solution to mitigate this damage. In more detail, the company will need:
• An online prescription request system.
• Possibly new hardware and software (Note: the company wants to keep the Microsoft Windows as their client operating system).
• A telephone management system (patients sometimes complain that they are unable to get through because the phones are busy). Also, the laboratory is closed during weekends, but several requests have to be processed. The company wants to include an internal telephone system for internals calls.
• Many new patients come to the laboratory as it was suggested to them by someone they know It would be nice if the laboratory could exploit social media to increase its reputation. Also, the patients could rank the lab, to make it appear higher in search results.

Write a report addressing the following parts and structured as outlined below. Part One – Threats (1500 words max)
A report section explaining the nature of the business and analysing the potential threats that exist and which, you, the IT specialist will have to address (we are mostly interested in network and hosts security threats). The report should  lso focus on the harm that can be caused if the patients’ files cannot be retrieved.Hint: Focus on the ethical issues existing in such a laboratory.
Part Two – Mitigations (1500 words max)
A report section explaining your suggestions for overcoming the security threats that may exist in this scenario. The full security layers should be addressed in your solution. Solutions offered must be both technically and legally possible and acceptable.
Part Three – Evaluation and Conclusions (2000 words max)
Report sections stating your evaluation, conclusions, and recommendations. This Part should be written in a way that would enable an IT Director (or similar role) understand both the issue and be able to implement the plan suggested.
Additional Hints:
1. You may wish to use tools such as Microsoft Visio, LucidChart or Microsoft Threat Modelling Tool to draw a diagram of the network (Cisco Packet Tracer images are not accepted).
2. No requirement for writing detailed policies. Instead, a summary of the policy purpose is enough.
Final Report Structure:
• Title and Introduction 
a) General stuff about the nature of the business (written to meet the needs of the potential end user, IT Director, or similar role – Very brief)
b) Cost benefit analysis (with possible scenarios – minimum 3 scenarios) • The Problem (20 marks)
a) Risks
b) Ethical and Law considerations
• The Solution Suggestions (based on the adopted scenario)
• Conclusion and Evaluation 
a) Short summary of the Disaster Recovery Plan
b) Conclusions
c) Recommendations
Download Sample Now

Earn back the money you have spent on the downloaded sample by uploading a unique assignment/study material/research material you have. After we assess the authenticity of the uploaded content, you will get 100% money back in your wallet within 7 days.

Unique Document

Under Evaluation

Get Money
into Your Wallet

Total 25 pages, 1 USD Per Page

Cite This Work

To export a reference to this article please select a referencing stye below:

My Assignment Help. (2020). Systems And Network Security. Retrieved from

My Assignment Help (2020) Systems And Network Security [Online]. Available from:
[Accessed 25 January 2021].

My Assignment Help. 'Systems And Network Security' (My Assignment Help, 2020) <> accessed 25 January 2021.

My Assignment Help. Systems And Network Security [Internet]. My Assignment Help. 2020 [cited 25 January 2021]. Available from:

For years, has been operating as one of the cheap assignment help providers in the USA. We are one of the best college paper writing services that keep service price minimal. We do not let the affordability of our service to hamper the standard of our work. We have separate teams of experts to provide report writing help . At, we believe in earning credibility, so students can pay for assignments only after getting satisfied solutions. Tough assignments bother you? Trust us with your project. You will not regret paying us to write assignments for you.

Latest Networking Samples

CMP71001 Cyber Security

Download : 0 | Pages : 8
  • Course Code: CMP71001
  • University: Southern Cross University
  • Country: Australia

Answer: Intellectual property may be defined as a commercial product of human intellect, which is valuable either in the abstract or concrete form like a protectable trademark, human intellect or a trade secret (Bently & Sherman, 2014). As per the approach of Berti’s (2009), it can be stated that the intellectual property system is nothing but a crossroads. The developed countries are said to be more associated with the level of enfo...

Read More arrow Tags: Australia Melbourne Management University of Melbourne 

NET220 Computer And Network Security

Download : 0 | Pages : 7
  • Course Code: NET220
  • University: Centennial College
  • Country: Canada

Answer: Threat Category Control Description Classification Type Accidental Corruption of information Proper shut down of the system The proper shut down of the system will help to save the files containing the information in a proper way. administration prevent   Installation of the anti virus. The implementation of the antivirus will protect the data from the a...

Read More arrow

COIT12202 Network Security Concepts

Download : 0 | Pages : 3
  • Course Code: COIT12202
  • University: Central Queensland University
  • Country: Australia

Answers: 1. 1. NAT means network address translation, which practically implies that a router or a firewall is translating addresses that come from the incoming interface, into different addresses flowing from the outgoing interface; conversely, when the response to the traffic comes back, it will re-transform the addresses in the original values. The typical case for NAT is to allow sharing of public IP addresses - which are a scarce resourc...

Read More arrow

MN603 Wireless Networks And Security

Download : 0 | Pages : 8

Answer: Introduction The Long term Evolution (LTE)/ Advanced Long Term Evolution (LTE-A) is a wireless communication standard for mobile devices and data networks. LTE provides high speed connectivity due of its higher bandwidths, superior spectrum efficiency with lower latency rates. This report describes about comparison of cellular networks with LTE network and architecture of LTE along with the attacks on LTE network. Comparison of Cellu...

Read More arrow

COIT20262 Advanced Network Security

Download : 0 | Pages : 6
  • Course Code: COIT20262
  • University: Central Queensland University
  • Country: Australia

Answer: Part (d) Information from Packets Information Answer Packet number from normal-student.pcap that contains the normal students’ password 26 Packet number from normal-student.pcap in which the server originally sends the cookie to the browser 28 Last 4 HEX digits of the id_hash in the cookie (give the value of the last 4 digits, not the packet number) C8b2 Packet nu...

Read More arrow

Save Time & improve Grade

Just share requirement and get customized Solution.

We will use e-mail only for:

arrow Communication regarding your orders

arrow To send you invoices, and other billing info

arrow To provide you with information of offers and other benefits

Add File

Error goes here




Overall Rating



Our Amazing Features


On Time Delivery

Our writers make sure that all orders are submitted, prior to the deadline.


Plagiarism Free Work

Using reliable plagiarism detection software, only provide customized 100 percent original papers.


24 X 7 Live Help

Feel free to contact our assignment writing services any time via phone, email or live chat. If you are unable to calculate word count online, ask our customer executives.


Services For All Subjects

Our writers can provide you professional writing assistance on any subject at any level.


Best Price Guarantee

Our best price guarantee ensures that the features we offer cannot be matched by any of the competitors.

Our Experts

Assignment writing guide
student rating student rating student rating student rating student rating 5/5

453 Order Completed

98% Response Time

Howard Asuncion

LLM in Criminal Law

London, United Kingdom

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

2279 Order Completed

97% Response Time

Zachary Perez

PhD in Computer Science and Information System

Washington, United States

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

230 Order Completed

97% Response Time

Liya Han

Master Of Science in Geotechnical Engineering (MSc Geotec)

Singapore, Singapore

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

265 Order Completed

97% Response Time

Ken Campbell

MSc in Electrical Engineering

Wellington, New Zealand

Hire Me

FREE Tools


Plagiarism Checker

Get all your documents checked for plagiarism or duplicacy with us.


Essay Typer

Get different kinds of essays typed in minutes with clicks.


GPA Calculator

Calculate your semester grades and cumulative GPa with our GPA Calculator.


Chemical Equation Balancer

Balance any chemical equation in minutes just by entering the formula.


Word Counter & Page Calculator

Calculate the number of words and number of pages of all your academic documents.

Refer Just 5 Friends to Earn More than $2000

Check your estimated earning as per your ability




Your Approx Earning

Live Review

Our Mission Client Satisfaction

I am very pleased with this assignment. It was written well and met the requirements that was needed to complete the assignment. I made the necessary grammarly corrections and submitted it on time. I will use this expert again


User Id: 585659 - 24 Jan 2021


student rating student rating student rating student rating student rating

I would like to continue working with this writer. He/she was on point. Thanks a lot for your help. This will allow me to understand the topic better and develop the real work.


User Id: 594483 - 24 Jan 2021


student rating student rating student rating student rating student rating

Report wriiten as expected but waiting to be graded. I have to change some of the wording but happy with report so far. Lets hope i get a good grade this time.


User Id: 66442 - 24 Jan 2021


student rating student rating student rating student rating student rating

Very Good Service provided by My Assignment Help to help me get my scored in all my examination.


User Id: 512391 - 24 Jan 2021


student rating student rating student rating student rating student rating
callback request mobile
Have any Query?