NTISthis.com

Evidence Guide: ICTTEN811 - Evaluate and apply network security

Student: __________________________________________________

Signature: _________________________________________________

Tips for gathering evidence to demonstrate your skills

The important thing to remember when gathering evidence is that the more evidence the better - that is, the more evidence you gather to demonstrate your skills, the more confident an assessor can be that you have learned the skills not just at one point in time, but are continuing to apply and develop those skills (as opposed to just learning for the test!). Furthermore, one piece of evidence that you collect will not usualy demonstrate all the required criteria for a unit of competency, whereas multiple overlapping pieces of evidence will usually do the trick!

From the Wiki University

 

ICTTEN811 - Evaluate and apply network security

What evidence can you provide to prove your understanding of each of the following citeria?

Analyse operation of the internet

  1. Evaluate the interrelationship of IP to open systems interconnect (OSI) seven layer model and the impact on network topologies and network elements
  2. Assess media access control (MAC) and IP addressing, and their application in security
  3. Report on transmission control protocol/internet protocol (TCP/IP) operations and use of transport protocols for transmitting data over the network
  4. Examine various types of routing protocols and the implications on security
  5. Analyse forms of label switching as applied to data packets
  6. Use software to simulate least-cost algorithms
Evaluate the interrelationship of IP to open systems interconnect (OSI) seven layer model and the impact on network topologies and network elements

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Assess media access control (MAC) and IP addressing, and their application in security

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Report on transmission control protocol/internet protocol (TCP/IP) operations and use of transport protocols for transmitting data over the network

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Examine various types of routing protocols and the implications on security

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Analyse forms of label switching as applied to data packets

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Use software to simulate least-cost algorithms

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Analyse internetwork protocols

  1. Compare connection-oriented and connection-less networks in internetworking applications
  2. Research design parameters used in networks
  3. Produce a report on IP multi-casting protocols and systems, including IP frame fields of data frames
Compare connection-oriented and connection-less networks in internetworking applications

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Research design parameters used in networks

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Produce a report on IP multi-casting protocols and systems, including IP frame fields of data frames

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Research and report internetwork operations

  1. Analyse protocol considerations of voice over internet protocol (VoIP)
  2. Research protocols G723.1, G729 and G729A standards and evaluate their application in internetworking
  3. Determine the format of JPEG and GIF files as applied to still pictures
  4. Determine the format of MPEG-2 and H.32x series multimedia protocols for motion pictures
  5. Evaluate features of different of multi-service protocols and of different email system protocols in networking operations
  6. Produce a report on features different web-based protocols used in internetworking operations
Analyse protocol considerations of voice over internet protocol (VoIP)

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Research protocols G723.1, G729 and G729A standards and evaluate their application in internetworking

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Determine the format of JPEG and GIF files as applied to still pictures

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Determine the format of MPEG-2 and H.32x series multimedia protocols for motion pictures

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Evaluate features of different of multi-service protocols and of different email system protocols in networking operations

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Produce a report on features different web-based protocols used in internetworking operations

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Analyse features and types of network security

  1. Analyse procedures and processes used for security attacks and use of protection mechanisms
  2. Research conventional encryption algorithms and determine possible locations of encryption devices
  3. Produce a report on conventional encryption key distribution problems and how message authentication and verification is achieved
  4. Research one-way hashing and secure hashing functions
  5. Produce a report on digital signature standard (DSS) principles, including public key cryptography algorithms for network security
Analyse procedures and processes used for security attacks and use of protection mechanisms

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Research conventional encryption algorithms and determine possible locations of encryption devices

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Produce a report on conventional encryption key distribution problems and how message authentication and verification is achieved

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Research one-way hashing and secure hashing functions

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Produce a report on digital signature standard (DSS) principles, including public key cryptography algorithms for network security

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Research features of public key authentication and email network security protocols

  1. Research public key authentication using Kerberos
  2. Analyse how electronic mail security is achieved using pretty good privacy (PGP)
  3. Research and report on internet protocol security (IPSec)
  4. Produce a report on encapsulating security payload (ESP), including internet key management processes
Research public key authentication using Kerberos

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Analyse how electronic mail security is achieved using pretty good privacy (PGP)

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Research and report on internet protocol security (IPSec)

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Produce a report on encapsulating security payload (ESP), including internet key management processes

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Research features of web, network management and system security

  1. Analyse how web threats and attacks occur in an IP network and determine system intruders and threats
  2. Research operation of transaction protocols
  3. Evaluate processes used for selection and protection of system passwords
  4. Evaluate system threats and methods used to counteract the threats
  5. Produce a report on anti-virus protection strategies, including firewall design principles, types and configurations
Analyse how web threats and attacks occur in an IP network and determine system intruders and threats

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Research operation of transaction protocols

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Evaluate processes used for selection and protection of system passwords

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Evaluate system threats and methods used to counteract the threats

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Produce a report on anti-virus protection strategies, including firewall design principles, types and configurations

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Document evaluation report

  1. Present a final report to include research and evaluation of network security management principles and network application in the workplace with enhancement recommendations
Present a final report to include research and evaluation of network security management principles and network application in the workplace with enhancement recommendations

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Assessed

Teacher: ___________________________________ Date: _________

Signature: ________________________________________________

Comments:

 

 

 

 

 

 

 

 

Instructions to Assessors

Evidence Guide

ELEMENT

PERFORMANCE CRITERIA

Elements describe the essential outcomes.

Performance criteria describe the performance needed to demonstrate achievement of the element.

1. Analyse operation of the internet

1.1 Evaluate the interrelationship of IP to open systems interconnect (OSI) seven layer model and the impact on network topologies and network elements

1.2 Assess media access control (MAC) and IP addressing, and their application in security

1.3 Report on transmission control protocol/internet protocol (TCP/IP) operations and use of transport protocols for transmitting data over the network

1.4 Examine various types of routing protocols and the implications on security

1.5 Analyse forms of label switching as applied to data packets

1.6 Use software to simulate least-cost algorithms

2. Analyse internetwork protocols

2.1 Compare connection-oriented and connection-less networks in internetworking applications

2.2 Research design parameters used in networks

2.3 Produce a report on IP multi-casting protocols and systems, including IP frame fields of data frames

3. Research and report internetwork operations

3.1 Analyse protocol considerations of voice over internet protocol (VoIP)

3.2 Research protocols G723.1, G729 and G729A standards and evaluate their application in internetworking

3.3 Determine the format of JPEG and GIF files as applied to still pictures

3.4 Determine the format of MPEG-2 and H.32x series multimedia protocols for motion pictures

3.5 Evaluate features of different of multi-service protocols and of different email system protocols in networking operations

3.6 Produce a report on features different web-based protocols used in internetworking operations

4. Analyse features and types of network security

4.1 Analyse procedures and processes used for security attacks and use of protection mechanisms

4.2 Research conventional encryption algorithms and determine possible locations of encryption devices

4.3 Produce a report on conventional encryption key distribution problems and how message authentication and verification is achieved

4.4 Research one-way hashing and secure hashing functions

4.5 Produce a report on digital signature standard (DSS) principles, including public key cryptography algorithms for network security

5. Research features of public key authentication and email network security protocols

5.1 Research public key authentication using Kerberos

5.2 Analyse how electronic mail security is achieved using pretty good privacy (PGP)

5.3 Research and report on internet protocol security (IPSec)

5.4 Produce a report on encapsulating security payload (ESP), including internet key management processes

6. Research features of web, network management and system security

6.1 Analyse how web threats and attacks occur in an IP network and determine system intruders and threats

6.2 Research operation of transaction protocols

6.3 Evaluate processes used for selection and protection of system passwords

6.4 Evaluate system threats and methods used to counteract the threats

6.5 Produce a report on anti-virus protection strategies, including firewall design principles, types and configurations

7. Document evaluation report

7.1 Present a final report to include research and evaluation of network security management principles and network application in the workplace with enhancement recommendations

Required Skills and Knowledge

ELEMENT

PERFORMANCE CRITERIA

Elements describe the essential outcomes.

Performance criteria describe the performance needed to demonstrate achievement of the element.

1. Analyse operation of the internet

1.1 Evaluate the interrelationship of IP to open systems interconnect (OSI) seven layer model and the impact on network topologies and network elements

1.2 Assess media access control (MAC) and IP addressing, and their application in security

1.3 Report on transmission control protocol/internet protocol (TCP/IP) operations and use of transport protocols for transmitting data over the network

1.4 Examine various types of routing protocols and the implications on security

1.5 Analyse forms of label switching as applied to data packets

1.6 Use software to simulate least-cost algorithms

2. Analyse internetwork protocols

2.1 Compare connection-oriented and connection-less networks in internetworking applications

2.2 Research design parameters used in networks

2.3 Produce a report on IP multi-casting protocols and systems, including IP frame fields of data frames

3. Research and report internetwork operations

3.1 Analyse protocol considerations of voice over internet protocol (VoIP)

3.2 Research protocols G723.1, G729 and G729A standards and evaluate their application in internetworking

3.3 Determine the format of JPEG and GIF files as applied to still pictures

3.4 Determine the format of MPEG-2 and H.32x series multimedia protocols for motion pictures

3.5 Evaluate features of different of multi-service protocols and of different email system protocols in networking operations

3.6 Produce a report on features different web-based protocols used in internetworking operations

4. Analyse features and types of network security

4.1 Analyse procedures and processes used for security attacks and use of protection mechanisms

4.2 Research conventional encryption algorithms and determine possible locations of encryption devices

4.3 Produce a report on conventional encryption key distribution problems and how message authentication and verification is achieved

4.4 Research one-way hashing and secure hashing functions

4.5 Produce a report on digital signature standard (DSS) principles, including public key cryptography algorithms for network security

5. Research features of public key authentication and email network security protocols

5.1 Research public key authentication using Kerberos

5.2 Analyse how electronic mail security is achieved using pretty good privacy (PGP)

5.3 Research and report on internet protocol security (IPSec)

5.4 Produce a report on encapsulating security payload (ESP), including internet key management processes

6. Research features of web, network management and system security

6.1 Analyse how web threats and attacks occur in an IP network and determine system intruders and threats

6.2 Research operation of transaction protocols

6.3 Evaluate processes used for selection and protection of system passwords

6.4 Evaluate system threats and methods used to counteract the threats

6.5 Produce a report on anti-virus protection strategies, including firewall design principles, types and configurations

7. Document evaluation report

7.1 Present a final report to include research and evaluation of network security management principles and network application in the workplace with enhancement recommendations

Evidence of ability to:

investigate and report on protocols used for data transmission over IP networks

investigate and report on network security in terms of internet protocols, digital signature standard (DSS) principles and asymmetric key cryptography on IP networks

research and report features of web, network management and system security management in IP networks

recommend enhancements to security management in IP networks.

Note: If a specific volume or frequency is not stated, then evidence must be provided at least once.

To complete the unit requirements safely and effectively, the individual must:

explain administrative network management systems

evaluate algorithms used in IP network security

specify the purpose of cryptography in security systems

explain encapsulation and encryption in data transmission

describe examples of enterprise solutions

explain firewalls

outline common network topologies

summarise operations network management systems

explain routing theory

explain and give examples of system threats

outline transaction protocols.