You will select a scenario describing an enterprise security challenge (see below). Based on the chosen challenge, and the described objectives of the enterprise, you will develop security requirements, develop a logical security architecture, and prepare a brief report justifying their design decisions.
You will complete the following:
This course allows for Full Assistance with Attribution.
Follow these simple steps:
You will be assessed on your engagement with the simulated task, your degree of success in the task, your write-up, and your interpretation of the tasks you submit for each. Feedback will be provided after one week from the deadline with comments on each of the criteria. General class feedback will be provided via the Announcement forum. Your final feedback and grade will be available at the conclusion of the course.
This assessment focuses on designing a logical enterprise security architecture based on a chosen scenario from the provided options. Students are required to analyze the scenario, identify appropriate frameworks, develop functional requirements, translate these into an architectural design, and justify their decisions in a concise report.
Select one scenario describing an enterprise security challenge.
Identify relevant frameworks (e.g., NIST, ISO/IEC 27001, ASD Essential Eight).
Define 3–10 functional requirements based on the scenario.
Develop a logical architecture diagram (maximum one A4 page).
Write a short report including:
A maximum 200-word introduction describing the architecture.
Justification of chosen framework(s).
Functional requirements in list or table form.
Justification of how architectural elements meet each requirement.
Embed diagram in the report (no hand-drawn submissions).
Provide references from academic and industry sources.
Appendix: include original pre-AI draft if GenAI tools were used.
The academic mentor began by ensuring the student clearly understood the assessment purpose to bridge theory (frameworks, requirements) with practical design (architecture diagram). The mentor clarified that the report should be concise but evidence-based.
The mentor guided the student to choose one relevant scenario from the provided table that aligned with their interest and knowledge. Discussion focused on the scope, risks, and enterprise objectives of the chosen scenario.
The student was directed to explore global cybersecurity frameworks such as NIST Cybersecurity Framework, ISO 27001, and ASD Essential Eight. The mentor explained how to justify the chosen framework(s) by linking them to the scenario’s objectives and compliance needs.
The mentor helped the student draft clear, single-sentence functional requirements (e.g., "The system must enforce multi-factor authentication for all remote users"). These were tailored to the enterprise’s context and security priorities.
Using tools like Lucidchart or draw.io, the mentor demonstrated how to visually represent:
Core network and application components.
Security layers (firewalls, IDS/IPS, VPNs, authentication servers).
Data flows and access control points.
The mentor emphasized clarity and alignment between the requirements and the architecture.
The student was guided to structure the report as follows:
Introduction – concise overview of the scenario and architecture.
Framework Justification – why selected framework(s) are relevant.
Requirements List – 3–10 functional requirements.
Architecture Diagram – embedded with clear labeling.
Requirement Justifications – short paragraphs linking design elements to requirements.
References – reliable industry and academic sources.
Finally, the mentor reviewed the draft with the student, ensuring clarity, APA 7th referencing, and compliance with GenAI use policy (including appendix with pre-AI draft if applicable).
The student successfully produced a structured report with a clear, justified architecture diagram.
All requirements were supported by specific architectural features.
The final submission demonstrated the ability to:
Apply evidence-based frameworks.
Translate functional requirements into practical design.
Critically justify decisions with references.
Present information professionally and concisely.
By completing the assessment with academic mentorship, the student achieved:
Understanding of the roles of frameworks in enterprise security design.
Skills in defining and justifying functional requirements.
Ability to design logical architectures aligned with enterprise needs.
Improved competency in academic writing, diagramming, and referencing.
Awareness of academic integrity and responsible use of GenAI tools.
Looking for support with your assignments? You can download the available sample solution to understand the correct format, structure, and depth of analysis expected in academic work. However, please note that this file is provided strictly for reference purposes only. Submitting the sample as your own work may result in plagiarism issues and academic penalties.
For students who want original work, we strongly recommend ordering a custom-written, plagiarism-free assignment crafted by our professional academic experts. Every fresh solution is tailored to your topic, adheres to university guidelines, and comes with assured quality.
100% original, plagiarism-free content
Written by subject-matter academic experts
Properly referenced and formatted
Delivered within your deadline
Boosts grades with reliable academic guidance
Plagiarism Disclaimer: The sample solution is for study and reference only. Always order a fresh solution for submission to maintain academic integrity.
[Download Sample Solution] [Order Fresh Assignment]
© Copyright 2026 My Uni Papers – Student Hustle Made Hassle Free. All rights reserved.