Architecture Diagrams Do Not Count Towards Your Word Limit Assessment

Download Solution Order New Solution

Assessment Overview

You will select a scenario describing an enterprise security challenge (see below). Based on the chosen challenge, and the described objectives of the enterprise, you will develop security requirements, develop a logical security architecture, and prepare a brief report justifying their design decisions.

Instructions

You will complete the following:

  1. Select a scenario from the above table.
  2. Identify relevant frameworks
  3. Develop requirements to support the design of their architecture.
  4. Develop a logical architecture that translates those requirements into something that meets the enterprise needs.
  5. Prepare a short report to accompany your architectural diagram. Your report wil include:
  1. The scenario you selected as per the assessment description.
  2. A maximum 200-word introduction describing their architecture. The introduction should be in paragraph format.
  3. Brief justification of chosen framework(s).
  4. List between 3-10 functional requirements they have defined based on the scenario provided. Requirements should be a single sentence each and can be in a numbered list or table.
  5. A diagram of their architecture no larger than a single A4 page (portrait or landscape).
  6. For each requirement, write a brief paragraph or numbered/dot point list justifying which elements of the architecture support this requirement.

Things to note

  • Select one scenario only.
  • You may use whichever tool you wish to draw your diagram; it should be embedded in your report and not submitted separately.
  • If you have access to Microsoft VISIO, that tool is excellent, otherwise consider this free tool,io.Powerpoint is workable in a pinch.
  • No hand drawn diagrams please.
  • References are required for this task. You are encouraged to utilise best practice guidance from government and industry authorities on information technology and cyber security, in addition to any relevant peer-reviewed academic sources they may use.

GenAI Quick Guide for this assessment

This course allows for Full Assistance with Attribution.

Follow these simple steps:

  1. Do your own first draft (nothing generated).
  2. Use GenAI to improve your work.
  3. Cite anything that was generated and used verbatim.
  • https://www.student.unsw.edu.au/ai-referencing
  1. In your final submission, include an appendix with your original “pre-AI draft” (in full).

Marking and feedback

You will be assessed on your engagement with the simulated task, your degree of success in the task, your write-up, and your interpretation of the tasks you submit for each. Feedback will be provided after one week from the deadline with comments on each of the criteria. General class feedback will be provided via the Announcement forum. Your final feedback and grade will be available at the conclusion of the course.

Assessment Summary

This assessment focuses on designing a logical enterprise security architecture based on a chosen scenario from the provided options. Students are required to analyze the scenario, identify appropriate frameworks, develop functional requirements, translate these into an architectural design, and justify their decisions in a concise report.

Key Requirements:

  • Select one scenario describing an enterprise security challenge.

  • Identify relevant frameworks (e.g., NIST, ISO/IEC 27001, ASD Essential Eight).

  • Define 3–10 functional requirements based on the scenario.

  • Develop a logical architecture diagram (maximum one A4 page).

  • Write a short report including:

    • A maximum 200-word introduction describing the architecture.

    • Justification of chosen framework(s).

    • Functional requirements in list or table form.

    • Justification of how architectural elements meet each requirement.

  • Embed diagram in the report (no hand-drawn submissions).

  • Provide references from academic and industry sources.

  • Appendix: include original pre-AI draft if GenAI tools were used.

Guidance Approach

Step 1: Understanding the Task

The academic mentor began by ensuring the student clearly understood the assessment purpose to bridge theory (frameworks, requirements) with practical design (architecture diagram). The mentor clarified that the report should be concise but evidence-based.

Step 2: Scenario Selection

The mentor guided the student to choose one relevant scenario from the provided table that aligned with their interest and knowledge. Discussion focused on the scope, risks, and enterprise objectives of the chosen scenario.

Step 3: Identifying Frameworks

The student was directed to explore global cybersecurity frameworks such as NIST Cybersecurity Framework, ISO 27001, and ASD Essential Eight. The mentor explained how to justify the chosen framework(s) by linking them to the scenario’s objectives and compliance needs.

Step 4: Developing Functional Requirements

The mentor helped the student draft clear, single-sentence functional requirements (e.g., "The system must enforce multi-factor authentication for all remote users"). These were tailored to the enterprise’s context and security priorities.

Step 5: Designing the Logical Architecture

Using tools like Lucidchart or draw.io, the mentor demonstrated how to visually represent:

  • Core network and application components.

  • Security layers (firewalls, IDS/IPS, VPNs, authentication servers).

  • Data flows and access control points.

The mentor emphasized clarity and alignment between the requirements and the architecture.

Step 6: Writing the Report

The student was guided to structure the report as follows:

  1. Introduction – concise overview of the scenario and architecture.

  2. Framework Justification – why selected framework(s) are relevant.

  3. Requirements List – 3–10 functional requirements.

  4. Architecture Diagram – embedded with clear labeling.

  5. Requirement Justifications – short paragraphs linking design elements to requirements.

  6. References – reliable industry and academic sources.

Step 7: Review and Academic Integrity

Finally, the mentor reviewed the draft with the student, ensuring clarity, APA 7th referencing, and compliance with GenAI use policy (including appendix with pre-AI draft if applicable).

Outcome Achieved

  • The student successfully produced a structured report with a clear, justified architecture diagram.

  • All requirements were supported by specific architectural features.

  • The final submission demonstrated the ability to:

    • Apply evidence-based frameworks.

    • Translate functional requirements into practical design.

    • Critically justify decisions with references.

    • Present information professionally and concisely.

Learning Objectives Covered

By completing the assessment with academic mentorship, the student achieved:

  • Understanding of the roles of frameworks in enterprise security design.

  • Skills in defining and justifying functional requirements.

  • Ability to design logical architectures aligned with enterprise needs.

  • Improved competency in academic writing, diagramming, and referencing.

  • Awareness of academic integrity and responsible use of GenAI tools.

Get the Right Guidance for Your Assignments

Looking for support with your assignments? You can download the available sample solution to understand the correct format, structure, and depth of analysis expected in academic work. However, please note that this file is provided strictly for reference purposes only. Submitting the sample as your own work may result in plagiarism issues and academic penalties.

For students who want original work, we strongly recommend ordering a custom-written, plagiarism-free assignment crafted by our professional academic experts. Every fresh solution is tailored to your topic, adheres to university guidelines, and comes with assured quality.

Why Choose a Fresh Solution?

  • 100% original, plagiarism-free content

  • Written by subject-matter academic experts

  • Properly referenced and formatted

  • Delivered within your deadline

  • Boosts grades with reliable academic guidance

Plagiarism Disclaimer: The sample solution is for study and reference only. Always order a fresh solution for submission to maintain academic integrity.

[Download Sample Solution]                [Order Fresh Assignment]

Get It Done! Today

Country
Applicable Time Zone is AEST [Sydney, NSW] (GMT+11)
+

Every Assignment. Every Solution. Instantly. Deadline Ahead? Grab Your Sample Now.