Restaurant Analysis Report Assessment

Choose a food and beverage organisation in your local area. It might be a café, a restaurant, the dining room of a local club or hotel, but it must have a menu and it must be an independent organisation. Franchised organisations like McDonald’s, Gloria Jean, Subway etc. are not permitted for this assessment task.

Visit the organisation at least once as a customer, order something from the menu and eat/drink while you are there. Provide a brief background of the independent food and beverage organisation, which you have selected for analysis. For example, name and type of establishment, location, opening hours etc.

Closely examine the menu document and provide a description of each of the three  areas of information listed above i.e. type of cuisine, type of foodservice and the market targeted. 

literature. Reference sources may be drawn from the textbook, book of readings, recommended references for the Restaurant Analysis or journal articles from any of the journals listed.

Discuss why it is important for the organisation to be true in practice to what its menu document purports. Use the literature to support your discussion.

  1. Make recommendations with justifications for changes to the document or its business practice, where necessary.
  2. Discussion on the importance of the menu reflecting actual practise, drawing on relevant literature 4%
  3. Critical evaluation of the extent to which the menu represents that actual practise drawing on the relevant literature 10%
  4. Appropriateness of recommendation 3%
  5. Report Format ( spelling grammar, referencing and logical flow of ideas 3% 

Advanced Network Security Assessment

Question 1

This assignment question requires that you analyse a packet capture dump file (http_gzip.pcap) and provide comments explaining each packet. This pcap file contains only ten packets.  Your task is to annotate each packet commenting on the following characteristics.

· Comment on any significant TCP flags and what they mean in the context of the packet capture. Significant flags include SYN, FIN, RST, and URG.  You must explain why the flag has been set and what it means for this TCP connection.  
· Comment on the direction of each packet (ie. client -> server or server -> client).  Be clear to explain in which direction the interaction is occurring.
· Comment on each command and response between the client and the server. You must explain what each command does.  You should also explain the data that is exchanged.  This will require that you study Internet documents relating to TCP to understand what the commands mean.  

You should also comment on the 2 port numbers used in this connection and their significance.  For example, is it an ephemeral or reserved port?  If it is a reserved port, what protocol does it relate to?

On the following page is an example of the template to use to complete this question.  It provides a brief summary of each packet and has been formatted to include an “explanation” field underneath each packet. You are to write your comments in this “explanation” field addressing the packet immediately above, based on your analysis of the packet using Wireshark. Be specific and detailed.  Any vague or limited responses will not attract any marks.  Note, that the table is only a summary of the information provided in the pcap file. Be sure to comment in relation to information provided in the pcap file using Wireshark, not just the summary table.


For examples of how to complete the table, be sure to have completed all 3 parts of the Packet Capture Exercises. They are available from the Lectures and Tutorials page of the course website. Your solution must of course be in your own words.  Do not copy directly from any examples or you will get zero marks



Question 2:


A small company is connected to the internet via a Router with firewall and proxy services installed (139.77.5.210).

There are three servers located in a DMZ (138.77.5.0 / 25).

The web server (138.77.5.89) can directly accept requests (HTTP or HTTPS) from the Internet or from the internal network (192.168.1.0/25).

The DNS server (138.77.5.6) can directly accept requests from the Internet. The DNS server can also directly accept requests from the internal network (192.168.1.0/25). However, if the DNS server cannot resolve a domain name requested by the internal network (192.168.1.0/25), it will contact the DNS servers on the Internet directly for the name resolution.

On behalf of the users on the internal network (192.168.1.0/25), the email server (138.77.5.110) sends emails to and receives emails from the Internet. The users on the internal network (192.168.1.0/25) use IMAP (Internet E-mail Access Protocol) to read and organise their emails on the email server.

The users on the internal network (192.168.1.0/25) are allowed to access the Internet only for HTTP, HTTPS and FTP services. However, the users of the internal network are never allowed to connect to the Internet directly.

There are 8 client computers and a Database server on the internal network.

Based on the above advanced network configuration and application scenarios, answer the following three questions.

A.      Draw a network diagram of this network including IP addresses.


B.      The firewall services are installed on the router. Create the firewall rules to implement the packet filtering and only allow the specified traffic. The firewall rules are to be created in the following format.

A.      C.   Briefly explain each rule in the rule base that you have created.


B.      The proxy services are also installed on the router to conceal the users of the internal network (192.168.1.0/25) from the Internet. Suppose that users on the internal computers send the following requests to the Internet. The proxy services perform the Port Address Translation (PAT). Complete the following connection table to show how PAT is working for requests from the users on the internal network.  

Question 3: 


Although the course textbook and other resources discuss several specific network attack vulnerabilities, it is not feasible to cover all of them. New vulnerabilities are being discovered all of the time, and there are hundreds of currently known vulnerabilities. Professional network administrators have to keep themselves current with all possible threat possibilities. One way of doing this is by performing personal research. In this case study, you should use the Internet to assist you in developing responses to the three questions.  Use of the course textbook and supplied resources only is not sufficient to award full marks. You should use your research skills and go beyond these resources.


You are required to answer the following questions.  
a)      Your are to research a recent ransom type attack via the internet, what type of attack has been performed by the hackers?  You need to fully justify your answer, not just state the type of attack.

b)      Describe how the attack may have occurred with sufficient information to explain how a hacker could carry out the attack. Ensure you include references.

c)      How could the network administrator prevent such attacks?  You don’t need to provide the actual code – just describe what measures they would have to implement to ensure that occurrence of an attack could be minimised.


Financial Accounting Assessment

Question 1


Bradfield Ltd is registered as a public company and is required by the Corporations Act 2001 to prepare a financial report for each financial year (s. 292) that complies with Australian accounting standards (s. 296). The financial statements prepared by Bradfield Ltd are general purpose financial statements because Bradfield Ltd is a reporting entity as defined in SAC 1 Definition of the Reporting Entity. The following is an extract from the trial balance prepared by Bradfield Ltd’s accounting staff for the year ended 30 June 2016.


Required

 
Prepare the Statement of profit or loss and other comprehensive income for Bradfield Ltd for the year ended 30 June 2016 in accordance with the requirements of AASB 101 Presentation of Financial Statements. 

In addition to referring to AASB 101 Presentation of Financial Statements, you may find it useful to refer to IAS 1 Presentation of Financial Statements Implementation Guidance (in Moodle) which provides examples of financial statements prepared in accordance with IAS 1 Presentation of Financial Statements which is the international equivalent of AASB 101 Present ation of Financial Statements.

Question2

Bendigo Ltd sells consumer whitegoods through 100 retail outlets throughout Victoria, New South Wales and Queensland. Bendigo Ltd leases the retail outlets and their accounting policy (in accordance with AASB 117 Leases) is to classify leases as finance leases when the terms of the lease transfer substantially all the risks and rewards of ownership to the lessee (Bendigo Ltd); all other leases are classified as operating leases. In applying this policy, Bendigo Ltd has classified all of its leases for the retail outlets as operating leases. In February 2016, the AASB issued a new accounting standard (AASB 116 Leases which is based on the new IFRS 16 Leases) that introduces a new accounting policy for the classification of leases. Although AASB 116 Leases does not become effective for some years, early adoption is permitted and Bendigo Ltd has decided to adopt it for the reporting period ending 30 June 2016.

In July 2015, at the beginning of the current reporting period, Bendigo Ltd decided to change its accounting policy for the valuation of inventories from a weighted-average cost (WAC) method to a first-in, first-out (FIFO) method. Bendigo Ltd believes that the FIFO method more accurately reflects the usage and flow of inventories in the economic cycle.

 Required


(a) How is a provision defined in AASB 137 Provisions, Contingent Liabilities and Contingent Assets? Why would Benson Ltd’s obligation to restore the contaminated environment be classified as a provision?

(b) Briefly explain the three methods that, according to AASB 137 Provisions, Contingent Liabilities and Contingent Assets, can be used by an entity to estimate the amount to be recognised as a provision.

(c) How has Benson Ltd taken risk into account to estimate the amount to be recognised as a provision? What is an alternative approach to taking risk into account?

(d) From the information in the question, calculate the amount that Benson Ltd should recognise as a provision as at 30 June 2016.

(e) By how much will the provision have increased as at the end of the following year on 30 June 2017? How should Benson Ltd account for the increase?

Business Report Plan Assessment

Objective 

The objective of this assignment is to conduct an early analysis, identify and evaluate all the marketing factors and develop a DETAILED PLAN with key facts, data and marketing points under relevant headings in preparation and assisting with the major assignment. You are required to conduct research, read widely and draw information from current affairs, and from the relevant sections of the material covered in lectures and tutorials. 

Role and task

You have recently gained a position as a junior marketing executive in the organization on which your MAJOR ASSIGNMENT is based and your boss (the marketing manager) has asked you to review the appropriateness of one of your current products for a target segment. The minor-business assignment will form part of your final submission for your major assignment. As such you are required to cover some or all of the following areas in the minor assignment.

Mark allocation 


Significant marks are allocated for evidence of research and analysis of the data and information obtained from this research.   The aim of this minor assignment is to demonstrate that you are able to research data and then apply this to your organisation, its markets, customers and products.

Scenarios

Men’s skincare /cosmetics manufacturers e.g. Nivea for Men
Women’s athletic apparel e.g. Lululemon
Gymnasiums e.g. Fitness First
Those who use other scenarios will receive a mark of zero.

Presentation 

The minor assignment should be presented as part of a business report (i.e. outline numbered headings, page numbers, etc). Please refer Q manual for format and APA referencing style. 


Minor Assignment: 

An individual Business report plan - 5% - 1000 words 
(Industry, Company, Competitors, Customers, Environment, STP, Market Research) 
This plan should include research, specific information and marketing application.
·         Identify and describe the relevant and key background information of the industry in which your company [organisation] operates. Including the size of the industry, growth or decline of the industry and future projections.   

·         List the relevant micro and macro environmental factors and observe any changes and developments and describe their [micro and macro factors] impact on the industry, market and business.

·         Identification of the key competitors.

·         List the relevant bases [variables] for segmentation of the market. Apply the market targeting process [STPD process]. Show possible market segments and profiles that emerge based on segmentation. Key consumer profiles should be briefly described.

·         Explain / describe the market coverage strategy, positioning [including a positioning map] and differentiation

·         Identification and description of the target segment(s) (customers) including their needs and wants.

You are required to demonstrate that you can write in an effective manner, that you understand basic marketing concepts and that you have the ability to appropriately apply theory to practice.  To demonstrate your ability to apply theory to practice you must illustrate your answer with relevant research and data that is applicable to your organisation.