diff_months: 12

Design and implement virtualised cyber security infrastructure for organisations Assessment

Download Solution Now
Added on: 2023-03-17 06:35:39
Order Code: 487414
Question Task Id: 0
  • Subject Code :

    ICTCYS612

Section 1: Virtualised cyber security infrastructure

Complete this section for each organisation.

Organisation 1

Organisation operations

Provide an analysis of your chosen organisation’s operations.

Describe the cyber security needs the organisation has based on their operations.

Network security options and technologies

Based on the organisation’s cyber security needs, identify and describe network security options, as well as suitable security technologies. Remember that these must relate to virtualised cyber security infrastructures.

Include at least two options for network security and two security technologies.

Requirements

Describe the data types to be protected, security levels required and secure boundary requirements.

Further, describe the mission-critical network servers that are part of the infrastructure.

Infrastructure design

Provide your design for the virtualised cyber security infrastructure. You can include this as a screenshot and attach it to your Portfolio.  

 

Implementation plan

Provide your implementation plan for your design. Make sure you plan includes:

Actions for implementation including network boundaries and technologies that will be used.

responsibilities and timelines.

Network security monitoring strategy

Describe the strategy that will be used for monitoring the network security.

Tools

Outline the tools that you will use to implement the infrastructure. Explain how you will obtain access to the network and data you need.  

Presentation

Include the title of your presentation here and attach it to your Portfolio.

Feedback

Document the feedback you received from the presentation regarding your design.

Describe your response to this feedback and adjustments you will make.

Organisation 2

Organisation operations

Provide an analysis of your chosen organisation’s operations.

Describe the cyber security needs the organisation has based on their operations.

Network security options and technologies

Based on the organisation’s cyber security needs, identify and describe network security options, as well as suitable security technologies. Remember that these must relate to virtualised cyber security infrastructures.

Include at least two options for network security and two security technologies.

Requirements

Describe the data types to be protected, security levels required and secure boundary requirements.

Further, describe the mission-critical network servers that are part of the infrastructure.

Infrastructure design

Provide your design for the virtualised cyber security infrastructure. You can include this as a screenshot and attach it to your Portfolio.  

Implementation plan

Provide your implementation plan for your design. Make sure you plan includes:

Actions for implementation including network boundaries and technologies that will be used.

responsibilities and timelines.

Network security monitoring strategy

Describe the strategy that will be used for monitoring the network security.

Tools

Outline the tools that you will use to implement the infrastructure. Explain how you will obtain access to the network and data you need.  

Presentation

Include the title of your presentation here and attach it to your Portfolio.

 

Feedback

Document the feedback you received from the presentation regarding your design.

Describe your response to this feedback and adjustments you will make.

Section 2: Implementation and testing

Complete this section for each organisation.

Organisation 1

Implementation

You are to provide evidence of the implementation of your design. This should include screenshots that show:

·         Network boundaries created

·         Relevant technologies implemented

·         Security levels set

·         User access set

Testing

Run tests on your network which will also demonstrate how you monitor the network.

Describe the tests you undertook and the results. Provide screenshots of the test results including logs. 

User feedback

Document the user feedback from your assessor.    

Adjustments

Based on the tests you ran, monitoring and user feedback describe the adjustments you need to make.

Organisation 2

Implementation

You are to provide evidence of the implementation of your design. This should include screenshots that show:

·         Network boundaries created

·         Relevant technologies implemented

·         Security levels set

·         User access set

Testing

Run tests on your network which will also demonstrate how you monitor the network.

Describe the tests you undertook and the results. Provide screenshots of the test results including logs. 

User feedback

Document the user feedback from your assessor.    

Adjustments

Based on the tests you ran, monitoring and user feedback describe the adjustments you need to make.

 

  • Uploaded By : Katthy Wills
  • Posted on : March 17th, 2023
  • Downloads : 0
  • Views : 124

Download Solution Now

Can't find what you're looking for?

Whatsapp Tap to ChatGet instant assistance

Choose a Plan

Premium

80 USD
  • All in Gold, plus:
  • 30-minute live one-to-one session with an expert
    • Understanding Marking Rubric
    • Understanding task requirements
    • Structuring & Formatting
    • Referencing & Citing
Most
Popular

Gold

30 50 USD
  • Get the Full Used Solution
    (Solution is already submitted and 100% plagiarised.
    Can only be used for reference purposes)
Save 33%

Silver

20 USD
  • Journals
  • Peer-Reviewed Articles
  • Books
  • Various other Data Sources – ProQuest, Informit, Scopus, Academic Search Complete, EBSCO, Exerpta Medica Database, and more