Design and implement virtualised cyber security infrastructure for organisations Assessment
- Subject Code :
ICTCYS612
Section 1: Virtualised cyber security infrastructure
Complete this section for each organisation.
Organisation 1
Organisation operations Provide an analysis of your chosen organisation’s operations. Describe the cyber security needs the organisation has based on their operations. |
Network security options and technologies Based on the organisation’s cyber security needs, identify and describe network security options, as well as suitable security technologies. Remember that these must relate to virtualised cyber security infrastructures. Include at least two options for network security and two security technologies. |
Requirements Describe the data types to be protected, security levels required and secure boundary requirements. Further, describe the mission-critical network servers that are part of the infrastructure. |
Infrastructure design Provide your design for the virtualised cyber security infrastructure. You can include this as a screenshot and attach it to your Portfolio. |
Implementation plan Provide your implementation plan for your design. Make sure you plan includes: Actions for implementation including network boundaries and technologies that will be used. responsibilities and timelines. |
Network security monitoring strategy Describe the strategy that will be used for monitoring the network security. |
Tools Outline the tools that you will use to implement the infrastructure. Explain how you will obtain access to the network and data you need. |
Presentation Include the title of your presentation here and attach it to your Portfolio. |
Feedback Document the feedback you received from the presentation regarding your design. Describe your response to this feedback and adjustments you will make. |
Organisation 2
Organisation operations Provide an analysis of your chosen organisation’s operations. Describe the cyber security needs the organisation has based on their operations. |
Network security options and technologies Based on the organisation’s cyber security needs, identify and describe network security options, as well as suitable security technologies. Remember that these must relate to virtualised cyber security infrastructures. Include at least two options for network security and two security technologies. |
Requirements Describe the data types to be protected, security levels required and secure boundary requirements. Further, describe the mission-critical network servers that are part of the infrastructure. |
Infrastructure design Provide your design for the virtualised cyber security infrastructure. You can include this as a screenshot and attach it to your Portfolio. |
Implementation plan Provide your implementation plan for your design. Make sure you plan includes: Actions for implementation including network boundaries and technologies that will be used. responsibilities and timelines. |
Network security monitoring strategy Describe the strategy that will be used for monitoring the network security. |
Tools Outline the tools that you will use to implement the infrastructure. Explain how you will obtain access to the network and data you need. |
Presentation Include the title of your presentation here and attach it to your Portfolio.
|
Feedback Document the feedback you received from the presentation regarding your design. Describe your response to this feedback and adjustments you will make. |
Section 2: Implementation and testing
Complete this section for each organisation.
Organisation 1
Implementation You are to provide evidence of the implementation of your design. This should include screenshots that show: · Network boundaries created · Relevant technologies implemented · Security levels set · User access set |
Testing Run tests on your network which will also demonstrate how you monitor the network. Describe the tests you undertook and the results. Provide screenshots of the test results including logs. |
User feedback Document the user feedback from your assessor. |
Adjustments Based on the tests you ran, monitoring and user feedback describe the adjustments you need to make. |
Organisation 2
Implementation You are to provide evidence of the implementation of your design. This should include screenshots that show: · Network boundaries created · Relevant technologies implemented · Security levels set · User access set |
Testing Run tests on your network which will also demonstrate how you monitor the network. Describe the tests you undertook and the results. Provide screenshots of the test results including logs. |
User feedback Document the user feedback from your assessor. |
Adjustments Based on the tests you ran, monitoring and user feedback describe the adjustments you need to make. |