diff_months: 4

Designandimplementvirtualisedcybersecurityinfrastructurefororganisations ICTCYS612

Flat 50% Off Order New Solution
Added on: 2025-05-14 04:59:52
Order Code: LD526247
Question Task Id: 0
  • Subject Code :

    ICTCYS612

ICTCYS612

Designandimplementvirtualisedcybersecurityinfrastructurefororganisations

ProjectPortfolio(Explanatory Document)

CONTENTS

Section1:Virtualisedcybersecurityinfrastructure 4

Section2:Implementationandtesting 12

Studentname:

Studentmustinclude.

Assessor:

Studentmustinclude.

Organisations this assessment is based on:

Studentmustinclude.Thiswillbethecasestudyorganisationsprovidedinappendix1.

Section1:Virtualisedcybersecurityinfrastructure

Completethissectionforeachorganisation.

Organisation1

Organisationoperations

Provideananalysisofyourchosen

organisationsoperations.

Describe the cyber security needs the or- ganisationhasbasedontheiroperations.

Addressing the first organisation inAppendix 1, the student must provideananalysisoftheorganisationsoperations.

Alsodescribethecybersecurityneedsoftheorganisationwhich

havetobebasedontheiroperations.

Network security options andtechnologies

Based on the organisations cyber securityneeds, identify and describe networksecurity options, as well as suitable securitytechnologies. Remember that these must relate to virtualised cyber securityinfrastructures.

Include at least two options for network securityandtwosecuritytechnologies.

The student must identify and describe network security options, as well as suitablesecuritytechnologiesandthesemustrelatetovirtualisedcyber securityinfrastructures.

Studentsmaydiscussarangeofoptionsandtechnologies.

For example, virtualised cyber security options include virtual firewalls and password policies.

Security technologies will be those provided by cyber security providers, studentscanidentifyarangeofvarioustechnologies.

Requirements

Describe the data types to be protected,security levels required and secureboundaryrequirements.

Further, describe the mission-criticalnetworkserversthatarepartoftheinfrastructure.

Thestudentmustdescribethedatatypestobeprotected,securitylevels required and secure boundary requirements. As well as describe the mission- criticalnetworkserversthatarepartoftheinfrastructure.

Thiswillbeaspertheinformationfromthecasestudy.

Infrastructuredesign

Provide your design for the virtualised cyber security infrastructure. You caninclude this as a screenshot and attach it toyour Portfolio.

The student must provide their design for the virtualised cyber security. This willbebasedontheoptionsandtechnologytheyhaveresearchedabove.

Implementationplan

Provide your implementation plan for yourdesign. Make sure you plan includes:

Actions for implementation includingnetwork boundaries and technologies thatwill be used.

responsibilitiesandtimelines.

The student must provide their implementation plan. The implementation plan mustbebasedontheirproposeddesign.Refertheexample.Butdonotcopyit.

Action

Responsibilities

Timelines

Finaldesign approved

ITProjectManager

Week1

Procuresoftware requiredandinstall

ITProjectManager

Week2

Testsystemsand adjust

ITProjectManager

Week3

Finalisesystemand provide finalreport to client

ITProjectManager

Week4

Networksecuritymonitoringstrategy

Describe the strategy that will be used formonitoring the network security.

The student must describe the strategy that will be used for monitoring the network. For example, they may refer tothereal time network monitoring. Address some other strategies as you suggested.

Tools

Outline the tools that you will use toimplement the infrastructure. Explain how you will obtain access to the network anddata you need.

Thestudentmustoutlinethetoolstheywillusetoimplementthe infrastructure. This will be specific software plus hardware e.g. the physicalcomputer.

Theystudentmustalsoexplainhowtheywillobtainaccesstothenetwork and data you need. For example, in this instance, it would mean downloading thevirtualmachinesoftwareontotheclientscomputer.

Presentation

Include the title of your presentation hereandattachittoyourPortfolio.

The student must include the slides of their power point presentation here. Then you submit your project portfolio to your teacher for his feedback comments.

Note: There are few more sections below in this document require teachersfeedback.Completethosesectionsaswellbeforeyousuendthisdocumentfor teachers feedback. After completing all those sections, sendyour document to teacher for his feedback. Then he will put his feedbacks to all feedback sections same time. Then you can complete the Feedback sections of this document.

Feedback

Document the feedback you receivedfromthe presentation regarding your design.

Describe your response to this feedbackand adjustments you will make.

Teacher will put his feedback here. Then the student must include their response to it mentioning adjustments to be introduced into their PP prsen- tation following teachers feedback.

Organisation2

Organisationoperations

Provideananalysisofyourchosen

organisationsoperations.

Describe the cyber security needs theorganisation has based on their operations.

Dothesamefortheorganisation2asyoudidfortheorganisation1above.

Network security options andtechnologies

Based on the organisations cyber securityneeds, identify and describe networksecurity options, as well as suitable securitytechnologies. Remember that these must relate to virtualised cyber securityinfrastructures.

Include at least two options for network securityandtwosecuritytechnologies.

Dothesamefortheorganisation2asyoudidfortheorganisation1above.

Requirements

Describe the data types to be protected,security levels required and secureboundaryrequirements.

Further, describe the mission-criticalnetworkserversthatarepartoftheinfrastructure.

Dothesamefortheorganisation2asyoudidfortheorganisation1above.

Infrastructuredesign

Provide your design for the virtualised cyber security infrastructure. You caninclude this as a screenshot and attach it toyour Portfolio.

Dothesamefortheorganisation2asyoudidfortheorganisation1above.

Implementationplan

Provide your implementation plan for yourdesign. Make sure you plan includes:

Actions for implementation includingnetwork boundaries and technologies thatwill be used.

responsibilitiesandtimelines.

Dothesamefortheorganisation2asyoudidfortheorganisation1above.

Networksecuritymonitoringstrategy

Describe the strategy that will be used formonitoring the network security.

Dothesamefortheorganisation2asyoudidfortheorganisation1above.

Tools

Outline the tools that you will use toimplement the infrastructure. Explain how you will obtain access to the network anddata you need.

Dothesamefortheorganisation2asyoudidfortheorganisation1above.

Presentation

Include the title of your presentation hereandattachittoyourPortfolio.

Dothesamefortheorganisation2asyoudidfortheorganisation1above.

Feedback

Document the feedback you received fromthe presentation regarding your design.

Describe your response to this feedbackand adjustments you will make.

Dothesamefortheorganisation2asyoudidfortheorganisation1above.

Section2:Implementationandtesting

Completethissectionforeachorganisation.

Organisation1

Implementation

Youaretoprovideevidenceoftheimplementation of your design. Thisshould include screenshots thatshow:

Networkboundariescreated

Relevanttechnologiesimplemented

Securitylevelsset

Useraccessset

The student must provide evidence of the implementation of the design they have created. This will depend on their design and the technologies they have identified.

Thestudentmustprovidescreenshotsoftheirwork.Youmaytakescreen-

shots from your work done in your computer or virtual demonstrations you developed with virtual machines and Cisco packet tracer. You can

download and install the oracle VM Box as the virtual machine. There are plenty of video clips in YouTube explaining how to use

the Oracle VM Box and install virtual computers into it. Otherwise ask your teacher to demonstrate that to you in the classroom.

Testing

Run tests on your network whichwillalsodemonstratehowyoumonitor the network.

Describe the tests you undertookandtheresults.Providescreenshotsofthetestresultsincludinglogs.

The student must provide evidence of the monitoring and testing of the system they havecreated.Onceyoudonethis,submityourdocumenttoyourteacherforhis feedback.

Userfeedback

Document the user feedback fromyour assessor.

Thestudentmustdocumenttheteacherssfeedbackprovidedhere.

Adjustments

Basedonthetestsyouran,monitoringanduserfeedbackdescribe the adjustments you needto make.

The student must document their adjustments based on the testing, monitoring and user feedback.

Organisation2

Implementation

Youaretoprovideevidenceoftheimplementation of your design. Thisshould include screenshots thatshow:

Networkboundariescreated

Relevanttechnologiesimplemented

Securitylevelsset

Useraccessset

Dothesamefortheorganisation2asyoudidfortheorganisation1above.

Testing

Run tests on your network whichwillalsodemonstratehowyoumonitor the network.

Describe the tests you undertookandtheresults.Providescreenshotsofthetestresultsincludinglogs.

Dothesamefortheorganisation2asyoudidfortheorganisation1above.

Userfeedback

Document the user feedback fromyour assessor.

Dothesamefortheorganisation2asyoudidfortheorganisation1above.

Adjustments

Basedonthetestsyouran,monitoringanduserfeedbackdescribe the adjustments you needto make.

Dothesamefortheorganisation2asyoudidfortheorganisation1above.

  • Uploaded By : Nivesh
  • Posted on : May 14th, 2025
  • Downloads : 0
  • Views : 121

Order New Solution

Can't find what you're looking for?

Whatsapp Tap to ChatGet instant assistance

Choose a Plan

Premium

80 USD
  • All in Gold, plus:
  • 30-minute live one-to-one session with an expert
    • Understanding Marking Rubric
    • Understanding task requirements
    • Structuring & Formatting
    • Referencing & Citing
Most
Popular

Gold

30 50 USD
  • Get the Full Used Solution
    (Solution is already submitted and 100% plagiarised.
    Can only be used for reference purposes)
Save 33%

Silver

20 USD
  • Journals
  • Peer-Reviewed Articles
  • Books
  • Various other Data Sources – ProQuest, Informit, Scopus, Academic Search Complete, EBSCO, Exerpta Medica Database, and more