Designandimplementvirtualisedcybersecurityinfrastructurefororganisations ICTCYS612
- Subject Code :
ICTCYS612
ICTCYS612
Designandimplementvirtualisedcybersecurityinfrastructurefororganisations
ProjectPortfolio(Explanatory Document)
CONTENTS
Section1:Virtualisedcybersecurityinfrastructure 4
Section2:Implementationandtesting 12
Studentname: |
Studentmustinclude. |
Assessor: |
Studentmustinclude. |
Organisations this assessment is based on: |
Studentmustinclude.Thiswillbethecasestudyorganisationsprovidedinappendix1. |
Section1:Virtualisedcybersecurityinfrastructure
Completethissectionforeachorganisation.
Organisation1
Organisationoperations Provideananalysisofyourchosen organisationsoperations. Describe the cyber security needs the or- ganisationhasbasedontheiroperations. |
Addressing the first organisation inAppendix 1, the student must provideananalysisoftheorganisationsoperations.
Alsodescribethecybersecurityneedsoftheorganisationwhich havetobebasedontheiroperations. |
Network security options andtechnologies Based on the organisations cyber securityneeds, identify and describe networksecurity options, as well as suitable securitytechnologies. Remember that these must relate to virtualised cyber securityinfrastructures. Include at least two options for network securityandtwosecuritytechnologies. |
The student must identify and describe network security options, as well as suitablesecuritytechnologiesandthesemustrelatetovirtualisedcyber securityinfrastructures. Studentsmaydiscussarangeofoptionsandtechnologies. For example, virtualised cyber security options include virtual firewalls and password policies. Security technologies will be those provided by cyber security providers, studentscanidentifyarangeofvarioustechnologies. |
Requirements Describe the data types to be protected,security levels required and secureboundaryrequirements. Further, describe the mission-criticalnetworkserversthatarepartoftheinfrastructure. |
Thestudentmustdescribethedatatypestobeprotected,securitylevels required and secure boundary requirements. As well as describe the mission- criticalnetworkserversthatarepartoftheinfrastructure. Thiswillbeaspertheinformationfromthecasestudy. |
Infrastructuredesign Provide your design for the virtualised cyber security infrastructure. You caninclude this as a screenshot and attach it toyour Portfolio. |
The student must provide their design for the virtualised cyber security. This willbebasedontheoptionsandtechnologytheyhaveresearchedabove. |
||||
Implementationplan Provide your implementation plan for yourdesign. Make sure you plan includes: Actions for implementation includingnetwork boundaries and technologies thatwill be used. responsibilitiesandtimelines. |
The student must provide their implementation plan. The implementation plan mustbebasedontheirproposeddesign.Refertheexample.Butdonotcopyit. |
||||
Action |
Responsibilities |
Timelines |
|||
Finaldesign approved |
ITProjectManager |
Week1 |
|||
Procuresoftware requiredandinstall |
ITProjectManager |
Week2 |
|||
Testsystemsand adjust |
ITProjectManager |
Week3 |
|||
Finalisesystemand provide finalreport to client |
ITProjectManager |
Week4 |
|||
Networksecuritymonitoringstrategy Describe the strategy that will be used formonitoring the network security. |
The student must describe the strategy that will be used for monitoring the network. For example, they may refer tothereal time network monitoring. Address some other strategies as you suggested. |
Tools Outline the tools that you will use toimplement the infrastructure. Explain how you will obtain access to the network anddata you need. |
Thestudentmustoutlinethetoolstheywillusetoimplementthe infrastructure. This will be specific software plus hardware e.g. the physicalcomputer. Theystudentmustalsoexplainhowtheywillobtainaccesstothenetwork and data you need. For example, in this instance, it would mean downloading thevirtualmachinesoftwareontotheclientscomputer. |
Presentation Include the title of your presentation hereandattachittoyourPortfolio. |
The student must include the slides of their power point presentation here. Then you submit your project portfolio to your teacher for his feedback comments.
Note: There are few more sections below in this document require teachersfeedback.Completethosesectionsaswellbeforeyousuendthisdocumentfor teachers feedback. After completing all those sections, sendyour document to teacher for his feedback. Then he will put his feedbacks to all feedback sections same time. Then you can complete the Feedback sections of this document. |
Feedback Document the feedback you receivedfromthe presentation regarding your design.
Describe your response to this feedbackand adjustments you will make. |
Teacher will put his feedback here. Then the student must include their response to it mentioning adjustments to be introduced into their PP prsen- tation following teachers feedback. |
Organisation2
Organisationoperations Provideananalysisofyourchosen organisationsoperations. Describe the cyber security needs theorganisation has based on their operations. |
Dothesamefortheorganisation2asyoudidfortheorganisation1above. |
Network security options andtechnologies Based on the organisations cyber securityneeds, identify and describe networksecurity options, as well as suitable securitytechnologies. Remember that these must relate to virtualised cyber securityinfrastructures. Include at least two options for network securityandtwosecuritytechnologies. |
Dothesamefortheorganisation2asyoudidfortheorganisation1above. |
Requirements Describe the data types to be protected,security levels required and secureboundaryrequirements. Further, describe the mission-criticalnetworkserversthatarepartoftheinfrastructure. |
Dothesamefortheorganisation2asyoudidfortheorganisation1above. |
Infrastructuredesign Provide your design for the virtualised cyber security infrastructure. You caninclude this as a screenshot and attach it toyour Portfolio. |
Dothesamefortheorganisation2asyoudidfortheorganisation1above. |
Implementationplan Provide your implementation plan for yourdesign. Make sure you plan includes: Actions for implementation includingnetwork boundaries and technologies thatwill be used. responsibilitiesandtimelines. |
Dothesamefortheorganisation2asyoudidfortheorganisation1above. |
Networksecuritymonitoringstrategy Describe the strategy that will be used formonitoring the network security. |
Dothesamefortheorganisation2asyoudidfortheorganisation1above. |
Tools Outline the tools that you will use toimplement the infrastructure. Explain how you will obtain access to the network anddata you need. |
Dothesamefortheorganisation2asyoudidfortheorganisation1above. |
Presentation Include the title of your presentation hereandattachittoyourPortfolio. |
Dothesamefortheorganisation2asyoudidfortheorganisation1above. |
Feedback Document the feedback you received fromthe presentation regarding your design. Describe your response to this feedbackand adjustments you will make. |
Dothesamefortheorganisation2asyoudidfortheorganisation1above. |
Section2:Implementationandtesting
Completethissectionforeachorganisation.
Organisation1
Implementation Youaretoprovideevidenceoftheimplementation of your design. Thisshould include screenshots thatshow: Networkboundariescreated Relevanttechnologiesimplemented Securitylevelsset Useraccessset |
The student must provide evidence of the implementation of the design they have created. This will depend on their design and the technologies they have identified. Thestudentmustprovidescreenshotsoftheirwork.Youmaytakescreen- shots from your work done in your computer or virtual demonstrations you developed with virtual machines and Cisco packet tracer. You can download and install the oracle VM Box as the virtual machine. There are plenty of video clips in YouTube explaining how to use the Oracle VM Box and install virtual computers into it. Otherwise ask your teacher to demonstrate that to you in the classroom. |
Testing Run tests on your network whichwillalsodemonstratehowyoumonitor the network. Describe the tests you undertookandtheresults.Providescreenshotsofthetestresultsincludinglogs. |
The student must provide evidence of the monitoring and testing of the system they havecreated.Onceyoudonethis,submityourdocumenttoyourteacherforhis feedback. |
Userfeedback Document the user feedback fromyour assessor. |
Thestudentmustdocumenttheteacherssfeedbackprovidedhere. |
Adjustments Basedonthetestsyouran,monitoringanduserfeedbackdescribe the adjustments you needto make. |
The student must document their adjustments based on the testing, monitoring and user feedback. |
Organisation2
Implementation Youaretoprovideevidenceoftheimplementation of your design. Thisshould include screenshots thatshow: Networkboundariescreated Relevanttechnologiesimplemented Securitylevelsset Useraccessset |
Dothesamefortheorganisation2asyoudidfortheorganisation1above. |
Testing Run tests on your network whichwillalsodemonstratehowyoumonitor the network. Describe the tests you undertookandtheresults.Providescreenshotsofthetestresultsincludinglogs. |
Dothesamefortheorganisation2asyoudidfortheorganisation1above. |
Userfeedback Document the user feedback fromyour assessor. |
Dothesamefortheorganisation2asyoudidfortheorganisation1above. |
Adjustments Basedonthetestsyouran,monitoringanduserfeedbackdescribe the adjustments you needto make. |
Dothesamefortheorganisation2asyoudidfortheorganisation1above. |