diff_months: 15

ICTNWK546 Manage Network Security Assessment

Download Solution Now
Added on: 2023-01-30 05:09:11
Order Code: CLT315040
Question Task Id: 0

Section 1: Security design preparation

1. Network security planning  

  • Provide an outline of the processes you will use to plan, build and manage a network security design to meet the  organisation’s  requirements. 

2. ICT assets  

  • Provide an overview of the organisation’s assets that need protecting. Remember assets are not just physical assets. 
  • Categorise each of the assets in terms of their value. The value does not need to be a monetary value but instead can be based on the value to the organisation e.g., high, medium, low, etc. 

3. Threat modelling

  • Describe at least three major threats to network security that can happen to any organisation, as well as where these threats originate from. 
  • For each threat, describe a system vulnerability that may have led to the threat. 

4. Risk management plan 

  • For each of the threats you have identified, identify the level of risk that the threat presents (use a risk legend to do this).  
  • Rank the threats in order of severity from least severe to most severe. Outline a risk control relevant to each threat. 
  • Use the table included in the Portfolio to develop your plan. 

5. Presentation

  • Write the title of your presentation here and attach it to your Portfolio.

Section 2: Security design and policy

1. Network security design

  • Provide an overview of your design to protect network security.  
  • Include screenshots to illustrate your work as required.  
  • Make sure you take into account manufacturer’s recommendations for use of the tools you will  incorporate into your design. Write about how you have done this. 
  • Further, include the costs of the equipment/software you have identified and document them here. 

2. Security policies

  • Develop and document security policies to  accompany your network security design.  
  • Your security policy must include as a minimum: 
  • Purpose of the policy.
  • Key procedures relevant to maintaining security e.g., identity management, threat management (including incident response procedures) and auditing procedures.  
  • As a guide your policy should be 2 – 3 pages. Write the name of your policy here and attach it your Portfolio. 

Get your ICTNWK546 Manage Network Srecurity assignment solved by our Network Security Experts from Exam Question Bank . Our Assignment Writing Experts are efficient to provide a fresh solution toall question. We are serving more than 10000+ Students in Australia, UK & US by helping them to score HD in their academics. Our Experts are well trained to follow all marking rubrics & referencing Style. Be it a used or new solution, the quality of the work submitted by our assignment experts remains unhampered.

You may continue to expect the same or even better quality with the used and new assignment solution files respectively. There’s one thing to be noticed that you could choose one between the two and acquire an HD either way. You could choose a new assignment solution file to get yourself an exclusive, plagiarism (with free Turn tin file), expert quality assignment or order an old solution file that was considered worthy of the highest distinction.

  • Uploaded By : Katthy Wills
  • Posted on : January 30th, 2023
  • Downloads : 0
  • Views : 150

Download Solution Now

Can't find what you're looking for?

Whatsapp Tap to ChatGet instant assistance

Choose a Plan

Premium

80 USD
  • All in Gold, plus:
  • 30-minute live one-to-one session with an expert
    • Understanding Marking Rubric
    • Understanding task requirements
    • Structuring & Formatting
    • Referencing & Citing
Most
Popular

Gold

30 50 USD
  • Get the Full Used Solution
    (Solution is already submitted and 100% plagiarised.
    Can only be used for reference purposes)
Save 33%

Silver

20 USD
  • Journals
  • Peer-Reviewed Articles
  • Books
  • Various other Data Sources – ProQuest, Informit, Scopus, Academic Search Complete, EBSCO, Exerpta Medica Database, and more