diff_months: 25

ICTNWK546 Manage Network Security Assignment

Download Solution Now
Added on: 2023-01-21 05:13:57
Order Code: CLT314975
Question Task Id: 0

Section 1: Security design preparation

Network securityplanningProvide an outline of the processesyou will use to plan, build and manage a network security designto meet theorganisationsrequirements.

  • Create password specifications
  • Describe the safety measures for email
  • How should sensitive data be handled?
  • Establish guidelines for using technology
  • Establish guidelines for using Facebook and twitter
  • Be ready for a situation
  • Update your policy as necessary.

ICT assetsProvide an overview of the organisations assets that need protecting. Remember assets are not just physical assets.Categorise each of the assets in terms of their value. The value does not need to be a monetary value but instead can be based on the value to the organisation e.g., high, medium, low, etc.

  1. PeopleHuman resources are usually a company's mostsignificant asset, so they should be given higher weight when assessingrisk. (High)
  2. Property can consist of both physical and immaterial items(Medium)
  3. Legal responsibility: Legal risks should be handled separatelybecause they may affect both people and property. This is partially due tothe amount of litigation that increasingly affects the military industry(Low)no

Threat modellingDescribe at least three major threats to network security that can happen to any organisation, as well as where thesethreats originate from.For each threat, describe a system vulnerability that may have led to the threat.

  1. Opening a questionable email or software can download malware and viruses. This can also be avoided if malware and anti-virus applications are used.
  2. DDos attacks happen in the absence of a firewall or other information security software.
  3. Person in the Middlehappens when users connect in an unsecuredmanner.

Risk management planFor each of the threats you have identified,identify the level of risk that the threat presents (use a risk legend to do this).Rank the threats in order of severity from least severe to most severe.Outline a risk control relevant to each threat.Use the table included in the Portfolio to develop your plan.

Risk 1.

Man in the Middle Attack

Risk Control

Employing asecurenetwork

Visitingreliablewebsites

Your cablenetworkfirewallinstallation

Risk 2.

DDoS Attack

Risk Control

Putting in afirewall

Risk 3.

Malware/Virus

Risk Control

Puttingsecurityprograms,such asantivirus orantimalware,in place

Avoiddownloadingor launchingdodgyprogramsfrom emails orwebsites youdon't trust

Section 2: Security design and policy

  1. Network security designProvide an overview of your design to protect network security.
  2. Include screenshots to illustrate your work as required.
  3. Make sure you take into account themanufacturers recommendations for use of the tools you willincorporate into yourdesign. Write about how you have done this.
  4. Further, include the costs ofthe equipment/software youhave identified andThe network security design from IT Biz Solutions Security offers a complete answer to all of their security requirements. Data encryption, secure communication protocols, secure authentication and authorisation, virus protection, and intrusion detection and prevention are all included in the design. The design also incorporates a thorough monitoring and recording system to guarantee that all traffic is tracked and recorded for forensic investigation and incident response. A strong patch management system is also incorporated into the design to guarantee that all systems and apps are maintained up to date with the most recent security updates. Last but not least, the design incorporates a disaster recovery strategy to guarantee that the network and its data are safeguarded in case of an emergency.
  • Before a connection is installed, a firewall will be constructed in each office.
  • To prevent unauthorised users from using the network, the firewall will be configured to give out a public IP address.
  • Every PC will have antivirus and anti-malware softwareinstalled.

  • Uploaded By : Katthy Wills
  • Posted on : January 21st, 2023
  • Downloads : 0
  • Views : 419

Download Solution Now

Can't find what you're looking for?

Whatsapp Tap to ChatGet instant assistance

Choose a Plan

Premium

80 USD
  • All in Gold, plus:
  • 30-minute live one-to-one session with an expert
    • Understanding Marking Rubric
    • Understanding task requirements
    • Structuring & Formatting
    • Referencing & Citing
Most
Popular

Gold

30 50 USD
  • Get the Full Used Solution
    (Solution is already submitted and 100% plagiarised.
    Can only be used for reference purposes)
Save 33%

Silver

20 USD
  • Journals
  • Peer-Reviewed Articles
  • Books
  • Various other Data Sources – ProQuest, Informit, Scopus, Academic Search Complete, EBSCO, Exerpta Medica Database, and more