diff_months: 11

Security Checklist A Case Study

Download Solution Now
Added on: 2024-11-14 05:00:07
Order Code: SA Student Jeff IT Computer Science Assignment(3_24_40321_106)
Question Task Id: 502397

CP2414 Assignment 1

Security Checklist A Case Study

0393277WARNING: This is NOT a group-based assignment. You should complete all parts of your submission INDIVIDUALLY.

Discussions and online tools (e.g., Google and ChatGPT) are allowed; however, please practice academic integrity (jcu.edu.au/students/learning-centre/academic-integrity) by citing and paraphrasing the sources. Note that citing ChatGPT is not a proper citation at this stage.

00WARNING: This is NOT a group-based assignment. You should complete all parts of your submission INDIVIDUALLY.

Discussions and online tools (e.g., Google and ChatGPT) are allowed; however, please practice academic integrity (jcu.edu.au/students/learning-centre/academic-integrity) by citing and paraphrasing the sources. Note that citing ChatGPT is not a proper citation at this stage.

Due Date: 11.59 pm, 08/March/2024

Introduction

This assignment contains three parts:

Part I - Identify and analyse threats to a company. Then, search for appropriate devices/software to address those threats. Remember to justify your choices (feasibility, efficiency, etc.).

Part II - Design a secure network.

Part III Citation and Referencing.

Scope

The concepts we discussed in the first three weeks cover all you need to complete this assignment.

Deliverables

Submit a single PDF document (.pdf) containing all parts to the Assignment 1 submission box in LearnJCU.

Formatting

If you use Word: Calibri 11, Line Spacing 1.5, leave Margins and Space before/after Paragraph as default.

If you use LaTeX: Article class specifying A4 paper and 1.5 line spacing.

Use IEEE referencing (including both in-text citations and reference list). See https://libguides.jcu.edu.au/IEEE

NOTE

We strongly suggest you check the originality of your submission via Draft submission SafeAssign Originality Report. If your report returns more than 40% similarity (including the reference list), then you should paraphrase to reduce this number.

Assignment rubric can be found in subject outline.

A suggested report structure sample at the end of this assignment sheet.

If you use answers from ChatGPT, then you should find the original resources to cite the ChatGPT answers. For example, ChatGPT tells you how packet-filtering firewalls work. You go to Google to find a citable resource saying (almost) the same thing as ChatGPT, then cite that resource.

Scenario Background

An Australian mattress-in-a-box company, TheSleepyheads, is not confident about its IT system considering the global rise in cybercrime and ransomware. Your friends in this company recommended you as a Cybersecurity Consultant to look after their IT system.

TheSleepyheads is a growing mattress-in-a-box company consisting of two branches, the Perth (Headquarters) branch and the Sydney branch. Each branch has four departments, with approximately forty employees per department. The Perth (Headquarters) branch has one mail server, two web servers, and two database servers. The Sydney branch has only one mail server and one database server.

Both branches have high-speed networks; however, weekday traffic can be pretty heavy. This is especially true for the Perth branch.

They have asked you to:

For both branches - Identify and analyse application and networking-based threats to their company; and

For the Perth (Headquarters) branch only - Recommend preventative and mitigative technologies and strategies for potential intrusion and attacks on the network.

Assignment tasks:

Part I. Potential Threats

TheSleepyheads have collected a list of complaints from employees about the workstations for you:

Complaint 1 (Teddy): My computer takes a long time to start up and shut down. It seems that there are other programs, which I dont use, running when I start my computer as well.

Complaint 2 (Christina): I often get the blue screen of death, and my workstation keeps crashing. This is so frustrating.

Complaint 3 (Meredith): It takes forever to download a file from the company servers. It doesnt even matter what the size or type of the file is.

Complaint 4 (Alex): Ive got customers and colleagues informing me that Ive been sending them emails; this is very weird because my job doesnt concern sending out emails to my colleagues, let alone customers.

Complaint 5 (Richard): I get many pop-ups on my screen. I never visited any inappropriate websites.

Complaint 6 (Joe): My computer's fan is so loud. It spins fast and always, even when I am not using it.

Complain 7 (All employees): It is either no response from the website, mail and database servers or taking too long to load the contents from those servers.

From the complaints above, you are asked to analyse and identify the threat/s (if any) and recommend strategies and technologies to prevent and mitigate those identified threats.

NOTE

Your threat analysis and identification should ONLY focus on network security as a result of cyber-attacks. For example, we do not consider website server access difficulty due to an out-of-order keyboard.

The complaints may be correlated with each other.

Part II. Firewall, Honeypot/s, and Other Network Security Technologies Planning and Design for Perth Branch

Deploying firewalls, honeypots, and other network security technologies can effectively protect an organisations network. As such, TheSleepyheads asked you to design a network security configuration for the Perth branch of the company. To do this, you will need to consider the existing facilities at the Perth (Headquarters) branch, the solutions you recommended in Part I and additional honeypot(s). Specifically, we should

Draw your proposed secure network diagram, including the following:

Firewall(s)

Other network security technologies (hardware and/or software)

Honeypot(s)

Existing devices (e.g., servers, workstations, routers and switches)

Explain and justify the configuration diagram regarding the following:

The type and placement of each firewall;

The honeypot location/s and quantity;

The placement and purpose of each piece of hardware/software.

Part III. Use IEEE referencing style. See https://libguides.jcu.edu.au/IEEE.

Suggested Report Structure

For the highest marks possible, you should READ THE RUBRIC and submit your report using the following structure:

Part I. Potential Threats

Complaint [number] [name]:

Identify the problem/s stated by the employee/s.

[Identified threat/s] [Discussion and comprehensive explanation for the identified threat/s]

Solution [Recommended resolution for threat]

Overarching Threat:

[If an overarching threat exists, you should discuss this here. See Part Is Note]

Part II. Firewall(s), honeypot(s), and other network security technologies Planning and Design

Diagram

Explanation and justification of the proposed configuration.

End of Assignment 1

  • Uploaded By : Pooja Dhaka
  • Posted on : November 14th, 2024
  • Downloads : 0
  • Views : 169

Download Solution Now

Can't find what you're looking for?

Whatsapp Tap to ChatGet instant assistance

Choose a Plan

Premium

80 USD
  • All in Gold, plus:
  • 30-minute live one-to-one session with an expert
    • Understanding Marking Rubric
    • Understanding task requirements
    • Structuring & Formatting
    • Referencing & Citing
Most
Popular

Gold

30 50 USD
  • Get the Full Used Solution
    (Solution is already submitted and 100% plagiarised.
    Can only be used for reference purposes)
Save 33%

Silver

20 USD
  • Journals
  • Peer-Reviewed Articles
  • Books
  • Various other Data Sources – ProQuest, Informit, Scopus, Academic Search Complete, EBSCO, Exerpta Medica Database, and more