Advise on security issues

Assignment Help Computer Network Security
Reference no: EM131203663 , Length: word count:5000

Your report should detail the following section and points below commensurate with the marks allocated and be addressed primarily to the management of CCA Pty Ltd who are not security or IT experts. Some issues may require the acquisition of new software and hardware; you should identify suitable products that could be used to resolve the issues. Your proposal should adhere to industry security best practise and produce a secure and functional network installation for CCA Pty Ltd.

Addressing Identified Issues

- Vulnerabilities should be ranked based on a simple risk assessment methodology
- Consider any necessary changes you think appropriate to the network design
- Consider any necessary changes you think to the server and client deployment
- Identify appropriate remediation for each identified issue and explain fully in language appropriate for the customer

Implicit/Unidentified Issues

- Vulnerabilities should be ranked based on a simple risk assessment methodology
- Consider any necessary changes you think appropriate to the network design
- Consider any necessary changes you think to the server and client deployment
- Identify appropriate remediation for each identified issue and explain fully in language appropriate for the customer

Policy Development

Develop basic polices need to better secure the network; as a minimum the following should be considered:

- Password Policy
- Acceptable Network Usage Policy
- Acceptable Internet Usage Policy
- Acceptable Email Usage Policy

Network Design

- Provide a detailed network diagram showing your proposal
- You may want to consider multiple diagrams to separate physical & logical components

Presentation

- Grammar & spelling
- Report format
- Overall presentation
- Appropriate referencing for a customer report

CCA Pty Ltd Case Study Information

CCA Pty Ltd are suppliers and publishers of printed media primarily for the enterprise IT training industry. Products include course manuals, test booklets and IT technology reference books.

All of their sales are currently done via e-mail or direct contact with customers.

CCA Pty Ltd has recently upgraded their Internet connection to ADSL2+ on a 250GB pcm plan in order to cater for the future possibility of having an online store.

You have been hired as a network security consultant to advise on security issues as a result of the recent re-structuring of the network. The customer would also like to investigate the option of publishing their product online and be able to receive orders via a web application. They don't need specific recommendations with respect to products but they would like some generic ideas on how to accomplish these goals.

You should have more than enough information in this brief to build a very solid set of recommendations for the customer. I would advise you to keep things as simple and easy as possible rather than trying to go into infinite detail on any one specific security issue that you discover.

In a nutshell you must deliver a set of risks that you have discovered, some remediation mechanisms for those risks, some design suggestions (both descriptively AND diagrammatically) and some policy examples and suggestions. There are quite a number of issues with this scenario that cover both technical and non-technical issues of security - you are expected to cover both in some part at least.
Pay attention to the marking breakdown detailed at the start of this brief to get an idea on how important each section is.

You may present your report in whatever way you think most appropriate but remember to keep it very professional and appropriate for dissemination to the customer.

Report Length 5000-7500 words (20-30 pages)

Attachment:- Assessment - Case Study.rar

Reference no: EM131203663

Questions Cloud

Sustainability movement in business is a trend : How has technology and the flattening world affected you in the last 10 years? Please share examples of this. Do you think the sustainability movement in business is a trend that's here to stay or a business fad? Why or why not?
Find the range of load resistance rl : The Zener diode shown in Fig. 3.10a has a voltage breakdown of 100 V with a maximum rated current of 20 mA. If the supply voltage is 150 V, find the range of load resistance RL over which the circuit is useful in maintaining RL at 100 V if Rs = 1.5..
What biological characteristics have contributed to success : The Earth's largest phylum is Arthropoda, including centipedes, millipedes, crustaceans, and insects. The insects have shown to be a particularly successful class within the phylum. What biological characteristics have contributed to the success o..
Professionalism skills for workplace success : This exercise involves analyzing a communication technique-presentations. On a daily basis, it is often expected that professionals be proficient with presentations. For this exercise, prepare a PowerPoint presentation that serves as your own prof..
Advise on security issues : ITI581 Security Fundamentals - CCA Pty Ltd Case Study - You have been hired as a network security consultant to advise on security issues as a result of the recent re-structuring of the network
Depreciation to date expected future net cash flows : Presented below is information related to equipment owned by Porto Company at December 31, 2014. Cost Accumulated depreciation to date Expected future net cash flows Fair value $7,000,000 800,000 5,000,000 3,400,000 Assume that Porto will continue to..
Problem set-inventory control : The Fine Garments Company sells fashion clothing. The forecasted annual demand for their premium leather jacket is 2,000. The order-processing cost per order is $40, and the inventory holding cost is $35/item/year. How many leather jackets should ..
Oobtain information about the firms strength : List at least four sources you will use to obtain information about the firms strength, weakness, opportunities, and threats. Discuss what categories of the SWOT elements of information are readily available on the internet. What categories of dat..
Explain the concern using the five Problem Solving Methods : To prepare for solving a problem, we must first acknowledge that the problem exists. Then, we must accept it, and clearly define or identify it. Finally, we must commit to solving the problem. Without some degree of personal commitment, the problems ..

Reviews

len1203663

9/13/2016 2:08:11 AM

I also strongly recommend that you very carefully read and digest the information in this brief, and check the forum for answers, before you post any questions. This will avoid confusion for all students which in turn reduces the stress associated with doing your assessment at the last minute – something some of you will attempt to do Good luck!

len1203663

9/13/2016 2:07:53 AM

Formatting 1.5 line spacing 11 point Times New Roman Full Justified 2.5cm Margin all round Footer – Your name and Student ID If you feel you require further information to either make a point or to clarify some part of the brief please post your queries to the specific forum thread that has been created for Assessment 2 information. If you post a question regarding this assessment to any other thread I may not answer it!

Write a Review

Computer Network Security Questions & Answers

  Summarize how virtualization works

Summarize how virtualization works, what it can be used for, what the security flaws are, and why the security issues associated withvirtualization might be of concern.

  Explain the role of intelligence in cyber security

explain the role of intelligence and counterintelligence in cyber security. Your explanation should include both the defensive and offensive aspect; policies that support or interfere; and suggestions, based upon what you have learned in class, t..

  Automating compliance with federal information security

Automating Compliance with Federal Information Security Requirements," on page 115 of the text Information Security: Contemporary Cases. Also, you will be creating a PowerPoint presentation that explains the information that you wrote in your p..

  Which of the following values is the maximum end-to-end

which of the following values is the maximum end-to-end transit time that can adequately support voice traffic on a

  Write a ten page report for the cio of kudler fine foods

Write an 8-to 10-page report for the CIO of Kudler Fine Foods. The report should have clear recommendations to ensure that the final frequent shopper program system is properly secured against likely threats.

  For this application you will determine how your computer

for this application you will determine how your computer is connected through a network. you do not have to actually

  Illustrate that signature verification will succeed

If Bob receives M and S, describe process Bob will use to verify signature. Illustrate that in this case signature verification will succeed.

  What is the value of your shared secret key

You begin the session by sending X your calculated value of TA. X responds by sending you the value TB = 167. What is the value of your shared secret key? Show all your work.

  Explain hardware and software used to support personal

Write 700-1050 word paper explaining hardware and software used to support personal, workgroup, and enterprise computing within current organization, an organization.

  Make a 3-4-page memo outlining what you have done as the

over the past several years the chief executive officer ceo of your company has read articles on internet control

  Conduct a partial as-is audit of the healthy body wellness

You will be required to conduct a partial as-is audit of the Healthy Body Wellness Center organization - Create two additional question sets (The category and questions). Tip: Use two of the ISO 27002 controls. Create a policy, procedure and practi..

  Open this using a brute-force attack

What is the worst case number of combinations he must now test to try open this using a brute-force attack?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd