Reference no: EM131203663 , Length: word count:5000
Your report should detail the following section and points below commensurate with the marks allocated and be addressed primarily to the management of CCA Pty Ltd who are not security or IT experts. Some issues may require the acquisition of new software and hardware; you should identify suitable products that could be used to resolve the issues. Your proposal should adhere to industry security best practise and produce a secure and functional network installation for CCA Pty Ltd.
Addressing Identified Issues
- Vulnerabilities should be ranked based on a simple risk assessment methodology
- Consider any necessary changes you think appropriate to the network design
- Consider any necessary changes you think to the server and client deployment
- Identify appropriate remediation for each identified issue and explain fully in language appropriate for the customer
Implicit/Unidentified Issues
- Vulnerabilities should be ranked based on a simple risk assessment methodology
- Consider any necessary changes you think appropriate to the network design
- Consider any necessary changes you think to the server and client deployment
- Identify appropriate remediation for each identified issue and explain fully in language appropriate for the customer
Policy Development
Develop basic polices need to better secure the network; as a minimum the following should be considered:
- Password Policy
- Acceptable Network Usage Policy
- Acceptable Internet Usage Policy
- Acceptable Email Usage Policy
Network Design
- Provide a detailed network diagram showing your proposal
- You may want to consider multiple diagrams to separate physical & logical components
Presentation
- Grammar & spelling
- Report format
- Overall presentation
- Appropriate referencing for a customer report
CCA Pty Ltd Case Study Information
CCA Pty Ltd are suppliers and publishers of printed media primarily for the enterprise IT training industry. Products include course manuals, test booklets and IT technology reference books.
All of their sales are currently done via e-mail or direct contact with customers.
CCA Pty Ltd has recently upgraded their Internet connection to ADSL2+ on a 250GB pcm plan in order to cater for the future possibility of having an online store.
You have been hired as a network security consultant to advise on security issues as a result of the recent re-structuring of the network. The customer would also like to investigate the option of publishing their product online and be able to receive orders via a web application. They don't need specific recommendations with respect to products but they would like some generic ideas on how to accomplish these goals.
You should have more than enough information in this brief to build a very solid set of recommendations for the customer. I would advise you to keep things as simple and easy as possible rather than trying to go into infinite detail on any one specific security issue that you discover.
In a nutshell you must deliver a set of risks that you have discovered, some remediation mechanisms for those risks, some design suggestions (both descriptively AND diagrammatically) and some policy examples and suggestions. There are quite a number of issues with this scenario that cover both technical and non-technical issues of security - you are expected to cover both in some part at least.
Pay attention to the marking breakdown detailed at the start of this brief to get an idea on how important each section is.
You may present your report in whatever way you think most appropriate but remember to keep it very professional and appropriate for dissemination to the customer.
Report Length 5000-7500 words (20-30 pages)
Attachment:- Assessment - Case Study.rar
Sustainability movement in business is a trend
: How has technology and the flattening world affected you in the last 10 years? Please share examples of this. Do you think the sustainability movement in business is a trend that's here to stay or a business fad? Why or why not?
|
Find the range of load resistance rl
: The Zener diode shown in Fig. 3.10a has a voltage breakdown of 100 V with a maximum rated current of 20 mA. If the supply voltage is 150 V, find the range of load resistance RL over which the circuit is useful in maintaining RL at 100 V if Rs = 1.5..
|
What biological characteristics have contributed to success
: The Earth's largest phylum is Arthropoda, including centipedes, millipedes, crustaceans, and insects. The insects have shown to be a particularly successful class within the phylum. What biological characteristics have contributed to the success o..
|
Professionalism skills for workplace success
: This exercise involves analyzing a communication technique-presentations. On a daily basis, it is often expected that professionals be proficient with presentations. For this exercise, prepare a PowerPoint presentation that serves as your own prof..
|
Advise on security issues
: ITI581 Security Fundamentals - CCA Pty Ltd Case Study - You have been hired as a network security consultant to advise on security issues as a result of the recent re-structuring of the network
|
Depreciation to date expected future net cash flows
: Presented below is information related to equipment owned by Porto Company at December 31, 2014. Cost Accumulated depreciation to date Expected future net cash flows Fair value $7,000,000 800,000 5,000,000 3,400,000 Assume that Porto will continue to..
|
Problem set-inventory control
: The Fine Garments Company sells fashion clothing. The forecasted annual demand for their premium leather jacket is 2,000. The order-processing cost per order is $40, and the inventory holding cost is $35/item/year. How many leather jackets should ..
|
Oobtain information about the firms strength
: List at least four sources you will use to obtain information about the firms strength, weakness, opportunities, and threats. Discuss what categories of the SWOT elements of information are readily available on the internet. What categories of dat..
|
Explain the concern using the five Problem Solving Methods
: To prepare for solving a problem, we must first acknowledge that the problem exists. Then, we must accept it, and clearly define or identify it. Finally, we must commit to solving the problem. Without some degree of personal commitment, the problems ..
|