Reference no: EM133804945
Assessment Information
Task instructions
Type of Product (tick which applies)
Project
Assignment
Portfolio
Case study
Summary and Purpose of Assessment
This project has been designed for you to demonstrate your skills in the following areas:
Section-1
identify threats to security
develop risk management plan
design network security policies
Create a risk management plan
Determine attacker scenarios and threats
Develop security policies
Section-2
analyse and plan solutions to compromised networks and design incident response
evaluate security information and use it to plan suitable control methods and countermeasures
add network controls, according to system security policies, procedures and risk management plan.
Design auditing and incident response procedure
Implement configurations aligned with incident response procedure design
Assessment Instructions
This is an individual based project to be completed inside the class room. This assessment includes practical task and written questions. You will be required to answer a series of tasks designed to demonstrate your understanding in the skills listed above.
What
You need to answer all the tasks below. Information and resources will be provided to you via Blackboard or in this document.
Background
You are the IT administrator at a high school Melbourne Central High School.
You have been tasked with analysing the admin department, with a view to strengthening security. This department was selected for a few reasons:
They deal with a lot of sensitive information
It's a small department
Your analysis will involve the Identification of habits within the school.
If these changes work well, then they can be implemented across the rest of the school.
Section 1: Analysis and Education
As part of your role as an IT administrator, you take the opportunity to observe the existing behaviours that exist within the admin team in order to instil better security habits. Real experts, zero AI-Get authentic assignment help!
Task 1: Attacker scenarios & threats
A security breach recently occurred at Melbourne Central High School. Luckily all incoming phone calls to the school for security purposes. One such phone call was captured between Joe, one of MCHS's admin staff, and phone call with the ID "Microsoft".
The transcript of the call has been provided:
Joe: Hello.
Unknown caller: Hi, my name is Peter from Microsoft and we have detected an issue with your computer. Would you mind checking something for me?
Joe: Sure, what should I check?
Peter: Can you please open the event viewer
***Peter takes Joe through the steps to open the Event Viewer***
Peter: Can you see any alerts?
Joe: Yes.
Peter: Ok, it seems as though your computer has a virus running and is harming your computer files. Can you please open your browser and go to www.remotefix.com.
Joe: Ok.
Peter: Please download the program on the homepage and install it onto your computer.
Joe downloads, installs and opens the program.
Peter: Can you please put the following settings into the program so I can remote in and fix the problem.
Joe places the settings as advised by Peter and provides him with remote access to the computer.
Luckily the damage caused was minimal, but rather than punishing Joe, you use this as a teaching opportunity.
Advise Joe what type of attack has occurred?
Advise Joe what red flags should Joe have noticed during this call and why? (List 3, 5-15 words per response)
Task 2. Create Security policy to combat this breach
To assist in combating this type of breach, you believe a clear security policy needs to be provided to admin staff advising them they cannot engage with any phone calls relating to IT issues.
All IT related calls, whether they are deemed to be legitimate or not, need to be escalated to the IT team. If the IT team isn't available, then a message can be taken and passed on to the IT team via email.
Your policy must contain the following:
Overview (5 - 15 words):
Scope (Dot Point):
Standards (20 - 40 words):
Guidelines (40 - 75 words):
Procedures (Minimum of 4 clear steps):
Issues (10 - 20 words):
Non-Compliance (10 - 20 words):
Task 2a: Seek feedback on Security Policy
Exchange your completed security policy from Section 1: Task 2 with another student who will take on the role of another member of the school's IT team.
Populate the table below on behalf of the student you have exchanged
Student providing feedback:
Feedback
Positive aspect of the policy
Areas of the policy that need improvement
Task 2b: Respond to Feedback
Create a copy of your original policy and save it as a second document called: <Student Name> Security Policy Updated.docx
Amend the areas of the policy outlined in the feedback provided by the other IT member in this new document. Highlight these changes in yellow.
Ensure you submit both the original and your amended document.
Section 2: Reviewing the Network
You have been tasked with reviewing the existing security setup in place. This will be done in 3 parts:
Creating a risk management plan
Creating an incident response plan
Using the newly created incident response and risk management Plan and in conjunction with a Security Policy relating to password enforcement to verify your network is operating according to these documents.
Required settings for each device have been provided to you. These settings can be download from Blackboard.