Analyse and plan solutions to compromised networks

Assignment Help Computer Networking
Reference no: EM133804945

Assessment Information

Task instructions

Type of Product (tick which applies)
Project
Assignment
Portfolio
Case study

Summary and Purpose of Assessment
This project has been designed for you to demonstrate your skills in the following areas:

Section-1
identify threats to security
develop risk management plan
design network security policies
Create a risk management plan
Determine attacker scenarios and threats
Develop security policies

Section-2
analyse and plan solutions to compromised networks and design incident response
evaluate security information and use it to plan suitable control methods and countermeasures
add network controls, according to system security policies, procedures and risk management plan.
Design auditing and incident response procedure
Implement configurations aligned with incident response procedure design

Assessment Instructions
This is an individual based project to be completed inside the class room. This assessment includes practical task and written questions. You will be required to answer a series of tasks designed to demonstrate your understanding in the skills listed above.

What
You need to answer all the tasks below. Information and resources will be provided to you via Blackboard or in this document.

Background
You are the IT administrator at a high school Melbourne Central High School.

You have been tasked with analysing the admin department, with a view to strengthening security. This department was selected for a few reasons:
They deal with a lot of sensitive information
It's a small department

Your analysis will involve the Identification of habits within the school.

If these changes work well, then they can be implemented across the rest of the school.

Section 1: Analysis and Education
As part of your role as an IT administrator, you take the opportunity to observe the existing behaviours that exist within the admin team in order to instil better security habits. Real experts, zero AI-Get authentic assignment help!

Task 1: Attacker scenarios & threats
A security breach recently occurred at Melbourne Central High School. Luckily all incoming phone calls to the school for security purposes. One such phone call was captured between Joe, one of MCHS's admin staff, and phone call with the ID "Microsoft".

The transcript of the call has been provided:

Joe: Hello.
Unknown caller: Hi, my name is Peter from Microsoft and we have detected an issue with your computer. Would you mind checking something for me?

Joe: Sure, what should I check?

Peter: Can you please open the event viewer

***Peter takes Joe through the steps to open the Event Viewer***
Peter: Can you see any alerts?

Joe: Yes.

Peter: Ok, it seems as though your computer has a virus running and is harming your computer files. Can you please open your browser and go to www.remotefix.com.

Joe: Ok.

Peter: Please download the program on the homepage and install it onto your computer.

Joe downloads, installs and opens the program.

Peter: Can you please put the following settings into the program so I can remote in and fix the problem.

Joe places the settings as advised by Peter and provides him with remote access to the computer.

Luckily the damage caused was minimal, but rather than punishing Joe, you use this as a teaching opportunity.

Advise Joe what type of attack has occurred?
Advise Joe what red flags should Joe have noticed during this call and why? (List 3, 5-15 words per response)

Task 2. Create Security policy to combat this breach
To assist in combating this type of breach, you believe a clear security policy needs to be provided to admin staff advising them they cannot engage with any phone calls relating to IT issues.

All IT related calls, whether they are deemed to be legitimate or not, need to be escalated to the IT team. If the IT team isn't available, then a message can be taken and passed on to the IT team via email.

Your policy must contain the following:

Overview (5 - 15 words):
Scope (Dot Point):
Standards (20 - 40 words):
Guidelines (40 - 75 words):
Procedures (Minimum of 4 clear steps):
Issues (10 - 20 words):
Non-Compliance (10 - 20 words):

Task 2a: Seek feedback on Security Policy
Exchange your completed security policy from Section 1: Task 2 with another student who will take on the role of another member of the school's IT team.

Populate the table below on behalf of the student you have exchanged
Student providing feedback:

Feedback
Positive aspect of the policy
Areas of the policy that need improvement

Task 2b: Respond to Feedback
Create a copy of your original policy and save it as a second document called: <Student Name> Security Policy Updated.docx

Amend the areas of the policy outlined in the feedback provided by the other IT member in this new document. Highlight these changes in yellow.

Ensure you submit both the original and your amended document.

Section 2: Reviewing the Network
You have been tasked with reviewing the existing security setup in place. This will be done in 3 parts:
Creating a risk management plan
Creating an incident response plan
Using the newly created incident response and risk management Plan and in conjunction with a Security Policy relating to password enforcement to verify your network is operating according to these documents.

Required settings for each device have been provided to you. These settings can be download from Blackboard.

Reference no: EM133804945

Questions Cloud

Adolescent with history of hemophilia : A nurse is teaching an adolescent with a history of hemophilia how to administer replacement factor at home.
Complete control of the environment : A desire to have complete control of the environment Folklore concerning the desired sex of the unborn child.
Describe how tobacco was introduced to the europeans : Describe how tobacco was introduced to the Europeans. Analyze how tobacco resulted in cash crops and significant trade for the British.
Describe principles of effective communication : Explain the roles and scope of practice for members of the intraprofessional team. Describe principles of effective communication in the healthcare setting.
Analyse and plan solutions to compromised networks : analyse and plan solutions to compromised networks and design incident response evaluate security information and use it to plan suitable control methods
Adjunct treatment for the conditions : 60 year old asian female with hypertension and diabetes presents to the FNP about ginkgo biloba as an adjunct treatment for the conditions
Which specific elements of the chapter do you think you will : Which specific elements of the chapter do you think you will be able to take with you into your career and use?
History of prescription BZD dependence : When providing primary care for a middle-aged woman with a history of prescription BZD dependence, you consider that:
History of falls causes her to be fearful of falling : Mona Caldwell, 64 y.o., Asian American. Slipped in the bathroom with a history of falls causes her to be fearful of falling

Reviews

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd