COM6013 Cybersecurity and AI Dissertation Project Assignment

Assignment Help Other Subject
Reference no: EM132827022 , Length: word count:3000

COM6013 Cybersecurity and AI Dissertation Project - University of Sheffield

Assignment Brief

VibeTel is a small to medium company that provides telecommunication services like (calls, text messages, video, and file sharing) to their customers. The company has a staff capacity of 150 and have two remote sites in UK and the US. VibeTel has 25 staffs working on site in both UK and USA, the rest of the employees work remotely. They have a moderate customer base of2000 that use their telecommunication services.

VibeTel has network and computing infrastructures on site, and due to the pandemic, the staff connect remotely and share files for busviness purposes. There are servers onsite that host files and they have some cloud subscription. Their servers host confidential information like User ID, address, phone number, card details,and confidential user information.Their staff normally use any device at home to connect and do their jobs. They connect via mobile, desktop, laptops etc. For those working on site, both building in US and UK have no barriers but physicalsecurity checks by onsite security agent.

The company's servers and network devices are located on the general office area, and they can beaccessed by everyone. The staff do not have any guidelines on how togenerate and use passwords, some of them are using their pet's name and favourite coffeeshop as password. The staff in addition use their personal gadgets in office to do work related activities. There is only one wireless network where all staff and visitors use. Both onsite and online staff use emails and Voice over IP (VoIP) phones to communicate with customers for troubleshooting purpose or account related updates.As the office is international, the head of IT in both countriesshould be grounded on laws governing data privacy and security.They seldom follow and implement these government policies in handling users' data in both countries.

The company have no interest in investing into perimeter firewalls or virtual firewall services. They are satisfied with the Service Provider's (SP) security serviceslike (packet filtering and inspection,malware detection and antispyware).In addition, some of the services they pay the SPare cloud space, reliable internet connection and priority on real-time services like voice and streaming data.Staffreceive several bogus texts, emails and phones from strangers persuading them to click a link for several reasons mostly malicious.To quickly share and save files, staff sometimes save customers' details in USB sticks and hard drives, the computers onsite all allow the use of external USB drive. Network admin and IT administrators find it difficult to track staff activity in the organisation, sometimes staffdeny doing certain operations and the IT teams are finding it difficult to trace which staff account access certain files or carry out an operation. Staffs occasionally use torrent sites to download movies and games.
Produce a security report for VibeTelthat analyses the possible threats and vulnerabilities that exist in their infrastructure and the way they do business. Provide mitigation strategiesthat will increase the security posture of the organisation towards maintainingconfidentiality, integrity, and availability. Your solution should take in consideration awareness to government and policy guidance in cybersecurity and use threat modelling methods in analysing the given network topology.

Hint on report writing style and format (3000 words)
Threat and vulnerabilities
• Individual
• Business
• Communications
• Infrastructure
Risk Assessment (Impact)
Threat modelling
• Data Flow Diagram (DFD)
Threat Mitigation Strategy
Summary and Conclusion
References

Attachment:- Cybersecurity and AI Dissertation Project.rar

Reference no: EM132827022

Questions Cloud

Expected total annual holding cost plus ordering cost : How much should Linda order from the Federal Reserve Board each time a cash order is placed if she wants to minimize her cost?
Discuss the various organizations slated with the protection : Students will discuss the various organizations slated with the protection of the United States and it's interests. Additionally, students will provide some.
What is the expected number of occupied seats : What is the expected number of occupied seats in the waiting room? Maintain at least 3 decimal place in all intermediate calculations
What is meant by strategic group analysis : What is meant by strategic group analysis, and why is this technique especially useful in healthcare strategic planning?
COM6013 Cybersecurity and AI Dissertation Project Assignment : COM6013 Cybersecurity and AI Dissertation Project Assignment Help and Solution, University of Sheffield - Assessment Writing Service
Define instructional strategies applied to support learning : Discuss the definitions, characteristics, causes, identification and instructional strategies applied to support learning. Define UDL, CAST and NIMAS.
Which pm policy provides the minimum cost strategy : Which PM policy provides the minimum cost strategy based on the information provided?
Discussion of the foundational leadership theories : A discussion of the foundational leadership theories upon which you would draw to lead this organization. (Benchmarks C1.1: Assess and synthesize historical.
Estimate demand for periods : A coffee shop owner wants to estimate demand for the next four quarters for hot chocolate. Sales data consist of trend and seasonality. Quarter relatives

Reviews

len2827022

3/13/2021 3:16:23 AM

Cybersecurity Kindly read the document very carefully and quote your price to produce quality work for University Level work.. This Assignment involves lab works like in Virtual Machine environment or Cisco Packet Tracer and 3k to 4k words and now it needs to complete the Template.

Write a Review

Other Subject Questions & Answers

  Review the article better unsafe than sorry

Review the article "Better Unsafe Than (Occasionally) Sorry?"

  According to a critic of the modern corporation

Assume that according to a critic of the modern corporation, many large firms regularly engage in anticompetitive behavior, such as monopolizing commerce. In making this assertion, what theoretical link is the critic best attempting to refute?

  The code of hammurabi and deuteronomy

Discuss those portions of The Code of Hammurabi and Deuteronomy that surprised you, and then try to think of reasons why the laws were so strict

  Preparation for the board of directors meeting

In preparation for the board of directors meeting, the chief executive officer (CEO) has asked you to prepare a strategy for maximizing the use of human resources.

  What materials were needed for raphael paintings

Write a 500-600 word paper that explains how Raphael used drawing as part of his process for painting The Alba Madonna. Imagine that you have been asked.

  Provide a brief descriptive account of a situation or issue

Provide a brief descriptive account of a situation or issue. Record your emotional/personal response to the situation/issue

  Compressing or crashing projects

Explain the risks associated with leveling resources, compressing or crashing projects, and imposed durations or "catch-up" as the project is being implemented.

  What do you think about faith and integration

What do you think about faith and integration in the classroom? What does faith and integration in the classroom look like to you? Please provide examples.

  How the biological personality theory affects

Explain how the biological personality theory affects an individual's personality. Explain it's strengths and weaknesses.

  Provide an overview of major trade policies

Discuss economic effects of international labour mobility on both origin (source) and destination (recipient) countries and Briefly discuss trade war

  Comparative politics-power and states

Why does the state exist? How should it be organized? Why? Finally, how is policy made by state institutions? Please give examples and explain in detail.

  Identify the three sources of threats

Did his or her advocacy invoke a change and/or influence others? Discuss why or why not.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd