Critique on how you arrive at mitigation strategy

Assignment Help Computer Networking
Reference no: EM132811438

Assignment Brief

VibeTel is a small to medium company that provides telecommunication services like (calls, text messages, video, and file sharing) to their customers. The company has a staff capacity of 150 and have two remote sites in UK and the US. VibeTel has 25 staffs working on site in both UK and USA, the rest of the employees work remotely. They have a moderate customer base of2000 that use their telecommunication services.

VibeTel has network and computing infrastructures on site, and due to the pandemic, the staff connect remotely and share files for busviness purposes. There are servers onsite that host files and they have some cloud subscription. Their servers host confidential information like User ID, address, phone number, card details,and confidential user information.Their staff normally use any device at home to connect and do their jobs. They connect via mobile, desktop, laptops etc. For those working on site, both building in US and UK have no barriers but physicalsecurity checks by onsite security agent.

The company's servers and network devices are located on the general office area, and they can beaccessed by everyone. The staff do not have any guidelines on how togenerate and use passwords, some of them are using their pet's name and favourite coffeeshop as password. The staff in addition use their personal gadgets in office to do work related activities. There is only one wireless network where all staff and visitors use. Both onsite and online staff use emails and Voice over IP (VoIP) phones to communicate with customers for troubleshooting purpose or account related updates.As the office is international, the head of IT in both countriesshould be grounded on laws governing data privacy and security.They seldom follow and implement these government policies in handling users' data in both countries.

The company have no interest in investing into perimeter firewalls or virtual firewall services. They are satisfied with the Service Provider's (SP) security serviceslike (packet filtering and inspection,malware detection and antispyware).In addition, some of the services they pay the SPare cloud space, reliable internet connection and priority on real-time services like voice and streaming data.Staffreceive several bogus texts, emails and phones from strangers persuading them to click a link for several reasons mostly malicious.To quickly share and save files, staff sometimes save customers' details in USB sticks and hard drives, the computers onsite all allow the use of external USB drive. Network admin and IT administrators find it difficult to track staff activity in the organisation, sometimes staffdeny doing certain operations and the IT teams are finding it difficult to trace which staff account access certain files or carry out an operation. Staffs occasionally use torrent sites to download movies and games.

Produce a security report for VibeTelthat analyses the possible threats and vulnerabilities that exist in their infrastructure and the way they do business. Provide mitigation strategiesthat will increase the security posture of the organisation towards maintainingconfidentiality, integrity, and availability. Your solution should take in consideration awareness to government and policy guidance in cybersecurity and use threat modelling methods in analysing the given network topology.

Description: Demonstrate and illustrate understanding of the various threats and vulnerabilities that exist in data and information systems.

To apply threat modelling tools and methods in identifying and evaluating threats and risks.

Analysis and critique on how you arrive at your mitigation strategy. Demonstrate knowledge of government policies and regulatory guidance.

Assess and evaluate the impact of threats with hierarchical or numerical representation in computing and network environments.

Articulate and fluent presentation of work with great clarity and coherence. This also includes the structure and outline of the work. Clear support of arguments with credible and reputable evidence.

Hint on report writing style and format (3000 words)

Threat and vulnerabilities
• Individual
• Business
• Communications
• Infrastructure
Risk Assessment (Impact)
Threat modelling
• Data Flow Diagram (DFD)
Threat Mitigation Strategy
Summary and Conclusion

References

Attachment:- Assessment Brief.rar

Reference no: EM132811438

Questions Cloud

Compute effective annual rate of interest for tokyo imports : Find the effective annual rate of interest. Tokyo Imports received a six-month, noninterest-bearing note for $100,000 from Tall Mart
Evaluate the optimal strategy : Suppose you wanted to start a company where you live. Which of the PEST factors would be the strongest? How would you evaluate the optimal strategy?
Calculate the basic earnings per share : Hayward Corporation had net income of $50,000 for the year ended December 31, 2020, Calculate the basic earnings per share
Investigate regulatory issues relating to legaliza­tion : Investigate the regulatory issues relating to the legaliza­tion and the use of medical and recreational marijuana within the State of Colorado.
Critique on how you arrive at mitigation strategy : Analysis and critique on how you arrive at your mitigation strategy. Demonstrate knowledgeof governmentpolicies and regulatory guidance
Find what is the degree of financial leverage : B Company's contribution margin is P45,000 at sales of P150,000. If the degree of operating leverage is 6, what is the degree of financial leverage?
Managing capacity : Capacity management in businesses is a function of their operations and environment. How do capacity decisions affect productivity?
How do you think boredom afffects decision making : 1.) How do you think boredom afffects your decision making, beyond promoting unethical decisions? Explain.
Record the conversion of the preferred stock : The common stock is trading at $25 per share at the time of conversion. Record the conversion of the preferred stock

Reviews

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd