Critique on how you arrive at mitigation strategy

Assignment Help Computer Networking
Reference no: EM132811438

Assignment Brief

VibeTel is a small to medium company that provides telecommunication services like (calls, text messages, video, and file sharing) to their customers. The company has a staff capacity of 150 and have two remote sites in UK and the US. VibeTel has 25 staffs working on site in both UK and USA, the rest of the employees work remotely. They have a moderate customer base of2000 that use their telecommunication services.

VibeTel has network and computing infrastructures on site, and due to the pandemic, the staff connect remotely and share files for busviness purposes. There are servers onsite that host files and they have some cloud subscription. Their servers host confidential information like User ID, address, phone number, card details,and confidential user information.Their staff normally use any device at home to connect and do their jobs. They connect via mobile, desktop, laptops etc. For those working on site, both building in US and UK have no barriers but physicalsecurity checks by onsite security agent.

The company's servers and network devices are located on the general office area, and they can beaccessed by everyone. The staff do not have any guidelines on how togenerate and use passwords, some of them are using their pet's name and favourite coffeeshop as password. The staff in addition use their personal gadgets in office to do work related activities. There is only one wireless network where all staff and visitors use. Both onsite and online staff use emails and Voice over IP (VoIP) phones to communicate with customers for troubleshooting purpose or account related updates.As the office is international, the head of IT in both countriesshould be grounded on laws governing data privacy and security.They seldom follow and implement these government policies in handling users' data in both countries.

The company have no interest in investing into perimeter firewalls or virtual firewall services. They are satisfied with the Service Provider's (SP) security serviceslike (packet filtering and inspection,malware detection and antispyware).In addition, some of the services they pay the SPare cloud space, reliable internet connection and priority on real-time services like voice and streaming data.Staffreceive several bogus texts, emails and phones from strangers persuading them to click a link for several reasons mostly malicious.To quickly share and save files, staff sometimes save customers' details in USB sticks and hard drives, the computers onsite all allow the use of external USB drive. Network admin and IT administrators find it difficult to track staff activity in the organisation, sometimes staffdeny doing certain operations and the IT teams are finding it difficult to trace which staff account access certain files or carry out an operation. Staffs occasionally use torrent sites to download movies and games.

Produce a security report for VibeTelthat analyses the possible threats and vulnerabilities that exist in their infrastructure and the way they do business. Provide mitigation strategiesthat will increase the security posture of the organisation towards maintainingconfidentiality, integrity, and availability. Your solution should take in consideration awareness to government and policy guidance in cybersecurity and use threat modelling methods in analysing the given network topology.

Description: Demonstrate and illustrate understanding of the various threats and vulnerabilities that exist in data and information systems.

To apply threat modelling tools and methods in identifying and evaluating threats and risks.

Analysis and critique on how you arrive at your mitigation strategy. Demonstrate knowledge of government policies and regulatory guidance.

Assess and evaluate the impact of threats with hierarchical or numerical representation in computing and network environments.

Articulate and fluent presentation of work with great clarity and coherence. This also includes the structure and outline of the work. Clear support of arguments with credible and reputable evidence.

Hint on report writing style and format (3000 words)

Threat and vulnerabilities
• Individual
• Business
• Communications
• Infrastructure
Risk Assessment (Impact)
Threat modelling
• Data Flow Diagram (DFD)
Threat Mitigation Strategy
Summary and Conclusion

References

Attachment:- Assessment Brief.rar

Reference no: EM132811438

Questions Cloud

Compute effective annual rate of interest for tokyo imports : Find the effective annual rate of interest. Tokyo Imports received a six-month, noninterest-bearing note for $100,000 from Tall Mart
Evaluate the optimal strategy : Suppose you wanted to start a company where you live. Which of the PEST factors would be the strongest? How would you evaluate the optimal strategy?
Calculate the basic earnings per share : Hayward Corporation had net income of $50,000 for the year ended December 31, 2020, Calculate the basic earnings per share
Investigate regulatory issues relating to legaliza­tion : Investigate the regulatory issues relating to the legaliza­tion and the use of medical and recreational marijuana within the State of Colorado.
Critique on how you arrive at mitigation strategy : Analysis and critique on how you arrive at your mitigation strategy. Demonstrate knowledgeof governmentpolicies and regulatory guidance
Find what is the degree of financial leverage : B Company's contribution margin is P45,000 at sales of P150,000. If the degree of operating leverage is 6, what is the degree of financial leverage?
Managing capacity : Capacity management in businesses is a function of their operations and environment. How do capacity decisions affect productivity?
How do you think boredom afffects decision making : 1.) How do you think boredom afffects your decision making, beyond promoting unethical decisions? Explain.
Record the conversion of the preferred stock : The common stock is trading at $25 per share at the time of conversion. Record the conversion of the preferred stock

Reviews

Write a Review

Computer Networking Questions & Answers

  How wireless technologies are enhancing your chosen industry

From the e-Activity, describe how wireless technologies are enhancing your chosen industry and are being used to enhance business strategy.

  Devise subnetting and addressing schemes

Devise subnetting and addressing schemes for Priority Advertising. The schemes must provide servers and some other network devices

  What companies are delivering cloud services

Defend your position or thinking! A good starting point for this discussion would be a clear definition of the 'cloud,' if one can be had. What companies are delivering cloud services, and what is it you can buy from them?

  How company can handle snmp from corporate location

How this company can handle SNMP from corporate location. Write details on versions, basic operations, and MIBs. Describe the advantages of this kind of centralized monitoring.

  Project management consultant

MN601 Who do you think should pay for the changes - what could have been done to make sure that the project scope was correct?

  Describe the organizational authentication technology

Identify and describe the organizational authentication technology and network security issues. Make a list of access points internal and external (remote)

  Contrast the basic network topologies bus and ring

Contrast the 3 basic network topologies (Bus, Ring, and Star)

  What is the difference between a policy and a procedure

What is the difference between a policy and a procedure? How do regulations affect network policies? Why does keeping good record help in managing your network?

  Identify three current or future security issues in sdn

MN502 - Overview of Network Security Literature review on Software Defined Networking (SDN) and Identify three current or future security issues in SDN.

  Which is the minimum water temperature of a dolphin of 2

thermal analysis of aquatic mammal such as a dolphin can provide insights into naturally occurring size distribution.

  Compare and contrast some of the options or technologies

compare and contrast some of the options or technologies available to secure a wi-fi network. what are the benefits of

  Importance of using routing protocol-general functionality

Discuss the importance of using a routing protocol and explain general functionality. Router Information Protocol (RIP) is a distance-vector routing protocol than can be used by a router to send data from one network to another. What are the demer..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd