Define different phase of network security

Assignment Help Computer Network Security
Reference no: EM133809787

Summary and Purpose of Assessment

This project has been designed for you to demonstrate your understanding in the following areas:
• Identifying/Detecting threats to security
• Threat Modelling
• Identifying and Valuing Assets
• Design, Implement, and Test Security Measures

Assessment Instructions
This is an individual based Project to be completed. This assessment includes practical task and written questions. You will be required to define different phase of network security, explore elements to risk management, analyse a case study to identify threats, create a threat model, asset valuing, incident reporting, and implement a series of different security solutions on a simulated network.

What
Youneed tocomplete a written report based on the information required in the sectionsbelow. Information and resources will be provided to you via Blackborad or in this document.

Background:
You have just been placed in charge of the IT department for a growing company called XPC that deals with other a customer base located locally and domestically. There are 15 roaming employees employed.
Prior to you coming on board, they didn't have any IT staff and hired contractors to do the work.
The information stored on your local servers is very confidential. Your company's employees do a lot of travelling both domestically and internationally. XPC has just received a shipment of brand-new, Windows based laptops to provide their employees with. Data is stored locally and then backed up to the server when the laptops connect to a network.
As XPC employees need to travel frequently, their main mode of data communication connecting back to the main server is to use whatever wireless connections are available.

No database has been put in place to track the assets.
You have been provided with a network diagram which provide you with the following:
• the current location of all the laptops in use by staff
• The current security in place on your network

Goal of this project:
You have been tasked with auditing this network and all the equipment in an effort to improve security.
To complete this task, you will need to create a report on your audit. Your report must contain the following:
• Title Page
• Table of Contents
• Plan
• Identifying and valuing XPC's assets
• Identifying and modelling the main threats
• Implementing and testing solutions to these main threats
• Conclusion

Section 1: Planning
Before you undertake your audit on this network, you need to determine the steps required to conduct this audit.
Write a 4-step plan that you can use on this network audit to assist you in identifying key elements to manage any potential risks on this network (4 elements - 5-15 words per element)

Section 2: Identifying and Valuing Assets Get your answer now!
Your first task is to create a database to audit the devices owned by XPC.
Create a table showing the following information:
a) List the assets owned by XPC
b) Categorise each device using their device type
c) For each device category, identify a potential threat and explain how this threat could occur (10-25 words per threat) - Please note your identified threats for any networking device types must be resolvable in Packet Tracer in Section 3
d) Determine the potential origin of this threat to this device type (Internal or External)
e) Value them in terms of importance to the organisation - High/Medium/Low and provide a brief explanation why you valued it this way

f) Cost - The cost for each device has been added to the topology. Add the cost of the devices together and calculate their total at the bottom of this column

Section 3 - Threat Modelling
You have been asked to design a threat model for the threats you identified in Task 1.
Design a threat model that does the following:
• Grades the threats based on at least 3 different categories
• Rates the likelihood of that threat occurring
• Provides a solution on handling the identified threats. (10-20 words per solution)

Section 4: Implement and test solutions

Section 4a:
Prior to implementing your solutions from section 3 across the whole network, you have been asked to pilot them only on 3 different devices.

Using the table below, identify 1 router, 1 switch and 1 WAP that you will apply your solution to. Explain how you will be implementing this solution on these devices in the left column and write the device name in the right column.

Section 4b
Now that you have identified the devices, Use the topology provided to implement the solutions to the devices you have selected in Section 4a.

You will be required to note the implemented security using the note tool on Packet Tracer. Place each note next to your selected devices listing the implemented solution.

Section 4c
Once you have implemented your solutions, you need to create a series of tests to validate whether the solutions have worked.

Each solution will need to have 2 tests:
• One test should test to ensure the security correctly allows authorised devices/people.
• One test should test to ensure the security correctly blocks unauthorised devices/people.

For each test provide an explanation on how the tests are to be conducted. You are not to describe what the expected outcome should look like (5-15 words per test)

Once you have created your tests, you must swap your tests and completed topology with another student of your choosing. The idea is for each student to run the tests as written and provide verbal feedback on the outcome and modifications required. Populate the feedback in the remaining fields with the following information:
• Test Outcome Success - Was the outcome successful: Yes/No. If not, why? (10-15 words per test)
• Modifications required - Based on the outcome of the test, were you required to make modifications to the network? :Yes/No. If not, why? (10-15 words per test)

At the bottom of your completed table, add the following information:
Tests for this network run by: *Insert other student's name here
I conducted testing on *Insert other student's name here* network.

Section 5: Conclusion
Provide a summary explaining how the tasks undertaken in this audit have made the XPC's network more secure. (50-75 words)
Provide an area for the management of XPC to sign off this report.

Where
You will be undertaking this assessment for 4 weeks during Scheduled class time and out class times. A date will be provided by the assessor on Blackborad. You will be provided some class time to work on this assessment, however, it is expected that the majority of this assessment will be completed outside of class.

How
This is an individual assessment. Youi will be assessed against the criteria listed in the marking guide in Section B of this task. To achieve a satisfactory result, you will need to address all criteria satisfactorily and submit work by the date specified by the assessor.

Reference no: EM133809787

Questions Cloud

What alternative workflow model could be used : She plans to use X (formerly Twitter) to communicate with Dr. Doe's patients. What workflow model could be used and why is it a good fit? What alternative
How did self-concept values and ethical principle contribute : How did your self-concept, values, and ethical principles contribute to the development of this philosophy?
How you apply information in this article to your own field : How can you apply information in this article to your own field? Identify a real-world situation, and explain how you could apply the information.
Describe three specific patient activities : Describe three specific patient activities/program/process that you believe would be possible techniques for achieving those outcomes.
Define different phase of network security : Define different phase of network security, explore elements to risk management, analyse a case study to identify threats, create a threat model, asset valuing
How did these affect gender race and class and positionality : How did these affect gender, race, and class positionality and relations? Was this imperial expansion simply a conquest and imposition of ideals?
Characteristics of effective home-learning environments : Analyse unit literature to create an A3 poster that summarises the key domains and components of language, developmental progressions
Explain how your research question aims to solve a problem : Explain how your research question identifies a specific aspect of your issue. Explain how your research question aims to solve a problem.
Describe each base of power and its characteristics : Describe each base of power and its characteristics. Identify different reactions followers may have for each base of power.

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd