Reference no: EM133238778
Instruction
This assessment task has 2 parts. Students are required to submit a technical report (a .docx file or word processor, not PDF) compiling all parts in a single technical report.
Part A Scenario:
In your class, the teaching team taught you about Firewall and its working procedures. You did some netlab experiments for related topics. Now, assume that you have joined the industry as a network security expert after completing this unit. You need to expand your knowledge by upskilling and researching related content/materials from online and other relevant sources.
Task A.1: (Critical Analysis)
In that role, your manager asked you to develop a plan for implementing and configuring "a virtual firewall for the public cloud". As a part of this plan, you need to write a report where you will explore the benefits of adopting virtual firewall for cloud computing, virtual firewall types, horizon scanning of this technology considering industry standard tools and present a case study describing the merits and/or weaknesses, other aspects (if you want to add any).
Task A.2: (Knowledge Reflection)
In that role, you have also heard that your business is interested about implementing the emerging "zero trust (ZTA) security architecture. While you are giving a plan on virtual firewall implementation for your business, some people think that ZTA and Firewalls cannot work together whereas others think that they are complementary! How you will put your logic/argument and explanation from a security expert's point of view to provide "critical" insights with proper reasoning and logics and address this issue.
Part B (min 1300 words) Scenario:
In your class, the teaching team taught you about IDS and IoT Networks, Protocols, etc. You did some netlab experiments for related topics. Now, assume that you have joined a consultancy firm as a security architect after completing this unit. You need to expand your knowledge by upskilling and researching related content/materials from online and other relevant sources.
Task B.1: (Critical Analysis)
In that role, your manager asked you to develop a white paper explaining the concept "Intrusion Detection System for Internet of Things within Energy Sector". The white paper will inform readers concisely about your proposed concept and present your philosophy on the matter. The report will include:
A proposed architecture for IDS considering an IoT environment within Energy sector. Illustrate the architecture and its different component, how the data flow will occur, what features are used for IDS, How IDS will safeguard the network, other aspects (if you want to add any)
Task B.2: (Knowledge Reflection)
Suppose as a security architect, you are heavily dealing with IDS for internet networks. However, the concept of the convergence of information technology (IT) and operation technology (OT) is new to you (and of course to many of your colleagues). However, your manager wants you to cover why IDS for Energy-IoT is different compared to other IoT setup or typical network (internet) based IDS. You need to provide your philosophy here by investigating the security requirements, gaps, and possible solutions.