Discuss the implications of australian federal government

Assignment Help Computer Networking
Reference no: EM133691724

Evaluate networking regulations and legislation for the telecommunication

Assessment Task 1

Answer the following questions in brief.

Question 1. Explain the following economic factors that can affect the growth of the networking industry:
a. Human resources
b. Physical capital
c. Natural resources
d. Technology

Question 2. Answer the following questions.

2.1. Discuss the following functions of producing evaluation reports:
a. Executive summary
b. Preface
c. Introduction
d. Findings
e. Conclusions & Recommendations
f. Appendices

2.2 Discuss the follow features of producing evaluation reports:
a) Greater transparency and accountability
b) Improved project performance
c) Effective resource allocation
d) Promotes learning & data-driven decision making.
e) Systematic management of organization

Question 3. Answer the following questions regarding the policies and procedures of the Australian Competition and Consumer Commission (ACCC), Universal Services Obligation (USO).
3.1. What do you understand by the Australian Competition and Consumer Commission (ACCC)?

3.2. Discuss the following five (5) policies and procedures of the Australian Competition and Consumer Commission (ACCC):
a. Accountability
b. Transparency
c. Confidentiality
d. Timeliness
e. Proportionality

3.3. What are Telecommunications Universal Service Obligation (USO).
3.4. Describe the following three (3) policies and procedures of Universal Services Obligation (USO):
a. Availability
b. Accessibility
c. Affordability

Question 4. Discuss the implications of Australian federal government regulation and deregulation on the networking industry.

Question 5. Answer the following questions regarding the purpose and implementation of networking legislation.

5.1. Explain the following five (5) purposes of networking legislation:
a. File and Data Sharing
b. Resource Sharing
c. Data Protection and Redundancy
d. Internal Communications
e. Distributing Computing Power

5.2. What do you understand by the implementation of networking legislation?

ASSESSMENT 2

This assessment task requires the student to:
• Produce at least two (2) comprehensive reports that evaluate the economic and political influences on the networking industry in Australia and the impact of regulations and legislation on the networking industry.

• Produce at least two summary reports that evaluate the impact of legislation on planning processes and access to networks.

To do so, you must complete the following activities:
• Activity 1: Access all legislation governing carriers and service providers in Australia and research the impact of government regulation and deregulation on the networking planning industry.
• Activity 2: Assess the influence of economic conditions on the growth and planning of network industries.
• Activity 3: Prepare two (2) report that evaluates economic and political influences on public and commercial enterprises that provide services in networking markets.
• Activity 4: Determine the rights of carriers and service providers in installing facilities in Australia.
• Activity 5: Identify the method used by the Australian Competition and Consumer Commission (ACCC) to enforce competitive provisions between service providers.
• Activity 6: Review the planning obligations of Universal Service Obligation (USO) and evaluate the accessibility of networking services to individuals and organizations across Australia.
• Activity 7: Prepare two (2) report outlining the impact of Australian federal legislation on network service planning processes and accessibility.

Case Study:

Company profile:

Managed Technology is an Australia based IT company. The company deals with systems and support; Networking, Voice, Internet Managed Solutions has a proven track record in providing technically appropriate, cost-effective computing and related technologies, hardware, and technical support to the business. We pride ourselves on our breadth of skills and experience coupled with an attention to detail.
Our objective is to provide the right solution for the long-term best interest of your business means more reliable data services for your business, less downtime and better productivity. Our alliances with best of breed partners ensure that you get the best value and most reliability - critical components in business. We look after your technology and network - your staff can get on with your business.
The company offers the following services:
• Automated remote monitoring 24/7
• Network performance, responsiveness and availability monitoring
• Routers and managed switches monitoring
• Mail server blacklist monitoring
• Domain name expiration monitoring
• SSL certificate expiration monitoring

New Project along with requirements:
The training organization has approached your company to evaluate networking regulations and legislation for the telecommunications industry.
You are the network engineer in your training organization. The management of the organization wants you to produce at least two comprehensive reports that evaluate the economic and political influences on the networking industry in Australia and the impact of regulations and legislation on the networking industry and produce at least two summary reports that evaluate the impact of legislation on planning processes and access to networks. This includes:

• Assess economic and political influences on networking regulations and legislation.
• Determine the impact of networking regulations and legislation.

Further, the training organization has provided the database file named ‘Databes001' attached with this assessment to review the organizational transactions and access information on the company's networks.

Task conditions

• The purpose of this assessment task is to produce at least two comprehensive reports that evaluate the economic and political influences on the networking industry in Australia and the impact of regulations and legislation on the networking industry and produce at least two summary reports that evaluate the impact of legislation on planning processes and access to networks.
• This assessment task will be completed in your training organization's IT lab. Your trainer/assessor will supervise you in performing this assessment task.

Task Instructions:
• The student will produce at least two comprehensive reports that evaluate the economic and political influences on the networking industry in Australia and the impact of regulations and legislation on the networking industry.
• You will produce at least two summary reports that evaluate the impact of legislation on planning processes and access to networks.

Skill test:

This assessment task requires the student to:

• Produce at least two (2) comprehensive reports that evaluate the economic and political influences on the networking industry in Australia and the impact of regulations and legislation on the networking industry.
• Produce at least two summary reports that evaluate the impact of legislation on planning processes and access to networks.

To do so, you must complete the following activities:
• Activity 1: Access all legislation governing carriers and service providers in Australia and research the impact of government regulation and deregulation on the networking planning industry.
• Activity 2: Assess the influence of economic conditions on the growth and planning of network industries.
• Activity 3: Prepare two (2) report that evaluates economic and political influences on public and commercial enterprises that provide services in networking markets.
• Activity 4: Determine the rights of carriers and service providers in installing facilities in Australia.
• Activity 5: Identify the method used by the Australian Competition and Consumer Commission (ACCC) to enforce competitive provisions between service providers.
• Activity 6: Review the planning obligations of Universal Service Obligation (USO) and evaluate the accessibility of networking services to individuals and organizations across Australia.
• Activity 7: Prepare two (2) report outlining the impact of Australian federal legislation on network service planning processes and accessibility.

Task Environment:

This assessment task will be completed in a simulated environment prepared by your training organization.

The simulated environment will provide you with all the required resources (such as the equipment and participants, etc.) to complete the assessment task. The simulated environment is very much like a learning environment where a student can practice, use and operate appropriate industrial equipment, techniques, practices under realistic workplace conditions.

The roles and responsibilities of the Network Engineer are:

• To access all legislation governing carriers and service providers in Australia and research the impact of government regulation and deregulation on the networking planning industry.
• To assess the influence of economic conditions on the growth and planning of network industries.
• To produce tworeport that evaluates economic and political influences on public and commercial enterprises that provide services in networking markets.
• To determine the rights of carriers and service providers in installing facilities in Australia.
• To identify the method used by the Australian Competition and Consumer Commission (ACCC) to enforce competitive provisions between service providers.
• To review the planning obligations of Universal Service Obligation (USO) and evaluate the accessibility of networking services to individuals and organizations across Australia.
• To produce two report outlining the impact of Australian federal legislation on network service planning processes and accessibility.

Roles and responsibilities of trainer/supervisor are:
• To provide databases. (provided with this assessor pack)
• To provide licensing requirements.

Activity 1: Access all legislation governing carriers and service providers in Australia and research the impact of government regulation and deregulation on the networking planning industry.

This part of the activity requires you to access all legislation governing carriers and service providers in Australia and research the impact of government regulation and deregulation on the networking planning industry and document the outcomes using ‘Template 1'.
Description of the activity

This activity requires you to access all legislation governing carriers and service providers in Australia and research the impact of government regulation and deregulation on the networking planning industry based on the information given in the case study and by doing online research.

This activity requires you to get access to ‘Database001' file attached with this assessment to review the organizational transactions and access information on the company's networks.

To do so, you need to:

• Access all legislation governing carriers and service providers in Australia and document their purpose using Template 1:
o Non-discrimination obligations
o ACCC explanatory material on the Part XIC non-discrimination provisions
o Special Access Undertaking (SAU)
o Authorized conduct
o Parts 7 and 8 of the Telecommunications Act
• Research the impact of government regulation and deregulation on the networking planning industry and document using Template 1.

Activity 2: Assess the influence of economic conditions on the growth and planning of network industries.

This part of the activity requires you to assess the influence of economic conditions on the growth and planning of network industries and document the outcomes using ‘Template 2'.
Description of the activity
This activity is a continuation of Activity 1.
This activity requires you to assess the influence of economic conditions on the growth and planning of network industries.

To do this activity, you need to do online research.

To do so, you need to:

• Assess the influence of economic conditions on the growth and planning of network industries by considering the following factors and document using Template 2:
o Human resources
o Physical capital
o Natural resources
o Technology

Activity 3: Produce two reports that evaluate economic and political influences on public and commercial enterprises that provide services in networking markets.
This part of the activity requires you to produce a report that evaluates economic and political influences on public and commercial enterprises that provide services in networking markets and document the outcomes using Template 3 and Template 4.
Description of the activity
This activity is a continuation of Activity 2.
This activity requires you to produce two reports that evaluate economic and political influences on public and commercial enterprises that provide services in networking markets.
To do so you need to:Create evaluation reports using the below steps:
o Consider your audience
o Plan your report
o Write about your findings
o Write accurately and clearly
o Develop your recommendations
o Involve people in the reporting process
o Finish the report
• Produce a report that evaluates economic influence on public and commercial enterprises that provides services in networking markets using Template 3. Include the following information in the report:
o Executive summary: a synopsis of your key findings and recommendations
o Introduction: a brief description of what you are evaluating, the purpose of your evaluation and the methods you have used (e.g surveys, interviews)
o Findings and discussion: information on what you delivered, how you delivered it and what outcomes occurred
o Recommendations: actions that need to be taken to respond to the evaluation findings
o Produce a second report that evaluates political influence on public and commercial enterprises that provides services in networking markets using Template 4. Include the following information in the report:
o Executive summary: a synopsis of your key findings and recommendations
o Introduction: a brief description of what you are evaluating, the purpose of your evaluation and the methods you have used (e.g surveys, interviews)
o Findings and discussion: information on what you delivered, how you delivered it and what outcomes occurred
o Recommendations: actions that need to be taken to respond to the evaluation findings

Activity 4: Determine the rights of carriers and service providers in installing facilities in Australia.
This part of the activity requires you to determine the rights of carriers and service providers in installing facilities in Australia and document the outcomes using ‘Template 5'.
Description of the activity
This activity is a continuation of Activity 3.
This activity requires you to determine the rights of carriers and service providers in installing facilities in Australia.
To do so, you need to:
• Determine the following rights of carriers and service providers in installing facilities in Australia and document using Template 5:
o Consumer rights
o Industry code of conduct
o Additional consumer protections
o Right to a telephone service

Activity 5: Identify the method used by the Australian Competition and Consumer Commission (ACCC) to enforce competitive provisions between service providers.
This part of the activity requires you to identify the method used by the Australian Competition and Consumer Commission (ACCC) to enforce competitive provisions between service providers and document the outcomes using ‘Template 6'.
Description of the activity
This activity is a continuation of Activity 4.
This activity requires you to identify the method used by the Australian Competition and Consumer Commission (ACCC) to enforce competitive provisions between service providers.

This activity requires you to review the policy and procedures of the Australian Competition, and Consumer Commission (ACCC) and Universal Services Obligation (USO) provided in the case study.

To do so, you need to:

• Identify the method used by the Australian Competition and Consumer Commission (ACCC) to enforce competitive provisions between service providers and document using Template 5:
o Enduring priorities
o Principles and approaches

Activity 6: Review the planning obligations of Universal Service Obligation (USO) and evaluate the accessibility of networking services to individuals and organisations across Australia.

This part of the activity requires you to review the planning obligations of Universal Service Obligation (USO) and evaluate the accessibility of networking services to individuals and organisations across Australia and document the outcomes using ‘Template 7'.

Description of the activity

This activity is a continuation of Activity 5.

This activity requires you to review the planning obligations of Universal Service Obligation (USO) and evaluate the accessibility of networking services to individuals and organisations across Australia.

This activity requires you to review policies and procedures provided in the case study for Universal Service Obligation (USO).

To do so you need to:

• Review the planning obligations of Universal Service Obligation (USO) and document using Template 7:
o Recent Legislative Changes
o Costing the USO
o USO Funding Review
o Tendering the USO
• Evaluate the accessibility of networking services to individuals and organisations across Australia by following methods below document using Template 7:
o Accessible telecommunications forum
o Telecommunications carrier industry development plans
o Expansion of Section 593 consumer grants program
o Expansion of current disability equipment programs
o Consolidated disability equipment program
o Telecommunications disability standard
o Section 407 amendment
o Public payphone accessibility

Activity 7: Produce two reports outlining the impact of Australian federal legislation on network service planning processes and accessibility.

This part of the activity requires you to produce a report outlining the impact of Australian federal legislation on network service planning processes and accessibility and document the outcomes using Template 8 and Template 9.

Description of the activity

This activity is a continuation of Activity 6.

This activity requires you to prepare two (2) reports outlining the impact of Australian federal legislation on network service planning processes and accessibility.

To do so you need to:

• Create two (2) reports outlining the impact of Australian federal legislation on network service planning processes and accessibility using the below steps:
o Consider your audience
o Plan your report
o Write about your findings
o Write accurately and clearly
o Develop your recommendations
o Involve people in the reporting process
o Finish the reports
Report 1:
• Prepare a report that outlining the impact of Australian federal legislation on network service planning processes using Template 8. Include the following information in the report:
o Executive summary: a synopsis of your key findings and recommendations
o Introduction: a brief description of what you are evaluating, the purpose of your evaluation and the methods you have used (e.g surveys, interviews)
o Findings and discussion: information on what you delivered, how you delivered it and what outcomes occurred
o Recommendations: actions that need to be taken to respond to the evaluation findings
Report 2:
• Produce a second report outlining the impact of Australian federal legislation on accessibility using Template 9. Include the following information in the report:
o Executive summary: a synopsis of your key findings and recommendations
o Introduction: a brief description of what you are evaluating, the purpose of your evaluation and the methods you have used (e.g surveys, interviews)
o Findings and discussion: information on what you delivered, how you delivered it and what outcomes occurred
o Recommendations: actions that need to be taken to respond to the evaluation findings

Implement Secure Encryption Technologies

ASSESSMENT 1

Task -1 Report Writing
This assessment requires you to research emerging encryption technologies for an Enterprise Network. This enterprise network has a range of devices such as:

• End-User PC with a range of Operating systems like Windows, macOS and Linux.
• Mobile devices as Android and iPhone.
• Server Infrastructure with Active Directory Domain Services, web server, DNS and more.
• Wireless Infrastructure and devices
Considering these devices during the research and write a report fully describing a range of emerging encryption techniques applicable to these settings including the cost, strength, impact on the user and resources. The report must address the following technology but not limited to:
• Introduction to encryption and its type
• Symmetric Encryption and its usage comparing AES, DES, triple DES, Blowfish
• Asymmetric Encryption and its usage in Enterprise Industry
• File encryption system in Enterprise Industry.
• Use of public key, private key, hash key, public key infrastructure, PGP or GnuPG
• Certificates and infrastructure including digital certificates, timestamps.

Task -2 Case Study

You have been recently Hired in Ford Pty Ltd, Brisbane to provide external Networking and Security Support. The IT manager of this company has tasked you to analyze encryption and security aspects of the Company, loopholes (if present) and different standards being used in the company.

Part A- Analyze enterprise data security requirements.

Moving forward to determine the encryption methods, you have arranged a meeting with the IT manager and other key stakeholders. Being a security specialist, your main goal of this meeting is to analyze enterprise data security requirements.

To determine the requirements of the client to secure the data make a list of questions you will discuss in the meeting. Enlist different types of question (open, closed and probing).

Part B- Review and Assess different encryption methods.

Question 1
After the analysis of the Wireless Network, you discovered that most Wireless Connections are using WEP standard. Being hired as Network and Security Support Officer what encryption standard will you suggest to the IT Manager so that wireless connection will be Secure.

You are required to compare different standards, cost, the strength of the standards and suggest the most secure wireless standard to the IT Manager.

Question 2
During the analysis you figured out different security threats and their sources including eavesdropping, data interception, data corruption, data falsification and authentication issues as less secure protocol as HTTP, telnet are being used. These are very critical organizational problems.

What suggestion/s will you give to minimize these problems? Include secure protocols for web, file transfer and remote management.

Question 3
In the meeting with the IT Manager, he mentioned encrypting the Hard Drive and files in the Laptop issued to the staff and enabling remote wiping feature so that if the Laptop is lost confidential data will not be exposed. He also wants to encrypt the email. But he is not sure how effective this will be, how can it affect the users work. Being a Network Security specialist explain each case to IT Manager in the Confidentiality, Integrity and Accountability aspects and suggest encryption methods.

Question 4

Most of the operating systems in Ford Pty Ltd is Windows 7. By default, in Windows 7 in the Internet option, TLS 1.0 is enabled. But this version of the TLS is vulnerable to man in the middle attack. Pointing out this vulnerability in the Internet option suggests newer encryption standard to the client.

Question 5
Summarize and document the finding from the scenarios (Q1-Q4). Forward this finding to your IT Manager.

ASSESSMENT 2

Task -1 Implement the encryption system.
In this task, you are required to implement encryption. After implementing an encryption system, you are required to inform the user and inform them about the impact on their daily tasks and responsibilities.

Part A - Determine encryption methods.

In this part, you are required to analyze the data security requirement in the Enterprise network to determine the encryption methods, rank them, and assess the cost of implementation.

Complete the following questions to determine the encryption methods.

Question 1

a) Discuss the data security requirement for in the enterprise network.

b) Discuss what kind of data needs to be protected; how can these data be protected. Summarize your findings.

Question 2
Research different encryption options that are available, find out their cost and basic functionality of these options and summarize them.

Question 3
Suggest the encryption options to your IT Manager with proper documentation.
Make a proper document and procedure for:
• Encrypting a Word file
• Encrypting File System
• BitLocker
• PGP for Desktop
• Use of secure protocols as HTTPS, SSH, TLS1.2 and so on

Part B - Create a security plan and policy.

You have recently forwarded the summarized version of encryption options you have suggested to your IT Manager. In the response of this, your IT Manager has provided a Template for security plan and policy regarding encryption methods to be used. You have been asked to make an extract of the security plan and policy following the given template.

Complete the security plan and policies in the template below.

Part B - Create a security plan and policy.

You have recently forwarded the summarized version of encryption options you have suggested to your IT Manager. In the response of this, your IT Manager has provided a Template for security plan and policy regarding encryption methods to be used. You have been asked to make an extract of the security plan and policy following the given template.

Complete the security plan and policies in the template below.

Information Security Policy and Standards: Data Encryption
Purpose:
This document provides Ford Pty Ltd. with the information required to effectively and efficiently plan, prepare and deploy encryption solutions to secure Legally/Contractually Restricted Information.
The focus is on providing a range of tools for the most common systems that are likely to be deployed in enterprise environments which store, transmit or process Sensitive and Personal Data.
When properly implemented, encryption provides an enhanced level of assurance that the data, while encrypted, cannot be viewed or otherwise discovered by unauthorized parties in the event of theft, loss or interception.
Audience:
• All Faculty and Staff
• All contractors, vendors and any others (including 3rd parties)
Policy Statement:
All the business functions are required to deploy Industry-approved encryption solutions to preserve the confidentiality and integrity of, and control accessibility to, University data classified as "Legally/Contractually Restricted" where this data is processed, stored or transmitted.
Policy/Procedures:
Encryption Products
The value of the data that requires protection and the system storing the data need to be considered carefully. Physical security refers to being able to control access to the system's storage media. All encryption methods detailed in these guidelines are applicable to desktop and mobile systems.
A defense in depth approach is recommended when evaluating and deploying encryption products. In an ideal situation, full disk and/or boot disk encryption would be combined with file/folder encryption in order to provide two "layers" of encryption to protect data in the event the first layer is compromised. This typically involves a combination of boot/full disk encryption and file/folder encryption.
Commercial operating systems such as Windows and Mac OS X provide integrated encryption solutions at no additional cost.

Boot Disk Encryption
• Scenario:
• Remarks:
• Product(s):
• OS-Integrated Product(s):
• Preferred Product(s):
Wireless Network Encryption
• Scenario:
• Remarks:
• Product(s):
• OS-Integrated Product(s):
• Preferred Product(s):
Email Encryption
• Scenario:
This allow messages and attachments to be sent in an encrypted form transparent to the user. This is most appropriate for departments whose users require frequent and regular encryption of email communications.
• Remarks: This encryption will encrypt every email. So, this standard is not compulsory for every department.
• Product(s): PGP Desktop
• OS-Integrated Product(s): Not Available
• Preferred Products: PGP Desktop
External Devices Encryption
• Scenario:
• Remarks:
• Product(s):
• OS-Integrated Product(s):
• Preferred Product(s):
File and FolderEncryption
• Scenario:
• Remarks:
• Product(s):
• OS-Integrated Product(s):
• Preferred Product(s):
Full Disk Encryption
• Scenario:
• Remarks:
• Product(s):
• OS-Integrated Product(s):
• Preferred Product(s):
Mobile Device Encryption
• Scenario:
• Remarks:
• OS-Integrated Product(s):
Transport-Level Encryption
• Scenario:
• Remarks:
• Product(s):
• OS-Integrated Product(s):
• Preferred Product(s):
Use of secure protocol
• Scenario:
• Remarks:
• Product(s):
• OS-Integrated Product(s):
• Preferred Product(s):

Forms/Instructions
Step 1 - Data Classification.
<Write how data can be classified and its level?>
Step 2 - Product Selection & Implementation
<What must be considered before selecting and implementing encryption?>
Step 3 - Key Creation and Management
<Procedure of Key Creation, Management and Recovery>
Step 4 - Document any Known Issues and their Resolution.
<Write how and what should be documented?>
Date:
Original Issue Date:
August 2023

Part C - Deploy encryption system.

In this part, you are required to deploy an encryption system. Some of the technologies that can be deployed are:
• Encrypting a Word file
• Encrypting File System
• BitLocker
• PGP for Desktop
• Use of secure protocols as HTTPS, SSH, TLS1.2 and so on
Note: Before installing PGP for desktop and encrypting the full hard drive you must analyze the Boot Time, CPU and GPU performance of user Desktop without the encryption. To analyze this, you can refer to Part D of this Task.

Part D - Analyze effect of encryption.
Analyze the following parameters to see the effect of encryption technologies before and after applying the encryption technologies:

Part E - Inform the user about the recent implementation.
In this part, you are required to inform the user of the recent policy and recent deployment of encryption methods.

You can draft an email to be sent to all the staff informing encryption options and policy. In your email mention to report the issues and compromises caused due to recent implementation to help desk.

Task-2 Monitor and document encryption.
In this Task you must verify, monitor and document encryption technologies and issues if present.

Part A - Verify the functionality of encryption.
In this part, you are required to verify the functionality and performance of each deployed encryption system.
Encryption can be verified as:
• Using Wireshark to verify communication is encrypted.
• Check Bit locker is Turned on or off.
• Go inside PGP to Verify the encryption and more.
• Verify the use of TLS 1.2

Part B - Review and solve any issues.
In this part you are required to review the help desk record, logs for related issues and compromises, document the issue with a resolution for future reference and notify the appropriate user with the solution to the problem.

Question 1
As the part of reviewing encryption-related issue two of the user has created the ticket mentioning their system has been slow since the encryption has been implemented. Review the helpdesk record and log. Locate those two tickets in Help Desk Record and copy the issue with the Ticket number.

Question 2
Earlier after the implementation of the Encryption, you have analyzed there would be slow performance and high memory usage because of the encryption. You tracked the user Desktop and reviewed hardware configuration. Only these two users had 2 GB of RAM and HDD installed.
Document the issue, cause and solution for future reference.

Question 2
Earlier after the implementation of the Encryption, you have analyzed there would be slow performance and high memory usage because of the encryption. You tracked the user Desktop and reviewed hardware configuration. Only these two users had 2 GB of RAM and HDD installed.
Document the issue, cause and solution for future reference.

Manage Network Security

ASSESSMENT 1

Question 1: Answer the following questions regarding the industry-standard ICT networks and their configuration.
1.1 Explain the term "ICT networks".
1.2 What is network configuration?
1.3 What are the three (3) types of network?

Question 2: Answer the following questions regarding the network attacks, vulnerabilities and related weaknesses of installed infrastructure, including:
• security technologies
• emerging security issues
2.1 What are network vulnerabilities?
2.2 What are network security attacks?
2.3 What is the relation between security weakness and vulnerability?
2.4Identify four (4) emerging security technologies.
2.5 Identify four (4) emerging security issues.

Question 3: Answer the following questions regarding the network security measures, including:
• auditing and penetration testing techniques
• logging analysis techniques
• organizational network infrastructure
• capabilities of software and hardware solutions
• general features of emerging security policies, with depth in security procedures
• network management and security process controls

3.1 What are the three (3) basic network security measures?
3.2 Identify two (2) auditing and penetration testing techniques.
3.3Explain the reasons for using network logging analysis techniques in terms of network security perimeter issue?
3.4 What do you mean by organizational network infrastructure keeping network security perimeter in prospect?
3.5 Explain the purpose of special hardware and software solutions like intrusion detection systems (IDS) to secure computer networks and host computers.
3.6 What are security policies and procedures? What general features should be included in the security procedures.
3.7 What are network security controls?

Question 4: Answer the following questions regarding the network security implementation risk management plans and procedures, including:
• network security planning
• implementation
• cost analysis and budgeting.
4.1 What is the purpose of security planning?
4.2 What is security implementation?
4.3Explain the purpose of cost analysis and budgeting for network security implementation

Question 5 Identify the five (5) most common network attacks and explain each in 50-100 words.

Question 6 Identify the five (5) most common vulnerabilities of a network.

Question 7 Identify the six (6) weaknesses of a network that can cause network attacks.

Question 8 Identify five (5) emerging security technologies used to secure a network.

Question 9 Identify six (6) security technologies used to secure organisation networks from web-based attacks.

Question 10 Identify five (5) emerging security issues.

Question 11 What is network auditing?

Question 12 Identify ten (10) tools used for network auditing.

Question 13 Explain network penetration.

Question 14 Identify ten (10) network penetration tools.

Question 15 What is a log analysis?

Question 16 Identify five (5) best practices to analyze network logs.

Question 17 Identify twenty (20) tools used to monitor and analyze network logs.

Question 18 What is organizational network infrastructure?

Question 19 How do you differentiate between IT infrastructure and network infrastructure?

Question 20 Identify five (5) features of an effective security policy.

Question 21 Identify four (4) procedures used for network security. Write 50-100 words for each procedure.

Question 22 Identify seven (7) basic security and management controls applicable to all networks.

Question 23 List five (5) essential features of a successful network security policy and explain each

Question 24 What are nine (9) essential elements of network security planning?

Question 25 Identify eight (8) types of information that must be included in an ideal risk management plan.

Question 26 Identify eight (8) steps to implement network security.

ASSESSMENT 2

Case Study
You have been working at ABC bank as an IT manager. ABC Bank wants to open a new branch in another city and for this they already purchased a double story building. It consists of one server room on the second floor, 2 management rooms on the second floor and one board room on the 1st floor. The following IT infrastructure will be delivered to the new location according to the requirement list raised by you.
• Twenty (20) HP I7 computers
• Four (2) Cisco 24 port switches
• Two (2) Hp ProLiant servers
• One (1) NBN connection
• Two (2) Wi fi Router
• One Wireless access point
• Two (2) Sharp MX-4111N all in one printer
• One (1) Biometric sensor
• One (1) server rack
• Sixty (60) patch cords (network cables)
Malware attacks have been a critical issue for ABC Bank. Last month a number of computer systems were out-of-order and caused significant financial damage to the organization.
Company officials want you to prepare a detailed report regarding the network security plans so that this report can be shared with the company's risk analyst. After the approval of the risk analyst, the IT head can give you the go ahead for setting up the network design with the suggested changes.

Activity - 1
In this assessment task:
• The student will act as themselves.
• The trainer assessor will act as the risk analyst/ your supervisor.
You need to prepare a report that includes the following information:
A. All three (3) phases of network security design
• Defining planning phase for network security design according to organisational requirements
• Defining building phase for network security design according to organisational requirements
• Defining managing phase for network security design according to organisational requirements
o Planning Phase, including the following:
» Most suitable network topology according to office layout
» Server roles
» The operating system for servers and workstations
» Applications requirement
» The bandwidth requirement for internet
» Antivirus requirements for servers and workstations
» Security measures for network equipment
» Access control
» Wi-fi Access point location
» Backup Strategy

o Building Phase of network security design, including the following:
» Risk assessment methods.
» Security measures
» Costing of network design
» Planned Network design feedback given by security analyst and IT head.
» Incident reporting matrix
» The threat model for risk assessment
» Determine attacker scenarios and threats according to network security design specifications.
» Design and document network components security measures.
» Develop and document security policies.
» Submit document to required personnel and seek and respond to feedback.

o Managing phase, including the following information:
» Incident reporting
» Security level matrix
» Facilities level
» Escalation matrix

B. Risks assessment, including the following information:
» Possible reasons
» Attackers scenarios and possible threats
o Determine major threat themes to network security
o Determine the potential origin of major threats according to network security design specifications
o Identify industry standard common network vulnerability types
o Design and document threat model according to network security design specifications
» Common network vulnerabilities
» Who can be a risk to the network?
» Level of risk

C. Risk management strategy.
» Assets that need to be secured
» Asset's approximate value (search form internet)
» Analysis on security risks
o Determine required elements of risk management according to network security design specifications.
o Identify organizational assets requiring protection.
o Categorize and document assets and determine their value according to organizationalrequirements.
o Determine and document risk management plan according to organizationalrequirements.
» Reason for the security of the asset
» Design security incidents response.
o Design and document auditing and incidents response procedure.
o Submit to required personnel, seek and respond to feedback.
» A risk management plan including the following information.
• No.
• Risk (What can happen)
• Source (How this can happen)
• Possible Impact of Risk
• Possible Treatment
• Effectiveness of current plan
• Likelihood
• Consequence
• Acceptable/Unacceptable

Activity 2
In this task :
• The Student will act as an ICT technician
• The trainer/assessor will act as a risk analyst.
• The student will hold a meeting with the risk analyst to collect feedback on the network security design
You are required to share the network design with risk analyst to collect the feedback in the following template.

Activity 3
In this task:
• The student will act as themselves
• The trainer/assessor will act as a security analyst.
• The student will implement the network design developed
You have submitted your proposed network report to the security analyst and after a few minor changes you received the go ahead from the IT head. Now it is the time for you to put your design into practice. You are required to perform the below tasks.
A. Create network security design for network component by including the following:
o Physical security requirements of sever.
o Server access rights
o Physical Security of Switches
o Password requirements of router, switches
o Wi-Fi security encryption
o Wi-Fi access point security

B. Create the Security incident report template including the following.
o Reported by
o Date of reporting
o Title /Role
o Incident No
o Incident Type
o Date of Incident
o Location
o City
o State
o Zip Code
o Incident Description
o Contact of the involved party
o Police Report filed Precinct.
o Reporting Officer
o Phone
o Follow up Action.
o Supervisor Name
o Supervisor Signature
o Date

Activity 4
In this task:
• The student will act as themselves.
• The student will implement the network security design developed.
After finalising the network security design and incident response template, it is the time for you to implement the final network security design. You want to test the working and reliability of the network design against the known vulnerabilities. To check the plan for a final sign off the following activities need to be performed and the required changes made.
• Testing of security design against the following vulnerabilities
o USB Drive access
o Wireless access point authentication
o SQL Injections
o Smartphone or digital devices authentication
o Email Filtering
o Database exposure
o Security patch updating
o Password policy
During the testing document, the incidents in the incident response template designed in part A of this assessment task to make required changes to complete the sign off template below.

Reference no: EM133691724

Questions Cloud

What do you think that means : Are the results from using Google Scholar different than the regular Google search you did for question 2 or the same? What do you think that means?
Do you think people are born prone to criminality : Do you think people are born prone to criminality? If someone was making the argument that people are born criminals.
Evaluate economic and political influences : Produce two reports that evaluate economic and political influences on public and commercial enterprises that provide services in networking markets
Distinguish between bilateral and multinational cooperation : Compare historical, political and descriptive approaches to an international perspective. Be sure to distinguish between bilateral-multinational cooperation.
Discuss the implications of australian federal government : ICTNPL413 Evaluate networking regulations and legislation for the telecommunication and Discuss the implications of Australian federal government regulation
What crucial aspect of the aup should the auditor focus : What crucial aspect of the AUP should the auditor focus on to ensure the organization meets the standards set for information security?
When would a person be excluded from public housing : Under U.S. federal law, what impact do criminal convictions have on public housing benefits? When would a person be excluded from public housing?
Determine the category of automated control : Determine the category of automated control if Incorrect pricing is shown in the pricing database from erroneous direct data access, price changes.
Explain racial profiling as it relates to american policing : Explain racial profiling as it relates to American Policing. Describe at least 3 methods police leaders use to prevent racial profiling in their department.

Reviews

Write a Review

Computer Networking Questions & Answers

  Subnetting and supernetting

What are the key differences between the following two terms: subnetting and supernetting? Provide examples for each - Do you expect IPv6 will replace IPv4 completely in the coming future

  Can one tool be used for managing more than one area

Can one tool be used for managing more than one area? Why or why not? Support your information and make sure all information sources are appropriately cited.

  Explain the significance on the design and use of various

explain the significance on the design and use of various variables and attributes control charts of being based on

  Find the efficiency of a dhcp packet when no option is used

What is the minimum length of a DHCP packet? What is the maximum length? Find the efficiency of a DHCP packet when no option is used.

  Computing successive values of congestion window

Determine successive values of congestion window in bytes?

  How can word processing be done more efficiently

How can word processing be done more efficiently? Search the Web for techniques that could help make word processing more efficient.

  How effective is the firewall in the current network

How effective is the firewall in the current network? Identify the network applications that are a part of the current network.

  Configure the active directory

Active Directory Design and Initial Setup - Active Directory Management A - Group Management - Configure the active directory following the proposed design

  Find the number of addresses in each subnet

Find the number of addresses in each subnet. Find the first and the last address in the first subnet. Find the first and the last address in the last subnet.

  Assignment - build your own system

In completing this task, you must use an approach based on the architectural divisions discussed during lectures to organise your answer

  New privacy issues related to cyberspace

Analyze personal privacy issues related to various personal and business-related cybersecurity scenarios

  Network performance of the communication technologies

MN603 Wireless Networks and Security - Evaluation of IoT networks - Identify and analyse the security and privacy issues in IoT, particularly the issue

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd