ICT professionals in information security roles

Assignment Help Other Subject
Reference no: EM132909555 , Length: word count:2500

HS3011 Information Security - Holmes Institute

Assessment - Security Hands-On Projects

Analyse and to assess information security risks for business applications and recommend appropriate security mechanisms.
Students will be able to:
1. Understand the challenges and impact of factors that relate to Information Systems security management
2. Demonstrate an understanding of security frameworks, models and standards and their application to different business scenarios,
3. Communicate effectively, information systems' security concepts and controls to both technical and non-technical stakeholders
4. Analyse and to assess information security risks for business applications and recommend appropriate security mechanisms.
5. Work autonomously as well as within group to develop a solution to a business scenario.
6. Understand the ICT profession and the expectations of ICT professionals in information security roles.

Assignment Requirements:

You are required to follow the instructions in each project and provide screen shots for the outcomes in addition to the answers to any provided questions.

PROJECT 1: Case Study

Lake Point Consulting Services (LPCS) provides security consulting and assurance services to over 500 clients across a wide range of enterprises in more than 20 states. A new initiative at LPCS is for each of its seven regional offices to provide internships to students who are in their final year of the security degree program at the local college.

Blue Ridge Real Estate is a state-wide residential and commercial real estate company. Because the company was the victim of several recent attacks, Blue Ridge wants to completely change its network infrastructure. Currently the company has a small IT staff, so they have contracted with LPSC to make recommendations and install the new equipment. First, however, they have asked LPSC to give a presentation to their executive staff about network security.

Task:

1. Write a short report to the executive staff about network security. Include:
a. what it is,
b. why it is important, and
c. how it can be achieved using network devices, technologies, and design elements.

Because the staff does not have an IT background, the report cannot be too technical in nature.

2. Blue Ridge has been working with LPSC and is debating if they should use UTM network security appliances or separate devices (firewall, Internet content filters, NIDS, etc.). Because they appreciated your first presentation, they want your opinion on this subject. Create a memo that outlines the advantages and disadvantages of each approach, and give your recommendation.

PROJECT 2: Case Study

The Information Security Community Site is an online companion to this textbook. It contains a wide variety of tools, information, discussion boards, and other features to assist learners.
• Go to community.cengage.com/Infosec2 and click the Join or Sign in icon to log in.
• Click Forums (Discussion) and
• Click on Security+ Case Projects (6th edition). Read the following case study.

A hospital decided to use cloud computing for processing and storage to save costs. After several months, it was discovered that the cloud provider's storage facilities were compromised and patient information was stolen. The hospital maintained that the cloud provider should be punished and fined for the breach, while the provider responded that it was still the hospital's responsibility under HIPAA to secure patient information and the hospital was ultimately responsible.
Task:

• Who do you think should be responsible? The cloud provider or the hospital?
• If the cloud provider is responsible, then should software companies like Microsoft be held liable for a vulnerability in their software that results in a data breach on a Microsoft server in a LAN?
• Where does the responsibility for the user end and the vendor begin?

PROJECT 3: Web Search Exercises

• Go to a popular online e-commerce site like Amazon.com. Place several items in your shopping cart, and then go to check out. When you reach the screen that asks for your credit card number, right-click on the Web browser and select "Properties." What can you find out about the cryptosystems and protocols in use to protect this transaction?
• Repeat Exercise 1 on a different Web site. Does this site use the same or different protocols? Describe them.
• Perform a Web search for "Symantec Desktop Email Encryption (powered by PGP Technology)." Download and install the trial version. Using the tool and your favorite e-mail program, send a PGP-signed e-mail to your instructor. What looks different in this e-mail compared with your other e-mails?
• Perform a Web search for "Announcing the Advanced Encryption Standard (AES)." Read this document, which is a FIPS 197 standard. Write a short overview of the development and implementation of this cryptosystem.
• Search the Web for "steganographic tools." What do you find? Download and install a trial version of one of the tools. Embed a short text file within an image. In a side-by-side comparison, can you tell the difference between the original image and the image with the embedded file?

PROJECT 4 Antennas

To many users, antennas are just one of life's great mysteries. They know from experience that any antenna is better than having no antenna, and that the higher the antenna is located, the better the reception will be. Yet the antenna is arguably one of the most important parts of a wireless network. Antennas play a vital role in both sending and receiving signals, and a properly positioned and functioning antenna can make all the difference between a wireless LAN operating at peak efficiency or a network that nobody can use. Use the Internet to research antennas for APs. Then answer the following questions:
• What different types of antennas are used?
• What are their strengths?
• What are their weaknesses?
• Which types would be used to concentrate a signal to a more confined area?
• Write a one-page paper on what you find.

Attachment:- Information Security.rar

Reference no: EM132909555

Questions Cloud

ENG 315 Professional Communications Promotional Message : ENG 315 Professional Communications Assignment - Professional Experience: Promotional Message, Strayer University, USA - Develop a promotional message
Arguments presented by risk management professionals : Discuss some of the unsound arguments presented by risk management professionals that hinder their ability to successfully manage known and unknown risks.
Process of organizational design : Consider yourself as one of the strategists who have been recently appointed by a newly formed organization. It's your first week of joining and you have realiz
Evaluate role of information technology in british airways : Suppose you are a Supply Chain Manager at British airways in South Africa. Evaluate the role of Information Technology in British Airways' supply chain and the
ICT professionals in information security roles : Analyse and to assess information security risks for business applications and recommend appropriate security mechanisms.
Effectve quality management strategies : Effectve quality management strategies are crucial for operations management. It leads to cost reduction and customer satisfaction.
Role of production planning-control in manufacturing unit : "What is the role of production planning and control in a manufacturing unit?
Analysis of quality management techniques : Analysis of quality management techniques used by the selected organization and add references
Traditional layout of organizations and the new layout : Because of the Corona crisis, there will certainly be a difference between the traditional layout of organizations and the new layout? What do you think of the

Reviews

Write a Review

Other Subject Questions & Answers

  Cross-cultural opportunities and conflicts in canada

Short Paper on Cross-cultural Opportunities and Conflicts in Canada.

  Sociology theory questions

Sociology are very fundamental in nature. Role strain and role constraint speak about the duties and responsibilities of the roles of people in society or in a group. A short theory about Darwin and Moths is also answered.

  A book review on unfaithful angels

This review will help the reader understand the social work profession through different concepts giving the glimpse of why the social work profession might have drifted away from its original purpose of serving the poor.

  Disorder paper: schizophrenia

Schizophrenia does not really have just one single cause. It is a possibility that this disorder could be inherited but not all doctors are sure.

  Individual assignment: two models handout and rubric

Individual Assignment : Two Models Handout and Rubric,    This paper will allow you to understand and evaluate two vastly different organizational models and to effectively communicate their differences.

  Developing strategic intent for toyota

The following report includes the description about the organization, its strategies, industry analysis in which it operates and its position in the industry.

  Gasoline powered passenger vehicles

In this study, we examine how gasoline price volatility and income of the consumers impacts consumer's demand for gasoline.

  An aspect of poverty in canada

Economics thesis undergrad 4th year paper to write. it should be about 22 pages in length, literature review, economic analysis and then data or cost benefit analysis.

  Ngn customer satisfaction qos indicator for 3g services

The paper aims to highlight the global trends in countries and regions where 3G has already been introduced and propose an implementation plan to the telecom operators of developing countries.

  Prepare a power point presentation

Prepare the power point presentation for the case: Santa Fe Independent School District

  Information literacy is important in this environment

Information literacy is critically important in this contemporary environment

  Associative property of multiplication

Write a definition for associative property of multiplication.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd