Reference no: EM133182454
ICTNWK423 Manage Network and Data Integrity - Australia
Network Management
Deliverables
Your document must include
1. Identifying user access control issues
a. Describe what is user control issues, examples (3 of them) and how to solve it
2. Using appropriate tools to conduct audit on system assets
a. What tools can you use to conduct audit on system assets? (recommendation: SolarWinds - do not download and use it)
b. Explain how to use it and show screenshot
3. Implementing and test antivirus solution
a. Download and install an antivirus software and do the EICAR test on it
b. You need to provide a step by step screenshot how download, install and test. For each screenshot, you will need to provide a brief description what you are doing in the screenshot
4. Employing systems to negate environmental threats
a. Describe what is environmental threats (1 paragraph)
b. Give an example (3 of them) (e.g. fire, floods, etc) - how it will affect the system
c. For each of the example, explain how to prevent it
5. Demonstrating features of data backup, restore and system roll back
a. Create a Windows Server 2012 VM, create a file on it, do a backup of the Windows Server, then delete that file you created, then restore the backup and check if the file came back
b. You need to provide a step by step screenshot how to create the VM, create the file, backup, delete the file, restoration and show the restored file. For each screenshot, you will need to provide a brief description what you are doing in the screenshot
6. Performing network monitoring using a variety of current standard tools
a. Download and install Wireshark and explain how to use it
b. Provide screenshot with your explanation
7. Adding network controls according to network and data integrity policies
a. Explain what is network control
b. Explain what is network and data integrity policies
c. How network control and network and data integrity policies relate?
8. Audit Check List
a. Use 4 Phones Case Study Document and their policies to fill out the audit checklist
b. In findings, reply to the question with "Yes" or "No"
c. If you say "Yes" then you should say "Where" you found it, then in Compliance column you can say "Compliant"
d. If you say "No" then in Compliance column you should say "How" to fix this issue
9. Referencing
a. The Referencing requirements have changed, please follow the link below for more information
TASK 2 - Server/Network Backup
CASE SCENARIO
Create a windows server 2012 VM, create a file on it, do a backup of the Windows Server, then delete that file you created, then restore the backup, and check if the file came back.
Deliverables
Your document must include
1. PLAN
a. Introduction
b. Test plan
2. IMPLEMENTATION
a. Screenshot of your configuration, crop your screenshot making sure all the relevant information is captured and make one or two comments of what the screenshot is about (You must take screen shot of the configuration process).
b. First, create a virtual machine with Windows Server 2012
c. Second, create a text file and put your name inside the file
d. Third, do a backup of the Windows Server
e. Fourth, delete the file
f. Fifth, restore the backup
g. Sixth, check the restored file
3. BACKUP LOG SHEET
a. Template given on Canvas
4. CONCLUSION
a. In your conclusion include any problems you may include and thetrouble shooting process you follow to solve them.
Attachment:- Manage Network and Data Integrity.rar