Identify strategies for combatting insider threats

Assignment Help Computer Network Security
Reference no: EM13841566

Assignment 1

Task

Background

As a consultant you have been asked by the Global Retail Solutions Group (GRS) to develop an implementable project plan for a point of sale and stock control system for a proposed chain (DSE) of retail outlets across Australia. You have been supplied the following information, information not available maybe assumed, this will be a competitive bid targeting the dual goals of quick implementation and low cost.

DSE is an aggressive player in the growing DIY electronics market with a plan to open a chain of retail outlets to further their growth in the market. Outlets will be located in major cities in seven states. The larger cities will have more than one store. Critical to sales is monitoring sales and stock turn to ensure adequate stock is available when demanded. Each store will be responsible for day-to-day operations, however, there is a strong central management structure at the national level. The services provided by the organization include volume buying to gain discounts, pricing, merchandising strategies, and consolidation of performance reporting for the corporate management.

The Information Systems Department at DSE's corporate office has been given the assignment to develop a transaction processing system that will apply modern RFID code scanning at the point of sale and provide automatic inventory control. The system will also relieve the store personnel of the tedious task of generating sales and performance reports as required by the head office.

An earlier project has successfully defined the store level hardware that will be used at the points of transaction plus the communications network that will connect the stores with the state offices. This hardware consists of standard PCs plus the scanning equipment and any other specialized interface hardware needed. The communications facility consists of a polled network and will be based on dial-up lines from the head office to the individual stores. The stores have no requirement to communicate with each other.

At this point in time, consider yourself a consultant who has to bid for the software development piece of the project upon which this system is based. You will have access to several DSE employees to execute the various tasks that your project proposal will guide to a successful conclusion.

You have selected Microsoft Project as a software tool to assist in the development of your proposal.

Five major activities have been defined, each of which contains a number of tasks. The tasks have been defined such that each task requires only one resource. Since there is a limit to the number of resources available to the project, a resource will probably be assigned several tasks throughout the duration of the project. However, for best efficiency the team has decided that it is best to schedule the completion of one task before the next task is started by the same resource. Your project design has divided the work into sufficiently small increments that this strategy can be successfully applied.

Since the software development is being done on standard platforms with standard operating environments and well-known development tools, there are no restrictions on the assignment of resources to tasks. This means that you can reassign tasks among your resource pool as required to make the most efficient schedule.

From the information supplied by DSE (below) you have to develop a design for the project. Your next task is to transfer the entire design to Microsoft Project so that you can clearly establish a timeline for the project based on detailed planning and costs associated with your preferred choice including resource utilisation. A concise business proposal including outputs from Microsoft Project will be required to make your case.

The project is due to begin on 01 September 2015.

Transaction processor

• User Interface - Driver code to display individual transaction data, including item name and price to both the customer and the operator. Richard - 3 days

• Peripheral Interface - Driver code to accept input data from the UPC scanner, scale and keyboard. Richard - 2 days

• Price Look-up - Inter-process communication to send item identification to the database and retrieve price information. Elizabeth - 3 days

• Order Control - Application code to accumulate item totals, accepting multiple quantities and calculating total price. This module also assigns items by tax category and maintains a total for each tax rate. Elizabeth - 10 days

• Payment Resolution - Application code to accept cash and debit transfers as payment for the order total. Note: Requires communications facilities with banking network. Harry - 4 days Transaction Resolution - Application code to update inventory, accumulate sales amounts, account for taxes collected by category. Harry - 5 days

• Receipt Printing - Application and driver code to print itemized receipt for cash sales and authorization form for debit transactions. Richard - 4 days

Price and inventory file

• Database Design - Schema design to include full description of each item and associated data to support price look-up and inventory management functions. Also includes tax rate by category and application of specific state tax rules. Sam - 5 days

• Database Access Library - Library applications that accept queries from the transaction processor and return data requested by the transaction. Includes inventory adjustment based on sale quantities. Jenny - 12 days

• Database Maintenance Library - Library applications that accept and apply price updates, add new items, change tax categories and update inventory status with new receipts. Ellie - 12 days

• Database Report Generation - Library applications that support database search for specific input criteria for product movement studies etc. Sam - 10 days

Inventory management

• Daily Status Report - Application code to search the database for all items that have been flagged as low stock status, sorted by supplier and displayed on a PC in the store manager's office. Elizabeth - 5 days

• Item History Report - An interactive query transaction to display on the manager's terminal the sales pattern for a selected item over the last two months. Jenny - 4 days

• Order Generation - Application code that accepts as input a specific item and returns the economic lot quantity and other pertinent vendor data. Also allow the manager to select and process an order to replenish stock. Harry - 7 days

• Order Communication - Application code that collects the decisions made in the Order Generation process and prepares an order for transmission to the head office. Harry - 3 days

• Receipt Processor - Application code that accepts input from the receiving dock via either scanner or keyboard to signal the receipt of stock. Richard - 3 days

• Inventory Update - Application code access the database library to update quantities in stock after receipt of shipments. Richard - 5 days

Communications

• Banking Network Interface - Driver code to initiate connection to local transaction switch and submit account and charge amount. Includes confirmation transaction and error recovery. Elizabeth - 7 days

• State Network Interface - Driver code to control incoming calls from the head office on the dial-up network. Handles automatic answer, message transfer in block mode and error recovery. Harry - 12 days

• Communications Command Interpreter - Application code to recognize incoming requests from the head office for various store performance reports. Jenny - 5 days

• Report Generator - Applications code to respond to a request from the communications interface to generate specific reports and return data as a file for sending to the state office in block mode. Each report is saved at the store and may be sent during the same communications session as the request or in a later session. Ellie - 10 days

Documentation

• Help for Transaction Processor - Richard - 5 days,

• Help for Price and Inventory Modules - Jenny - 5 days

• Help for Inventory Management - Harry - 5 days

• Help for Communications - Ellie - 5 days

Alpha test

• This test is conducted by a resource obtained from the head office. The objective is to verify that all of the functions are operational and that the results of each transaction are accurate and reliable. Barry - 20 days

• Developer support is provided as follows: Richard - 5 days, Jenny - 7 days, Harry - 6 days, and Ellie - 5 days

Beta test

• This test is to be conducted by actual users in several of the retail outlets. No development resources are allocated to this test. The duration of the test is 60 days.

Start roll-out

• This milestone marks the completion of the project. The rate at which the product is actually installed and delivered to operating personnel depends on the availability of resources and plans from the individual stores. Each of these is the possible subject of a project plan.

Resource costs

$/hour $/hour

Richard 200 Elizabeth 100

Jenny 100 Ellie 90

Harry 100 Outside Contractors - Sam 200

Barry 100 Transfer pricing - other internal resources 120

Task A

You are required to present your project plan to the project sponsor that shows how you propose to implement this project. As a minimum you should provide your plan as a business report including typical plan components such as objectives and goals, risk assessment and other elements you feel are important to support this project, and required to obtain approval from the project sponsor.

You must also incorporate, as a minimum, the following specific project software outputs:

• project summary

• gantt chart

• cash flow/budget

• network diagram

• resource sheet, and

• any other content you feel is appropriate.

The assignment will be marked on the basis of the sponsor's understanding of how you plan to complete this project in the most effective manner. This means value for money, timeframe, presentation, understanding of your approach and consistency and accuracy of the plan.
As you prepare your report, don't forget to format the software so that reports (eg. Gantt chart) are easy to read and can be handled (ideally on 1 page) as part of a meaningful project plan.

You are presenting your plan to the project sponsor who needs to understand your project plan, have confidence in you as the project manager and have the appropriate supporting documentation to back up your approach.

Task B

1. Generate a Turnitin originality report and submit this report via EASTS;

2. Answer the following questions to interpret the Turnitin originality report. The questions can be found through the following link: https://www.academicinternational.org/teaching/turnitin.pdf Submit your answers via EASTS.

Turnitin is more than a ‘gotcha' device - it is an effective learning tool:

Because the sophisticated use of sources involves a complex set of research, critical thinking, and writing skills, you should expect to take several years to master them. Turnitin can be a helpful tool in this developmental process. You should use your originality reports as feedback on a first draft so that you can improve your use of sources before submitting the final draft for marking.

Interpreting the Turnitin Originality Report:

After you submit your draft to Turnitin for self-checking, you should look carefully at the originality report so that you can improve on your use of sources. Your essay will be on the left side of the screen, and the matching colour-coded sources will be listed on the right. Then you can make the necessary changes to your essay before you submit the final draft for marking.

You need to register with Turnitin to create a Student Account under the CSU Turnitin Licence at https://www.turnitin.com/login_page.asp
Further information on how to use Turnitin can be found through the following link: https://student.csu.edu.au/study/plagiarism/checking

Rationale

This assessment task covers topics 1 to 9 and has been designed to ensure that you are engaging with the subject content on a regular basis. More specifically it seeks to assess your ability to:

• demonstrate how a practicing project manager actually applies project management skills, methods, techniques and tools ;

• use an industry standard project management software tool (Microsoft Project);

• apply project management skills, methods, techniques and tools to a real world problem typical of a project manager;

Assignment 2

Task

Mobile and cloud based solutions should be investigated. Furthermore, data secuirty also needs to be further investigated, which includes data ownership (by headspace, the young person, the ED, etc), data security in the cloud and who has access permission, and to what level of access, etc.

Outputs should include the following:

• An updated Project Vision.

This should be a revised Vision from assignments 2.

• Non-Functional Requirements - a System Wide Requirement Specification.

This sets out the critical system qualities, system interfaces, user interface requirements, and system constraints.

• Validation, and project management issues need to be considered in the response to this assessment item.

Rationale

This assignment is intended to develop and test your ability to research the role of information systems in solving business problems. Using some data gathering techniques you will also learn about the role of the system analyst in the development of information systems.

Assignment 3

Task

Consider the following Case study: https://www.enisa.europa.eu/activities/risk-management/evolving-threat-environment/enisa-threat-landscape/enisa-threat-landscape-2014 And answer the following Questions:

1) Provide a brief overview of the case study

2) Prepare a diagram for the ENISA security infrastructure

3) Identify strategies for combatting Insider Threats

4) Out of the ‘'Top threats'' which threat you regard to be the most significant and why?

5) Identify and discuss the key Threat Agents. What could be done to minimize their impact on the system?

6) Provide a brief summary (literature review) of Social Hacking issues

7) Based on the data provided in Table 2, discuss the trends in threat probability

8) How could the ETL process be improved? Discuss.

9) Based on Table 10 and your own research, identify and discuss threats that (in your opinion) will be most challenging for ENISA to combat in the year 2016 onwards.

10) To sum up, should ENISA be satisfied with its current state of IT Security? Why? Or Why not?

Rationale

To demonstrate your understanding of:

• the principles of security risk management; and

• the application of risk management principles to real-world examples.

Reference no: EM13841566

Questions Cloud

Public-private partnership and democracy : Public-Private Partnership and Democracy
Expressions in the matlab command window : These problems all involve typing expressions in the MATLAB command window. To complete this homework assignment, turn in a text (or Word, or PDF) file containing the expression that you type to respond to each problem.
To access and download stock : The objectives of this exercise: 1. To access and download stock and index price data from yahoo.com. 2. To discern the difference between a real-time closing price and an adjusted price.
What have been the effects of the bill of rights? : What have been the effects of the Bill of Rights?
Identify strategies for combatting insider threats : Identify strategies for combatting Insider Threats. Out of the ‘'Top threats'' which threat you regard to be the most significant and why?
Evaluate laws and regulations relative to product safety : evaluate laws and regulations relative to product safety and liability
Net profits after taxes : Doris Wise is a young career woman. She lives in Phoenix, Arizona, where she owns and operates a highly successful modeling agency. Doris manages her modest but rapidly growing investment portfolio, made up mostly of high-grade common stocks. Because..
Describe models of cultural evolution and cultural ecology : Describe models of cultural evolution and cultural ecology
Describe the differences among generalized and balanced : Describe the differences among generalized and balanced

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd