List the assets owned by xpc and categorise

Assignment Help Other Subject
Reference no: EM133702101

Background:

You have just been placed in charge of the IT department for a growing company called XPC that deals with other a customer base located locally and domestically. There are 15 roaming employees employed.

Prior to you coming on board, they didn't have any IT staff and hired contractors to do the work.

The information stored on your local servers is very confidential. Your company's employees do a lot of travelling both domestically and internationally. XPC has just received a shipment of brand-new, Windows based laptops to provide their employees with. Data is stored locally and then backed up to the server when the laptops connect to a network.

As XPC employees need to travel frequently, their main mode of data communication connecting back to the main server is to use whatever wireless connections are available.

No database has been put in place to track the assets.

You have been provided with a network diagram which provide you with the following:
• the current location of all the laptops in use by staff
• The current security in place on your network
Goal of this project:
You have been tasked with auditing this network and all the equipment in an effort to improve security.
To complete this task, you will need to create a report on your audit. Your report must contain the following:
• Title Page
• Table of Contents
• Plan
• Identifying and valuing XPC's assets
• Identifying and modelling the main threats
• Implementing and testing solutions to these main threats
• Conclusion

Section 1: Planning
Before you undertake your audit on this network, you need to determine the steps required to conduct this audit.
Write a 4-step plan that you can use on this network audit to assist you in identifying key elements to manage any potential risks on this network (4 elements - 5-15 words per element)

Section 2: Identifying and Valuing Assets
Your first task is to create a database to audit the devices owned by XPC.
Create a table showing the following information:
a) List the assets owned by XPC
b) Categorise each device using their device type
c) For each device category, identify a potential threat and explain how this threat could occur (10-25 words per threat) - Please note your identified threats for any networking device types must be resolvable in Packet Tracer in Section 3
d) Determine the potential origin of this threat to this device type (Internal or External)
e) Value them in terms of importance to the organisation - High/Medium/Low and provide a brief explanation why you valued it this way (5-20 words)
f) Cost - The cost for each device has been added to the topology. Add the cost of the devices together and calculate their total at the bottom of this column

Section 3 - Threat Modelling
You have been asked to design a threat model for the threats you identified in Task 1.
Design a threat model that does the following:
• Grades the threats based on at least 3 different categories
• Rates the likelihood of that threat occurring
• Provides a solution on handling the identified threats. (10-20 words per solution)

Section 4: Implement and test solutions

Section 4a:
Prior to implementing your solutions from section 3 across the whole network, you have been asked to pilot them only on 3 different devices.

Using the table below, identify 1 router, 1 switch and 1 WAP that you will apply your solution to. Explain how you will be implementing this solution on these devices in the left column and write the device name in the right column.

Section 4b
Now that you have identified the devices, Use the topology provided to implement the solutions to the devices you have selected in Section 4a.

You will be required to note the implemented security using the note tool on Packet Tracer. Place each note next to your selected devices listing the implemented solution.

Section 4c
Once you have implemented your solutions, you need to create a series of tests to validate whether the solutions have worked.

Each solution will need to have 2 tests:
• One test should test to ensure the security correctly allows authorised devices/people.
• One test should test to ensure the security correctly blocks unauthorised devices/people.

For each test provide an explanation on how the tests are to be conducted. You are not to describe what the expected outcome should look like (5-15 words per test)

Once you have created your tests, you must swap your tests and completed topology with another student of your choosing. The idea is for each student to run the tests as written and provide verbal feedback on the outcome and modifications required. Populate the feedback in the remaining fields with the following information:
• Test Outcome Success - Was the outcome successful: Yes/No. If not, why? (10-15 words per test)
• Modifications required - Based on the outcome of the test, were you required to make modifications to the network? :Yes/No. If not, why? (10-15 words per test)

At the bottom of your completed table, add the following information:
Tests for this network run by: *Insert other student's name here
I conducted testing on *Insert other student's name here* network.

Section 5: Conclusion
Provide a summary explaining how the tasks undertaken in this audit have made the XPC's network more secure. (50-75 words)
Provide an area for the management of XPC to sign off this report.

Where
You will be undertaking this assessment for 4 weeks during Scheduled class time and out class times. A date will be provided by the assessor on Blackborad. You will be provided some class time to work on this assessment, however, it is expected that the majority of this assessment will be completed outside of class.

How
This is an individual assessment. Youi will be assessed against the criteria listed in the marking guide in Section B of this task. To achieve a satisfactory result, you will need to address all criteria satisfactorily and submit work by the date specified by the assessor.

Note: Don't need to do section 4

 

Reference no: EM133702101

Questions Cloud

What are origins of liberal thought in western societies : Please explain in detail: What are the origins of liberal thought in Western societies?
What were consequences of the industrial revolution : What were significant causes and consequences of the industrial revolution? How important was this event at the time.
Why is it important to learn about mexican violence-labor : Why is it important to learn about Mexican Violence and Labor? Include topics such as (Resistance Labor, Gendered Labor, Impacts of unfair labor practices).
Why identifying internal and external trends is important : Explain why identifying both internal and external trends is important for quick intervention, and how you would develop a tactical plan to reduce a trend.
List the assets owned by xpc and categorise : List the assets owned by XPC and Categorise each device using their device type - Write a 4-step plan that you can use on this network audit to assist
Identifying key elements to manage any potential risks : Write a 4-step plan that you can use on this network audit to assist you in identifying key elements to manage any potential risks on this network
How has aspects of your identity changed over time : How has this aspect or aspects of your identity changed over time? In what ways is this identity a source of power in your society? In international society?
How adam smith applied values of individualism to economic : In a couple of sentences, describe how Adam Smith applied the values of individualism to economic or political systems.
What impact did classical liberalism have on western society : What impact did classical liberalism have on western society? How did liberalism evolve over time?

Reviews

Write a Review

Other Subject Questions & Answers

  What are the five stages in therapy

What are the five stages in therapy? Describe each stage and it's goal

  Foundations of mythology

Foundations of Mythology

  Space station quickly and in most efficient fashion

What maneuvers can your crew perform to arrive at the Space Station quickly and in the most efficient fashion?

  What is ideological basis for self-strengthening movement

What is the ideological basis for the Self-Strengthening Movement during the Qing period and Are the reformists nationalist?

  Difference between probable cause and reasonable suspicion

What is the difference between probable cause and reasonable suspicion? How long can police detain a suspect based on reasonable suspicion

  Artist on the planet

Leonardo DaVinci, perhaps the best known artist on the planet. If you make it to the Louvre in Paris, you may have to wait in line for hours to to view his most famous work, La Gioconda (Mona Lisa) - and you have to see behind thick bulletproof glass..

  Discuss the triple-bottom-line approach

At the next big family gathering, you want to impress your grandparents with the innovative ideas you have learned in business school.

  Performance in leadership skills role play

Create a scoring opportunity so your instructor can assess your performance in Leadership Skills Role Play 2: Individual Session

  Discuss the power of vision

Discuss the power of vision as it relates to leadership effectiveness. What forces, people, and events have influenced current attitudes toward leadership.

  Question 1react to the following statements which are often

question 1react to the following statements which are often made by it professionals. you are expected to make use of

  Analysis of imagery evaluating an artifact

Humans are art making creatures. From the evocative hunting depictions of our ancient ancestors to modern dance, humans have reacted to their environment by painting, singing, dancing, writing, and recording the things they encounter.

  Prepare by learning well the philosophies

Prepare by learning WELL the philosophies/ ethics/ morals of the person you are assigned. Knowing something of the others would help so that you can defend your

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd