Reviewing system logs for encryption issues and compromises

Assignment Help Other Subject
Reference no: EM133135324

ICTNWK537 IMPLEMENT SECURE ENCRYPTION TECHNOLOGIES

Assessment Task 1: Knowledge Test

Q1: Explain each of the following symmetric key algorithms in 50-100 and list at least two (2) usages for each of symmetric key algorithms.
1) AES
2) DES
3) Triple DES
4) Blowfish

Q2: Explain each of the below mention encryption types in 80-150 words:
1) Public Key
2) Secret Key
3) Hash key

Q3: Explain the functioning of "Digital signatures" in 100-150 words.

Q4: Explain two (2) features of digital signatures. Write 100-150 for each function.

Q5: Answer the below questions related to timestamp.
5A) Explain two (2) functions of timestamp. Explain each in 50-100 words.
5B) Summarise two features of timestamp.

Q6: What do you understand by the term "Encryption strength"? Explain in 50-100 words.

Q7: Explain each of following terms in 50-150 words.
1. Message digest 5 (MD5)
2. Secure hash algorithm (SHA)
3. Public key infrastructure (PKI)
4. Pretty good privacy (PGP)
5. GNU privacy guard (GnuPG)

Q8: Explain the importance of reviewing helpdesk records to troubleshoot encryption issues. Explain in 40-80 words.

Q9: What important information will you collect by reviewing system logs for encryption issues and compromises. Write your response in 50-100 words.

Q10: Explain each the following security threat in 50-100 words.
1) Eavesdropping
2) Data Interception
3) Data corruption
4) Data falsification
5) Authentication issues.

Q11: Explain the term "Transmission Control Protocol" and its application in 150-200 words.

Q12: Explain the following terms. (Each in 50-150 words).
1. Wired Equivalent Privacy (WEP)
2. Wi-Fi Protected access (WPA)
3. Wi-Fi Protected access 2 (WPA2)

Q13: Explain each of the following certificate related infrastructure in 50-150 words?
1) Certificate authorities
2) Registration authorities
3) Repository services

Q14: List three (3) most common asymmetric key algorithms and summarise their usages in 40-80 words

Q15: What do you understand by reply attacks? Write your response in 100-150 words.

Q16: List and explain five (5) security problems and challenges arise due to organisational issues?

Q17: Summarise the features and functions of access control permission in 100-200 words.

Q18: Explain the functioning and features of the following in 100-200 words for each.
A. Symmetrical Encryption
B. Asymmetrical Encryption

Q19: Summarise the features and functions of "One-way encryption"?

Q20: List two techniques to analyse data security requirements.

Q21: What are the essential information should include in a security plan. List any three (3).

Assessment 2: Assessment task environment

You are required to select, implement and monitor secure file encryption technologies on a computer network or local environment. You are required to read and understand a predetermined issue and/or situation and participate in a number of assessment activities.

The following are the goals and objectives to complete this assessment task:
• Determine encryption methods
• Identify enterprise data security needs according to computer network and organisational needs
• Obtain and review available range of encryption technologies and determine options according to computer network and organisational needs
• Plan and document proposed encryption implementation strategy and submit to required personnel
• Seek and respond to proposed encryption plan feedback from required personnel according to organisational needs
• Carry out encryption
• Implement encryption technology to enterprise system according to vendor specifications
• Analyse and document effect of encryption technologies on required user roles and responsibilities
• Submit encryption technologies analysis report and inform user impact to required users and organisational personnel
• Finalise encryption technologies
• Evaluate implementation of encryption technologies according to encryption analysis report
• Determine function and performance of encryption technologies
• Seek user feedback on function and performance of encryption technologies
• Document encryption issues and compromises and submit to organisational help desk support
A supervisor will be assigned to you by your training organisation. The supervisor can answer your questions related to understanding the requirements associated with the assessment task. The supervisor will act according to job role and responsibilities.

The supervisor can be your trainer or assessor or a different trainer or assessor or a staff member (including mentors) from the training organisation.
Roles and responsibilities
As part of your job role, you have the following job responsibilities:
• Interprets and analyses technical data to determine security requirements.
• Identifies and interprets technical compromises from help desk records.
• Prepares workplace documentation that incorporates an evaluation of technical information using specialised and cohesive language.
• Determines the required form, channel and mode of communication for a specific purpose, according to own role.
• Uses a combination of formal, logical planning processes and an increasingly intuitive knowledge of context to determine data security threats, risks and countermeasures.
• Initiates standard procedures when responding to familiar problems to troubleshoot, debug and correct connectivity and security issues.
• Follows explicit and implicit protocols and meets expectations associated with own role.
• Demonstrates knowledge of the purposes, specific functions and key features of industry standard digital systems and tools.
• Operates industry standard digital systems and tools effectively to complete routine tasks.
• Manages and maintains data securely and actively monitors technology, notifying others if security becomes compromised.
• Operates industry standard digital systems and tools effectively to complete routine tasks.
Task requirements
This assessment task requires you to select, implement and monitor secure file encryption technologies on a computer network or local environment. The assessment activities are mentioned within the assessment task.

Simulated Environment

Assessment task instructions
• The purpose of this assessment task is to select, implement and monitor secure file encryption technologies on a computer network or local environment.
• The training organisation must ensure that the simulated assessment environment is in accordance with the requirements specified.
• The training organisation will assign a supervisor to the student.
• The training organisation will provide the resources required to complete the assessment task.
• The student must use the templates provided to document their responses.
• The student must follow the word-limits specified in the templates.
• The trainer/assessor must assess the student using the performance checklist provided.

Assessment task environment
This assessment task will be completed in a simulated environment prepared by your training organisation.
The simulated environment will provide you with all the required resources (such as the equipment and participants, etc.) to complete the assessment task. The simulated environment is very much like a learning environment where a student is able to practice, use and operate appropriate industrial equipment, techniques, practices under realistic workplace conditions.
Requirements for the simulated assessment environment
The trainer/assessor will ensure that the simulated assessment environment is sufficient to complete this assessment task.
The simulated environment consists of:
• The training organisation as the workplace where the student will be required to complete their job-related tasks and activities
• The standard operating/workplace procedures related to the training organisation
• The trainer/assessor will provide the student with assistance throughout the assessment activity.

You are required to select, implement and monitor secure file encryption technologies on a computer network or local environment. You are required to read and understand a predetermined issue and/or situation and participate in a number of assessment activities.

The following are the goals and objectives to complete this assessment task:
• Determine encryption methods
• Identify enterprise data security needs according to computer network and organisational needs
• Obtain and review available range of encryption technologies and determine options according to computer network and organisational needs
• Plan and document proposed encryption implementation strategy and submit to required personnel
• Seek and respond to proposed encryption plan feedback from required personnel according to organisational needs
• Carry out encryption
• Implement encryption technology to enterprise system according to vendor specifications
• Analyse and document effect of encryption technologies on required user roles and responsibilities
• Submit encryption technologies analysis report and inform user impact to required users and organisational personnel
• Finalise encryption technologies
• Evaluate implementation of encryption technologies according to encryption analysis report
• Determine function and performance of encryption technologies
• Seek user feedback on function and performance of encryption technologies
• Document encryption issues and compromises and submit to organisational help desk support
A supervisor will be assigned to you by your training organisation. The supervisor can answer your questions related to understanding the requirements associated with the assessment task. The supervisor will act according to job role and responsibilities.

Roles and responsibilities
As part of your job role, you have the following job responsibilities:
• Interprets and analyses technical data to determine security requirements.
• Identifies and interprets technical compromises from help desk records.
• Prepares workplace documentation that incorporates an evaluation of technical information using specialised and cohesive language.
• Determines the required form, channel and mode of communication for a specific purpose, according to own role.
• Uses a combination of formal, logical planning processes and an increasingly intuitive knowledge of context to determine data security threats, risks and countermeasures.
• Initiates standard procedures when responding to familiar problems to troubleshoot, debug and correct connectivity and security issues.
• Follows explicit and implicit protocols and meets expectations associated with own role.
• Demonstrates knowledge of the purposes, specific functions and key features of industry standard digital systems and tools.
• Operates industry standard digital systems and tools effectively to complete routine tasks.
• Manages and maintains data securely and actively monitors technology, notifying others if security becomes compromised.
• Operates industry standard digital systems and tools effectively to complete routine tasks.
Task requirements
This assessment task requires you to select, implement and monitor secure file encryption technologies on a computer network or local environment. The assessment activities are mentioned within the assessment task.

Assessment Task 2: Project

Scenario:
"Southern Star" company is providing public, private, hybrid and community cloud services to many companies across the world and offering following services:
• IaaS (Infrastructure-as-a-Service)
• PaaS (Platform-as-a-Service)
• SaaS (Software-as-a-Service)
• Storage, Database, Information, Process, Application, Integration, Security, Management, Testing-as-a-service
To provide above mentioned cloud services, "Southern Star" company has following infrastructure in their data centre.
• Eight (8) Servers out of these Six (6) are connected to network and Two (2) are kept as backup
• Twelve (12) Network switches with 24 port support (Nine (9) Switches are connected to network are three (3) are kept as back up)
• Six (6) Routers (4 Routers are hosing NBN connection and two (2) of them are kept as back up)
• Five (5) wireless access point connected to network to provide Wi-Fi connectivity throughout data centre.
• Twenty (20) SAN (Storage area network) storage area devices to store client's data
• Fifty (50) desktop computers
"Shan Publications" is a premium client of "Southern Star". "Shan publication" use cloud services offered by "Southern Star" to store the drafts of unpublished poems, books and blueprints of printed books. One day as they were downloading the drafts of some books to publish, they found that some of their data is missing from the server and raised the complaint about missing data to "Southern Star". As per the agreement "Southern Star" is liable for client data security and company do not want to lose their client base.
Southern Star is now investigating the problem, and one of the senior consultant (Lee) is allocated to this project. Lee is working in the company from last 10 years and has an extensive amount of experience in network, cloud and data security.
David is a general manager of the Southern star and looking after all the operation of the organisation.

Roles and responsibilities of Lee:
• Planning, implementing and upgrading security measures and controls
• Establishing plans and protocols to protect digital files and information systems against unauthorized access, modification and/or destruction
• Maintaining data and monitor security access
• Performing vulnerability testing, risk analyses and security assessments
• Conducting internal and external security audits
• Anticipating security alerts, incidents and disasters and reduce their likelihood
• Managing network, intrusion detection and prevention systems
• Analysing security breaches to determine their root cause
• Recommending and install appropriate tools and countermeasures
• Defining, implementing and maintaining corporate security policies
• Training fellow employees in security awareness and procedures
• Coordinating security plans with outside vendors
After an initial investigation of the data loss problem, Lee has found below concerns in the southern star network infrastructure:
• No data encryption service
• Data security concerns
• Data permission not planned
• Additional hardware to manage the data

Activity 1: (Analysing and documenting data security requirement)
After reviewing the scenario, you need to analyse the data loss problem and need to prepare a security plan including
• Background of the security plan
• Issues identified in the network
• How to resolve each issue
• What hardware and software required
• How identified software and hardware aligned with the solutions
• How and when data backup will be prepared
• Transmission security
• Network database security
You may need to research related to security plan on the internet. You must complete below security plan as a part of the activity.

Activity 2: (Review encryption technologies and costs)
Note: This activity is in continuation of activity 1.
After completing the security plan, you are required to review a range of encryption software on the internet and complete below Technology cost template.
After completing the template, you are required to send email to David(Trainer/assessor) including technology cost document for approval. Email must include:
• Subject
• Body
• Explain that which option is the best and why we should use it.

Assessment Task 3 - Project

The following are the goals and objectives to complete this assessment task:
• Determine encryption methods
• Identify enterprise data security needs according to computer network and organisational needs
• Obtain and review available range of encryption technologies and determine options according to computer network and organisational needs
• Plan and document proposed encryption implementation strategy and submit to required personnel
• Seek and respond to proposed encryption plan feedback from required personnel according to organisational needs
• Carry out encryption
• Implement encryption technology to enterprise system according to vendor specifications
• Analyse and document effect of encryption technologies on required user roles and responsibilities
• Submit encryption technologies analysis report and inform user impact to required users and organisational personnel
• Finalise encryption technologies
• Evaluate implementation of encryption technologies according to encryption analysis report
• Determine function and performance of encryption technologies
• Seek user feedback on function and performance of encryption technologies
• Document encryption issues and compromises and submit to organisational help desk support

Roles and responsibilities
As part of your job role, you have the following job responsibilities:
• Interprets and analyses technical data to determine security requirements.
• Identifies and interprets technical compromises from help desk records.
• Prepares workplace documentation that incorporates an evaluation of technical information using specialised and cohesive language.
• Determines the required form, channel and mode of communication for a specific purpose, according to own role.
• Uses a combination of formal, logical planning processes and an increasingly intuitive knowledge of context to determine data security threats, risks and countermeasures.
• Initiates standard procedures when responding to familiar problems to troubleshoot, debug and correct connectivity and security issues.
• Follows explicit and implicit protocols and meets expectations associated with own role.
• Demonstrates knowledge of the purposes, specific functions and key features of industry standard digital systems and tools.
• Operates industry standard digital systems and tools effectively to complete routine tasks.
• Manages and maintains data securely and actively monitors technology, notifying others if security becomes compromised.
• Operates industry standard digital systems and tools effectively to complete routine tasks.

Task requirements
This assessment task requires you to select, implement and monitor secure file encryption technologies on a computer network or local environment. The assessment activities are mentioned within the assessment task.

Assessment task instructions
• The purpose of this assessment task is to select, implement and monitor secure file encryption technologies on a computer network or local environment.
• The training organisation must ensure that the simulated assessment environment is in accordance with the requirements specified.
• The training organisation will assign a supervisor to the student.
• The training organisation will provide the resources required to complete the assessment task.
• The student must use the templates provided to document their responses.
• The student must follow the word-limits specified in the templates.
• The trainer/assessor must assess the student using the performance checklist provided.

Assessment task environment
This assessment task will be completed in a simulated environment prepared by your training organisation.
The simulated environment will provide you with all the required resources (such as the equipment and participants, etc.) to complete the assessment task. The simulated environment is very much like a learning environment where a student is able to practice, use and operate appropriate industrial equipment, techniques, practices under realistic workplace conditions.
Requirements for the simulated assessment environment
The trainer/assessor will ensure that the simulated assessment environment is sufficient to complete this assessment task.
The simulated environment consists of:
• The training organisation as the workplace where the student will be required to complete their job-related tasks and activities
• The standard operating/workplace procedures related to the training organisation
• The trainer/assessor will provide the student with assistance throughout the assessment activity.

Resources, tools, and equipment requirements
The following resources, tools and equipment will be made available by the training organisation at the simulated workplace to complete this assessment task:
• Workplace personnel/stakeholders to participate in the questioning session requires active participation in a range of creative thinking activities
o Please refer to the roles and responsibilities section for more information
• a site where encryption installation may be conducted
• a live network
• servers
• industry standard encryption software

• industry standard encryption tools
• organisational security and encryption deliverables.
Simulated assessment scenario
You are required to select, implement and monitor secure file encryption technologies on a computer network or local environment. You are required to read and understand a predetermined issue and/or situation and participate in a number of assessment activities.

The following are the goals and objectives to complete this assessment task:
• Determine encryption methods
• Identify enterprise data security needs according to computer network and organisational needs
• Obtain and review available range of encryption technologies and determine options according to computer network and organisational needs
• Plan and document proposed encryption implementation strategy and submit to required personnel
• Seek and respond to proposed encryption plan feedback from required personnel according to organisational needs
• Carry out encryption
• Implement encryption technology to enterprise system according to vendor specifications
• Analyse and document effect of encryption technologies on required user roles and responsibilities
• Submit encryption technologies analysis report and inform user impact to required users and organisational personnel
• Finalise encryption technologies
• Evaluate implementation of encryption technologies according to encryption analysis report
• Determine function and performance of encryption technologies
• Seek user feedback on function and performance of encryption technologies
• Document encryption issues and compromises and submit to organisational help desk support
A supervisor will be assigned to you by your training organisation. The supervisor can answer your questions related to understanding the requirements associated with the assessment task. The supervisor will act according to job role and responsibilities.
The supervisor can be your trainer or assessor or a different trainer or assessor or a staff member (including mentors) from the training organisation.

Roles and responsibilities
As part of your job role, you have the following job responsibilities:
• Interprets and analyses technical data to determine security requirements.
• Identifies and interprets technical compromises from help desk records.
• Prepares workplace documentation that incorporates an evaluation of technical information using specialised and cohesive language.
• Determines the required form, channel and mode of communication for a specific purpose, according to own role.
• Uses a combination of formal, logical planning processes and an increasingly intuitive knowledge of context to determine data security threats, risks and countermeasures.
• Initiates standard procedures when responding to familiar problems to troubleshoot, debug and correct connectivity and security issues.
• Follows explicit and implicit protocols and meets expectations associated with own role.
• Demonstrates knowledge of the purposes, specific functions and key features of industry standard digital systems and tools.
• Operates industry standard digital systems and tools effectively to complete routine tasks.
• Manages and maintains data securely and actively monitors technology, notifying others if security becomes compromised.
• Operates industry standard digital systems and tools effectively to complete routine tasks.

Task requirements
This assessment task requires you to select, implement and monitor secure file encryption technologies on a computer network or local environment. The assessment activities are mentioned within the assessment task.

Assessment task instructions

• The purpose of this assessment task is to select, implement and monitor secure file encryption technologies on a computer network or local environment.
• The training organisation must ensure that the workplace assessment environment is in accordance with the requirements specified.
• The workplace will assign a supervisor to the student.
• The trainer/assessor can also act as a supervisor to the student as well.
• The workplace will provide the resources required to complete the assessment task.
• The student must use the templates provided to document their responses.
• The student must follow the word-limits specified in the templates.
• The trainer/assessor must assess the student using the performance checklist provided.

Scenario:
Activity 1
(Installing encryption software)
This activity is continuation of assessment task 2. You are required to participate in a practical demonstration task. You need to complete this activity in 1 to 2 hours.
Note: For This activity RTO/Assessor will provide you the following:
• A site where encryption installation may be conducted
• A live network
• Servers
• Encryption software
• Encryption tools.
You have received a final approval from David to start the encryption project, so you must perform the installation of encryption software and tools on the live network.
Assume yourself as "Lee" and install database encryption software and tools.
You need to install encryption software on IT Server. You need to Perform installation of database "Encryption" software by adhering below mention conditions.
a) Use secure protocol for data transfer
b) Create a digital key certificate for client and server
c) Use secure network protocols
d) Set admin password
Student must follow vendor instruction to install the software.

Activity 2: (Analysing effect of encryption on user roles)
Note: This activity is in continuation of activity 1.
Assume that Lee has implemented the encryption software successfully. As a part of his responsibilities, he needs to analyse the effect of user roles and responsibilities.
Assume yourself as Lee and you are required to analyse the effect of user roles and responsibilities in encryption and complete the following "security plan" template.

Security plan - 2
Role Description/effect
Enterprise Administrator Intended for administrators who control the Enterprise and require administrative rights to all groups, users, devices, and policies regardless of where they reside.
Group or Policy Administrator Intended for administrators who control any assigned group or policy.

Enterprise Authenticator Intended for Help Desk personnel who provide remote assistance when users forget their Endpoint Encryption password or have a technical problem. Enterprise Authenticators have configurable privileges for the Enterprise.
Group or Policy Authenticator Intended for Help Desk personnel with the same privileges as the Enterprise Authenticator except for being limited to the assigned group or policy only.
User Intended for basic end users with no special privileges. The user role cannot log on to Endpoint Encryption management consoles.

Activity 3: (Role Play - Informing users about their roles)
Note: This activity is in continuation of activity 2.
o Time allowed for this activity is 10-15 minutes.
Assume that you are still playing the role of Lee and participate in the following role play.
The purpose of the role play is to inform users about new encryption technology and how it works. Explain the effects of new encryption technology on user responsibilities. You need to use the template that you have developed in the assessment activity 2 (Assessment task 3) to explain the effects of new encryption technology on user responsibilities for the following users:
o Policy administrator
o Enterprise Authenticator
o Policy authenticator
o User
Your trainer/assessor will act as enterprise administrator and will ask you the following questions:
1. Security limitations of all the roles
2. Explanation of the features included in the "Enterprise administrator" role
Following the role play, complete minutes of meeting template with details of what was discussed.

Activity 4: (Analysing functioning of "Encryption software")
Assuming that you have implemented the encryption technology and tools in a live server in the previous assessment activities, you are required to monitor the encryption in this activity. You need to complete this task in 1 to 2 hours.
In this activity you need to monitor the functioning of "Encryption software" by perform following tasks in a live server.
1. Analyse the implementation of encryption technology to confirm its functioning by:
o Monitoring digital signature
o Monitoring Data Encryption Compromising Network Performance
o Monitoring network performance
2. Analyse helpdesk records for errors occurred and security compromises in encryption and print these records as a part of this activity.
3. Check local computer security logs for encryption issues and print it as a part of this activity.
4. You need write a note on encryption issue and security compromises included error logs and network performance issues identified in the task and submit to your trainer/assessor.

Attachment:- IMPLEMENT SECURE ENCRYPTION TECHNOLOGIES.rar

Reference no: EM133135324

Questions Cloud

Effective management of people : Do cost-containment pressures work against the effective management of people? Why or why not?
Best practices for a performance evaluation system : Name and describe three best practices for a performance evaluation system
Explain meaning of discretionary and committed fixed costs : Explain the meaning of discretionary and committed fixed costs. Explain the formula: Total variable costs = Variable rate x Amount of output (provide example)
Change management purpose and discipline : Explain the purpose and discipline of change management and the characteristics of a learning organization.
Reviewing system logs for encryption issues and compromises : Explain the importance of reviewing helpdesk records to troubleshoot encryption issues and List and explain five security problems and challenges arise
How can i influence others in the workplace : As an HR practitioner, how can I influence others in the workplace? (with example)
Explain what the eeoc does : Why do you think organizations commonly run into problems with the EEOC, and how might these problems be avoided?
Acknowledge and learn better people : Easy 20s are people who are always willing to listen to acknowledge and learn better people. Middle 60 are people who will listen but often time they don't rea
Concept of business strategy evolved : How has the concept of business strategy evolved?

Reviews

Write a Review

Other Subject Questions & Answers

  Create a comprehensive mission statement for the clinic

Analyze some of the key social, political, and economic factors that have led to the proliferation of urgent care facilities .

  Identify these personal challenges and problems in video

As illustrated in the video, identify 3 of these personal challenges/problems? Write a 2-3 page paper that focuses on three of the personal challenges

  Constructing and using a supplier selection system

49309 - Quality Planning and Analysis - assignment consists of a number of tasks (parts) and has been designed with the aim of providing students a practical

  What is role of executives in process of change management

What is the role of executives in the process of change management and strategic planning? How do issues with diversity and culture relate to change management?

  Pathways into indirect and direct pathways

What problems are there with dividing up the pathways into indirect and direct pathways?

  Describe what effect you are seeing in the data

Submit a 2 - 3 page type - written, double - spaced standard font document that connects the changes that have occurred in your country due to globalization.

  Complete the given therapy chart

Complete the following Pharmacotherapy and Medication Assisted Therapy chart. For each "Purpose of Medication," list the name of a medication that is used.

  Explain the influence of altruistic organizations

Explain the influence of altruistic organizations (Peace Corps, Project Hope, religious and non-religious missions, and so on) on health and health care.

  Which aspects of your personality have changed over time

Reflect on your life history and discuss which aspects of your personality have changed over time and which aspects have stayed consistent.

  Increase supply of viable organs for transplant

Some have suggested that the sale of organs in the U.S. would increase the supply of viable organs for transplant. Others have said that only voluntary donation is ethical under the U.S. system of medicine

  In what ways were those issues surprising

Identify the top three issues your writing specialist focused on in your rough draft (e.g., paragraph structure, proper use of quotations, thesis statement.

  Describe the merits of the article in brief

For this assignment, you are required to critique a journal article on risk management. Your critique must include the following: An evaluation or critique of.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd