Advise on security issues

Assignment Help Computer Network Security
Reference no: EM131203663 , Length: word count:5000

Your report should detail the following section and points below commensurate with the marks allocated and be addressed primarily to the management of CCA Pty Ltd who are not security or IT experts. Some issues may require the acquisition of new software and hardware; you should identify suitable products that could be used to resolve the issues. Your proposal should adhere to industry security best practise and produce a secure and functional network installation for CCA Pty Ltd.

Addressing Identified Issues

- Vulnerabilities should be ranked based on a simple risk assessment methodology
- Consider any necessary changes you think appropriate to the network design
- Consider any necessary changes you think to the server and client deployment
- Identify appropriate remediation for each identified issue and explain fully in language appropriate for the customer

Implicit/Unidentified Issues

- Vulnerabilities should be ranked based on a simple risk assessment methodology
- Consider any necessary changes you think appropriate to the network design
- Consider any necessary changes you think to the server and client deployment
- Identify appropriate remediation for each identified issue and explain fully in language appropriate for the customer

Policy Development

Develop basic polices need to better secure the network; as a minimum the following should be considered:

- Password Policy
- Acceptable Network Usage Policy
- Acceptable Internet Usage Policy
- Acceptable Email Usage Policy

Network Design

- Provide a detailed network diagram showing your proposal
- You may want to consider multiple diagrams to separate physical & logical components

Presentation

- Grammar & spelling
- Report format
- Overall presentation
- Appropriate referencing for a customer report

CCA Pty Ltd Case Study Information

CCA Pty Ltd are suppliers and publishers of printed media primarily for the enterprise IT training industry. Products include course manuals, test booklets and IT technology reference books.

All of their sales are currently done via e-mail or direct contact with customers.

CCA Pty Ltd has recently upgraded their Internet connection to ADSL2+ on a 250GB pcm plan in order to cater for the future possibility of having an online store.

You have been hired as a network security consultant to advise on security issues as a result of the recent re-structuring of the network. The customer would also like to investigate the option of publishing their product online and be able to receive orders via a web application. They don't need specific recommendations with respect to products but they would like some generic ideas on how to accomplish these goals.

You should have more than enough information in this brief to build a very solid set of recommendations for the customer. I would advise you to keep things as simple and easy as possible rather than trying to go into infinite detail on any one specific security issue that you discover.

In a nutshell you must deliver a set of risks that you have discovered, some remediation mechanisms for those risks, some design suggestions (both descriptively AND diagrammatically) and some policy examples and suggestions. There are quite a number of issues with this scenario that cover both technical and non-technical issues of security - you are expected to cover both in some part at least.
Pay attention to the marking breakdown detailed at the start of this brief to get an idea on how important each section is.

You may present your report in whatever way you think most appropriate but remember to keep it very professional and appropriate for dissemination to the customer.

Report Length 5000-7500 words (20-30 pages)

Attachment:- Assessment - Case Study.rar

Reference no: EM131203663

Questions Cloud

Sustainability movement in business is a trend : How has technology and the flattening world affected you in the last 10 years? Please share examples of this. Do you think the sustainability movement in business is a trend that's here to stay or a business fad? Why or why not?
Find the range of load resistance rl : The Zener diode shown in Fig. 3.10a has a voltage breakdown of 100 V with a maximum rated current of 20 mA. If the supply voltage is 150 V, find the range of load resistance RL over which the circuit is useful in maintaining RL at 100 V if Rs = 1.5..
What biological characteristics have contributed to success : The Earth's largest phylum is Arthropoda, including centipedes, millipedes, crustaceans, and insects. The insects have shown to be a particularly successful class within the phylum. What biological characteristics have contributed to the success o..
Professionalism skills for workplace success : This exercise involves analyzing a communication technique-presentations. On a daily basis, it is often expected that professionals be proficient with presentations. For this exercise, prepare a PowerPoint presentation that serves as your own prof..
Advise on security issues : ITI581 Security Fundamentals - CCA Pty Ltd Case Study - You have been hired as a network security consultant to advise on security issues as a result of the recent re-structuring of the network
Depreciation to date expected future net cash flows : Presented below is information related to equipment owned by Porto Company at December 31, 2014. Cost Accumulated depreciation to date Expected future net cash flows Fair value $7,000,000 800,000 5,000,000 3,400,000 Assume that Porto will continue to..
Problem set-inventory control : The Fine Garments Company sells fashion clothing. The forecasted annual demand for their premium leather jacket is 2,000. The order-processing cost per order is $40, and the inventory holding cost is $35/item/year. How many leather jackets should ..
Oobtain information about the firms strength : List at least four sources you will use to obtain information about the firms strength, weakness, opportunities, and threats. Discuss what categories of the SWOT elements of information are readily available on the internet. What categories of dat..
Explain the concern using the five Problem Solving Methods : To prepare for solving a problem, we must first acknowledge that the problem exists. Then, we must accept it, and clearly define or identify it. Finally, we must commit to solving the problem. Without some degree of personal commitment, the problems ..

Reviews

len1203663

9/13/2016 2:08:11 AM

I also strongly recommend that you very carefully read and digest the information in this brief, and check the forum for answers, before you post any questions. This will avoid confusion for all students which in turn reduces the stress associated with doing your assessment at the last minute – something some of you will attempt to do Good luck!

len1203663

9/13/2016 2:07:53 AM

Formatting 1.5 line spacing 11 point Times New Roman Full Justified 2.5cm Margin all round Footer – Your name and Student ID If you feel you require further information to either make a point or to clarify some part of the brief please post your queries to the specific forum thread that has been created for Assessment 2 information. If you post a question regarding this assessment to any other thread I may not answer it!

Write a Review

 

Computer Network Security Questions & Answers

  Case study incident-response policy

Case Study Incident-Response Policy

  Define cybersecurity as an organizational strategy

Prepare a short paper of approximately 8-12 ( double spaced)pages investigating the strategic impact of cybersecurity in the organization with a special focus on its ethical and legal implications.

  What is the single most important new technology

Need a research paper on "What is the single most important new technology that has affected digital forensics in the last five years and why?" The paper has to be well referenced.

  Nmap application and how it can be used

Write a one papge paper APA FORMAT about NMAP application and how it can be used to find vulnerabilities

  Combine the two disks into one logical volume

Illustrate your explanation by using the Linux Log- ical Volume Manager to combine the two spare disks available on the Virtual Debian distribution. Combine the two disks into one logical volume. Format the new logical disk and modify the /etc/fst..

  Implement encryption and decryption of the vigenere cipher

Implement both encryption AND decryption of the Vigenere cipher with 26 English letters and 1 space character

  Which type of terrorists are considered to be most dangerous

Which type of terrorists are considered to be most dangerous

  Analyse how trust is used in controlling access

Analyse how trust is used in controlling access to resources. Evaluate the proposed solution used in emergent environments such as BYOD, cloud and pervasive environments.

  Seven phases of the systems development life cycle

iscuss and explain each of the seven phases of the systems development life cycle. Make sure your descriptions make connections between the different phases

  Examine how system balanced security and usability

Analyzes the implementation of the system in your plan. Examine how this system balanced security and usability, and explain the challenges of incorporating system security and system usability into a design.

  Construct a secure mac scheme by using prf

Prove the security of the MAC scheme you constructed in the previous item. In order to get the full bonus points, you are expected to provide a rigorous security proof and construct a secure MAC scheme by using PRF.

  Use a two-stage transposition technique to encrypt

Use a two-stage transposition technique to encrypt the following message using the key "Decrypt". Ignore the comma and the period in the message

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd