Produce a network security plan and demonstrate

Assignment Help Basic Computer Science
Reference no: EM13935820

Some of the projects that your group may choose to work on are, but not limited to (please choose only one) :

Work on the case study provided
Network security in virtualised data centres
Deployment of advanced authentication and encryption
Tracking and tracing cyber attacks
Network security and disaster recovery
....or, the project of your own choice

Note:

Please consider the project case of Lloyds Business School as a MODEL CASE SCENARIO. However, your group can choose to work on it, if they wish to. Furthermore, you are encouraged to select and work on any organisational network security project (including your workplace).

It is important to note that, whether you work on one of above suggested projects or the project of your own choice, the final outcome of the course is to deliver a network security plan.

Your task is to produce a network security plan and demonstrate its technical implementation in order to address the organisation's network security requirements.

from the above list we have chosen TRACKING AND TRACING CYBER ATTACKS.

we need to give one securitythreat which has already effected to loyds business school and we have overcome the situation.
so u can take gofor the attacks like man-in-the middle attack to the organisation. how it is effected and what specifications did we take to overcome the situation.

General Information

This is a group assessment.

As a member of your group you are required to deliver a short in-class presentation.

This presentation is due in week 11. Each member of the group must give an oral presentation of their DRAFT Project Report using PowerPoint slides. This assessment worths 10% of total course marks.

It is important that each member of the group will submit the same presentation slides.

Requirements

In your presentation, your group will summarise the security plan you produced.

You will identify and justify your selection of key threats or security challenges to the organisation and explain what technology you will implement to mitigate or minimise those. Describe how you will test technologies that you identified and what documentation (including policy and procedures) you will be producing.

Take this opportunity to collect constructive feedback about what your group will be implementing.

What you need to submit????

You are required to submit:

A single ZIP file containing:

A document in Microsoft Word format (.doc or .docx) that contains a brief summary of the presentation. This summary should indicate the key points that will be discussed and by whom (maximum 1000 words). You must complete and submit (this template will be provided soon) as the basis for your submission.
The presentation PowerPoint file(s) and any other hand-outs.
References from in-text citations should be at the end of the document(s).

Hints

The presentation should be no more than 15 minutes in length (including questions).
Pitch the presentation at your peers: in other words, use terminology they would be familiar with.
This is a formal presentation. Do not use slang and ensure your delivery is professional

Note: Should a group member fail to contribute to or attend the presentation, then they will received zero marks.

Reference no: EM13935820

Questions Cloud

Describe how bach could use a long strangle to hedge : Describe how Bach could use a long strangle to hedge its possible dirham positions. What is the tradeoff involved in using a long strangle versus a long straddle to hedge the positions?
Wireless network coverage and other issues : In this assignment, you will compare and contrast wireless network coverage and other issues involved in the selection of a wireless provider and a mobile ad hoc networks (MANET).
Explain the tower of hanoi problem : Write a javascript to solve the problem of the Towers of Hanoi. Allow the end user to enter the number of disks in a text field. Use a recursive tower function with four parameters:
Determine the expected amount of british pounds : Determine the expected amount of British pounds that you will receive if you use a forward hedge. Determine the expected amount of pounds that you will receive if you do not hedge and believe in purchasing power parity.
Produce a network security plan and demonstrate : Please consider the project case of Lloyds Business School as a MODEL CASE SCENARIO. However, your group can choose to work on it, if they wish to. Furthermore, you are encouraged to select and work on any organisational network security project (..
Analyse the effectiveness of leadership : Task: Critically analyse the effectiveness of leadership portrayed in the movie you have selected using the framework for assessing leadership effectiveness
Define similarities in the structure of e. coli and hiv : Structural differences can simply be addressed by distinguishing the physical differences between E. Coli and HIV. Characteristics that are commonly used to classify or distinguish the differences between the microorganisms may also be presented.
Summarize the mncs hedging of transaction exposure : Summarize the MNC's hedging of transaction exposure based on the comments in the annual report (an easy way to find the right section is to use the search function using the word ‘risk').
Fair value versus conservatism : "Fair Value vs. Conservatism? Aspects of the History of Accounting, Auditing, Business and Finance from Ancient Mesopotamia to Modern China" by Richard H. Macve, in 2013 London School of Economics & Political Science (LSE)- Department of Accountin..

Reviews

Write a Review

 

Basic Computer Science Questions & Answers

  Design the logic for a program

Using Visual Logic: Design the logic for a program that allows a user to entry 15 numbers, then displays each number and its difference from the numeric average of the numbers entered.

  Presenter notes section of the presentation

Note: The slides in your presentation should include only the main points you wish to make, with more extensive information included in the presenter notes section of the presentation.

  What is called a whitespace character

Given an int variable modelYear write a statement that assigns true to norecall if the value of modelYear does NOT fall within the two recall ranges and assigns false otherwise. Do not use an if statement in this exercise!

  Discuss why companies concentrate o revenue models

Discuss why companies concentrate o revenue models and the analysis of business processes instead of businesses models when they undertake electronic commerce initiatives

  What windows cli command will display

What Windows CLI command will display all current resources that your computer is making available to other network users

  Discuss how you think learning more about excel will assist

Discuss how you think learning more about Excel will assist you in your school work and career. What types of spreadsheets have you created or do you plan to create now that you know more about Excel

  Write a circletype class

diameter and circumference Set c1's radius to 4 Display c1's radius, area, diameter and circumference Execute c1 = c1 + c2 Display c1's radius, area, diameter and circumference Display c2's radius, area, diameter and circumference.

  Draw the von neumann cycle and explain the basic function

Draw the Von Neumann Cycle and explain the basic function carried out in each state.

  Write a python function celcius fahrenheit

Write a python function celcius_fahrenheit wich takes temperature values from a list and changes them into fahrenheit values.

  Jurisdictions pose in the fight against cybercrime

CIS 330 Explain, in detail, what you believe to be the greatest challenge facing law enforcement agencies investigating exploitation, cyber stalking, and obscenity. Provide a rationale for your response. Identify the specific challenges that overlapp..

  Prove by solving the equations using laplace transform

For a RC circuit, we can use Laplace transforms to show that when we apply a step input of 5V, the voltage across the capacitor rises exponentially to a final value equal to step input.

  Boolean variable called wantstoppings

After reading the input character, the program shall assign a value to a Boolean variable called  wantsToppings ( true  for a customer who wants toppings,  false  for a customer who does not).

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd