Analyse the implementation of encryption technology

Assignment Help Management Information Sys
Reference no: EM133389190

Scenario:

"Southern Star" company is providing public, private, hybrid and community cloud services to many companies across the world and offering following services:

  • IaaS (Infrastructure-as-a-Service)
  • PaaS (Platform-as-a-Service)
  • SaaS (Software-as-a-Service)
  • Storage, Database, Information, Process, Application, Integration, Security, Management,

Testing-as-a-service

To provide above mentioned cloud services, "Southern Star" company has following infrastructure in their data centre.

  • Eight Servers out of these Six are connected to network and two are kept as backup
  • Twelve Network switches with 24 port support (Nine Switches are connected to network

are three are kept as back up)

  • Six Routers (4 Routers are hosing NBN connection and two of them are kept as back up)
  • Five wireless access point connected to network to provide Wi-Fi connectivity throughout

data centre.

  • Twenty SAN (Storage area network) storage area devices to store client's data
  • Fifty desktop computers

"Shan Publications" is a premium client of "Southern Star". "Shan publication" use cloud services offered by "Southern Star" to store the drafts of unpublished poems, books and blueprints of printed books. One day as they were downloading the drafts of some books to publish, they found that some of their data is missing from the server and raised the complaint about missing data to "Southern Star". As per the agreement "Southern Star" is liable for client data security and company do not want to lose their client base.

Southern Star is now investigating the problem, and one of the senior consultants (Lee) is allocated to this project.

Lee is working in the company from last 10 years and has an extensive amount of experience in network, cloud and data security. David is a general manager of the Southern star and looking after all the operation of the organisation.

Roles and responsibilities of Lee:

  • Planning, implementing and upgrading security measures and controls
  • Establishing plans and protocols to protect digital files and information systems against

unauthorized access, modification and/or destruction

  • Maintaining data and monitor security access
  • Performing vulnerability testing, risk analyses and security assessments
  • Conducting internal and external security audits
  • Anticipating security alerts, incidents and disasters and reduce their likelihood
  • Managing network, intrusion detection and prevention systems
  • Analysing security breaches to determine their root cause
  • Recommending and install appropriate tools and countermeasures
  • Defining, implementing and maintaining corporate security policies
  • Training fellow employees in security awareness and procedures
  • Coordinating security plans with outside vendors

After an initial investigation of the data loss problem, Lee has found below concerns in the

southern star network infrastructure:

  • No data encryption service
  • Data security concerns
  • Data permission not planned
  • Additional hardware to manage the data

Questions 

Activity 1: (Analysing and documenting data security requirement)

After reviewing the scenario, you need to analyse the data loss problem and need to make a security plan including

  • Background of the security plan
  • Issues identified in the network
  • How to resolve each issue
  • What hardware and software required
  • How identified software and hardware aligned with the solutions
  • How and when data backup will be prepared
  • Transmission security
  • Network database security

You may need to research related to security plan on the internet. You must complete the

template security plan as a part of the activity (provided separately).

Activity 2: (Review encryption technologies and costs)

Note: This activity is in continuation of activity 1.

After completing the security plan, you are required to review a range of encryption software on

the internet and complete below Technology cost template.

After completing the template, you are required to send email to David (Trainer/assessor)

including technology cost document for approval. Email must include:

  • Subject
  • Body
  • Explain that which option is the best and why we should use it.

Part b

Activity 1 (Installing encryption software)

This activity is continuation of part A. You are required to participate in a practical demonstration task. You have received a final approval from David to start the encryption project, so you must perform the installation of encryption software and tools on the live network. Assume yourself as "Lee" and install database encryption software and tools.

You need to install encryption software on IT Server. You need to Perform installation of database "Encryption" software by adhering below mention conditions.

a) Use secure protocol for data transfer

b) make a digital key certificate for client and server

c) Use secure network protocols

d) Set admin password

Student must follow vendor instruction to install the software.

Your trainer and assessor will observe you during the activity and complete the performance

checklist.

Activity 2: (Analysing effect of encryption on user roles)

Note: This activity is in continuation of activity 1.

Assume that Lee has implemented the encryption software successfully. As a part of his

responsibilities, he needs to analyse the effect of user roles and responsibilities.

Assume yourself as Lee and you are required to analyse the effect of user roles and responsibilities in encryption and complete the following "security plan - 2" template.

Activity 3: (Role Play - Informing users about their roles)

Note: This activity is in continuation of activity 2.

Assume that you are still playing the role of Lee and participate in the following role play. The purpose of the role play is to inform users about new encryption technology and how it works. Explain the effects of new encryption technology on user responsibilities. You need to use the template that you have developed in the assessment activity 2 (Part B) to explain the effects of new encryption technology on user responsibilities for the following users:

o Policy administrator

o Enterprise Authenticator

o Policy authenticator

o User

 

Your trainer/assessor will act as enterprise administrator and will ask you the following questions:

1. Security limitations of all the roles

2. Explanation of the features included in the "Enterprise administrator" role Following the role play, complete minutes of meeting template with details of what was discussed.

Activity 4: (Analysing functioning of "Encryption software")

Assuming that you have implemented the encryption technology and tools in a live server in the previous assessment activities, you are required to monitor the encryption in this activity. In this activity you need to monitor the functioning of "Encryption software" by perform following tasks in a live server.

1. Analyse the implementation of encryption technology to confirm its functioning by:

o Monitoring digital signature

o Monitoring Data Encryption Compromising Network Performance

o Monitoring network performance

2. Analyse helpdesk records for errors occurred and security compromises in

encryption and print these records as a part of this activity.

3. Check local computer security logs for encryption issues and print it as a part of

this activity.

4. You need make a note on encryption issue and security compromises included error logs and network performance issues identified in the task and submit to your trainer/assessor.

Reference no: EM133389190

Questions Cloud

Commonly adopted benchmark that he could use : Gary wants to use a secure configuration benchmark for his organization for Linux. Which of the following organizations would provide a useful, commonly adopted
Describe era reshaped european culture leading to world war : Give an overview of the "Age of Anxiety" during the 1920s in Europe. Include the causes, key authors, and movements.
Managing risk to its electronic protected health information : Does your practice develop, document, and implement policies and procedures for assessing and managing risk to its electronic protected health information ePHI
What amount can marcus include in his itemized deduction : Marcus Suto paid a variety of taxes to state and local governments during 2022. He paid $6,000 in state income tax, $4,000 in property tax on his home, $400
Analyse the implementation of encryption technology : Analyse the implementation of encryption technology to confirm - Analyse helpdesk records for errors occurred and security compromises
Calculate the interest benefit based on quarters : The prescribed rates set by the CRA for 2022 equaled 2% for Q1&Q2 and 1% for Q3&Q4. Calculate the interest benefit based on quarters, do not use the number
What are the capital gains tax implications : What are the capital gains tax (CGT) implications in relation to the sale of the Southern Highlands house (Australian Tax Law implication, please referring
Discuss the historical tradition of laws : Discuss the historical 'tradition' of laws that circumscribed certain avenues of life among the citizens of the Holy Roman Empire.
Calculate a specific earned value measurement : Budget at Completion (BAC) for hypothetical projects. You will then be asked to calculate a specific Earned Value Measurement based upon these values

Reviews

Write a Review

Management Information Sys Questions & Answers

  Information technology and the changing fabric

Illustrations of concepts from organizational structure, organizational power and politics and organizational culture.

  Case study: software-as-a-service goes mainstream

Explain the questions based on case study. case study - salesforce.com: software-as-a-service goes mainstream

  Research proposal on cloud computing

The usage and influence of outsourcing and cloud computing on Management Information Systems is the proposed topic of the research project.

  Host an e-commerce site for a small start-up company

This paper will help develop internet skills in commercial services for hosting an e-commerce site for a small start-up company.

  How are internet technologies affecting the structure

How are Internet technologies affecting the structure and work roles of modern organizations?

  Segregation of duties in the personal computing environment

Why is inadequate segregation of duties a problem in the personal computing environment?

  Social media strategy implementation and evaluation

Social media strategy implementation and evaluation

  Problems in the personal computing environment

What is the basic purpose behind segregation of duties a problem in the personal computing environment?

  Role of it/is in an organisation

Prepare a presentation on Information Systems and Organizational changes

  Perky pies

Information systems to adequately manage supply both up and down stream.

  Mark the equilibrium price and quantity

The demand schedule for computer chips.

  Visit and analyze the company-specific web-site

Visit and analyze the Company-specific web-site with respect to E-Commerce issues

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd