Discuss two types of threats against network routers

Assignment Help Computer Network Security
Reference no: EM132305644 , Length: word count:2500

IS Security and Risk Management Assignment - Applied Project

Assessment Details: This assessment is designed to assess your technical skills in investigation IS security, risk threats and management to an organization. The assessment is also assessing your skills to evaluate risk management techniques and IS auditing. You are required to select an organization that uses information systems to perform daily business operations. You have to identify the most valuable assets for the organisations and investigate the security threats and mitigation techniques. You have also to propose/evaluate the risk management techniques adopted by the selected organization to ensure the reliability, confidentiality, availability, and integrity. You have also to discuss audit plan and processes used by the organization and investigate the impact of human factors on security and risk management.

Task Specifications - This assessment includes two tasks as follows:

Task 1: Each student should select an organisation. The organization must provide information systems services to the staff and customers. You have to write a report to answer the followings related to the selected organization:

1. Network devices are highly vulnerable and can be exposed. Discuss two types of threats against network routers/switches of the selected organization. Illustrate how these devices are vulnerable to destruction and abuse.

2. Propose with justification two types of network security devices can be used to control security and mitigate threats related to the web and email servers.

3. Assume the organization used Windows server 2016 to host the organization web site. Discuss how the organization can ensure the availability of the web service using windows server 2016.

4. Discuss the impact of employee on information security of the selected organization. Provide risk management recommendation to reduce the risk of employee.

5. Windows server 2016 supported with different tools for auditing. Illustrate windows server 2016 auditing tools and discuss how they can be used by the selected organization to monitor and analyzing the web server and email server problems.

You may need to make some assumptions with the required justifications.

Task 2: Use the online encryption tool to encrypt your student ID and name using Data Encryption Standard (DEC) according to the following table:

Table 1: Encryption student details using DEC

Item

Settings/Results

Key

SBM4304

Algorithm

Data Encryption Standard

Mode

CBC

Encode the output using

Base64

Text to encrypt

{Student ID:Student name}

Encrypted with dec (Result)

{Encrypted text}

You have to replace:

  • {Student ID:Student name} with your student ID and your name
  • {Encrypted text} with the encrypted text

In your report, you have to provide:

1. Table-1 with completed fields with a support of screenshot of encryption website.

2. Screenshot demonstrate the verification of your work by decrypting the cipher obtain in Table-1.

Please note you have to use Harvard reference style and the report should be submitted as a Word file.

In completing this assessment successfully, you will be able to investigate IS security, risk threats and propose the suitable security controls.

Attachment:- Assignment File.rar

Reference no: EM132305644

Questions Cloud

What does the future look like for hcit : What does the future look like for HCIT in terms of software development, education, research, and practices? What challenges could arise? Respond to at least.
So how should business use social media : There is no doubt that social media is a force unto itself. So how should business use social media?
Discusses the topic of business ethics : Discusses the topic of business ethics. Topic ideas might include the role of ethics in the workplace, breach of ethics, the effect of internal and external
Analyze two new provisions to the affordable care act : Analyze at least two (2) new provisions to the Affordable Care Act. Interpret the implications of these new provisions for access to care for families.
Discuss two types of threats against network routers : SBM4304 IS Security and Risk Management Assignment - Applied Project, Asia Pacific International College, Sydney, Australia
Design a logical and physical topographical layout : The infrastructure which encompasses the network solution and security considerations is a major consideration for your company.
Contributing to ineffectiveness of incentive scheme : "Research the factors contributing to ineffectiveness of incentive scheme"
What are the key aspects of health and safety legislation : What are the key aspects of health and safety legislation? Identify and describe the five steps of the define scope process.
Detailed summary of at least two different methods : Detailed summary of at least two different methods of quality measurement. Evaluation of the methods.

Reviews

len2305644

5/14/2019 9:56:50 PM

Word count / Time provided: 2500 words. Marking Information: The applied project will be marked out of 100 and will be weighted 50% of the total unit mark. Introduction (5 marks) - Introduction is very well written, and the report outline is also discussed. Threats against network routers/switches (15 marks) - Excellent discussion about threats with clear specifications related to routers/switches. Network security devices (15 mark) - A very clear and in-depth discussion about network security devices. Availability of the web service (10 mark) - Has excellent understanding and identification of techniques to improve the availability of the web service.

len2305644

5/14/2019 9:56:43 PM

Impact of employee on information security (15 mark) - Excellent understanding of impact of employee on information security. Windows server 2016 auditing tools (10 mark) - Excellent understanding and demonstration of audit process related to the selected sector. Student details encryption (Table-1 and Screenshot) (10 mark) - Table -1 completed correctly with correct result. Verification by decryption (10 mark) - Screenshot is provided related to Table-1 with correct result. Summary (5 marks) - A section very clearly summarizing the overall contribution. References using Harvard style (5 marks) - Clear styles with excellent source of references.

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd