Enterprise security operations and implementation assessment

Assignment Help Other Subject
Reference no: EM133871476

Information Security

Assessment - Enterprise Security Operations and Implementation

Purpose of the assessment - Explain the major methodologies for secure networks and what threats they address
Identify and report network threats, select and implement appropriate countermeasures for network security
Use security policies to manage operational security, and then administer those policies to ensure compliance by users in an organization

Assignment Scenario
You are working as a cybersecurity consultant for SecureSoft Pty Ltd, a company transitioning to hybrid cloud infrastructure. Following a series of risk findings and user- related incidents, the company has tasked you with developing an integrated security framework. As a group of 4 members, your role is to assess current practices, test core systems, and propose improvements using both strategic planning and hands- on technical validation.
You are required to complete the following tasks. Each task combines conceptual understanding and practical execution. Use your test environment to collect evidence (screenshots, outputs, config files) and present a clear analysis and recommendation in your report and presentation.

Task 1: Identifying and Responding to Threats
Identify and explain three significant threats or vulnerabilities that are relevant to SecureSoft's infrastructure. Justify why these are critical in the current cybersecurity landscape.
Perform a vulnerability or reconnaissance assessment in your virtual lab. Use appropriate tools to discover weaknesses or exposed services. Summarise what you identified.
Prioritize the threats using a risk matrix or similar model, rating their potential impact and likelihood. Justify your ratings.
Provide actionable recommendations to reduce the risks and improve threat detection capability.
Include evidence of scan results, screenshots, risk matrix diagram.

Task 2: Access Control and Endpoint Defense
Design an access control structure using Role-Based Access Control (RBAC) and Multi-Factor Authentication (MFA). Describe roles, permissions, and the flow of access.
Test and evaluate a credential protection tool such as a password manager or breach-check service. What did you learn about user credential risk?
Simulate or assess endpoint threats (e.g., malware infection, keylogging, or unsafe apps). How would these be identified and mitigated in a real system?
Propose technical controls and policies to improve authentication practices and secure endpoint behaviour.
Include evidence of tool outputs, screenshots, policy examples.

Task 3: Network and Communication Security
Design a secure network architecture including segmentation for user, admin, and internet-facing services. Explain how this limits lateral movement and enhances control.
Capture and analyze network traffic to distinguish between secure and insecure communications (e.g., HTTPS vs HTTP). Describe your findings.
Investigate any unusual or simulated malicious traffic. How would you detect and respond to such traffic in a production environment?
Recommend communication security measures such as encryption protocols, firewall rule sets, and visibility tools.
Include evidence of net ork diagrams, packet captures, analysis screenshots.

Task 4: Governance, Awareness, and Policy Integration (with GoPhish)
Create core policy components for Acceptable Use, Incident Response, and Data Classification. Explain how they will be implemented and enforced. Get online assignment help in the USA!
Analyse a digital certificate from a secure website or digitally signed document. What does it tell you about authenticity and trust?
Explore browser or application privacy settings. What protections are in place by default, and what settings can be improved?
Design or simulate a phishing awareness campaign using GoPhish. Include:
How you designed the campaign (template, email, landing page)
What user actions were tracked
Lessons learned from the results
How such simulations support training and governance
Include evidence of GoPhish screenshots, policy excerpts, certificate validation, bro ser settings.

Task 5: PowerPoint Presentation
Each group must develop a PowerPoint presentation (10-15 slides) summarising their key findings, practical implementations, and outcomes from the assignment. This presentation should reflect contributions from all team members and visually showcase selected tools, results, configurations, or recommendations. It must include
Overview of key issues, threats, and objectives
Visual presentation of tools, methods, or configurations
Explanation of reasoning, decisions, and outcomes
Structure, slide clarity, and engagement
The presentation must be submitted alongside the ritten report and presented in Week 11/12.

References
Must consider at least ten (10) current references from journal/conference papers and books. Must follow IEEE referencing style.

Reference no: EM133871476

Questions Cloud

Information on the NSF website apply to your profession : How does the information on the NSF website apply to your profession and specifically to your chosen athletes?
Homeland security briefing paper : HSMN 610 Concepts in Homeland Security, University of Maryland Global Campus - Prepare a briefing paper on the homeland security enterprise
What are the barriers to interpersonal communication : What are the barriers to interpersonal communication? What are procedures and examination techniques that will be used during the physical exam of your patient?
Determine proper valuation for tcs if any valuation is merit : FIN 650- Determine the proper valuation for TCS if any valuation is merit. Key here is to look at the entire enterprise valuation of the firm.
Enterprise security operations and implementation assessment : MN522 Information Security, Melbourne Institute of Technology - Explore browser or application privacy settings. What protections are in place by default
Higher efficiency in the dental hygiene department : Discussion with your understanding of best practices for scheduling for higher efficiency in the dental hygiene department.
HR practitioners might evaluate quality of training programs : Identify two different frameworks around which HR practitioners might evaluate the quality of training programs. The commentary discusses the Kirkpatrick Model.
What the calculated results tell you about each of companies : Explain the meaning of each ratio and what the calculated results tell you about each of the companies. Refer to the calculated ratios in your analysis.
Example of risk that organization might encounter : Select an example of a risk that an organization might encounter. Assess it in terms of likelihood and impact using the qualitative approach

Reviews

Write a Review

Other Subject Questions & Answers

  Cross-cultural opportunities and conflicts in canada

Short Paper on Cross-cultural Opportunities and Conflicts in Canada.

  Sociology theory questions

Sociology are very fundamental in nature. Role strain and role constraint speak about the duties and responsibilities of the roles of people in society or in a group. A short theory about Darwin and Moths is also answered.

  A book review on unfaithful angels

This review will help the reader understand the social work profession through different concepts giving the glimpse of why the social work profession might have drifted away from its original purpose of serving the poor.

  Disorder paper: schizophrenia

Schizophrenia does not really have just one single cause. It is a possibility that this disorder could be inherited but not all doctors are sure.

  Individual assignment: two models handout and rubric

Individual Assignment : Two Models Handout and Rubric,    This paper will allow you to understand and evaluate two vastly different organizational models and to effectively communicate their differences.

  Developing strategic intent for toyota

The following report includes the description about the organization, its strategies, industry analysis in which it operates and its position in the industry.

  Gasoline powered passenger vehicles

In this study, we examine how gasoline price volatility and income of the consumers impacts consumer's demand for gasoline.

  An aspect of poverty in canada

Economics thesis undergrad 4th year paper to write. it should be about 22 pages in length, literature review, economic analysis and then data or cost benefit analysis.

  Ngn customer satisfaction qos indicator for 3g services

The paper aims to highlight the global trends in countries and regions where 3G has already been introduced and propose an implementation plan to the telecom operators of developing countries.

  Prepare a power point presentation

Prepare the power point presentation for the case: Santa Fe Independent School District

  Information literacy is important in this environment

Information literacy is critically important in this contemporary environment

  Associative property of multiplication

Write a definition for associative property of multiplication.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd