Produce a network security plan and demonstrate

Assignment Help Basic Computer Science
Reference no: EM13935820

Some of the projects that your group may choose to work on are, but not limited to (please choose only one) :

Work on the case study provided
Network security in virtualised data centres
Deployment of advanced authentication and encryption
Tracking and tracing cyber attacks
Network security and disaster recovery
....or, the project of your own choice

Note:

Please consider the project case of Lloyds Business School as a MODEL CASE SCENARIO. However, your group can choose to work on it, if they wish to. Furthermore, you are encouraged to select and work on any organisational network security project (including your workplace).

It is important to note that, whether you work on one of above suggested projects or the project of your own choice, the final outcome of the course is to deliver a network security plan.

Your task is to produce a network security plan and demonstrate its technical implementation in order to address the organisation's network security requirements.

from the above list we have chosen TRACKING AND TRACING CYBER ATTACKS.

we need to give one securitythreat which has already effected to loyds business school and we have overcome the situation.
so u can take gofor the attacks like man-in-the middle attack to the organisation. how it is effected and what specifications did we take to overcome the situation.

General Information

This is a group assessment.

As a member of your group you are required to deliver a short in-class presentation.

This presentation is due in week 11. Each member of the group must give an oral presentation of their DRAFT Project Report using PowerPoint slides. This assessment worths 10% of total course marks.

It is important that each member of the group will submit the same presentation slides.

Requirements

In your presentation, your group will summarise the security plan you produced.

You will identify and justify your selection of key threats or security challenges to the organisation and explain what technology you will implement to mitigate or minimise those. Describe how you will test technologies that you identified and what documentation (including policy and procedures) you will be producing.

Take this opportunity to collect constructive feedback about what your group will be implementing.

What you need to submit????

You are required to submit:

A single ZIP file containing:

A document in Microsoft Word format (.doc or .docx) that contains a brief summary of the presentation. This summary should indicate the key points that will be discussed and by whom (maximum 1000 words). You must complete and submit (this template will be provided soon) as the basis for your submission.
The presentation PowerPoint file(s) and any other hand-outs.
References from in-text citations should be at the end of the document(s).

Hints

The presentation should be no more than 15 minutes in length (including questions).
Pitch the presentation at your peers: in other words, use terminology they would be familiar with.
This is a formal presentation. Do not use slang and ensure your delivery is professional

Note: Should a group member fail to contribute to or attend the presentation, then they will received zero marks.

Reference no: EM13935820

Questions Cloud

Describe how bach could use a long strangle to hedge : Describe how Bach could use a long strangle to hedge its possible dirham positions. What is the tradeoff involved in using a long strangle versus a long straddle to hedge the positions?
Wireless network coverage and other issues : In this assignment, you will compare and contrast wireless network coverage and other issues involved in the selection of a wireless provider and a mobile ad hoc networks (MANET).
Explain the tower of hanoi problem : Write a javascript to solve the problem of the Towers of Hanoi. Allow the end user to enter the number of disks in a text field. Use a recursive tower function with four parameters:
Determine the expected amount of british pounds : Determine the expected amount of British pounds that you will receive if you use a forward hedge. Determine the expected amount of pounds that you will receive if you do not hedge and believe in purchasing power parity.
Produce a network security plan and demonstrate : Please consider the project case of Lloyds Business School as a MODEL CASE SCENARIO. However, your group can choose to work on it, if they wish to. Furthermore, you are encouraged to select and work on any organisational network security project (..
Analyse the effectiveness of leadership : Task: Critically analyse the effectiveness of leadership portrayed in the movie you have selected using the framework for assessing leadership effectiveness
Define similarities in the structure of e. coli and hiv : Structural differences can simply be addressed by distinguishing the physical differences between E. Coli and HIV. Characteristics that are commonly used to classify or distinguish the differences between the microorganisms may also be presented.
Summarize the mncs hedging of transaction exposure : Summarize the MNC's hedging of transaction exposure based on the comments in the annual report (an easy way to find the right section is to use the search function using the word ‘risk').
Fair value versus conservatism : "Fair Value vs. Conservatism? Aspects of the History of Accounting, Auditing, Business and Finance from Ancient Mesopotamia to Modern China" by Richard H. Macve, in 2013 London School of Economics & Political Science (LSE)- Department of Accountin..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Updated code for the networking program

Please get me the updated code for the networking program also i need an abstract of how the code works, the source file , and all information needed to defend it.

  Efficiency and effectiveness metrics

Choose any of the Perspective boxes in this chapter or the opening case. Then, identify and describe at least seven metrics that could be used to measure the success of the IT systems in your chosen example. For each metric, categorize it as eit..

  Compare and contrast pop e-mail to web-based e-mail

Compare and contrast POP e-mail to Web-based e-mail systems in terms of control, security, and accessibility.

  What is number of bits per baud for the given techniques

What is the number of bits per baud for the following techniques? ASK with four different amplitudes and FSK with 8 different frequencies

  Problem resolution in an organization.

In a one to two page (two page double-spaced maximum) paper explain why information systems today are currently effective or ineffective in assisting with problem resolution in an organization.

  Find probability of having no umbrella if it rains

When rain is forecast, Mr. Pickwick takes his umbrella. When rain is not forecast, he takes it with  probability 1/3. Find the probability that Pickwick has no umbrella, given that it rains.

  What is the ieee-754 single-precision binary representation

Program: What is the IEEE-754 single-precision binary representation of the floating point number 49.625?

  Compare and contrast the four levels of protection

Compare and contrast the four levels of protection used during spill response and cleanup activities. In your discussion, provide an example of a spill or cleanup scenario for each level

  Popular day-trip destination for local families

Two large international holiday companies have been planning to build hotel and leisure facilities for tourists on one of the island's beaches, which is also a popular day-trip destination for local families.

  Identify an incident in cybercrime or cyberwarfare

Identify an incident in cybercrime or cyberwarfare related to this entity. Fully discuss the specifics of the cyber incident (and related incidents) and analyze the motivation of the actors/attackers. Also suggest methods for organizations to d..

  How to stop process-freeze its memory image in process

Some multicomputers permit running processes to be migrated from one node to another. Is it adequate to stop process, freeze its memory image, and just ship that off to different node?

  Critical to the system forensics industry

Explain in your own words the importance of report writing and why you believe it is critical to the system forensics industry. Discuss the need for forensic reports when testifying as an expert witness.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd