Simulate industry practices for securing networks

Assignment Help Other Subject
Reference no: EM133867549 , Length: word count:1500

Introduction to Cyber Security

Assessment - Network Security Configuration & Access Control

Type - Simulation and Artefact Development

Task

Demonstrate your understanding of key cyber security concepts aligned with learning outcomes LO2, LO3, and LO4. You will configure a firewall and develop an access control policy document that complies with relevant laws, regulations, and ethical guidelines. Get online assignment help now!

LO2: Identify vulnerabilities and threats pertaining to the IT infrastructure of organisations.

LO3: Recommend risk mitigation strategies to address cyber security vulnerabilities and threats.

LO4: Analyse privacy, legal, ethical and security issues and solutions related to the IT infrastructure and use of technologies in organisations.

Assessment Description

This assessment is designed to simulate industry practices for securing and managing networks. You will apply your knowledge and skills to configure firewalls, define access control policies, and evaluate the legal and ethical considerations of your decisions.
Your final deliverable includes two documents:
Your report (.docx), which includes:
Your access control model justification
Your Access Control Policy
Your legal and compliance justification
Your pfsense Configuration (.xml)

Case Study
Kaplan Financial, a mid-sized Australian company, is experiencing rapid growth, which has introduced critical network security challenges. Recent incidents, including unauthorised access, phishing attempts, and malware infections, have posed significant threats to the company's operations and the security of sensitive data.
The company is pursuing ISO 27001 certification, reflecting its commitment to implementing best practices for information security management. Additionally, as an Australian organisation, Kaplan Financial must comply with relevant legislation, including the Privacy Act 1988 (Cth) and the Cybersecurity Act 2018, which mandate stringent measures for safeguarding sensitive information and protecting critical systems against cyber threats.
To address these challenges, you are brought in as a consultant tasked with configuring the network firewall and designing robust access controls for the internal IT team. Your solution must secure the network and prevent future attacks as well as align with the company's certification requirements and legislative obligations.

Kaplan Financial has several departments with distinct responsibilities:

Executive Leadership: Oversees the company's overall strategy and drive organisational performance.
Client Services: Provides personalised investment advice, manages client portfolios, and ensures financial strategies align with customers' goals.

Human Resources: Manages employee records, recruitment, performance, and HR operations.
IT Department: Maintains the IT infrastructure, manages the network, support employees' technological needs, and ensures security across all systems.
Administration: Involved in day-to-day administrative functions and ensures smooth operations across departments.


Kaplan Financial's network infrastructure includes the following components:

Each of the fifty (50) employees have company-provided laptops connected via Wi-Fi. Flexible work arrangements allow employees to work both on-site and remotely.
The company has internal servers hosting critical applications:

Customer Relationship Management (CRM): A comprehensive system for managing client portfolios, automating communications, tracking client engagement, and generating profitability report.
Human Resources Management software: A platform to manage employee records, track performance, and automate HR processes.

Security Information and Event Management (SIEM): A tool to monitor, detect, and respond to security threats across the network.

Corporate Performance Management (CPM) System: A platform that provides high- level insights, analytics, and tools to monitor overall company performance against strategic goals.

Assessment Instructions

Understand the Case Study
Review the context of Kaplan Financial, its security challenges, and compliance obligations. Consider how the organisational structure influences security design.
Select an Access Control Model
Choose the most appropriate access control model. Justify your choice considering security concerns and departmental responsibilities. This should form the first part of your report and should be approximately 250 words long.
Document Your Access Control Policy
Use a generative AI tool (e.g., ChatGPT, Gemini) to draft a formal access control policy. Your policy should be approximately 1000 words long and should cover:
Measures to prevent unauthorized access.
Secure access for both on-site and remote workers.
Implementation of access control principles (e.g. least privilege, need-to-know).
Access control impact on each of the critical applications.
How the policy affects firewall configuration.
Other details found in a typical access control policy.

Refine your generative AI outputs to create a formal Access Control Policy. Submit your policy as the second part of your report. Include screenshots of your generative AI interaction in the appendices.

Justify Legal and Compliance Obligations
Justify your access control policy by explaining how it aligns with Kaplan Financial's legal obligations, referencing relevant regulations. Your justification should be approximately 250 words long and should be submitted as the third part of your report.
Configure the Network Firewall
Configure the network firewall using pfSense according to your access control policy. Save the configuration as an XML file for submission.

Reference no: EM133867549

Questions Cloud

Describe the blood brain barrier : Describe the mechanism of action of the drugs for cognitive impairment. How do these medications achieve a therapeutic effect in Alzheimer's disease.
What would be your approach to treating an unidentified rash : What would be your approach to treating an unidentified rash?
Write a report that critically articulates the aged care : Report and recommendations on the challenges facing the aged care sector in Australia today - write a report that critically articulates the Aged Care challenge
Is the affordable care act funded by the federal government : Is the Affordable Care Act funded by the federal government?
Simulate industry practices for securing networks : Network Security Configuration & Access Control Assessment - simulate industry practices for securing and managing networks. You will apply your knowledge
Functions of bioreactor frameworks in elementing most cells : What are the functions of the bioreactor frameworks in elementing the most cells and microorganisms.
Discuss how they would liaise with the families : Discuss how they would liaise with the families, the community and external agencies to support the children's language and literacy development
Summary on the status of mentally ill homeless patients : The health risks and the societal perceptions of mentally ill homeless people. What health issues are most likely to be seen in the homeless population?
What is osmotic pressure : What is osmotic pressure? Can solutions with the same concentration of different solutes have different osmotic pressures?

Reviews

Write a Review

Other Subject Questions & Answers

  Cross-cultural opportunities and conflicts in canada

Short Paper on Cross-cultural Opportunities and Conflicts in Canada.

  Sociology theory questions

Sociology are very fundamental in nature. Role strain and role constraint speak about the duties and responsibilities of the roles of people in society or in a group. A short theory about Darwin and Moths is also answered.

  A book review on unfaithful angels

This review will help the reader understand the social work profession through different concepts giving the glimpse of why the social work profession might have drifted away from its original purpose of serving the poor.

  Disorder paper: schizophrenia

Schizophrenia does not really have just one single cause. It is a possibility that this disorder could be inherited but not all doctors are sure.

  Individual assignment: two models handout and rubric

Individual Assignment : Two Models Handout and Rubric,    This paper will allow you to understand and evaluate two vastly different organizational models and to effectively communicate their differences.

  Developing strategic intent for toyota

The following report includes the description about the organization, its strategies, industry analysis in which it operates and its position in the industry.

  Gasoline powered passenger vehicles

In this study, we examine how gasoline price volatility and income of the consumers impacts consumer's demand for gasoline.

  An aspect of poverty in canada

Economics thesis undergrad 4th year paper to write. it should be about 22 pages in length, literature review, economic analysis and then data or cost benefit analysis.

  Ngn customer satisfaction qos indicator for 3g services

The paper aims to highlight the global trends in countries and regions where 3G has already been introduced and propose an implementation plan to the telecom operators of developing countries.

  Prepare a power point presentation

Prepare the power point presentation for the case: Santa Fe Independent School District

  Information literacy is important in this environment

Information literacy is critically important in this contemporary environment

  Associative property of multiplication

Write a definition for associative property of multiplication.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd