Manage network security1. Answer the following questions regarding the industry-standard ICT networks and their configuration1.1. Explain the term “ICT networks” using 20-40 words. 1.2. What is...

1 answer below »
Hi . How much would this cost



Manage network security 1. Answer the following questions regarding the industry-standard ICT networks and their configuration 1.1. Explain the term “ICT networks” using 20-40 words.  1.2. What is network configuration? Answer using 20-40 words.  1.3. What are the three (3) types of network? 2. Answer the following questions regarding the network attacks, vulnerabilities and related weaknesses of installed infrastructure, including: ·         security technologies ·         emerging security issues 2.1. What are network vulnerabilities? Answer using 20-40 words.  2.2. What are network security attacks? Answer using 20-40 words.  2.3. What is the relation between security weakness and vulnerability? Answer using 20-40 words. 2.4. Identify four (4) emerging security technologies. 2.5. Identify four (4) emerging security issues. 3. Answer the following questions regarding the network security measures, including: ·         auditing and penetration testing techniques ·         logging analysis techniques ·         organisational network infrastructure ·         capabilities of software and hardware solutions ·         general features of emerging security policies, with depth in security procedures ·         network management and security process controls 3.1. What are the three (3) basic network security measures?  3.2. Identify two (2) auditing and penetration testing techniques  3.3. Explain the reasons for using network logging analysis techniques in terms of network security perimeter issue? Answer using 50-100 words.  3.4. What do you mean by organisational network infrastructure keeping network security perimeter in prospect?  3.5. Explain the purpose of special hardware and software solutions like intrusion detection systems (IDS) to secure computer networks and host computers. Answer using 30-60 words.  3.6. What are security policies and procedures? What general features should be included in the security procedures. Answer using 30-60 words.  3.7. What are network security controls? Answer using 30-60 words.  4. Answer the following questions regarding the network security implementation risk management plans and procedures, including: ·         network security planning ·         implementation ·         cost analysis and budgeting. 4.1. What is the purpose of network security planning? Explain using 20-40 words.  4.2. What is security implementation? Answer using 20-40 words.  4.3. Explain the purpose of cost analysis and budgeting for network security implementation using 20-40 words.  5. Identify the five (5) most common network attacks and explain each in 50-100 words. 6. Identify the five (5) most common vulnerabilities of a network. Explain each in 50-100 words. 7. Identify the six (6) weakness of a network that can cause network attacks. 8. Identify five (5) emerging security technologies used to secure a network.   9. Identify six (6) security technologies used to secure organisation networks from web-based attacks. Write 50-150 words for each. 10. Identify five (5) emerging security issues. Explain each in 50-100 words. 11. What is network auditing? Write your answer in 50-100 words. 12. Identify ten (10) tools used for network auditing. 13. Explain network penetration in 50-100 words. 14. Identify ten (10) network penetration tools. 15. What is a log analysis? Write your answer in 50-100 words. 16. Identify five (5) best practices to analyse network logs. Write your answer in 200-250 words. 17. Identify twenty (20) tools used to monitor and analyse network logs. 18. What is organisational network infrastructure? Write your answer in 40-80 words. 19. How do you differentiate between IT infrastructure and network infrastructure? Write your answer in 200-250 words. 20. Identify five (5) features of an effective security policy. 21. Identify four (4) procedures used for network security. Write 50-100 words for each procedure. 22. Identify seven (7) basic security and management controls applicable to all networks. 23. List five (5) essential features of a successful network security policy and explain each in 50-100 words. 24. What are nine (9) essential elements of network security planning? 25. Identify eight (8) types of information that must be included in an ideal risk management plan. 26. Identify eight (8) steps to implement network security. Business Plan Template Manage network security Scenario: You have been working in ABC bank as an IT manger. ABC Bank wants to open a new branch in another city and for this they already purchased a double story building.  It consists of one server room on its second floor, 2 management room on second floor and one board room on the 1st floor.  The following IT infrastructure will be delivered to the new location according to requirement list raised by you. A.Twenty (20) HP I7 computers B.Four (2) Cisco 24 port switches C.Two (2) Hp ProLiant servers  D.One (1) NBN connection  E.Two (2) Wi fi Router F.One Wireless access point G.Two (2) Sharp MX-4111N all in one printers H.One (1) Biometric sensor  I.One (1) server rack J.Sixty (60) patch cords(network cables) Malware attack has been a critical issue for ABC Bank Last month a number of computer systems were out-of-order and caused significant financial damaged to the organisation.  Company officials want you to prepare a detailed report regarding the network security plans so that this report can be shared with company’s risk analyst. After the approval of the risk analyst, the IT head can give you the go ahead for setting up the network design with the suggested changes. Task 1:  In this assessment task: •The student will act as themselves •The trainer assessor will act as the risk analyst/ your supervisor   You need to prepare a report that includes the following information:  A.All three (3) phases of network security design •Defining planning phase for network security design according to organisational requirements •Defining building phase for network security design according to organisational requirements •Defining managing phase for network security design according to organisational requirements oPlanning Phase, including the following: Most suitable network topology according to office layout Server roles  The operating system for servers and workstations Applications  requirement The bandwidth requirement for internet  Antivirus requirements for servers and workstations Security measures for network equipment Access control  Wi-fi Access point location Backup Strategy oBuilding Phase of network security design, including the following: Risk assessment methods Security measures Costing of network design Planned Network design feedback given by security analyst and IT head Incident reporting matrix The threat model for risk assessment Determine attacker scenarios and threats according to network security design specifications Design and document network components security measures Develop and document security policies Submit document to required personnel and seek and respond to feedback oManaging phase, including the following information: Incident reporting  Security level matrix Facilities level Escalation matrix B.Risks assessment, including the following information: Possible reasons Attackers scenarios and possible threats oDetermine major threat themes to network security oDetermine the potential origin of major threats according to network security design specifications oIdentify industry standard common network vulnerability types oDesign and document threat model according to network security design specifications  Common network vulnerabilities Who can be a risk to the network? Level of risk  C.Risk management strategy Assets that need to be secured Asset’s approximate value (search form internet) Analysis on security risks  oDetermine required elements of risk management according to network security design specifications oIdentify organisational assets requiring protection oCategorise and document assets and determine their value according to organisational requirements oDetermine and document risk management plan according to organisational requirements  Reason for the security of the asset Design security incidents response  oDesign and document auditing and incidents response procedure oSubmit to required personnel, seek and respond to feedback  A risk management plan including the following information •No. •Risk (What can happen) •Source (How this can happen) •Possible Impact of Risk •Possible Treatment  •Effectiveness of current plan •Likelihood •Consequence •Acceptable/Unacceptable Task 2 : This task is in continuation of task 1 In this task : · The student will act as an ICT technician · The trainer/assessor will act as a risk analyst. · The student will hold a meeting with the risk analyst to collect feedback on the network security design Task 3: This task is in continuation of Task 2 In this task: · The student will act as themselves · The trainer/assessor will act as a security analyst. · The student will implement the network design developed You have submitted your proposed network report to the security analyst and after a few minor changes you received the go ahead from the IT head. Now it is the time for you to put your design into practice. You are required to perform the below tasks. A.    Create network security design for network component by including the following: o    Physical security requirements of sever o    Server access rights o    Physical Security of Switches o    Password requirements of router, switches o    Wi-Fi security encryption o    Wi-Fi access point security B.      Create the Security incident report template including the following o    Reported by o    Date of reporting o    Title /Role o    Incident No o    Incident Type o    Date of Incident o    Location o    City o    State o    Zip Code o    Incident Description o    Contact of the involved party o    Police Report filed Precinct o    Reporting Officer o    Phone o    Follow up Action o    Supervisor Name o    Supervisor Signature o    Date Task 4: This task is in continuation of task 3 In this task: · The student will act as themselves · The student will implement the network security design developed. After finalising the network security design and incident response template, it is the time for you to implement the final network security design. You want to test the working and reliability of the network design against the known vulnerabilities. To check the plan for a final sign off  the following activities need to be performed and the required changes made. •   Testing of security design against the following vulnerabilities o    USB Drive access o    Wireless access point authentication o    SQL Injections o    Smartphone or digital devices authentication o    Email Filtering o    Database exposure o    Security patch updating o    Password policy During the testing document, the incidents in the incident response template designed in part A of this assessment task to make required changes to complete the sign off template below. Assessment-2 Task-1 Report : A. All three (3) phases of network security design Defining planning phase for network security design according to organisational requirements Most suitable network topology according to office layout Server roles The operating system for servers and workstations Applications requirement The bandwidth requirement for internet Antivirus requirements for servers and workstations Security measures for network equipment Access control Wi-fi Access point location Backup Strategy Defining building phase for network security design according to organisational requirements : Risk assessment methods Security measures Costing of network design Planned Network design feedback given by security analyst and IT head Incident reporting matrix The threat model for risk assessment Determine attacker scenarios and threats according to network security design specifications Design and document network components security measures Develop and document security policies Submit document to required personnel and seek and respond to feedback Defining managing phase for network security design according to organisational requirements Incident reporting Security level matrix Facilities level Escalation matrix B. Risks assessment, including the following information: Possible reasons Attackers scenarios and possible threats · Determine major threat themes to network security · Determine the potential origin of major threats according to network security design
Answered 1 days AfterNov 08, 2022

Answer To: Manage network security1. Answer the following questions regarding the industry-standard ICT...

Shubham answered on Nov 09 2022
45 Votes
Business Plan Template
Manage network security
Scenario:
You have been working in ABC bank as an IT manger. ABC Bank wants to open a new branch in another city and for this they already purchased a double story building.  It consists of one server room on its second floor, 2 management room on second floor and one board room on the 1st floor.  The following IT infrastructure will be delivered to the new location according to requirement list raised by you.
A.    Twenty (20) HP I7 computers
B.    Four (2) Cisco 24 port switches
C.    Two (2) Hp ProLiant servers 
D.    One (1) NBN connection 

E.    Two (2) Wi fi Router
F.    One Wireless access point
G.    Two (2) Sharp MX-4111N all in one printers
H.    One (1) Biometric sensor 
I.    One (1) server rack
J.    Sixty (60) patch cords(network cables)
Malware attack has been a critical issue for ABC Bank Last month a number of computer systems were out-of-order and caused significant financial damaged to the organisation. 
Company officials want you to prepare a detailed report regarding the network security plans so that this report can be shared with company’s risk analyst. After the approval of the risk analyst, the IT head can give you the go ahead for setting up the network design with the suggested changes.
Task 1: 
In this assessment task:
•    The student will act as themselves
•    The trainer assessor will act as the risk analyst/ your supervisor
You need to prepare a report that includes the following information: 
A.    All three (3) phases of network security design
•    Defining planning phase for network security design according to organisational requirements
•    Defining building phase for network security design according to organisational requirements
•    Defining managing phase for network security design according to organisational requirements
o    Planning Phase, including the following:
    Most suitable network topology according to office layout
    Server roles 
    The operating system for servers and workstations
    Applications  requirement
    The bandwidth requirement for internet 
    Antivirus requirements for servers and workstations
    Security measures for network equipment
    Access control 
    Wi-fi Access point location
    Backup Strategy
o    Building Phase of network security design, including the following:
    Risk assessment methods
    Security measures
    Costing of network design
    Planned Network design feedback given by security analyst and IT head
    Incident reporting matrix
    The threat model for risk assessment
    Determine attacker scenarios and threats according to network security design specifications
    Design and document network components security measures
    Develop and document security policies
    Submit document to required personnel and seek and respond to feedback
o    Managing phase, including the following information:
    Incident reporting 
    Security level matrix
    Facilities level
    Escalation matrix
B.    Risks assessment, including the following information:
    Possible reasons
    Attackers scenarios and possible threats
o    Determine major threat themes to network security
o    Determine the potential origin of major threats according to network security design specifications
o    Identify industry standard common network vulnerability types
o    Design and document threat model according to network security design specifications 
    Common network vulnerabilities
    Who can be a risk to the network?
    Level of risk 
C.    Risk management strategy
    Assets that need to be secured
    Asset’s approximate value (search form internet)
    Analysis on security risks 
o    Determine required elements of risk management according to network security design specifications
o    Identify organisational assets requiring protection
o    Categorise and document assets and determine their value according to organisational requirements
o    Determine and document risk management plan according to organisational requirements 
    Reason for the security of the asset
    Design security incidents response 
o    Design and document auditing and incidents response procedure
o    Submit to required personnel, seek and respond to feedback 
    A risk management plan including the following information
•    No.
•    Risk (What can happen)
•    Source (How this can happen)
•    Possible Impact of Risk
•    Possible Treatment 
•    Effectiveness of current plan
•    Likelihood
•    Consequence
•    Acceptable/Unacceptable
Task 2 :
This taskis in continuation of task 1
In thistask :
· The studentwillact as an ICT technician
· The trainer/assessorwillact as a riskanalyst.
· The studentwillhold a meetingwith the riskanalyst to collect feedback on the network security design
Task 3:
This task is in continuation of Task 2
In this task:
· The student will act as themselves
· The trainer/assessor will act as a security analyst.
· The student will implement the network design developed
You have submitted your proposed network report to the security analyst and after a few minor changes you received the go ahead from the IT head. Now it is the time for you to put your design into practice. You are required to perform the below tasks.
A.    Create network security design for network component by including the following:
o    Physical security requirements of sever
o    Server access rights
o    Physical Security of Switches
o    Password requirements of router, switches
o    Wi-Fi security encryption
o    Wi-Fi access point security
B.      Create the Security incident report template including the following
o    Reported by
o    Date of reporting
o    Title /Role
o    Incident No
o    Incident Type
o    Date of Incident
o    Location
o    City
o    State
o    Zip Code
o    Incident Description
o    Contact of the involved party
o    Police Report filed Precinct
o    Reporting Officer
o    Phone
o    Follow up Action
o    Supervisor Name
o    Supervisor Signature
o    Date
Task...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here