New

Learn smart - Learn online. Upto 88% off on courses for a limited time. View Courses

Securing Higher Grades Costing Your Pocket? Book Your Assignment at The Lowest Price Now!
loader
Add File

Error goes here

Files Missing!

Please upload all relevant files for quick & complete assistance.

Guaranteed Higher Grade!

Stuck on Your Question?

Get 24x7 live help from our Top Tutors. All subjects covered.

loader
250 words

Error goes here

Files Missing!

Please upload all relevant files for quick & complete assistance.

Students Who Viewed This Also Studied

20 Pages
MN502 Network Security

Task PBL Week 1 Vulnerable voicemail: telco-issued PINs insecure Optus and Virgin Mobile make it easy for hackers to access customers' voicemail remotely as they do not require issued PINs to be ...

Course

MN502

Type

Home Work

Subject

Networking

University

Melbourne Institute of Technology

Season

Spring

12 Pages
ICT120 Introduction to Computer Networks

Task: Finally, sketch an outline of the physical network and answer the following questions. Q1. You have decided to use a network ID 192.168.4.0/24 to create three separate networks for the employe ...

Course

ICT120

Type

Home Work

Subject

Networking

University

University of the Sunshine Coast

10 Pages
CC5901 Low-Power and Wide-Area IoT Communications Network

1. For an LPWA application, if each node is assigned with a 150-Hz channel, and you have measured that the average signal-to-noise ratio is 5dB, what is the average data rate it can transmit? 2. If t ...

Type

Course Work

Subject

Networking

University

James Cook University

39 Pages
YNENG1 Diploma of Network Engineering

Question: Instruction Please answer all the questions and use the case study provided in the introduction to answer all the questions. Answer each questions in answer box provided for each question, ...

Course

YNENG1

Type

Programming

Subject

Networking

University

Charles Darwin University

Season

Spring

ICTNWK601 Design and Implement a Security System

Question

Answered

Question:

Scenario: 

ALEXA Finance Pvt. Limited is a renowned financial services company. It has gained a good reputation in the city of Melbourne and its surrounding regional areas. The company deals in both the personal and commercial financial services to the corporate sectors. The company’s head office is situated at the CBD of Melbourne with its regional offices in Geelong and Ballarat. The company is using MYOB as the ERP and all the services are provided through a centralised management system.

For better services to its customers, AlEXA has made all the data centralised stored in the head office. The company’s management is fully aware of the importance and the integrity of the data as financial data of different clients is always critical and needs to be protected by the company. The IT department of the company is well equipped and comprised of latest tools and technologies with all the computers, printers, scanners (NAS-Storage Servers), servers, WiFi access points, switches , routers, IP Phones connected in a sophisticated and efficient network. The network provide all the employees of the company to access the centralised data stored on the servers of the company by the network using the LAN connections, while the regional offices connect and access the date using the in-house configured and managed VPN.

The IT department is headed by RONE, the IT Manager while Steve assists him in managing the networks and the systems and work as the System Administrator. With the ever increasing workload and the data of the company’s clients, the IT department is looking forward to design and implement a security system for their network to not only protect the data but also to provide efficient and secured access for the end users.

The job responsibilities and the network diagram of the company are as follow:

Job Responsibilities of IT Manager:

  • Running regular checks on network and data security
  • Identifying and acting on opportunities to improve and update software and systems
  • Developing and implementing IT policy and best practice guides for the organisation
  • Designing training programs and workshops for staff
  • Conducting regular system audits
  • Running and sharing regular operation system reports with senior staff
  • Overseeing and determining timeframes for major IT projects including system updates, upgrades, migrations and outages
  • Managing and reporting on allocation of IT budget
  • Providing direction for IT team members
  • Identifying opportunities for team training and skills advancement

Job Responsibilities of System Administrator:

  • Provide technical support for both hardware and software issues our users encounter
  • Manage the configuration and operation of client-based computer operating systems
  • Monitor the system daily and respond immediately to security or usability concerns
  • Create and verify backups of data
  • Respond to and resolve help desk requests
  • Upgrade systems and processes as required for enhanced functionality and security issue resolution
  • Administrate infrastructure, including firewalls, databases, malware protection software and other processes
  • Review application logs
  • Install and test computer-related equipment
  • Upgrade systems with new releases and models
  • Develop expertise to train staff on new technologies
  • Build an internal wiki with technical documentation, manuals and IT policies

Network Diagram of Alexa Finance to give illustration of all the all the computers, printers, scanners (NAS-Storage Servers), servers, WiFi access points, switches , routers, IP Phones connected

Task: (Role Play on evaluation of the network security threats)

The IT department needs to correspond with the management of the company to elaborate the requirement of the design and implementation of the security system. The IT department will organise a meeting and explain the requirements to the General Manager and the Finance Manager. After the elaboration of the requirements, they need to complete the minutes of meetings and get it signed off by all the attendees including the General Manager to initiate the implementation.

You will act as the Systems Administrator and will elaborate the requirements of the security system. You will evaluate the different types of network security threats. The trainer/assessor will act as the IT Manager and will supervise the evaluation of the network security threats. Two of the students will act as the General Manager and the Finance Manager, while the Finance Manager will arise the financial constraints attach to the implementation. After the role play, you need to document a precise report define the threats on the security system.

In the role-play you need to discuss the following:

  • Analyse different types of malwares and mitigation of the network attacks
  • Explain the analytical and structured approach towards the protection of the network infrastructure of the company.
  • It will include:
  • The nature of the security being required by the ALEXA’s ICT network infrastructure o Level of Security required for the Network
  • Explain and analyse the functions and importance of Authentication, Authorisation and accounting for the security of the network
  • Elaborate and compare different common features of TACAS+ and RADIUS for ensuring the security of the network
  • Discuss the operational strategies and weaknesses of the different firewall technologies
  • Explain the Analysis different IDPS technologies along with monitoring methods and responses to the attacks and options to monitor them
  • Compare and analyse Network based and Host based IDPS for the identification of the malicious activity and maintaining the log, attempt to block them and reporting of the malicious activity
  • Discuss with the assessor about the different cryptographic techniques that can ensure network security
  • Discuss and analyse the Internet Key Exchange Protocol –IKE and explain the binding blocks of IPSec and the security functions it provides
  • You also need to design a brief report on Switch Security Attacks – Layer 2 and mitigation techniques against them.

ICTNWK601 Design and Implement a Security System

Answer in Detail

Solved by qualified expert

Get Access to This Answer

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Hac habitasse platea dictumst vestibulum rhoncus est pellentesque. Amet dictum sit amet justo donec enim diam vulputate ut. Neque convallis a cras semper auctor neque vitae. Elit at imperdiet dui accumsan. Nisl condimentum id venenatis a condimentum vitae sapien pellentesque. Imperdiet massa tincidunt nunc pulvinar sapien et ligula. Malesuada fames ac turpis egestas maecenas pharetra convallis posuere. Et ultrices neque ornare aenean euismod. Suscipit tellus mauris a diam maecenas sed enim. Potenti nullam ac tortor vitae purus faucibus ornare. Morbi tristique senectus et netus et malesuada. Morbi tristique senectus et netus et malesuada. Tellus pellentesque eu tincidunt tortor aliquam. Sit amet purus gravida quis blandit. Nec feugiat in fermentum posuere urna. Vel orci porta non pulvinar neque laoreet suspendisse interdum. Ultricies tristique nulla aliquet enim tortor at auctor urna. Orci sagittis eu volutpat odio facilisis mauris sit amet.

Tellus molestie nunc non blandit massa enim nec dui. Tellus molestie nunc non blandit massa enim nec dui. Ac tortor vitae purus faucibus ornare suspendisse sed nisi. Pharetra et ultrices neque ornare aenean euismod. Pretium viverra suspendisse potenti nullam ac tortor vitae. Morbi quis commodo odio aenean sed. At consectetur lorem donec massa sapien faucibus et. Nisi quis eleifend quam adipiscing vitae proin sagittis nisl rhoncus. Duis at tellus at urna condimentum mattis pellentesque. Vivamus at augue eget arcu dictum varius duis at. Justo donec enim diam vulputate ut. Blandit libero volutpat sed cras ornare arcu. Ac felis donec et odio pellentesque diam volutpat commodo. Convallis a cras semper auctor neque. Tempus iaculis urna id volutpat lacus. Tortor consequat id porta nibh.

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Hac habitasse platea dictumst vestibulum rhoncus est pellentesque. Amet dictum sit amet justo donec enim diam vulputate ut. Neque convallis a cras semper auctor neque vitae. Elit at imperdiet dui accumsan. Nisl condimentum id venenatis a condimentum vitae sapien pellentesque. Imperdiet massa tincidunt nunc pulvinar sapien et ligula. Malesuada fames ac turpis egestas maecenas pharetra convallis posuere. Et ultrices neque ornare aenean euismod. Suscipit tellus mauris a diam maecenas sed enim. Potenti nullam ac tortor vitae purus faucibus ornare. Morbi tristique senectus et netus et malesuada. Morbi tristique senectus et netus et malesuada. Tellus pellentesque eu tincidunt tortor aliquam. Sit amet purus gravida quis blandit. Nec feugiat in fermentum posuere urna. Vel orci porta non pulvinar neque laoreet suspendisse interdum. Ultricies tristique nulla aliquet enim tortor at auctor urna. Orci sagittis eu volutpat odio facilisis mauris sit amet.

Tellus molestie nunc non blandit massa enim nec dui. Tellus molestie nunc non blandit massa enim nec dui. Ac tortor vitae purus faucibus ornare suspendisse sed nisi. Pharetra et ultrices neque ornare aenean euismod. Pretium viverra suspendisse potenti nullam ac tortor vitae. Morbi quis commodo odio aenean sed. At consectetur lorem donec massa sapien faucibus et. Nisi quis eleifend quam adipiscing vitae proin sagittis nisl rhoncus. Duis at tellus at urna condimentum mattis pellentesque. Vivamus at augue eget arcu dictum varius duis at. Justo donec enim diam vulputate ut. Blandit libero volutpat sed cras ornare arcu. Ac felis donec et odio pellentesque diam volutpat commodo. Convallis a cras semper auctor neque. Tempus iaculis urna id volutpat lacus. Tortor consequat id porta nibh.

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Hac habitasse platea dictumst vestibulum rhoncus est pellentesque. Amet dictum sit amet justo donec enim diam vulputate ut. Neque convallis a cras semper auctor neque vitae. Elit at imperdiet dui accumsan. Nisl condimentum id venenatis a condimentum vitae sapien pellentesque. Imperdiet massa tincidunt nunc pulvinar sapien et ligula. Malesuada fames ac turpis egestas maecenas pharetra convallis posuere. Et ultrices neque ornare aenean euismod. Suscipit tellus mauris a diam maecenas sed enim. Potenti nullam ac tortor vitae purus faucibus ornare. Morbi tristique senectus et netus et malesuada. Morbi tristique senectus et netus et malesuada. Tellus pellentesque eu tincidunt tortor aliquam. Sit amet purus gravida quis blandit. Nec feugiat in fermentum posuere urna. Vel orci porta non pulvinar neque laoreet suspendisse interdum. Ultricies tristique nulla aliquet enim tortor at auctor urna. Orci sagittis eu volutpat odio facilisis mauris sit amet.

Tellus molestie nunc non blandit massa enim nec dui. Tellus molestie nunc non blandit massa enim nec dui. Ac tortor vitae purus faucibus ornare suspendisse sed nisi. Pharetra et ultrices neque ornare aenean euismod. Pretium viverra suspendisse potenti nullam ac tortor vitae. Morbi quis commodo odio aenean sed. At consectetur lorem donec massa sapien faucibus et. Nisi quis eleifend quam adipiscing vitae proin sagittis nisl rhoncus. Duis at tellus at urna condimentum mattis pellentesque. Vivamus at augue eget arcu dictum varius duis at. Justo donec enim diam vulputate ut. Blandit libero volutpat sed cras ornare arcu. Ac felis donec et odio pellentesque diam volutpat commodo. Convallis a cras semper auctor neque. Tempus iaculis urna id volutpat lacus. Tortor consequat id porta nibh.

28 More Pages to Come in This Document. Get access to the complete answer.

MyAssignmenthelp.com is one of the leading urgent assignment help providers in the USA. We have earned our reputation as best assignment help in multiple countries including the USA. We have designed unique fastest delivery options, which assist us to deliver immediate assignment assistance. Our teams of highly skilled qualified writers are capable of delivering fast assistances. We provide online assignment help to a wide range subjects so that whenever students face the urgent need of assignment help, they can hire our assistance within a short period.

More ICTNWK601 ICTNWK601 Design and Implement a Security System: Questions & Answers

Q
icon

We aren't endorsed by this University

MN502 Network Security

Task PBL Week 1 Vulnerable voicemail: telco-issued PINs insecure Optus and Virgin Mobile make it easy for hackers to access customers' voicemail remotely as they do not require issued PINs to be changed, warn security experts. The security experts say telcos should require rather than prom ...

View Answer
Q
icon

We aren't endorsed by this University

ICT120 Introduction to Computer Networks

Task: Finally, sketch an outline of the physical network and answer the following questions. Q1. You have decided to use a network ID 192.168.4.0/24 to create three separate networks for the employees of Intelli Publishing. Do you foresee any issues with this network ID in terms of public and priv ...

View Answer
Q
icon

We aren't endorsed by this University

CC5901 Low-Power and Wide-Area IoT Communications Network

1. For an LPWA application, if each node is assigned with a 150-Hz channel, and you have measured that the average signal-to-noise ratio is 5dB, what is the average data rate it can transmit? 2. If the data of a deployed LPWA temperature monitoring system have missing data from some sensors, what y ...

View Answer
Q
icon

We aren't endorsed by this University

YNENG1 Diploma of Network Engineering

Question: Instruction Please answer all the questions and use the case study provided in the introduction to answer all the questions. Answer each questions in answer box provided for each question,minimum words for each answer. Introduction  Hydraulink Australia has grown 54% in just 2 y ...

View Answer

Content Removal Request

If you are the original writer of this content and no longer wish to have your work published on Myassignmenthelp.com then please raise the content removal request.

Choose Our Best Expert to Help You

icon

5% Cashback

On APP - grab it while it lasts!

Download app now (or) Scan the QR code

*Offer eligible for first 3 orders ordered through app!

screener
ribbon
callback request mobile
Have any Query?