This coursework is designed to demonstrate the broad understanding and knowledge of the module, assessing, and evaluating the student’s strength and level of analysis; divided into four learning outcomes. The coursework should be submitted as one document in a report format in final submission.
You have just been appointed as IT Security Manager in a multinational company in Dublin. You are responsible for physical, IT and information/data security. The company conducts secure research for defence.
These are three departments within this company:
R&D is the one department with good security (biometric and card-based access control systems and running its network with the company's network using third party VPN). Since it is connected to the company’s network, R&D servers recently got attacked with Distributed Denial of Service attack (DDoS) and even with Man in the middle attack. Recent audit has also been found that there was an incorrect configuration of firewall policies.
All offices are on the ground floor with servers (email, ftp, web servers etc) and document filling rooms and photocopiers in the basement which are easily accessible to all employees of their day to day duties. In each department, there are several workstations, network printers, USB based local printer/plotter/scanners, USB and network drives.
There is also a smoking area just outside the building, conveniently situated next to the staff car park which is open for visitors and contractors as well. The company’s Wi-Fi signals can be sensed by wireless devices in the smoking area.
Initially, you need to carry out investigation about the IT security risks, existing organisational security procedure and controls to mitigate the risks. You also need to consider IT security policies, data protection laws, risk assessment methods, and security audit necessary for improving the overall security.
As IT Manager, your first task as part of your new role is to provide an IT security awareness training to all employees. The training presentation shall include different types of IT security risks together with network security tools and risk assessment and treatment methods. In addition to presentation, you should also produce a detailed report containing technical review of the topics covered in the presentation.
Presentation should cover the following points.
You should follow the assignment brief scenario and produce the followings:
Produce a report that contains the followings:
You are required to consider and evaluate the alignment of IT security with organisational policy and suitability of using tools used in organisational policy.