CETM30 Fundamentals of Cybersecurity
Task:
The following learning outcomes will be assessed:
Knowledge
• Ability to critically understand the principles of cybersecurity and the procedures to manage these in organisational settings, taking into account potential security threats, risks and attacks
• Ability to evaluate the processes, procedures and protocols required to implement secure, reliable and effective systems security and identify suitable metrics to quantify and measure levels of security
You have a maximum word limit of 2000 words for this task – not including diagrams and references:
1. Given that the company would like to establish a link between the Cardiff and Newcastle sites (WAN), and given that the sites already have FTTP connectivity, examine and create a section in your report which considers what technologies exist that could be used to secure these connections so that data is safe from theft or tampering in any way when flowing from site to site. Make sure you include recommendations for what they really should do (with full justification as to why they should follow your advice). [20 Marks]
2. Examine the floor plans you have been provided with for the Cardiff HQ buildings and their associated temporary network diagrams. Then create a chapter in your report which discusses/includes the following:
The security weaknesses/hazards inherent in the physical make-up of the sites and suggest what could be done to secure them from a structural point of view – please bear in mind that the uppermost floor has the open roof above it – the new area in the other building is the same, but has a mobile phone mast on the top of it (4G rated) – just above the accountant office. The 1st – 8th floors of these buildings are occupied by 7 other businesses.
Using the network diagrams, also highlight the problems/security weaknesses with their existing network arrangements.
Reworked diagrams of the floor plans and networks showing the necessary changes you would recommend for overcoming these weaknesses.
o Full justification for your recommendations including any building/network design lterations and any additional network/system hardware or software that would be required to support your ideas