Get Instant Help From 5000+ Experts For

Writing: Get your essay and assignment written from scratch by PhD expert

Rewriting: Paraphrase or rewrite your friend's essay with similar meaning at reduced cost

Editing:Proofread your work by experts and improve grade at Lowest cost

And Improve Your Grades
Phone no. Missing!

Enter phone no. to receive critical updates and urgent messages !

Attach file

Error goes here

Files Missing!

Please upload all relevant files for quick & complete assistance.

Guaranteed Higher Grade!
Free Quote
CETM30 Fundamentals of Cybersecurity

The following learning outcomes will be assessed:

• Ability to critically understand the principles of cybersecurity and the procedures to manage these in organisational settings, taking into account potential security threats, risks and attacks

• Ability to evaluate the processes, procedures and protocols required to implement secure, reliable and effective systems security and identify suitable metrics to quantify and measure levels of security

You have a maximum word limit of 2000 words for this task – not including diagrams and references:

1. Given that the company would like to establish a link between the Cardiff and Newcastle sites (WAN), and given that the sites already have FTTP connectivity, examine and create a section in your report which considers what technologies exist that could be used to secure these connections so that data is safe from theft or tampering in any way when flowing from site to site. Make sure you include recommendations for what they really should do (with full justification as to why they should follow your advice). [20 Marks]

2. Examine the floor plans you have been provided with for the Cardiff HQ buildings and their associated temporary network diagrams. Then create a chapter in your report which discusses/includes the following: 
The security weaknesses/hazards inherent in the physical make-up of the sites and suggest what could be done to secure them from a structural point of view – please bear in mind that the uppermost floor has the open roof above it – the new area in the other building is the same, but has a mobile phone mast on the top of it (4G rated) – just above the accountant office. The 1st – 8th floors of these buildings are occupied by 7 other businesses.

Using the network diagrams, also highlight the problems/security weaknesses with their existing network arrangements.

Reworked diagrams of the floor plans and networks showing the necessary changes you would recommend for overcoming these weaknesses.
o Full justification for your recommendations including any building/network design  lterations and any additional network/system hardware or software that would be required to support your ideas 

sales chat
sales chat