Ictnwk546 Assessment 1 Ictnwk546 - Student Assessment 1
Ictnwk546 Assessment 1 Ictnwk546 - Student Assessment 1
Ictnwk546 Assessment 1 Ictnwk546 - Student Assessment 1
Students: Please fill out this cover sheet clearly and accurately. Make sure you have kept a
copy of your work.
Student
Nilesh Nischal Prasad Student ID
Name AIBL232730
Student Declaration
I declare that
These tasks are my own work.
None of this work has been completed by any other person.
I have not cheated or plagiarised the work or colluded with any other student/s.
I have correctly referenced all resources and reference texts throughout these assessment tasks.
I understand that if I am found to be in breach of policy, disciplinary action may be taken against me.
Student
nprasad
Signature
Assessor To Complete
Assessment
Task Result Type of Submission
Task
Knowledge
☐ NYC (Not Yet Competent) ☐ First re-submission
Test
Assessor
feedback
Assessor
Signature
Task 1 – Knowledge Test
1. List two types of ICT networks. Include a description of their configuration in your answer.
LAN (Local Area Network) – This network is designed for businesses and school and is
designed for single buildings. In a LAN, computers and hardware such as printers can be
connected by cable (copper wiring), fibre optic cabling or using a wireless connection.
WAN (Wide Area Network) – This network is designed to connect to multiple buildings
spread across a specific geographic area, or even the world. WAN connects through
internet protocol to communicate and connect to multiple locations.
2. Complete the following table about network attacks, vulnerabilities and security technologies.
ANIT Australia Pty Ltd t/a Albright Institute of Business and Language | RTO: 45041 | CRICOS: 03553J |P.1
1300 189 154 | Level 2, 341-345 Queen Street, Melbourne VIC 3000 | www.albrightinstitute.edu.au | v 2.0
- Password is shared infected USB flash
with other people. drive etc.
- No Antivirus
installed
- Lack of internal
controls and
training
ANIT Australia Pty Ltd t/a Albright Institute of Business and Language | RTO: 45041 | CRICOS: 03553J |P.2
1300 189 154 | Level 2, 341-345 Queen Street, Melbourne VIC 3000 | www.albrightinstitute.edu.au | v 2.0
- 3rd party software vulnerabilities i.e. Use
to monitor all PC’s Splunk software etc
windows updates
and trigger
security
vulnerabilities i.e.
Use Splunk
software etc
3. With the expansion of cloud services and new technologies, the use of mobile devices and the
Internet of Things (IoT), there have also emerged a number of security issues. List two examples
of emerging security issues.
IoT device can be a gateway to an entire network where hackers can use its
processing power to distribute malware and distributed denial of service (DDoS)
attacks. Some of the emerged security risk as below.
-Malware for Mobile
-Using cloud technology to breach company systems.
- Vulnerabilities
-Device mismanagement and misconfiguration
4. Outline the terms auditing and penetration testing that can be used to measure a network’s
security.
The student must outline the terms auditing and penetration testing that can be used to measure a
-Security Audit
network’s is evaluating
security. a system
Their response or applications
may include risk level
but is not limited to: against a set of IT
standard to find out if there is any risk that can create security breaches. This
A security
includes audit is&aExternal
internal systematicIT evaluation
Audit, SOX of the IT infrastructure
compliance audit defences
or PCI and measures
audit how
or yearly
system audit conducted
well security by Paid
protocols comply with aITlist
security vendor.
of established criteria to ensure network security.
- Penetration testing
Penetration testing – Thistoistry
is used carried out
to breach anby
ICTcertified IT company
system just like a hackerthat useThis
would. different
will
methods to attack a real network, same way the hackers carry out
therefore determine if the IT infrastructure could withstand a range of attacks. the IT attack.
Typically, penetration services are requested when a system or network has huge
investments in security and they need to verify if all avenues of security have
been covered.
ANIT Australia Pty Ltd t/a Albright Institute of Business and Language | RTO: 45041 | CRICOS: 03553J |P.3
1300 189 154 | Level 2, 341-345 Queen Street, Melbourne VIC 3000 | www.albrightinstitute.edu.au | v 2.0
5. Outline two logging analysis techniques that can be used to measure the security of a network.
6. Outline two types of security measures that can be put in place in a network.
7. List a type of software that can be used for network security and summarise its capabilities.
ANIT Australia Pty Ltd t/a Albright Institute of Business and Language | RTO: 45041 | CRICOS: 03553J |P.4
1300 189 154 | Level 2, 341-345 Queen Street, Melbourne VIC 3000 | www.albrightinstitute.edu.au | v 2.0
8. List a type of hardware that can be used for network security and summarise its capabilities.
Firewall – security device that monitors and filters incoming and outgoing network
traffic and it decides whether to allow or block the connection and prevents
unauthorized access to the network.
An organization may choose to deploy a software-based firewall as well. The
main difference between a hardware firewall and a software firewall is that the
hardware firewall runs on its own physical device, while a software firewall is
installed on another machine.
9. Given the importance of network security, describe the key features that a network security policy
should include, as well as procedures that should be included.
Access and control of propriety data and personal data. Physical security protocols for
dealing with visitors, locking doors, etc definitions. Password policy. Acceptable use policy
for email, internet browsing, social media etc.
Network management and security process controls that can be put in place to ensure
network security. This includes network control, developing security policies and
implementing it.
ANIT Australia Pty Ltd t/a Albright Institute of Business and Language | RTO: 45041 | CRICOS: 03553J |P.5
1300 189 154 | Level 2, 341-345 Queen Street, Melbourne VIC 3000 | www.albrightinstitute.edu.au | v 2.0
10. Outline two network management and security process controls that can be put in place to ensure
network security.
Network security policy process can be put to ensure network security. Network
security essential make access and limiting the access to have a network secured
for efficient network management operations. E.g., network monitoring including
logs reports strategies. Other network security include:
- Networking monitoring including checking logs for errors
- Audit the network and check security controls.
- Revisit and communicate security policies with users and vendors
11. Explain the importance of a risk management plan and procedures in network security
implementation.
Risk management plan is an important process because it empowers a business with the
necessary tools so that it can adequately identify and deal with potential risks. Once a risk
has been identified, it is then easy to mitigate it.
In general risk can be categories into three parts, low level risk, mid-level risk and high-
level risk. Low level risk the network administer should look after the network on a regular
basis. For mid-level risk in addition to looking after the network on a regular basis the
network administrator should have some strategies in place as a part of incident
response. For a high level risk the network level administrator should take some immediate
action so that further disruption does not take place.
12. Outline the process of developing risk management plans and procedures as part of network
security planning.
Risk management plans and procedures are developed as a part of network security
design. They are designed focusing on stakeholder requirements. Organisational
requirements to protect network vulnerabilities for the security planning organisations can
involve different subjective and objective resources. Firewall with the help of IT personnel
can help the network protected to prevent data loss, theft or corruption and network
failure.
Process to develop risk management plan:
- Step 1: Define the scope and objectives.
- Step 2: Identify the assets and threats.
- Step 3: Analyze the vulnerabilities and impacts.
- Step 4: Role and responsibilities to work on the risk.
- Step 5: Evaluate and prioritize the risks.
- Step 6: Implement and document the controls.
Procedures
- Identify risk
- Investigate
- TakeAustralia
ANIT actionPty Ltd t/a Albright Institute of Business and Language | RTO: 45041 | CRICOS: 03553J |P.6
- Recover
1300 189 154 | Level 2, 341-345 Queen Street, Melbourne VIC 3000 | www.albrightinstitute.edu.au | v 2.0
- Report
13. Explain how risk management should be built into cost analysis and budgeting of network
security. Give an example to illustrate your answer.
ANIT Australia Pty Ltd t/a Albright Institute of Business and Language | RTO: 45041 | CRICOS: 03553J |P.7
1300 189 154 | Level 2, 341-345 Queen Street, Melbourne VIC 3000 | www.albrightinstitute.edu.au | v 2.0