Ictnwk546 Assessment 1 Ictnwk546 - Student Assessment 1

Download as pdf or txt
Download as pdf or txt
You are on page 1of 8

Assessment Task 1 – Coversheet

Students: Please fill out this cover sheet clearly and accurately. Make sure you have kept a
copy of your work.

Student and Submission Details

Student
Nilesh Nischal Prasad Student ID
Name AIBL232730

Unit Code Date of


ICTNWK546 - Manage network security
and Name submission 20/08/2023

Student Declaration
I declare that
 These tasks are my own work.
 None of this work has been completed by any other person.
 I have not cheated or plagiarised the work or colluded with any other student/s.
 I have correctly referenced all resources and reference texts throughout these assessment tasks.
 I understand that if I am found to be in breach of policy, disciplinary action may be taken against me.

Student
nprasad
Signature

Assessor To Complete

Assessment
Task Result Type of Submission
Task

☐ C (Competent) ☐ First submission

Knowledge
☐ NYC (Not Yet Competent) ☐ First re-submission
Test

☐ NA (Not Assessed) ☐ Second re-submission

Assessor
feedback

Assessor Name Date

Assessor
Signature
Task 1 – Knowledge Test

Assessment Task 1 – Knowledge Questions


Please answer the following questions. A word limit of 150 words applies to each response,
unless otherwise specified.
You must read thoroughly the “Student Workbook/Learner Guide” before attempting this Task.

1. List two types of ICT networks. Include a description of their configuration in your answer.

LAN (Local Area Network) – This network is designed for businesses and school and is
designed for single buildings. In a LAN, computers and hardware such as printers can be
connected by cable (copper wiring), fibre optic cabling or using a wireless connection.

WAN (Wide Area Network) – This network is designed to connect to multiple buildings
spread across a specific geographic area, or even the world. WAN connects through
internet protocol to communicate and connect to multiple locations.

2. Complete the following table about network attacks, vulnerabilities and security technologies.

Network attack 1 Network attack 2

List two types of Passive Network Attack Active Network Attack


network attack.
- Attackers gain - Attackers gain
Briefly describe the
access to a unauthorized access
type of attack.
network and can and modify data,
monitor or steal delete or encrypt and
sensitive create total data loss
information for the company.
including credit
card details.

Outline the - Weak passwords - Lack of physical


vulnerabilities of or password policy security
the ICT system that is not enforced for
- Misuse of hardware or
may have led to the software or PC
each of the attacks. software, plugging
login.

ANIT Australia Pty Ltd t/a Albright Institute of Business and Language | RTO: 45041 | CRICOS: 03553J |P.1
1300 189 154 | Level 2, 341-345 Queen Street, Melbourne VIC 3000 | www.albrightinstitute.edu.au | v 2.0
- Password is shared infected USB flash
with other people. drive etc.

- Poor security - Operating system are


design not regularly updated,
or windows updated
- Hardware or
services not running on
software not
PC.
updated regularly

- No Antivirus
installed

- Lack of internal
controls and
training

List a security - Firewall is installed - Firewall is installed and


technology that can and rules rules configured to
prevent such an configured to only only allow certain
attack allow certain ports ports to be opened to
to be opened to allow access as per
allow access as business requirements.
per business
- Antivirus is installed
requirements.
and updated.
- Antivirus is installed
- Windows update is
and updated.
pushed using SCCM
- Windows update is console.
pushed using
- User SSL certificate to
SCCM console.
establish secure
- Use VPN to access connection between
or work remotely a web server and
with two factor internet browser
authentications.
- Use VPN to access or
- User SSL certificate work remotely with
to establish secure two factor
connection authentications.
between a web
- 3rd party software to
server and internet
monitor all PC’s
browser
windows updates and
trigger security

ANIT Australia Pty Ltd t/a Albright Institute of Business and Language | RTO: 45041 | CRICOS: 03553J |P.2
1300 189 154 | Level 2, 341-345 Queen Street, Melbourne VIC 3000 | www.albrightinstitute.edu.au | v 2.0
- 3rd party software vulnerabilities i.e. Use
to monitor all PC’s Splunk software etc
windows updates
and trigger
security
vulnerabilities i.e.
Use Splunk
software etc

3. With the expansion of cloud services and new technologies, the use of mobile devices and the
Internet of Things (IoT), there have also emerged a number of security issues. List two examples
of emerging security issues.

IoT device can be a gateway to an entire network where hackers can use its
processing power to distribute malware and distributed denial of service (DDoS)
attacks. Some of the emerged security risk as below.
-Malware for Mobile
-Using cloud technology to breach company systems.
- Vulnerabilities
-Device mismanagement and misconfiguration

4. Outline the terms auditing and penetration testing that can be used to measure a network’s
security.
The student must outline the terms auditing and penetration testing that can be used to measure a
-Security Audit
network’s is evaluating
security. a system
Their response or applications
may include risk level
but is not limited to: against a set of IT
standard to find out if there is any risk that can create security breaches. This
A security
includes audit is&aExternal
internal systematicIT evaluation
Audit, SOX of the IT infrastructure
compliance audit defences
or PCI and measures
audit how
or yearly
system audit conducted
well security by Paid
protocols comply with aITlist
security vendor.
of established criteria to ensure network security.
- Penetration testing
Penetration testing – Thistoistry
is used carried out
to breach anby
ICTcertified IT company
system just like a hackerthat useThis
would. different
will
methods to attack a real network, same way the hackers carry out
therefore determine if the IT infrastructure could withstand a range of attacks. the IT attack.
Typically, penetration services are requested when a system or network has huge
investments in security and they need to verify if all avenues of security have
been covered.

ANIT Australia Pty Ltd t/a Albright Institute of Business and Language | RTO: 45041 | CRICOS: 03553J |P.3
1300 189 154 | Level 2, 341-345 Queen Street, Melbourne VIC 3000 | www.albrightinstitute.edu.au | v 2.0
5. Outline two logging analysis techniques that can be used to measure the security of a network.

Please find two logging analysis methods:


-Pattern detection and recognition filters messages based on a pattern book.
-Correlation analysis involves collating logs from different sources and systems
and sorting messages that pertain to a particular event.

6. Outline two types of security measures that can be put in place in a network.

-Firewalls – this will control incoming and outgoing traffic on networks.


-Email Security
- Remote access VPN
- Antivirus Software – licensed version

7. List a type of software that can be used for network security and summarise its capabilities.

- Network security monitoring software – enable us to perform real time


network monitoring, advanced access control and prevent data leakage
and other threats.

- VPN is used to authenticate the communication between the network and a


device.

ANIT Australia Pty Ltd t/a Albright Institute of Business and Language | RTO: 45041 | CRICOS: 03553J |P.4
1300 189 154 | Level 2, 341-345 Queen Street, Melbourne VIC 3000 | www.albrightinstitute.edu.au | v 2.0
8. List a type of hardware that can be used for network security and summarise its capabilities.

Firewall – security device that monitors and filters incoming and outgoing network
traffic and it decides whether to allow or block the connection and prevents
unauthorized access to the network.
An organization may choose to deploy a software-based firewall as well. The
main difference between a hardware firewall and a software firewall is that the
hardware firewall runs on its own physical device, while a software firewall is
installed on another machine.

9. Given the importance of network security, describe the key features that a network security policy
should include, as well as procedures that should be included.

Access and control of propriety data and personal data. Physical security protocols for
dealing with visitors, locking doors, etc definitions. Password policy. Acceptable use policy
for email, internet browsing, social media etc.
Network management and security process controls that can be put in place to ensure
network security. This includes network control, developing security policies and
implementing it.

Network security management and security policies should cover below:

1. Protecting sensitive information: Network security helps protect sensitive


information, such as financial data, personal information, and confidential
business information, from unauthorized access, theft, and exploitation.
2. Preventing cyber-attacks: Network security helps prevent cyber attacks, such as
malware, phishing, and denial-of-service attacks, that can cause damage to
systems and data.
3. Ensuring business continuity: Network security helps ensure that business
operations can continue uninterrupted in the event of a security breach or
failure.
4. Compliance with regulations: Network security is often a requirement for
organizations that must comply with regulations, such as the Payment Card
Industry Data Security Standard (PCI DSS) or the General Data Protection
Regulation (GDPR).
5. Protecting against data loss: Network security helps protect against data loss,
whether it is accidental or intentional, and helps ensure that valuable
information is not lost or damaged.

In summary, network security is essential for protecting an organization's assets,


maintaining business continuity, and complying with legal and regulatory requirements. It
is a crucial component of an organization's overall security strategy.

ANIT Australia Pty Ltd t/a Albright Institute of Business and Language | RTO: 45041 | CRICOS: 03553J |P.5
1300 189 154 | Level 2, 341-345 Queen Street, Melbourne VIC 3000 | www.albrightinstitute.edu.au | v 2.0
10. Outline two network management and security process controls that can be put in place to ensure
network security.

Network security policy process can be put to ensure network security. Network
security essential make access and limiting the access to have a network secured
for efficient network management operations. E.g., network monitoring including
logs reports strategies. Other network security include:
- Networking monitoring including checking logs for errors
- Audit the network and check security controls.
- Revisit and communicate security policies with users and vendors

11. Explain the importance of a risk management plan and procedures in network security
implementation.

Risk management plan is an important process because it empowers a business with the
necessary tools so that it can adequately identify and deal with potential risks. Once a risk
has been identified, it is then easy to mitigate it.
In general risk can be categories into three parts, low level risk, mid-level risk and high-
level risk. Low level risk the network administer should look after the network on a regular
basis. For mid-level risk in addition to looking after the network on a regular basis the
network administrator should have some strategies in place as a part of incident
response. For a high level risk the network level administrator should take some immediate
action so that further disruption does not take place.

12. Outline the process of developing risk management plans and procedures as part of network
security planning.

Risk management plans and procedures are developed as a part of network security
design. They are designed focusing on stakeholder requirements. Organisational
requirements to protect network vulnerabilities for the security planning organisations can
involve different subjective and objective resources. Firewall with the help of IT personnel
can help the network protected to prevent data loss, theft or corruption and network
failure.
Process to develop risk management plan:
- Step 1: Define the scope and objectives.
- Step 2: Identify the assets and threats.
- Step 3: Analyze the vulnerabilities and impacts.
- Step 4: Role and responsibilities to work on the risk.
- Step 5: Evaluate and prioritize the risks.
- Step 6: Implement and document the controls.

Procedures
- Identify risk
- Investigate
- TakeAustralia
ANIT actionPty Ltd t/a Albright Institute of Business and Language | RTO: 45041 | CRICOS: 03553J |P.6
- Recover
1300 189 154 | Level 2, 341-345 Queen Street, Melbourne VIC 3000 | www.albrightinstitute.edu.au | v 2.0
- Report
13. Explain how risk management should be built into cost analysis and budgeting of network
security. Give an example to illustrate your answer.

Risk management is very important to be built in the network to ensure that


proper network security devices could be purchased and maintained which are
included within the budget of the organisation e.g, firewall, network switch,
router, cisco devices etc.
Risk management can be used to measure the impacts and probability and use
estimated cost in justifying the budget and this should be budgeted in CAPEX /
OPEX.

ANIT Australia Pty Ltd t/a Albright Institute of Business and Language | RTO: 45041 | CRICOS: 03553J |P.7
1300 189 154 | Level 2, 341-345 Queen Street, Melbourne VIC 3000 | www.albrightinstitute.edu.au | v 2.0

You might also like