0% found this document useful (0 votes)
97 views11 pages

ICTWK546 Manage Network Security

Uploaded by

Nilesh Prasad
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
97 views11 pages

ICTWK546 Manage Network Security

Uploaded by

Nilesh Prasad
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 11

PORTFOLIO

Student Version

ICTNWK546
Manage network security
C ONT ENTS
Section 1: Security design preparation 4
Section 2: Security design and policy 10
Student name: Nilesh Nischal Prasad

Assessor:

Date:

Business this assessment is


based on:

ICTNWK546 Manage network security | 3


Section 1: Security design preparation

Network security Planning


planning
-The overall goal is to create an optimum security system
Provide an outline of the
processes you will use
for the network. This will involve discussion of the hardware,
to plan, build and software, firewalls and security devices that needs to be
manage a network purchased as per the company budget.
security design to meet
the organisation’s - router
requirements.
- switches

- servers

- CCTV

- firewall

- cabling

-Server racks

- Switch Racks

- ISP routers

- Screen console – KPM switches

-PC’S

- UPS

- Software licenses

- Windows operating system and license

- Antivirus

- Printers

Building

In the building phase, network administrators and security


specialist use he available hardware and software to
create the security system as set out in the security design.
In building phase, network administrator and security
specialist use the available hardware and software to
create the security system as per security planning and
design. The administrators will also develop, test and
deploy security templates and policies.

ICTNWK546 Manage network security | 4


Security policy includes:

- User identification and password – strong password


policy including letter, numbers and symbol
- Threat Data policy – name of the administrator that will
have access to database.
- Security policy – computer should not be left long
period of time. Enforce security policies to the PC is
locked if not in use for the period of time.
- IT equipment should not be removed from the premises

Managing

After the security design has been implemented, the


administrator is responsible for managing the design to
ensure it provides the security envisioned by the security
design. The network administrator will ensure that the
policy implemented is working properly. If there is issues
with the policy, it will be reported to the specialist and
rectified.

ICT assets Aseets Value


Provide an overview of
the organisation’s Data and Information High Value – critical data
assets that need and required by the
protecting. Remember organisation
assets are not just
physical assets.
Computers High Value- computer and
Categorise each of the servers are expensive
assets in terms of their
equipment and requires to
value. The value does
not need to be a be fully operational for the
monetary value but network / IT LAN to
instead can be based on function.
the value to the
organisation e.g., high, Routers Medium Value – router is
medium, low, etc.
required for LAN to
operational. This can be
replaced by 3rd party
vendor under SLA
agreement.

Bridges Medium Value – Bridges is


required for LAN to be
operational. This can be
replaced by 3rd party

ICTNWK546 Manage network security | 5


vendor under SLA
agreement.

Printer Low value – printers can be


replaced with new one at
cheaper cost.

Threat modelling Malware – Malicious software, program or code that is


Describe at least three harmful to systems
major threats to network
security that can happen
- Computer slows down
to any organisation, as - Your system crashes
well as where these
threats originate from. - Loss of disk space
For each threat, - Your screen is inundated with annoying ads
describe a system
vulnerability that may - There is weird increase in your systems Internet activity
have led to the threat.
- Your browser settings change

- You lose access to your files or your entire computer

Types of Malware

- Adware – unwanted software designed to throw


advertisements up on your screen.

- Spyware – secretly observes the computer user activity

- Virus – attaches to another program

- Randsomeware attack – that locks out you from PC


and requires to pay a randsome to regain access

- Trojan horse

ICTNWK546 Manage network security | 6


Phishing

Phishing is a type of social engineering attack often used


to steal user data, including login credentials and credit
card numbers. It occurs when an attacker, masquerading
as a trusted entity, dupes a victim into opening an email,
instant message, or text message. The recipient is then
tricked into clicking a malicious link, which can lead to the
installation of malware, the freezing of the system as part
of a ransomware attack or the revealing of sensitive
information.

SQL Injection

- SQL (Level – physical (data is extracted, logical


(Processing) and view level.

- SQL injection – Denied your access to database,


malicious information

- SQL Injection refers to the vulnerability that allows


cybercriminals to exploit SQL code in order to
manipulate RDBMS procedure that reply on SQL.

Type of SQL Injection

- Hidden data retrieval. Change the SQL query such that


it can access hidden database entities.

- Logic subversion – Manipulating application logic or


using query to interfere with the expected use of
application.

Signs of SQL Injection

- Large volume of queries with unexpected structure

- Frequent redirects, ads and popups linked to your


website.

- Access request to database metadata and structure


information

- Requests about the structure of dynamic SQL queries

- Unexpected behaviour of the application.

ICTNWK546 Manage network security | 7


IP address spoofing

- IP spoofing is the creation of internet protocol packets


which have a modified source address in order to
either hide the identity of the sender. IP Spoofing is
analogous to an attacker sending a package to
someone with the wrong return address listed.

Risk management plan Threats Level of Risk Risk Control


For each of the threats
you have identified, Malware Likely -Antivirus software
identify the level of risk Significant
that the threat presents
(use a risk legend to do Phishing Significant -Install Phishing
this). prevention tool or
Rank the threats in hardware to detect
order of severity from and block phishing
least severe to most emails and train end
severe. users not to open
Outline a risk control any links that is not
relevant to each threat. business related.
Use the table included
- Strong Password
in the Portfolio to SQL injection Likely
parameters
develop your plan. Significant
- Third-party
authentication.
- Web application
firewall.
- Always update
and use patches.
-Continuously
monitor SQL
statements and
database.

IP address Spoofing Medium - Install firewall on


network

ICTNWK546 Manage network security | 8


- Use VPN

- Visit secure sites


that uses https
protocol

- Install Antivirus
software with
firewall protection
enabled

IT Risk register - Refer end of this document

Presentation LAN Network Diagram – Refer end of this document


Write the title of your
presentation here and
attach it to your
Portfolio.

Attach:
Presentation ☒

ICTNWK546 Manage network security | 9


Section 2: Security design and policy

Network security design Configure Firewall – Refer end of this document


Provide an overview of
your design to protect
network security.
Include screenshots to
illustrate your work as
required.
Make sure you take into
account manufacturer’s
recommendations for use
of the tools you will
incorporate into your
design. Write about how
you have done this.
Further, include the costs
of the equipment/software
you have identified and
document them here.

Security policies IT Security Policy – Refer end of this document


Develop and document
security policies to
accompany your network
security design.
Your security policy must
include as a minimum:

 Purpose of the policy.

 Key procedures
relevant to maintaining
security e.g., identity
management, threat
management
(including incident
response procedures)
and auditing
procedures.
As a guide your policy
should be 2 – 3 pages.
Write the name of your

ICTNWK546 Manage network security | 10


policy here and attach it
your Portfolio.

Feedback Feedback Template – Refer end of this Document


Write the feedback you
received here and your
response to it.

ICTNWK546 Manage network security | 11

You might also like