0% found this document useful (0 votes)
61 views44 pages

ICT202 Webinar-Week 1

The document discusses a group presentation on the management analysis of Australia Post, including an overview of its leaders and their leadership styles, how their leadership has helped the company adapt to changing markets, and the functions and challenges of Australia Post as one of the largest postal services in the world.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
61 views44 pages

ICT202 Webinar-Week 1

The document discusses a group presentation on the management analysis of Australia Post, including an overview of its leaders and their leadership styles, how their leadership has helped the company adapt to changing markets, and the functions and challenges of Australia Post as one of the largest postal services in the world.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 44

Group Presentation

“Management Analysis of Australia Post:


Leaders, Situations, Strengths, Challenges, and
Functions”

Courtesy of Pixabay
1
Introduction
1. Australia Post is a government-owned corporation that provides postal, retail, financial, and
digital services to customers across Australia.
2. The company was established in 1809 and has since become an iconic Australian brand, with
a reputation for reliability and trustworthiness.
3. In this slide, we will discuss the top leaders of Australia Post and their leadership style.
4. We will also explore how their leadership style has helped the company adapt to the changing
market dynamics and stay ahead of its competitors.
5. Did you know that Australia Post delivers over 3 billion letters and parcels each year, making
it one of the largest postal services in the world?

2
Objective:
• By the end of this slide, you will have a clear understanding of the top
leaders of Australia Post and their leadership style.
• You will also learn how their leadership style has helped the company
adapt to the changing market dynamics and stay ahead of its competitors.

3
ICT 202 Cyber Security
Unit Coordinator: Dr. Saman Shojae
Lecturer: Dr. Saman Shojae

Any Questions?

Email:
[email protected]

4
Unit Learning Outcomes

LO2. Appreciate and


LO1 Understand and
explain appropriate LO3. Assess and apply
explain the importance
governance, assurance security management
of information security
and internal control standards and
in achieving
techniques for managing frameworks to real-word
organizational goals and
information risks and case based scenarios
objectives
security
LO4. Understand and
apply major theories,
LO6. Evaluate
concepts and LO5. Identify and
protection mechanisms
methodologies for mitigate possible risks
and authentication and
assuring the integrity and attacks
encryption systems
and security of
information assets

5
Learning Resources

Recommended Reading
Prescribed Text (PT): Lynda
Whitman, M. E., & https://www.lynda.com
PT: Michael, G &
Mattord, H. J. /IT-Infrastructure-
Roberto, T. Introduction
Principles of tutorials/Practical-
to Computer Security,
Information Security, Cybersecurity/164982-
Global Edition.
6th Edition. Cengage 2.html
Pearson.
Learning, USA.

6
Assessment Tasks
No Name Type Description ULO Week %
1 Practical Labs Labs in Packet Tracer Practical Labs to design and LO3, LO4, LO6 3, 6, 9, 11 40
deploy various security In-class
technologies  
2 Report and presentation Case study Analyse the designing and 8 40
security of the chosen real-world LO1, LO2,
organization, find its security LO3, LO4,
problems, and discuss the correct LO5, LO6
design/technologies
3 Practical assessment Practical assessment in Design, implement, and secure a LO3, LO4, LO5, LO6 12 20
  Packet Tracer network in Packet Tracer   In-class
 

7
Pre-Requisite of Unit

ICT102 Technology and Networks

8
The Internet: A “Nuts and Bolts” view
Billions of connected mobile network
computing devices: national or global ISP
 hosts = end systems
 running network apps at
Internet’s “edge”

Devices : forward packets


local or
(chunks of data) Internet
regional ISP
 routers, switches
home network content
Communication links provider
network datacenter
 fiber, copper, radio, satellite network

 transmission rate: bandwidth


Networks enterprise
 collection of devices, routers, network
links: managed by an organization
Kurose, J., & Ross, K. (2017). Computer Networking: A Top-Down Approach, Global Edition.
The Internet: A “Nuts and Bolts” View
mobile network
 Internet: “network of networks” 4G
national or global ISP
• Interconnected ISPs

Streaming
 Protocols are everywhere Skype
IP
video
• control sending, receiving of messages
local or
• e.g., HTTP (Web), Skype, TCP, IP, WiFi, regional ISP
4G, Ethernet
home network content
provider
HTTP network
Internet Standards
datacenter
 network
Ethernet
• Defined by IETF: Internet Engineering
Task Force TCP
enterprise
• Request for Comments (RFC): network
Standard documents WiFi
Kurose, J., & Ross, K. (2017). Computer Networking: A Top-Down Approach, Global Edition.
The Internet: A “services” View

 Infrastructure that provides services to mobile network

applications: national or global ISP

• Web, streaming video, multimedia


teleconferencing, email, games, e-commerce, Streaming
social media, inter-connected appliances, … Skype video

 It allows sending/receiving apps to “connect” local or


regional ISP
to each other, use Internet transport service
home network content
provider
HTTP network datacenter
network

enterprise
network

Kurose, J., & Ross, K. (2017). Computer Networking: A Top-Down Approach, Global Edition.
Internet Protocol (IP) Address
• IP address
• IPv4 example: 203.2.218.214
• IPv6 example: 2001:0db8:85a3:0042:1000:8a2e:0370:7334

• IP address is just like your postal address


• Changes with your location
• Every device must have a unique IP address to communicate over the internet
• Find your IP address using ipconfig/all on the command prompt

TEQSA: PRV14311
CRICOS: 03836J 12
What’s a Protocol?
Human Protocols: Network Protocols:
 “what’s the time?”  Computers (devices) rather than humans
 “I have a question”  All communication activity in Internet
governed by protocols
 introductions

Protocols define the format, order of


Rules for:
messages sent and received among
… specific messages sent
network entities, and actions taken
… specific actions taken
when message received
on message transmission, receipt
Kurose, J., & Ross, K. (2017). Computer Networking: A Top-Down Approach, Global Edition.

TEQSA: PRV14311
CRICOS: 03836J 13
What’s a Protocol?
A human protocol and a computer network protocol:

Hi TCP connection
request
Hi TCP connection
response
Got the
time? GET http://gaia.cs.umass.edu/kurose_ross
2:00
<file>
time
Q: other human protocols? Kurose, J., & Ross, K. (2017). Computer Networking: A Top-Down Approach, Global Edition.

TEQSA: PRV14311
CRICOS: 03836J 14
Packet Switching
Today’s internet is a packet switched network
Data is divided into packets and sent to the destination
 Each packet contains a portion of user data plus some control info.
 Each packet has to find its own route to the destination
 No predetermined path
 Decision as to which node to hop to in the next step is taken only when a
node is reached.
 Resources used as needed
 Congestion in routers: packets queue, wait for link use
 Less reliable
Kurose, J., & Ross, K. (2017). Computer Networking: A Top-Down Approach, Global Edition.

TEQSA: PRV14311
CRICOS: 03836J 15
The Network Core
 Mesh of interconnected routers mobile network
national or global ISP
 Packet-switching: hosts break data
from applications into packets
• Network forwards packets from
one router to the next, across links local or
regional ISP

on path from source to destination home network content


provider
network datacenter
network

enterprise
network

Kurose, J., & Ross, K. (2017). Computer Networking: A Top-Down Approach, Global Edition.
Protocol Layers

Networks are complex!


Question:
• many “pieces”:
• hosts Is there any way of organizing
• routers
network architecture?
• links of various media
• applications Answer:
• protocols Yes, possible with a layered
• hardware, software architecture

Slide form Ross, K. and Kurose, J., 2016. Computer Networking: A Top-Down Approach, Global Edition.

TEQSA: PRV14311
CRICOS: 03836J
Example: Organization of Air Travel

end-to-end transfer of person plus baggage


ticket (purchase) ticket (complain)
baggage (check) baggage (claim)
gates (load) gates (unload)
runway takeoff runway landing
airplane routing airplane routing
airplane routing

How would you define/discuss the system of airline travel?


 a series of steps, involving many services
Slide form Ross, K. and Kurose, J., 2016. Computer Networking: A Top-Down Approach, Global Edition.
Example: Organization of Air Travel

ticket (purchase) ticketing service ticket (complain)


baggage (check) baggage service baggage (claim)
gates (load) gate service gates (unload)
runway takeoff runway service runway landing
airplane routing routing service
airplane routing airplane routing

layers: each layer implements a service


 via its own internal-layer actions
 relying on services provided by layer below
Slide form Ross, K. and Kurose, J., 2016. Computer Networking: A Top-Down Approach, Global Edition.
Why Layering?
 Dealing with complex systems
Discuss a well defined, specific part of a large and complex system
Modularization eases maintenance, updating of system
Change of implementation of layer’s service transparent to rest of
system
e.g. change in gate procedure doesn’t affect rest of system

Slide form Ross, K. and Kurose, J., 2016. Computer Networking: A Top-Down Approach, Global Edition.
TCP/IP Protocol Stack
 To provide structure to design of network
protocols, network designers organize
protocols in layers
 Service – says what a layer does
 Protocol – says how the service is
implemented
 Advantages
 When taken together the protocols of
various layers are called the Protocol
Stack.
 Internet Protocol Stack consists of Five
layers
 Physical, Link, Internet or Network,
Transport and Application layers. Slide form Ross, K. and Kurose, J., 2016. Computer Networking: A Top-Down Approach, Global Edition.
TCP/IP Protocol Stack
• Application Layer:

• Network applications and their application layer protocols reside.


• Provides user interfaces and support for services such as e-mail, file transfer etc.
• Hyper Text Transfer Protocol (HTTP)
• File Transfer Protocol (FTP)

• An application layer protocol is distributed over multiple end systems


• The packets of information at the application layer is called as a message.

Slide form Ross, K. and Kurose, J., 2016. Computer Networking: A Top-Down Approach, Global Edition.
TCP/IP Protocol Stack
• Transport Layer:

• Transports application-layer messages between application end points.

• Transport layer packet is called as a segment

• Breaks long messages into shorter segments

• There are two Transport Layer Protocols

• Transmission Control Protocol (TCP) --- For Web browsing, File Transfer, Email
• User Datagram Protocol (UDP) --- For Real time video streaming, Skype calls
Slide form Ross, K. and Kurose, J., 2016. Computer Networking: A Top-Down Approach, Global Edition.
TCP/IP Protocol Stack
• Network Layer or Internet Layer:

• Responsible for moving network layer packets known as datagrams from one host
to another.
• Transport layer passes a transport layer segment and a destination IP address to
the network layer.
• Network layer includes IP Protocol
• Defines the fields in the datagram as well as how end systems and routers act
on these fields
• Commonly referred as IP layer.
• Different routing protocols.
• Determine the route that datagrams take between source and destination

Slide form Ross, K. and Kurose, J., 2016. Computer Networking: A Top-Down Approach, Global Edition.
TCP/IP Protocol Stack
• Link Layer:

Moves a packet from one node (host or router) to the next node in the
route.
Divide the stream of bits received from the network layer into manageable
data units called frames.
Transforms a raw transmission facility to a reliable link.
Mechanism to detect and retransmit damaged or lost frames
Example of link layer protocols include WiFi, Ethernet etc.

Slide form Ross, K. and Kurose, J., 2016. Computer Networking: A Top-Down Approach, Global Edition.
TCP/IP Protocol Stack
• Physical Layer:

The job of this layer is to move the individual bits within frames from one
node to next.

Representation of bits
Physical Layer data consists of a stream of bits (0 or 1)
Generate signals to transfer bits.
The protocol in this layer depend on the actual transmission medium
of the link.

Slide form Ross, K. and Kurose, J., 2016. Computer Networking: A Top-Down Approach, Global Edition.
TCP/IP Protocol Stack
 Application: Provides user interfaces and support for services
such as e-mail, file transfer etc. Application
 FTP, HTTP
 Transport: Transports application-layer messages between
Transport
application end points.
 Segmentation and reassembly
 TCP, UDP Network
 Network: Routing of Datagrams from source to destination
Link
 IP, routing protocols
 Link: Move a packet from one node (host or router) to the next node in Physical
the route.
 Ethernet, WiFi

 Physical: Move the individual bits with in frames from one node to next

Slide form Ross, K. and Kurose, J., 2016. Computer Networking: A Top-Down Approach, Global Edition.
OSI Reference Model

• In 1970 International Organization for Standardization


proposed a seven layered model called Open Systems
Interconnection (OSI) model.

• Presentation Layer: Provide services such as data


encryption, compression.

• Session Layer: Synchronization points (checkpointing)


and recovery of data exchange.

• TCP/IP stack “missing” these layers!


• these services, if needed, must be implemented in the
application by the application developer.
Slide form Ross, K. and Kurose, J., 2016. Computer Networking: A Top-Down Approach, Global Edition.
Encapsulation and De-Encapsulation
M

application M application
message
Ht M
transport Ht M
transport
segment
Hn Ht M Hn Ht M
network network
datagram

Hl Hn Ht M Hl Hn Ht M
link link
frame

physical physical

source destination

Slide form Ross, K. and Kurose, J., 2016. Computer Networking: A Top-Down Approach, Global Edition.
message M
source
application
Encapsulation and
segment
datagram Hn Ht
Htt M
M
transport
network
De-Encapsulation
frame Hl Hn Ht M link
physical
link
physical

switch

destination Hn Ht M network
M application Hl Hn Ht M link Hn Ht M
Ht M transport physical
Hn Ht M network
Hl Hn Ht M link router
physical
Slide form Ross, K. and Kurose, J., 2016. Computer Networking: A Top-Down Approach, Global Edition.
Network Basics

https://www.youtube.com/watch?v=rIZ61PyDkH8&list=PLR0bgGon_WTKY2irHaG_lNRZTrA7gAaCj&index=1

TEQSA: PRV14311
CRICOS: 03836J 31
What is Security?
• “A state of being secure and free from danger or harm; the actions taken to make
someone or something secure.”

• A successful organisation should have multiple layers of security in place to protect:

Operations Physical People Functions Communication Information


Infrastructure Whitman, M & Mattord, J 2018, Principles of Information Security, 6th Edn, Cengage Learning, USA.

TEQSA: PRV14311
CRICOS: 03836J 32 32
Cyber Security Fundamentals
• An important aspect of computer security is the identification of vulnerabilities in
computer systems, which can, for instance, allow a malicious user to gain access to
private data and even assume full control of a machine.
• Vulnerabilities enable a variety of attacks.
• Analysis of these attacks can determine the severity of damage that can be inflicted
and the likelihood that the attack can be further replicated.
• Actions that need to be taken to defend against attacks include
• Identifying compromised machines
• Removing the malicious code
• Patching systems to eliminate the vulnerability

TEQSA: PRV14311
CRICOS: 03836J 33
Confidentiality, Integrity and Availability (CIA)

Whitman, M & Mattord, J 2018, Principles of Information Security, 6th Edn, Cengage Learning, USA.

TEQSA: PRV14311
CRICOS: 03836J 34
Confidentiality
• In the context of computer security, confidentiality is the avoidance of the
unauthorized disclosure of information.
• Confidentiality involves the protection of data, providing access for those who are
allowed to see it while disallowing others from learning anything about its content.
• Tools to Protect Sensitive Information
• Encryption
• Access Control
• Authentication
• Authorization
• Physical Security

TEQSA: PRV14311
CRICOS: 03836J 35
Encryption
• The transformation of information using a secret, called an
encryption key, so that the transformed information can only be
read using another secret, called the decryption key (which may, in
some cases, be the same as the encryption key).
• To be secure, an encryption scheme should make it extremely
difficult for someone to determine the original information
without use of the decryption key.

TEQSA: PRV14311
CRICOS: 03836J 36
Access Control
• Rules and policies that limit access to confidential information to
those people and/or systems with a “need to know.”
• This need to know may be determined by
• Identity, such as a person’s name or a computer’s serial
number, or
• A role that a person has, such as being a manager or a
computer security specialist.

TEQSA: PRV14311
CRICOS: 03836J 37
Authentication

• The determination of the identity or role that someone has.


• This determination can be done in a number of different ways,
but it is usually based on
• Something the person has (like a smart card)
• Something the person knows (like a password)
• Something the person is (like a human with a fingerprint).

TEQSA: PRV14311
CRICOS: 03836J 38
Authentication

TEQSA: PRV14311
CRICOS: 03836J 39
Authorization and Physical Security
• Authorization
• The determination if a person or system is allowed access to resources,
based on an access control policy.
• Such authorizations should prevent an attacker from tricking the system
into letting him have access to protected resources.
• Physical Security
• The establishment of physical barriers to limit access to protected
computational resources.
• Such barriers include locks on cabinets and doors etc.

TEQSA: PRV14311
CRICOS: 03836J 40
C.I.A Triad

https://www.youtube.com/watch?v=szcmb-lcYV4

TEQSA: PRV14311
CRICOS: 03836J 41 41
Your Tasks For The Week

• Read Chapter 1 of the prescribed Textbook


• Revise your Networking Concepts
• Revise today’s lecture
• Watch videos that were mentioned in today’s lecture

42
What’s coming up in the next week?

• Integrity
• Availability
• Types of Attacks
• Encryption Mechanisms

43
Any Questions?

44

You might also like