docx

School

Australian College of Business and Technology, Colombo *

*We aren’t endorsed by this school

Course

ICT

Subject

Information Systems

Date

Jun 12, 2024

Type

docx

Pages

35

Uploaded by CommodoreFireFox42

Report
Student Assessment Guide: ICTCYS612 Design and implement virtualized cyber security infrastructure for organizations
ICT60220 Advanced Diploma of Information Technology Student Assessment Guide: ICTCYS612 Design and implement virtualized cyber security infrastructure for organizations Copyright 2023 Australian College of Business Intelligence All rights reserved Version: 23.0 Date Modified: July 2023 No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording or otherwise without the prior written permission of the Australian College of Business Intelligence. Disclaimer: The Australian College of Business Intelligence does not invite reliance upon, nor accept responsibility for, the information it provides. The Australian College of Business Intelligence makes every effort to provide a high-quality service. However, neither the Australian College of Business Intelligence, nor the providers of data, gives any guarantees, undertakings or warranties concerning the accuracy, completeness or up-to-date nature of the information provided. Users should confirm information from another source if it is of sufficient importance for them to do so. Student Assessment Guide: ICTCYS612 Version: v23.0 Page 2 of 35 Developed by: ACBI Approved by: DoS Issued: July 2021 Review: July 2023
ICT60220 Advanced Diploma of Information Technology Student Assessment Guide: ICTCYS612 Design and implement virtualized cyber security infrastructure for organizations Content s 1. Assessment Information ...................................................................................................... 4 A. Purpose of assessment ........................................................................................................................ 4 B. What you are required to do ............................................................................................................... 4 C. Competencies being assessed ............................................................................................................. 4 D. Important resources for completing this assessment ......................................................................... 5 E. A note on plagiarism and referencing .................................................................................................. 6 F. A note on questions with role plays ..................................................................................................... 6 G. Instructions for completing this assessment ....................................................................................... 6 2. Assessment Coversheet ....................................................................................................... 8 3. Assessment Questions ......................................................................................................... 9 A. Task A - Demonstrate knowledge of virtualized cyber security infrastructure .................................... 9 B. Task B - Plan infrastructure ............................................................................................................... 14 C. Task C - Implement infrastructure ..................................................................................................... 18 D. Task D - Test infrastructure ............................................................................................................... 18 4. Student Self Checklist ........................................................................................................ 20 Student Assessment Guide: ICTCYS612 Version: v23.0 Page 3 of 35 Developed by: ACBI Approved by: DoS Issued: July 2021 Review: July 2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
ICT60220 Advanced Diploma of Information Technology Student Assessment Guide: ICTCYS612 Design and implement virtualized cyber security infrastructure for organizations 1. Assessment Information A. Purpose of assessment This assessment will develop your skills and knowledge required to research, design, implement and test virtualised cyber security infrastructure in a small to medium sized organisation. B. What you are required to do For this assessment, you are required to complete 4 tasks: Task A – Demonstrate knowledge of virtualized cyber security infrastructure Task B – Plan infrastructure Task C – Implement infrastructure Task D – Test infrastructure All tasks of this assessment require you to use the provided case study information relating to the fictional company Bains & Co. C. Competencies being assessed Elements To achieve competency in this unit you must demonstrate your ability to: 1. Prepare to design infrastructure 2. Design and plan infrastructure 3. Implement infrastructure 4. Test infrastructure Performance Evidence Evidence of the ability to: Student Assessment Guide: ICTCYS612 Version: v23.0 Page 4 of 35 Developed by: ACBI Approved by: DoS Issued: July 2021 Review: July 2023
ICT60220 Advanced Diploma of Information Technology Student Assessment Guide: ICTCYS612 Design and implement virtualized cyber security infrastructure for organizations Design and implement cyber security infrastructure and review results against organisational needs on at least two different occasions Knowledge Evidence You must demonstrate knowledge of: Features and implementation methodologies of cyber security Cyber security infrastructure features including: o Application security o Business continuity planning o Disaster recovery planning o Operational security (OPSEC) o Threat vectors Organisational business processes and applicable cyber security requirements design and implementation Organisational procedures applicable to designing and implementing cybersecurity infrastructure, including: o Documenting established requirements, risks and work performed o Establishing requirements and features of cyber security infrastructure o Establishing maintenance and alert processes o Testing methods and procedures Security risks, and tolerance of risk in an organisation Industry standard cyber security providers Industry standards and regulations applicable to implementing cyber security infrastructure in an organisation Organisation, infrastructure and cyber security requirements. For further information on the competencies of this unit, please refer to: https://training.gov.au/Training/Details/ICTCYS612 D. Important resources for completing this assessment To complete this assessment, please refer to the following resources provided on Moodle: ICTCYS612 Design and implement virtualized cyber security infrastructure for organizations learner guide ICTCYS612 Observation checklist ICTCYS612 Marking Guide ICTCYS612 Case study folder Additional student assessment information Student Assessment Guide: ICTCYS612 Version: v23.0 Page 5 of 35 Developed by: ACBI Approved by: DoS Issued: July 2021 Review: July 2023
ICT60220 Advanced Diploma of Information Technology Student Assessment Guide: ICTCYS612 Design and implement virtualized cyber security infrastructure for organizations E. A note on plagiarism and referencing Plagiarism is a form of theft where the work, ideas, inventions etc. of other people are presented as your own. When quoting or paraphrasing from a source such as the Internet, the source must be recognised. If you are quoting a source, make sure to acknowledge this by including “quotation marks” around the relevant words/sentences or ideas. Note the source at the point at which it is included within your assessment, such as by using a citation. Then list the full details of the source in a ‘references’ section at the end of your assessment. All sources used for your assessment should be detailed in a ‘references’ section. It is advisable to never copy another person’s work. F. A note on questions with role plays Task B, Question B7 involves a role play. For this question, as outlined below, you will be assessed on your ability to role play being an IT manager at WESEC, a company specialized in providing secretarial services for corporate organisations. This question requires you to lead a meeting and take notes on what is discussed. Please note: You will also need to attend separate meetings organised by other students whereby you role play being other people. This allows other students in your unit to also role play being the Senior Human Resources Manager. G. Instructions for completing this assessment Answer the questions below using the spaces provided: Answer all parts of each question Use your own words and give examples wherever possible The quality of your answer is more important than how long it is Enter your answers in this document You may use various sources of information to inform your answers, including your resources provided by ACBI, books, and online sources. You must acknowledge and cite your sources. Student Assessment Guide: ICTCYS612 Version: v23.0 Page 6 of 35 Developed by: ACBI Approved by: DoS Issued: July 2021 Review: July 2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
ICT60220 Advanced Diploma of Information Technology Student Assessment Guide: ICTCYS612 Design and implement virtualized cyber security infrastructure for organizations Submission via Moodle Please refer to the “Instructions for Submitting Your Assessment” found within the unit course page on Moodle. NOTE: Please take care to follow all instructions listed. Assessments uploaded with a draft status on Moodle may not be graded. Student Assessment Guide: ICTCYS612 Version: v23.0 Page 7 of 35 Developed by: ACBI Approved by: DoS Issued: July 2021 Review: July 2023
ICT60220 Advanced Diploma of Information Technology Student Assessment Guide: ICTCYS612 Design and implement virtualized cyber security infrastructure for organizations 2. Assessment Coversheet Candidate Name: Student ID: Contact Number: Email: Trainer / Assessor Name: Qualification: ICT60220 Advanced Diploma of Information Technology Units of Competency: ICTCYS612 Design and implement virtualized cyber security infrastructure for organizations Assessment Tasks: A. Demonstrate knowledge of virtualized cyber security infrastructure B. Plan infrastructure C. Implement infrastructure D. Test infrastructure Due Date: Date Submitted: Declaration: I have read and understood the following information at the beginning of this assessment guide (please tick): Assessment information Submitting assessments Plagiarism and referencing I declare this assessment is my own work and where the work is of others, I have fully referenced that material. Name (please print): Candidate signature: Date: 3. Assessment Questions Student Assessment Guide: ICTCYS612 Version: v23.0 Page 8 of 35 Developed by: ACBI Approved by: DoS Issued: July 2021 Review: July 2023
ICT60220 Advanced Diploma of Information Technology Student Assessment Guide: ICTCYS612 Design and implement virtualized cyber security infrastructure for organizations A. Task A - Demonstrate knowledge of virtualized cyber security infrastructure Task A instructions Answer the following questions to demonstrate your knowledge of virtualized cyber security infrastructure. A1. Describe governance and protection principles of cyber security. NOTE: Refer to https://www.cyber.gov.au/acsc/view-all-content/guidance/cyber-security-principles to inform your answer. Answer in 100-200 words. Write your answer here A2. Explain which of the following methods can be used to protect against these cyber security threats: a. Malware b. Emotet c. Denial of Service d. Man in the Middle e. Phishing f. SQL Injection g. Password Attacks Answer in 100-200 words. Write your answer here Student Assessment Guide: ICTCYS612 Version: v23.0 Page 9 of 35 Developed by: ACBI Approved by: DoS Issued: July 2021 Review: July 2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
ICT60220 Advanced Diploma of Information Technology Student Assessment Guide: ICTCYS612 Design and implement virtualized cyber security infrastructure for organizations A3. Describe what kind of cyber security infrastructure you can use and features of that cyber security infrastructure for the following important areas of cyber security: a. Application security b. Business continuity planning c. Disaster recovery planning d. Operational Security (OPSEC) e. Threat vectors Answer in 200-400 words. Write your answer here A4. Describe how cyber security can be designed and implemented for an organizational business process. Answer in 100-200 words. Write your answer here A5. Describe organisational procedures applicable to designing and implementing cybersecurity Student Assessment Guide: ICTCYS612 Version: v23.0 Page 10 of 35 Developed by: ACBI Approved by: DoS Issued: July 2021 Review: July 2023
ICT60220 Advanced Diploma of Information Technology Student Assessment Guide: ICTCYS612 Design and implement virtualized cyber security infrastructure for organizations infrastructure for the following processes: Documenting established requirements, risks and work performed Establishing requirements and features of cyber security infrastructure Establishing maintenance and alert processes Testing methods and procedures Answer in 200-400 words. Write your answer here A6. Explain key security risks for small to large enterprises today. Answer in 100-200 words. Write your answer here A7. Explain tolerance of risk in an organisation. Answer in 100-200 words. Write your answer here Student Assessment Guide: ICTCYS612 Version: v23.0 Page 11 of 35 Developed by: ACBI Approved by: DoS Issued: July 2021 Review: July 2023
ICT60220 Advanced Diploma of Information Technology Student Assessment Guide: ICTCYS612 Design and implement virtualized cyber security infrastructure for organizations A8. Research three industry standard cyber security providers. Identify who they are and what products or services they offer. Answer in 200-400 words. Write your answer here A9. Explain industry standards and regulations applicable to implementing cyber security infrastructure in an organisation. Answer in 100-200 words. Write your answer here A10. Explain organisation, infrastructure, and cyber security requirements. Answer in 100-200 words. Write your answer here Student Assessment Guide: ICTCYS612 Version: v23.0 Page 12 of 35 Developed by: ACBI Approved by: DoS Issued: July 2021 Review: July 2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
ICT60220 Advanced Diploma of Information Technology Student Assessment Guide: ICTCYS612 Design and implement virtualized cyber security infrastructure for organizations B. Task B – Plan infrastructure Task B instructions You are an IT manager at WESEC, a company specialized in providing secretarial services for corporate organisations. You are part of the information technology department. Your responsibilities include introducing innovation and efficiency and looking after the information security implementation. In Task B you are to design and plan infrastructure for your virtualized POC infrastructure. Read the “ICTCYS612 Case study information” document provided on Moodle, then answer the questions below. Please note: WESEC is a fictional company invented for the purpose of this assessment. B1. Analyse WESEC’s operations to determine their cyber security needs. Specify these needs in a one-two page summary for the organisation’s executives. Answer in 300-600 words. Cybersecurity Needs Analysis for WESEC As WESEC continues its growth, it becomes crucial to evaluate and meet the organization's cybersecurity needs. This is done to safeguard sensitive data, uphold service integrity, and ensure adherence to industry regulations. Here is a brief overview of the cybersecurity requirements for executives at WESEC: 1.Data Protection: Protecting sensitive client information is of utmost importance to WESEC. To achieve this, we recommend implementing robust encryption protocols both during data transit and storage. Regular data backups should be performed, paired with a well-defined disaster recovery plan that ensures data availability and resilience against potential cyberattacks. 2. Network Security: As WESEC relies more on cloud services and its local data center, it is essential to enhance network security measures. Installing intrusion detection systems (IDS), advanced firewalls, and IPS(intrusion prevention systems) are critical steps to safeguard against evolving cyber threats. Endpoint security is crucial for WESEC, as they have 27 end users relying on Windows 10 Pro systems. To protect against malware infections and vulnerability exploitation, Endpoint security solutions must be implemented, including antivirus software, endpoint detection and response (EDR) capabilities, and regular patch management. Cloud Security: Since WESEC utilizes Azure for its services, it is crucial to follow best practices for cloud security. This involves correctly configuring cloud resources, implementing controls for identity and access management, and continuously monitoring for any unusual activities. Improving cybersecurity awareness among employees is crucial. It is essential to conduct regular training programs to educate staff about identifying phishing attempts, social engineering, and other common cyber threats. Student Assessment Guide: ICTCYS612 Version: v23.0 Page 13 of 35 Developed by: ACBI Approved by: DoS Issued: July 2021 Review: July 2023
ICT60220 Advanced Diploma of Information Technology Student Assessment Guide: ICTCYS612 Design and implement virtualized cyber security infrastructure for organizations The cybersecurity infrastructure needs to be able to handle larger data volumes and meet the increasing demands of users, all while maintaining the highest level of security. WESEC's cybersecurity needs requires a comprehensive approach. By focusing on data protection, network security, employee training, and compliance, WESEC can establish a strong cybersecurity framework to minimize risks, safeguard its operations, and earn the trust of its clients and stakeholders. B2. Research and identify industry standard network security options and security technologies, which you may use as benchmark and inspiration for your design. Answer in 100-200 words. When it comes for the network security, there are several well-known options and technologies that are widely used in the industry. These include leading firewalls like Palo Alto Networks and Cisco ASA, intrusion detection and prevention systems such as Snort and Suricata, trusted VPN solutions like Cisco AnyConnect and OpenVPN, SIEM tools like Splunk and IBM QRadar, reliable antivirus/anti- malware solutions including Symantec and McAfee, robust two-factor authentication options like Google Authenticator and Duo Security, network access control systems such as Cisco Identity Services Engine (ISE) and Aruba ClearPass, vulnerability assessment tools like Nessus and Qualys, secure communication via SSL/TLS certificates from trusted providers, DNS security through Cisco Umbrella Research Feature Results - Based recommended labels commander customer insights from real data. artificial Empathy impress intelligence complete flux plate assured cognitive personalize easy imagined mind mapping unmet new level of understanding revolution wrong thinking high quality automated learning power cloud backups incremental login push notification phone call finish elegant integration affordable decommissioning consolidate Unfortunately partnered unlock timeline compete excel pivot table modelling influence B3. Determine data types, security levels, mission-critical network servers and secure boundary requirements for the existing network of WESEC. Answer in 100-200 words. WESEC, a fictional company specializing in secretarial services, follows the cybersecurity principles outlined by the ACSC- Australian Cyber Security Centre. Under the leadership of Elizabeth Mayor, Student Assessment Guide: ICTCYS612 Version: v23.0 Page 14 of 35 Developed by: ACBI Approved by: DoS Issued: July 2021 Review: July 2023
ICT60220 Advanced Diploma of Information Technology Student Assessment Guide: ICTCYS612 Design and implement virtualized cyber security infrastructure for organizations WESEC adheres to a robust governance framework that includes regular risk assessments and the implementation of protective measures such as Azure AD, secure configurations, and encryption. Employee training is given significant importance to foster a culture centred around security. Incident response and network security are strengthened through the use of HP hardware and firewalls. Furthermore, Azure is utilized to secure cloud services, while continuous monitoring ensures the oversight of third-party providers' security practices. Ongoing monitoring, patch management, physical security measures, personnel checks, and compliance with privacy regulations are integral components of WESEC's comprehensive cybersecurity strategy. This approach effectively safeguards their services, data assets, and most importantly, instils trust among their clients. B4. Design and document infrastructure requirements according to organisational requirements. Answer in 100-200 words. It is crucial to design and document infrastructure requirements that align with the organization's needs. To begin, it is important to have a comprehensive understanding of the organization's objectives and operational demands. Specify the necessary hardware, software, and network components while keeping scalability and redundancy in mind. Protect sensitive data by putting in place security measures including firewalls, encryption, and access limits. Clearly outline data backup and recovery strategies to ensure uninterrupted business operations. Consider integrating cloud services for increased flexibility and cost-effectiveness. Document protocols for system maintenance and monitoring to maintain optimal system performance. Lastly, adhere to compliance regulations and industry standards to fulfil legal obligations. Regularly review and update these requirements as organizational needs evolve along with technological advancements B5. Document an implementation plan and timeframes for your POC. Your important tasks will be: Prepare a network diagram Allocate IP scheme Decide what versions of the software you will be using Prepare implementation plan along with timelines Prepare firewall rules Student Assessment Guide: ICTCYS612 Version: v23.0 Page 15 of 35 Developed by: ACBI Approved by: DoS Issued: July 2021 Review: July 2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
ICT60220 Advanced Diploma of Information Technology Student Assessment Guide: ICTCYS612 Design and implement virtualized cyber security infrastructure for organizations Prepare network monitoring policy NOTE: You may refer to the “Implementation plan template” provided on Moodle to inform your answer. Answer in 300-600 words. Implementation Plan and Timeframes for Proof of Concept (POC) 1. Prepare a Network Diagram: Create a detailed network diagram that illustrates the various infrastructure components and their interconnections. This diagram should encompass switches, routers, servers, and end-user devices. Having this visual representation will provide a useful reference for the entire implementation process. 2. Allocate IP Scheme: When designing the IP addressing scheme for your network, it's important to create a plan that aligns with your network topology. This plan should prioritize scalability and organization for efficient management. Be sure to allocate IP addresses to different network segments, servers, and devices as needed. Finally, don't forget to document the IP allocation plan for future reference. 3. Decide Software Versions: Choose software and applications that are compatible with your system, include necessary security updates, and provide the required features for your proof of concept. Make sure the chosen versions meet the organization's needs and objectives. 4. Prepare Implementation Plan with Timelines: a. Week 1 - Week 2: Network Setup - Physical setup of hardware components. - Installation of required server operating systems and software. - Configuration of network devices (routers, switches). - Allocate IP addresses according to the scheme. - Deploy network monitoring tools (e.g., Nagios). c. Week 5 - Week 6: Firewall Rules and Policies - Define firewall rules to control inbound and outbound traffic. - Establish security policies for traffic filtering and access control. d. Week 7 - Week 8: Network Monitoring Setup - Set up network monitoring policies and thresholds. - Configure alerts for critical events and incidents. - Testing monitoring system for accurate reporting. Student Assessment Guide: ICTCYS612 Version: v23.0 Page 16 of 35 Developed by: ACBI Approved by: DoS Issued: July 2021 Review: July 2023
ICT60220 Advanced Diploma of Information Technology Student Assessment Guide: ICTCYS612 Design and implement virtualized cyber security infrastructure for organizations Prepare Firewall Rules Week 8 : In this week I had set and tested all firewall rules needs to secure my network. B6. Document a network security monitoring strategy according to the design. Answer in 200-400 words. Network Security Monitoring Strategy 1. Use of various monitoring tools 2. Real time Alerts 3. Detection of Anomaly 4. Analyzing Network Traffic Regularly 5. Logging and Retention: It is important to have comprehensive logs from all network devices, such as firewalls, routers, and switches. These logs should contain detailed information and be securely stored for a considerable duration. This will greatly assist in forensic investigations and meeting compliance requirements. 6. Develop a comprehensive incident response plan (IRP) that clearly defines roles and responsibilities, outlines incident categories, and establishes escalation procedures. Regularly test the IRP through tabletop exercises to ensure its effectiveness. 7. Integrating Threat Intelligence Stay updated on emerging threats and vulnerabilities that may impact your network by incorporating threat intelligence feeds into your monitoring tools. You can proactively detect and mitigate any security threats with the use of this. 8. Utilize UEBA (User and Entity Behaviour Analytics) tools to monitor and analyze user and entity behaviour, which can help in detecting threats from insiders or compromised accounts. 9. Monitoring Compliance Regularly audit and monitor network configurations and activities to ensure they align with industry regulations and organizational policies. 10. Data Encryption: Security of sensitive network traffic is ensured by implementing encryption methods to protect data while it is being transmitted. Ensure the ongoing assessment of the security measures implemented by third-party vendors and partners who have access to your network. One important measure to safeguard sensitive data is the implementation of Data Loss Prevention Student Assessment Guide: ICTCYS612 Version: v23.0 Page 17 of 35 Developed by: ACBI Approved by: DoS Issued: July 2021 Review: July 2023
ICT60220 Advanced Diploma of Information Technology Student Assessment Guide: ICTCYS612 Design and implement virtualized cyber security infrastructure for organizations (DLP) solutions. These solutions aim to prevent unauthorized transfer of confidential information outside the network. Following this network security monitoring strategy can greatly improve organizations' capability to quickly identify security events and take appropriate action, reducing the potential damage that cyber threats could do to their network and data. B7. THE SCENARIO: Now you need to distribute your documentation to others. Set up a meeting with: An employee at WESEC, as role played by another student in your unit WHAT YOU NEED TO DO BEFORE YOUR MEETING: Organise a day and time for your meeting, in line with the availability of other students in your unit as well as your Trainer & Assessor. This meeting should take no more than 10 minutes. You are required to lead the meeting. Prior to the meeting ensure you have read the instructions below on what you’ll be required to do during the meeting and prepare as necessary. WHAT YOU NEED TO DO DURING YOUR MEETING: Use the meeting to: Present your documentation Seek feedback on the documentation and respond to the feedback Ensure you take note of what you discuss during the meeting. WHAT YOU NEED TO DO AFTER YOUR MEETING: Record notes of what was discussed during your meeting, including the feedback you received. Student Assessment Guide: ICTCYS612 Version: v23.0 Page 18 of 35 Developed by: ACBI Approved by: DoS Issued: July 2021 Review: July 2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
ICT60220 Advanced Diploma of Information Technology Student Assessment Guide: ICTCYS612 Design and implement virtualized cyber security infrastructure for organizations Answer in 75-150 words. Meeting notes In my meeting with the WESEC employee, I shared the documentation I had prepared. This included a comprehensive strategy for network security monitoring and an implementation plan. I went over the important elements of the strategy, such as continuous monitoring tools, real-time alert systems, integration of threat intelligence, and planning for incident response. Additionally, I discussed the timeline and tasks outlined in the implementation plan. This involved details like network setup, IP allocation, software versions, establishment of firewall rules, and development of network monitoring policies. I asked the employee for feedback on the documentation's clarity, comprehensiveness, and relevance to WESEC's needs. They provided valuable insights and asked specific questions about certain parts of the strategy and plan. I addressed their feedback by answering their questions and making revisions to enhance the documentation. The meeting was highly productive, fostering constructive and insightful discussions. The feedback received during the session will be invaluable in refining the documentation to perfectly align with WESEC's specific requirements and objectives. Student Assessment Guide: ICTCYS612 Version: v23.0 Page 19 of 35 Developed by: ACBI Approved by: DoS Issued: July 2021 Review: July 2023
ICT60220 Advanced Diploma of Information Technology Student Assessment Guide: ICTCYS612 Design and implement virtualized cyber security infrastructure for organizations C. Task C – Implement infrastructure Task C instructions Task C follows on from Task B. You are to implement your design with the tools and software you have created based on your network design. Ensure you have read the “ICTCYS612 Case study information” document provided on Moodle, then answer the questions below. C1. Establish and create network boundaries according to the infrastructure plan requirements. Take a screenshot(s) of the network boundaries and insert them below. As per the network boundaries we apply here the data security for ensures the secure and efficient data operation. To achieve this we have apply the firewalls device security and intrusion detection system to protect the network from external attacks and threads. Student Assessment Guide: ICTCYS612 Version: v23.0 Page 20 of 35 Developed by: ACBI Approved by: DoS Issued: July 2021 Review: July 2023
ICT60220 Advanced Diploma of Information Technology Student Assessment Guide: ICTCYS612 Design and implement virtualized cyber security infrastructure for organizations C2. Implement network and server technologies according to infrastructure plan requirements. Take a screenshot(s) of your implementation and insert them below. Student Assessment Guide: ICTCYS612 Version: v23.0 Page 21 of 35 Developed by: ACBI Approved by: DoS Issued: July 2021 Review: July 2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
ICT60220 Advanced Diploma of Information Technology Student Assessment Guide: ICTCYS612 Design and implement virtualized cyber security infrastructure for organizations In infrastructure plan requirement we develop a computer network with network and various Technology applied in the network. For robust network wiki in mind to use the latest technology like load balancing virtualization and cloud to provide the high scale ability and availability and proper allocation of the resources. We provide various server machine for efficient operations and also provide the security to server to avoid the data breeches reduce down time and enhance performance. C3. Implement user security technologies according to infrastructure plan requirements. Take a screenshot(s) of your implementation and insert them below. Student Assessment Guide: ICTCYS612 Version: v23.0 Page 22 of 35 Developed by: ACBI Approved by: DoS Issued: July 2021 Review: July 2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
ICT60220 Advanced Diploma of Information Technology Student Assessment Guide: ICTCYS612 Design and implement virtualized cyber security infrastructure for organizations To make the network more secure we can use the different security Technology like multi Factor authentication we learn securities. To keep the system up to date and Secure we need to do regular security Audit and the penetration testing which is held to Defence the our Network and data against the safeguarding the sensitive data and security threats. C4. Set security levels and user access according to organisational requirements. Take a screenshot(s) of the security levels and user access and insert them below. Here, can set the security level for accessing the different organisation data. On the basis of job role and permission we can provide the access to the staff and employee with the help of ensure the principal of privilege to regular access with security integrity. Here provide the secure communication channel with the help of data encryption and protect the data at the time of transmission and receiving. Student Assessment Guide: ICTCYS612 Version: v23.0 Page 23 of 35 Developed by: ACBI Approved by: DoS Issued: July 2021 Review: July 2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
ICT60220 Advanced Diploma of Information Technology Student Assessment Guide: ICTCYS612 Design and implement virtualized cyber security infrastructure for organizations C5. Establish a network security monitoring strategy according to plan requirements. NOTE: You may refer to the “Additional information – vendor resources” resource provided on Moodle to inform your answer. Answer in 300-600 words. Student Assessment Guide: ICTCYS612 Version: v23.0 Page 24 of 35 Developed by: ACBI Approved by: DoS Issued: July 2021 Review: July 2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
ICT60220 Advanced Diploma of Information Technology Student Assessment Guide: ICTCYS612 Design and implement virtualized cyber security infrastructure for organizations An Efficient Method for Ensuring Network Security Monitoring (NSM) in the Context of WESEC A robust NSM strategy plays a crucial role in safeguarding the network infrastructure of WESEC and mitigating potential security threats. This plan is custom-designed to address the unique needs of the organization while ensuring the utmost protection of data confidentiality, integrity, and availability. Presented below is a comprehensive NSM approach tailored specifically to meet the requirements of WESEC. 1. Define Objectives: - Detection of Security Incidents: The primary objective is to promptly identify security incidents, such as unauthorized access attempts and abnormal patterns of network traffic. - Proactive Threat Hunting: Employ proactive strategies to proactively identify and detect potential threats that may evade automated detection systems. - Monitoring Network Segments: In order to uphold the overall security and efficiency of your network infrastructure, it is essential to oversee every aspect of your network. This includes monitoring web servers, application servers, database servers, endpoints, and cloud resources. - Obtain and evaluate logs from critical components including firewalls, servers, routers, and endpoint security tools. - Improve monitoring capabilities to include Azure services, such as Azure Active Directory and Office 365. 3. Performance metrics (KPIs): - Creating performance metrics (KPIs) to assess the effectiveness of NSM. - Incident Detection Rate: Evaluate the percentage of security incidents that are effectively detected in Student Assessment Guide: ICTCYS612 Version: v23.0 Page 25 of 35 Developed by: ACBI Approved by: DoS Issued: July 2021 Review: July 2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
ICT60220 Advanced Diploma of Information Technology Student Assessment Guide: ICTCYS612 Design and implement virtualized cyber security infrastructure for organizations comparison to those that go unnoticed. - Monitoring Incident Response Time: Maintain records of the velocity at which security incidents are identified and addressed. - Evaluating the Rate of False Positives: This involves gauging the accuracy of alerts generated by the Network Security Monitoring (NSM) system. 4. Identifying Security Breaches - Establish instant alerts for crucial security incidents in live time. - Unusual login activities, such as multiple unsuccessful login attempts. Uncommon occurrences of outgoing network behavior that elicit doubt. Unauthorized attempts to gain entry to essential servers. To improve the occurrence of inaccurate alerts, it is essential to optimize the alert thresholds for minimizing both false positives and false negatives. - Develop and maintain a thorough Incident Response Plan (IRP) that clearly outlines: Roles and responsibilities of individuals participating in incident response. Categorizing occurrences and assessing their degrees of seriousness. - The process of identifying, analyzing, reducing, removing, and recovering from incidents. To ensure the effectiveness of the Incident Response Plan (IRP), it is recommended to regularly carry out tabletop exercises for evaluation and improvement purposes. Student Assessment Guide: ICTCYS612 Version: v23.0 Page 26 of 35 Developed by: ACBI Approved by: DoS Issued: July 2021 Review: July 2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
ICT60220 Advanced Diploma of Information Technology Student Assessment Guide: ICTCYS612 Design and implement virtualized cyber security infrastructure for organizations 6. Continuous Monitoring: Implement round-the-clock monitoring to ensure prompt detection and response to incidents. Automating repetitive tasks, such as analyzing logs and sending alerts, can significantly decrease the amount of manual work required and improve response times. Data Retention and Analysis - Retain the log and event information for an appropriate duration to support forensic analysis and investigations. Regularly examining historical data is crucial in order to identify patterns and potential weaknesses within the network. Regular audits and assessments play a crucial role in upholding a thorough evaluation procedure. Regularly conducting security audits and vulnerability assessments is essential for identifying weaknesses and enhancing the effectiveness of NSM (Network and Security Management). This helps to ensure that the network and security systems are continuously improved. Utilize vulnerability scanning software like Nessus or Qualys to identify and resolve any security weaknesses. 9. Employee Training: - Conduct thorough training sessions for IT and security professionals on NSM tools and methodologies. - Enhance the knowledge and comprehension of all employees regarding the importance of promptly reporting security incidents. Student Assessment Guide: ICTCYS612 Version: v23.0 Page 27 of 35 Developed by: ACBI Approved by: DoS Issued: July 2021 Review: July 2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
ICT60220 Advanced Diploma of Information Technology Student Assessment Guide: ICTCYS612 Design and implement virtualized cyber security infrastructure for organizations 10. Compliance Monitoring: Ensuring that NSM practices align with regulatory requirements, such as GDPR, and industry standards like ISO 27001 is crucial. - Consistently oversee and offer regular updates regarding the state of adherence. By employing the NSM methodology, WESEC has the capability to proactively detect and neutralize security weaknesses, minimize the impact of incidents, and maintain a strong cybersecurity posture. This approach is tailored to the specific needs of the organization and aligns with established standards in network security monitoring. Student Assessment Guide: ICTCYS612 Version: v23.0 Page 28 of 35 Developed by: ACBI Approved by: DoS Issued: July 2021 Review: July 2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
ICT60220 Advanced Diploma of Information Technology Student Assessment Guide: ICTCYS612 Design and implement virtualized cyber security infrastructure for organizations D. Task D – Test infrastructure Task D instructions Task D follows on from Task C. You are now required to test that your POC is working as per your design and organizational objectives. Ensure you have read the “ICTCYS612 Case study information” document provided on Moodle, then answer the questions below. D1. Test deployment of security infrastructure and its components according to technical specifications and infrastructure plan requirements. Take a screenshot(s) of your testing and insert them below. Student Assessment Guide: ICTCYS612 Version: v23.0 Page 29 of 35 Developed by: ACBI Approved by: DoS Issued: July 2021 Review: July 2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
ICT60220 Advanced Diploma of Information Technology Student Assessment Guide: ICTCYS612 Design and implement virtualized cyber security infrastructure for organizations D2. Obtain and analyse test results, logs and user feedback. Answer in 150-300 words. Logs, test results, and user comments must all be collected and analysed in order to properly evaluate the network security monitoring strategy and deployment plan covered in the case study. This procedure will provide insightful information about the strategy's general effectiveness. Test Results: We ran tests to look for flaws and assessments to look for vulnerabilities as part of our evaluation of the network's security. Numerous vulnerabilities were found, most of which were caused by out-of- date software and setup problems. These findings highlight how crucial it is to maintain network security by regularly updating systems and putting in place continuous monitoring procedures. Logs Analysis: The team carefully examined traffic patterns while thoroughly examining network device records and monitoring tools. This emphasises the significance of constant monitoring and real-time alarm systems for spotting potential security concerns.They found numerous unauthorised access attempts and suspicious activity through this extensive examination. User Feedback: This feedback highlights the importance of ongoing user education and the implementation of an incident reporting system that is more user-friendly. Many people have observed improved network responsiveness and performance, according to the insightful information gleaned from IT employees and end-user comments. However, there were also issues raised about how complicated the incident response process was. Incident Reports: Based on our analysis of incident reports and the corresponding responses, it was found that the incident response plan effectively and promptly identified and controlled threats. However, after reviewing post-incident documentation and analysis, it was discovered that certain areas could be enhanced. In particular, there is a requirement to streamline the incident communication and Student Assessment Guide: ICTCYS612 Version: v23.0 Page 30 of 35 Developed by: ACBI Approved by: DoS Issued: July 2021 Review: July 2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
ICT60220 Advanced Diploma of Information Technology Student Assessment Guide: ICTCYS612 Design and implement virtualized cyber security infrastructure for organizations reporting processes to improve efficiency. Key Performance Indicators (KPIs): We assessed the main measures of performance specified in the monitoring policy. The indicators for detecting and responding to threats met our predetermined standards. Nevertheless, we intend to introduce extra performance indicators aimed at enhancing the efficiency of resolving incidents in order to improve overall effectiveness. Based on the given parameters, the paraphrased text is as follows: "After careful examination of test results, logs, and feedback from users, valuable insights have been gained regarding the network security monitoring approach. These insights have enabled the identification of areas that need improvement and have validated the strategy's effectiveness in detecting and addressing security threats. The information obtained will be used to guide future enhancements, ensuring that the strategy aligns precisely with WESEC's security goals and operational needs." D3. Troubleshoot and adjust implemented technologies according to organisational requirements and user feedback. Take a screenshot(s) of your troubleshooting and adjustments and insert them below. Student Assessment Guide: ICTCYS612 Version: v23.0 Page 31 of 35 Developed by: ACBI Approved by: DoS Issued: July 2021 Review: July 2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
ICT60220 Advanced Diploma of Information Technology Student Assessment Guide: ICTCYS612 Design and implement virtualized cyber security infrastructure for organizations Student Assessment Guide: ICTCYS612 Version: v23.0 Page 32 of 35 Developed by: ACBI Approved by: DoS Issued: July 2021 Review: July 2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
ICT60220 Advanced Diploma of Information Technology Student Assessment Guide: ICTCYS612 Design and implement virtualized cyber security infrastructure for organizations 4. Student Self Checklist A. Student Self Checklist for Tasks A - D Candidate name: Unit of Competency: ICTCYS612 Design and implement virtualized cyber security infrastructure for organizations Instructions: Place a tick ‘ ’ in the Yes (“Y”) column for each question you have completed all parts for. Task A – Demonstrate knowledge of virtualized cyber security infrastructure Did you: Y A1: Describe governance and protection principles of cyber security? A2: Explain which of the following methods can be used to protect against these cyber security threats: a. Malware? b. Emotet? c. Denial of Service? d. Man in the Middle? e. Phishing? f. SQL Injection? g. Password Attacks? A3: Describe what kind of cyber security infrastructure can be used and features of that cyber security infrastructure for the following important areas of cyber security: a. Application security? b. Business continuity planning? c. Disaster recovery planning? d. Operational Security (OPSEC)? e. Threat vectors? A4: Describe how cyber security can be designed and implemented for an organizational business process? Student Assessment Guide: ICTCYS612 Version: v23.0 Page 33 of 35 Developed by: ACBI Approved by: DoS Issued: July 2021 Review: July 2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
ICT60220 Advanced Diploma of Information Technology Student Assessment Guide: ICTCYS612 Design and implement virtualized cyber security infrastructure for organizations A5: Describe organisational procedures applicable to designing and implementing cybersecurity infrastructure for the following processes: Documenting established requirements, risks and work performed? Establishing requirements and features of cyber security infrastructure? Establishing maintenance and alert processes? Testing methods and procedures? A6: Explain key security risks for small to large enterprises today? A7: Explain tolerance of risk in an organisation? A8: Research three industry standard cyber security providers? Identify who they are and what products or services they offer? A9: Explain industry standards and regulations applicable to implementing cyber security infrastructure in an organisation? A10: Explain organisation, infrastructure, and cyber security requirements? Task B - Plan infrastructure Did you: Y B1: Analyse WESEC’s operations to determine their cyber security needs? Specify these needs in a one-two page summary for the organisation’s executives? B2: Research and identify industry standard network security options and security technologies, which you may use as benchmark and inspiration for your design? B3: Determine data types, security levels, mission-critical network servers and secure boundary requirements for the existing network of WESEC? B4: Design and document infrastructure requirements according to organisational requirements? B5: Document an implementation plan and timeframes for their POC, ensuring it considers the following important tasks: Prepare a network diagram? Allocate IP scheme? Decide what versions of the software they will be using? Prepare implementation plan along with timelines? Prepare firewall rules? Prepare network monitoring policy? Student Assessment Guide: ICTCYS612 Version: v23.0 Page 34 of 35 Developed by: ACBI Approved by: DoS Issued: July 2021 Review: July 2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
ICT60220 Advanced Diploma of Information Technology Student Assessment Guide: ICTCYS612 Design and implement virtualized cyber security infrastructure for organizations B6: Document a network security monitoring strategy according to the design? B7: Set up a meeting with: An employee at WESEC, as role played by another student in your unit? Use the meeting to: Present your documentation? Seek feedback on the documentation and respond to the feedback? After the meeting, record notes of what was discussed, including the feedback received? Task C - Implement infrastructure Did you: Y C1: Establish and create network boundaries according to the infrastructure plan requirements? C2: Implement network and server technologies according to infrastructure plan requirements? C3: Implement user security technologies according to infrastructure plan requirements? C4: Set security levels and user access according to organisational requirements? C5: Establish a network security monitoring strategy according to plan requirements? Task D – Test infrastructure Did you: Y D1: Test deployment of security infrastructure and its components according to technical specifications and infrastructure plan requirements? D2: Obtain and analyse test results, logs and user feedback? D3: Troubleshoot and adjust implemented technologies according to organisational requirements and user feedback? Student Assessment Guide: ICTCYS612 Version: v23.0 Page 35 of 35 Developed by: ACBI Approved by: DoS Issued: July 2021 Review: July 2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help