docx
keyboard_arrow_up
School
Australian College of Business and Technology, Colombo *
*We aren’t endorsed by this school
Course
ICT
Subject
Information Systems
Date
Jun 12, 2024
Type
docx
Pages
35
Uploaded by CommodoreFireFox42
Student
Assessment Guide:
ICTCYS612 Design and implement virtualized
cyber security infrastructure for organizations
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTCYS612 Design and implement virtualized cyber security infrastructure for organizations
Copyright 2023
Australian College of Business Intelligence
All rights reserved
Version: 23.0
Date Modified: July 2023
No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means,
electronic, mechanical, photocopying, recording or otherwise without the prior written permission of the Australian College of
Business Intelligence.
Disclaimer:
The Australian College of Business Intelligence does not invite reliance upon, nor accept responsibility for, the information it
provides. The Australian College of Business Intelligence makes every effort to provide a high-quality service. However, neither
the Australian College of Business Intelligence, nor the providers of data, gives any guarantees, undertakings or warranties
concerning the accuracy, completeness or up-to-date nature of the information provided. Users should confirm information
from another source if it is of sufficient importance for them to do so.
Student Assessment Guide: ICTCYS612
Version: v23.0
Page 2 of 35
Developed by: ACBI
Approved by: DoS
Issued: July 2021
Review: July 2023
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTCYS612 Design and implement virtualized cyber security infrastructure for organizations
Content
s
1. Assessment Information
......................................................................................................
4
A. Purpose of assessment
........................................................................................................................
4
B. What you are required to do
...............................................................................................................
4
C. Competencies being assessed
.............................................................................................................
4
D. Important resources for completing this assessment
.........................................................................
5
E. A note on plagiarism and referencing
..................................................................................................
6
F. A note on questions with role plays
.....................................................................................................
6
G. Instructions for completing this assessment
.......................................................................................
6
2. Assessment Coversheet
.......................................................................................................
8
3. Assessment Questions
.........................................................................................................
9
A. Task A - Demonstrate knowledge of virtualized cyber security infrastructure
....................................
9
B. Task B -
Plan infrastructure ...............................................................................................................
14
C. Task C - Implement infrastructure
.....................................................................................................
18
D. Task D - Test infrastructure
...............................................................................................................
18
4. Student Self Checklist
........................................................................................................
20
Student Assessment Guide: ICTCYS612
Version: v23.0
Page 3 of 35
Developed by: ACBI
Approved by: DoS
Issued: July 2021
Review: July 2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTCYS612 Design and implement virtualized cyber security infrastructure for organizations
1. Assessment Information
A. Purpose of assessment
This assessment will develop your skills and knowledge required to research, design, implement and test
virtualised cyber security infrastructure in a small to medium sized organisation.
B. What you are required to do
For this assessment, you are required to complete 4 tasks:
Task A – Demonstrate knowledge of virtualized cyber security infrastructure
Task B – Plan infrastructure
Task C – Implement infrastructure
Task D – Test infrastructure
All tasks of this assessment require you to use the provided case study information relating to the
fictional company Bains & Co.
C. Competencies being assessed
Elements
To achieve competency in this unit you must demonstrate your ability to:
1.
Prepare to design infrastructure
2.
Design and plan infrastructure
3.
Implement infrastructure
4.
Test
infrastructure
Performance Evidence
Evidence of the ability to:
Student Assessment Guide: ICTCYS612
Version: v23.0
Page 4 of 35
Developed by: ACBI
Approved by: DoS
Issued: July 2021
Review: July 2023
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTCYS612 Design and implement virtualized cyber security infrastructure for organizations
Design and implement cyber security infrastructure and review results against organisational
needs
on
at
least
two
different
occasions
Knowledge Evidence
You must demonstrate knowledge of:
Features and implementation methodologies of cyber security
Cyber security infrastructure features including:
o
Application security
o
Business continuity planning
o
Disaster recovery planning
o
Operational security (OPSEC)
o
Threat vectors
Organisational business processes and applicable cyber security requirements design and
implementation
Organisational procedures applicable to designing and implementing cybersecurity
infrastructure, including:
o
Documenting established requirements, risks and work performed
o
Establishing requirements and features of cyber security infrastructure
o
Establishing maintenance and alert processes
o
Testing methods and procedures
Security risks, and tolerance of risk in an organisation
Industry standard cyber security providers
Industry standards and regulations applicable to implementing cyber security infrastructure in
an organisation
Organisation, infrastructure and cyber security requirements.
For further information on the competencies of this unit, please refer to:
https://training.gov.au/Training/Details/ICTCYS612
D. Important resources for completing this
assessment
To complete this assessment, please refer to the following resources provided on Moodle:
ICTCYS612 Design and implement virtualized cyber security infrastructure for organizations
learner guide
ICTCYS612 Observation checklist
ICTCYS612 Marking Guide
ICTCYS612 Case study folder
Additional student assessment information
Student Assessment Guide: ICTCYS612
Version: v23.0
Page 5 of 35
Developed by: ACBI
Approved by: DoS
Issued: July 2021
Review: July 2023
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTCYS612 Design and implement virtualized cyber security infrastructure for organizations
E. A note on plagiarism and referencing
Plagiarism is a form of theft where the work, ideas, inventions etc. of other people are presented as your
own.
When quoting or paraphrasing from a source such as the Internet, the source must be recognised. If you
are quoting a source, make sure to acknowledge this by including “quotation marks” around the
relevant words/sentences or ideas. Note the source at the point at which it is included within your
assessment, such as by using a citation. Then list the full details of the source in a ‘references’ section at
the end of your assessment. All sources used for your assessment should be detailed in a ‘references’ section. It is advisable to never
copy
another
person’s
work.
F. A note on questions with role plays
Task B, Question B7 involves a role play. For this question, as outlined below, you will be assessed on
your ability to role play being an IT manager at WESEC, a company specialized in providing secretarial
services for corporate organisations. This question requires you to lead a meeting and take notes on
what is discussed. Please note: You will also need to attend separate meetings organised by other students whereby you
role play being other people. This allows other students in your unit to also role play being the Senior
Human Resources Manager. G. Instructions for completing this assessment
Answer the questions below using the spaces provided:
Answer all parts of each question
Use your own words and give examples wherever possible
The quality of your answer is more important than how long it is
Enter your answers in this document
You may use various sources of information to inform your answers, including your resources provided
by ACBI, books, and online sources. You must acknowledge and cite your sources. Student Assessment Guide: ICTCYS612
Version: v23.0
Page 6 of 35
Developed by: ACBI
Approved by: DoS
Issued: July 2021
Review: July 2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTCYS612 Design and implement virtualized cyber security infrastructure for organizations
Submission via Moodle
Please refer to the “Instructions for Submitting Your Assessment” found within the unit course page on
Moodle. NOTE: Please take care to follow all instructions listed. Assessments uploaded with a draft status on
Moodle
may
not
be
graded.
Student Assessment Guide: ICTCYS612
Version: v23.0
Page 7 of 35
Developed by: ACBI
Approved by: DoS
Issued: July 2021
Review: July 2023
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTCYS612 Design and implement virtualized cyber security infrastructure for organizations
2. Assessment Coversheet
Candidate Name:
Student ID:
Contact Number:
Email:
Trainer / Assessor Name:
Qualification:
ICT60220 Advanced Diploma of Information Technology Units of Competency:
ICTCYS612 Design and implement virtualized cyber security infrastructure
for organizations
Assessment Tasks:
☐
A. Demonstrate knowledge of virtualized cyber security infrastructure
☐
B. Plan infrastructure ☐
C. Implement infrastructure
☐
D. Test infrastructure
Due Date:
Date Submitted:
Declaration:
I have read and understood the following information at the beginning of
this assessment guide (please tick): ☐
Assessment information
☐
Submitting assessments
☐
Plagiarism and referencing
I declare this assessment is my own work and where the work is of others, I
have fully referenced that material.
Name (please print):
Candidate signature:
Date:
3. Assessment Questions
Student Assessment Guide: ICTCYS612
Version: v23.0
Page 8 of 35
Developed by: ACBI
Approved by: DoS
Issued: July 2021
Review: July 2023
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTCYS612 Design and implement virtualized cyber security infrastructure for organizations
A. Task A - Demonstrate knowledge of virtualized
cyber security infrastructure
Task
A
instructions
Answer the following questions to demonstrate your knowledge of virtualized cyber security
infrastructure.
A1.
Describe
governance
and
protection
principles
of
cyber
security.
NOTE: Refer to https://www.cyber.gov.au/acsc/view-all-content/guidance/cyber-security-principles to
inform your answer. Answer in 100-200 words.
Write
your
answer
here
A2. Explain which of the following methods can be used to protect against these cyber security
threats:
a.
Malware
b.
Emotet
c.
Denial of Service
d.
Man in the Middle
e.
Phishing
f.
SQL Injection
g.
Password Attacks
Answer in 100-200 words.
Write
your
answer
here
Student Assessment Guide: ICTCYS612
Version: v23.0
Page 9 of 35
Developed by: ACBI
Approved by: DoS
Issued: July 2021
Review: July 2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTCYS612 Design and implement virtualized cyber security infrastructure for organizations
A3. Describe what kind of cyber security infrastructure you can use and features of that cyber
security infrastructure for the following important areas of cyber security:
a.
Application security
b.
Business continuity planning
c.
Disaster recovery planning
d.
Operational Security (OPSEC)
e.
Threat
vectors
Answer in 200-400 words.
Write
your
answer
here
A4. Describe how cyber security can be designed and implemented for an organizational business
process.
Answer in 100-200 words.
Write
your
answer
here
A5. Describe organisational procedures applicable to designing and implementing cybersecurity
Student Assessment Guide: ICTCYS612
Version: v23.0
Page 10 of 35
Developed by: ACBI
Approved by: DoS
Issued: July 2021
Review: July 2023
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTCYS612 Design and implement virtualized cyber security infrastructure for organizations
infrastructure for the following processes:
Documenting established requirements, risks and work performed
Establishing requirements and features of cyber security infrastructure
Establishing maintenance and alert processes
Testing
methods
and
procedures
Answer in 200-400 words.
Write
your
answer
here
A6. Explain key security risks for small to large enterprises today.
Answer in 100-200 words.
Write
your
answer
here
A7.
Explain
tolerance
of
risk
in
an
organisation.
Answer in 100-200 words.
Write
your
answer
here
Student Assessment Guide: ICTCYS612
Version: v23.0
Page 11 of 35
Developed by: ACBI
Approved by: DoS
Issued: July 2021
Review: July 2023
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTCYS612 Design and implement virtualized cyber security infrastructure for organizations
A8. Research three industry standard cyber security providers. Identify who they are and what
products
or
services
they
offer.
Answer in 200-400 words.
Write
your
answer
here
A9. Explain industry standards and regulations applicable to implementing cyber security
infrastructure
in
an
organisation.
Answer in 100-200 words.
Write
your
answer
here
A10.
Explain
organisation,
infrastructure,
and
cyber
security
requirements.
Answer in 100-200 words.
Write
your
answer
here
Student Assessment Guide: ICTCYS612
Version: v23.0
Page 12 of 35
Developed by: ACBI
Approved by: DoS
Issued: July 2021
Review: July 2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTCYS612 Design and implement virtualized cyber security infrastructure for organizations
B. Task B – Plan infrastructure Task
B
instructions
You are an IT manager at WESEC, a company specialized in providing secretarial services for corporate
organisations. You are part of the information technology department. Your responsibilities include
introducing innovation and efficiency and looking after the information security implementation. In
Task B you are to design and plan infrastructure for your virtualized POC infrastructure.
Read the “ICTCYS612 Case study information” document provided on Moodle, then answer the
questions
below.
Please note: WESEC is a fictional company invented for the purpose of this assessment.
B1. Analyse WESEC’s operations to determine their cyber security needs. Specify these needs in a
one-two
page
summary
for
the
organisation’s
executives.
Answer in 300-600 words.
Cybersecurity Needs Analysis for WESEC
As WESEC continues its growth, it becomes crucial to evaluate and meet the organization's
cybersecurity needs. This is done to safeguard sensitive data, uphold service integrity, and ensure
adherence to industry regulations. Here is a brief overview of the cybersecurity requirements for
executives at WESEC:
1.Data Protection: Protecting sensitive client information is of utmost importance to WESEC. To
achieve this, we recommend implementing robust encryption protocols both during data transit and
storage. Regular data backups should be performed, paired with a well-defined disaster recovery plan
that ensures data availability and resilience against potential cyberattacks.
2. Network Security: As WESEC relies more on cloud services and its local data center, it is essential to
enhance network security measures. Installing intrusion detection systems (IDS), advanced firewalls,
and IPS(intrusion prevention systems) are critical steps to safeguard against evolving cyber threats.
Endpoint security is crucial for WESEC, as they have 27 end users relying on Windows 10 Pro systems.
To protect against malware infections and vulnerability exploitation, Endpoint security solutions must
be implemented, including antivirus software, endpoint detection and response (EDR) capabilities,
and regular patch management.
Cloud Security: Since WESEC utilizes Azure for its services, it is crucial to follow best practices for
cloud security. This involves correctly configuring cloud resources, implementing controls for identity
and access management, and continuously monitoring for any unusual activities.
Improving cybersecurity awareness among employees is crucial. It is essential to conduct regular
training programs to educate staff about identifying phishing attempts, social engineering, and other
common cyber threats.
Student Assessment Guide: ICTCYS612
Version: v23.0
Page 13 of 35
Developed by: ACBI
Approved by: DoS
Issued: July 2021
Review: July 2023
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTCYS612 Design and implement virtualized cyber security infrastructure for organizations
The cybersecurity infrastructure needs to be able to handle larger data volumes and meet the
increasing demands of users, all while maintaining the highest level of security.
WESEC's cybersecurity needs requires a comprehensive approach. By focusing on data protection,
network security, employee training, and compliance, WESEC can establish a strong cybersecurity
framework to minimize risks, safeguard its operations, and earn the trust of its clients and
stakeholders.
B2. Research and identify industry standard network security options and security technologies,
which
you
may
use
as
benchmark
and
inspiration
for
your
design.
Answer in 100-200 words.
When it comes for the network security, there are several well-known options and technologies that
are widely used in the industry. These include leading firewalls like Palo Alto Networks and Cisco ASA,
intrusion detection and prevention systems such as Snort and Suricata, trusted VPN solutions like
Cisco AnyConnect and OpenVPN, SIEM tools like Splunk and IBM QRadar, reliable antivirus/anti-
malware solutions including Symantec and McAfee, robust two-factor authentication options like
Google Authenticator and Duo Security, network access control systems such as Cisco Identity
Services Engine (ISE) and Aruba ClearPass, vulnerability assessment tools like Nessus and Qualys,
secure communication via SSL/TLS certificates from trusted providers, DNS security through Cisco
Umbrella Research Feature Results - Based recommended labels commander customer insights from
real data. artificial Empathy impress intelligence complete flux plate assured cognitive personalize
easy imagined mind mapping unmet new level of understanding revolution wrong thinking high
quality automated learning power cloud backups incremental login push notification phone call finish
elegant integration affordable decommissioning consolidate Unfortunately partnered unlock timeline
compete excel pivot table modelling influence
B3. Determine data types, security levels, mission-critical network servers and secure boundary
requirements
for
the
existing
network
of
WESEC.
Answer in 100-200 words.
WESEC, a fictional company specializing in secretarial services, follows the cybersecurity principles
outlined by the ACSC- Australian Cyber Security Centre. Under the leadership of Elizabeth Mayor,
Student Assessment Guide: ICTCYS612
Version: v23.0
Page 14 of 35
Developed by: ACBI
Approved by: DoS
Issued: July 2021
Review: July 2023
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTCYS612 Design and implement virtualized cyber security infrastructure for organizations
WESEC adheres to a robust governance framework that includes regular risk assessments and the
implementation of protective measures such as Azure AD, secure configurations, and encryption.
Employee training is given significant importance to foster a culture centred around security. Incident
response and network security are strengthened through the use of HP hardware and firewalls.
Furthermore, Azure is utilized to secure cloud services, while continuous monitoring ensures the
oversight of third-party providers' security practices. Ongoing monitoring, patch management,
physical security measures, personnel checks, and compliance with privacy regulations are integral
components of WESEC's comprehensive cybersecurity strategy. This approach effectively safeguards
their services, data assets, and most importantly, instils trust among their clients.
B4. Design and document infrastructure requirements according to organisational requirements.
Answer in 100-200 words.
It is crucial to design and document infrastructure requirements that align with the organization's
needs. To begin, it is important to have a comprehensive understanding of the organization's
objectives and operational demands. Specify the necessary hardware, software, and network
components while keeping scalability and redundancy in mind. Protect sensitive data by putting in
place security measures including firewalls, encryption, and access limits. Clearly outline data backup
and recovery strategies to ensure uninterrupted business operations. Consider integrating cloud
services for increased flexibility and cost-effectiveness. Document protocols for system maintenance
and monitoring to maintain optimal system performance. Lastly, adhere to compliance regulations
and industry standards to fulfil legal obligations. Regularly review and update these requirements as
organizational needs evolve along with technological advancements
B5. Document an implementation plan and timeframes for your POC. Your important tasks will be:
Prepare a network diagram
Allocate IP scheme
Decide what versions of the software you will be using
Prepare implementation plan along with timelines
Prepare firewall rules
Student Assessment Guide: ICTCYS612
Version: v23.0
Page 15 of 35
Developed by: ACBI
Approved by: DoS
Issued: July 2021
Review: July 2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTCYS612 Design and implement virtualized cyber security infrastructure for organizations
Prepare
network
monitoring
policy
NOTE: You may refer to the “Implementation plan template” provided on Moodle to inform your
answer. Answer in 300-600 words.
Implementation Plan and Timeframes for Proof of Concept (POC)
1. Prepare a Network Diagram:
Create a detailed network diagram that illustrates the various infrastructure components and their
interconnections. This diagram should encompass switches, routers, servers, and end-user devices.
Having this visual representation will provide a useful reference for the entire implementation
process.
2. Allocate IP Scheme:
When designing the IP addressing scheme for your network, it's important to create a plan that aligns
with your network topology. This plan should prioritize scalability and organization for efficient
management. Be sure to allocate IP addresses to different network segments, servers, and devices as
needed. Finally, don't forget to document the IP allocation plan for future reference.
3. Decide Software Versions:
Choose software and applications that are compatible with your system, include necessary security
updates, and provide the required features for your proof of concept. Make sure the chosen versions
meet the organization's needs and objectives.
4. Prepare Implementation Plan with Timelines:
a. Week 1 - Week 2: Network Setup
- Physical setup of
hardware components.
- Installation of
required server operating systems and software.
- Configuration of
network devices (routers, switches).
- Allocate IP
addresses according to the scheme.
- Deploy network
monitoring tools (e.g., Nagios).
c. Week 5 - Week 6: Firewall Rules and Policies
- Define firewall
rules to control inbound and outbound traffic.
- Establish
security policies for traffic filtering and access control.
d. Week 7 - Week 8: Network Monitoring Setup
- Set up network
monitoring policies and thresholds.
- Configure alerts
for critical events and incidents.
- Testing
monitoring system for accurate reporting.
Student Assessment Guide: ICTCYS612
Version: v23.0
Page 16 of 35
Developed by: ACBI
Approved by: DoS
Issued: July 2021
Review: July 2023
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTCYS612 Design and implement virtualized cyber security infrastructure for organizations
Prepare Firewall Rules
Week 8 : In this week I had set and tested all firewall rules needs to secure my network.
B6. Document a network security monitoring strategy according to the design.
Answer in 200-400 words.
Network Security Monitoring Strategy
1.
Use of various monitoring tools 2.
Real time Alerts
3.
Detection of Anomaly
4.
Analyzing Network Traffic Regularly
5.
Logging and Retention: It is important to have comprehensive logs from all network devices, such as firewalls, routers, and switches. These logs should contain detailed information and be securely stored for a considerable duration. This will greatly assist in forensic investigations
and meeting compliance requirements.
6.
Develop a comprehensive incident response plan (IRP) that clearly defines roles and responsibilities, outlines incident categories, and establishes escalation procedures. Regularly test the IRP through tabletop exercises to ensure its effectiveness.
7.
Integrating Threat Intelligence
Stay updated on emerging threats and vulnerabilities that may impact your network by incorporating threat intelligence feeds into your monitoring tools. You can proactively detect and mitigate any security threats with the use of this.
8. Utilize UEBA (User and Entity Behaviour Analytics) tools to monitor and analyze user and entity behaviour, which can help in detecting threats from insiders or compromised accounts.
9. Monitoring Compliance
Regularly audit and monitor network configurations and activities to ensure they align with industry regulations and organizational policies. 10. Data Encryption: Security of sensitive network traffic is ensured by implementing encryption methods to protect data while it is being transmitted.
Ensure the ongoing assessment of the security measures implemented by third-party vendors and partners who have access to your network.
One important measure to safeguard sensitive data is the implementation of Data Loss Prevention Student Assessment Guide: ICTCYS612
Version: v23.0
Page 17 of 35
Developed by: ACBI
Approved by: DoS
Issued: July 2021
Review: July 2023
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTCYS612 Design and implement virtualized cyber security infrastructure for organizations
(DLP) solutions. These solutions aim to prevent unauthorized transfer of confidential information outside the network.
Following this network security monitoring strategy can greatly improve organizations' capability to
quickly identify security events and take appropriate action, reducing the potential damage that cyber
threats could do to their network and data.
B7. THE
SCENARIO:
Now you need to distribute your documentation to others. Set up a meeting with:
An employee at WESEC, as role played by another student in your unit
WHAT YOU NEED TO DO BEFORE YOUR MEETING:
Organise a day and time for your meeting, in line with the availability of other students in your unit
as well as your Trainer & Assessor. This meeting should take no more than 10 minutes. You are required to lead the meeting. Prior to the meeting ensure you have read the instructions
below on what you’ll be required to do during the meeting and prepare as necessary. WHAT
YOU
NEED
TO
DO
DURING
YOUR
MEETING:
Use the meeting to:
Present your documentation
Seek feedback on the documentation and respond to the feedback
Ensure
you
take
note
of
what
you
discuss
during
the
meeting.
WHAT YOU NEED TO DO AFTER YOUR MEETING:
Record notes of what was discussed during your meeting, including the feedback you received. Student Assessment Guide: ICTCYS612
Version: v23.0
Page 18 of 35
Developed by: ACBI
Approved by: DoS
Issued: July 2021
Review: July 2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTCYS612 Design and implement virtualized cyber security infrastructure for organizations
Answer in 75-150 words.
Meeting notes
In my meeting with the WESEC employee, I shared the documentation I had prepared. This included
a comprehensive strategy for network security monitoring and an implementation plan. I went over
the important elements of the strategy, such as continuous monitoring tools, real-time alert
systems, integration of threat intelligence, and planning for incident response. Additionally, I
discussed the timeline and tasks outlined in the implementation plan. This involved details like
network setup, IP allocation, software versions, establishment of firewall rules, and development of
network monitoring policies.
I asked the employee for feedback on the documentation's clarity, comprehensiveness, and
relevance to WESEC's needs. They provided valuable insights and asked specific questions about
certain parts of the strategy and plan. I addressed their feedback by answering their questions and
making revisions to enhance the documentation.
The meeting was highly productive, fostering constructive and insightful discussions. The feedback
received during the session will be invaluable in refining the documentation to perfectly align with
WESEC's specific requirements and objectives.
Student Assessment Guide: ICTCYS612
Version: v23.0
Page 19 of 35
Developed by: ACBI
Approved by: DoS
Issued: July 2021
Review: July 2023
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTCYS612 Design and implement virtualized cyber security infrastructure for organizations
C. Task C – Implement infrastructure
Task
C
instructions
Task
C
follows
on
from
Task
B.
You are to implement your design with the tools and software you have created based on your
network
design.
Ensure you have read the “ICTCYS612 Case study information” document provided on Moodle, then
answer the questions below. C1. Establish and create network boundaries according to the infrastructure plan requirements.
Take a screenshot(s) of the network boundaries and insert them below.
As per the network boundaries we apply here the data security for ensures the secure and efficient
data operation. To achieve this we have apply the firewalls device security and intrusion detection
system to protect the network from external attacks and threads.
Student Assessment Guide: ICTCYS612
Version: v23.0
Page 20 of 35
Developed by: ACBI
Approved by: DoS
Issued: July 2021
Review: July 2023
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTCYS612 Design and implement virtualized cyber security infrastructure for organizations
C2. Implement network and server technologies according to infrastructure plan requirements.
Take a screenshot(s) of your implementation and insert them below.
Student Assessment Guide: ICTCYS612
Version: v23.0
Page 21 of 35
Developed by: ACBI
Approved by: DoS
Issued: July 2021
Review: July 2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTCYS612 Design and implement virtualized cyber security infrastructure for organizations
In infrastructure plan requirement we develop a computer network with network and various
Technology applied in the network. For robust network wiki in mind to use the latest technology like
load balancing virtualization and cloud to provide the high scale ability and availability and proper
allocation of the resources. We provide various server machine for efficient operations and also
provide the security to server to avoid the data breeches reduce down time and enhance
performance.
C3. Implement user security technologies according to infrastructure plan requirements.
Take a screenshot(s) of your implementation and insert them below.
Student Assessment Guide: ICTCYS612
Version: v23.0
Page 22 of 35
Developed by: ACBI
Approved by: DoS
Issued: July 2021
Review: July 2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTCYS612 Design and implement virtualized cyber security infrastructure for organizations
To make the network more secure we can use the different security Technology like multi Factor
authentication we learn securities. To keep the system up to date and Secure we need to do regular
security Audit and the penetration testing which is held to Defence the our Network and data against
the safeguarding the sensitive data and security threats.
C4. Set security levels and user access according to organisational requirements.
Take a screenshot(s) of the security levels and user access and insert them below.
Here, can set the security level for accessing the different organisation data. On the basis of job role
and permission we can provide the access to the staff and employee with the help of ensure the
principal of privilege to regular access with security integrity. Here provide the secure communication
channel with the help of data encryption and protect the data at the time of transmission and
receiving.
Student Assessment Guide: ICTCYS612
Version: v23.0
Page 23 of 35
Developed by: ACBI
Approved by: DoS
Issued: July 2021
Review: July 2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTCYS612 Design and implement virtualized cyber security infrastructure for organizations
C5. Establish a network security monitoring strategy according to plan requirements.
NOTE: You may refer to the “Additional information – vendor resources” resource provided on Moodle
to inform your answer. Answer in 300-600 words.
Student Assessment Guide: ICTCYS612
Version: v23.0
Page 24 of 35
Developed by: ACBI
Approved by: DoS
Issued: July 2021
Review: July 2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTCYS612 Design and implement virtualized cyber security infrastructure for organizations
An Efficient Method for Ensuring Network Security Monitoring (NSM) in the Context of WESEC
A robust NSM strategy plays a crucial role in safeguarding the network infrastructure of WESEC and
mitigating potential security threats. This plan is custom-designed to address the unique needs of the
organization while ensuring the utmost protection of data confidentiality, integrity, and availability.
Presented below is a comprehensive NSM approach tailored specifically to meet the requirements of
WESEC. 1. Define Objectives:
- Detection of Security Incidents: The primary objective is to promptly identify security incidents, such
as unauthorized access attempts and abnormal patterns of network traffic. - Proactive Threat Hunting: Employ proactive strategies to proactively identify and detect potential
threats that may evade automated detection systems. - Monitoring Network Segments: In order to uphold the overall security and efficiency of your
network infrastructure, it is essential to oversee every aspect of your network. This includes
monitoring web servers, application servers, database servers, endpoints, and cloud resources.
- Obtain and evaluate logs from critical components including firewalls, servers, routers, and endpoint
security tools. - Improve monitoring capabilities to include Azure services, such as Azure Active Directory and Office
365. 3. Performance metrics (KPIs):
- Creating performance metrics (KPIs) to assess the effectiveness of NSM. - Incident Detection Rate: Evaluate the percentage of security incidents that are effectively detected in
Student Assessment Guide: ICTCYS612
Version: v23.0
Page 25 of 35
Developed by: ACBI
Approved by: DoS
Issued: July 2021
Review: July 2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTCYS612 Design and implement virtualized cyber security infrastructure for organizations
comparison to those that go unnoticed.
- Monitoring Incident Response Time: Maintain records of the velocity at which security incidents are
identified and addressed. - Evaluating the Rate of False Positives: This involves gauging the accuracy of alerts generated by the
Network Security Monitoring (NSM) system. 4. Identifying Security Breaches - Establish instant alerts for crucial security incidents in live time.
- Unusual login activities, such as multiple unsuccessful login attempts. Uncommon occurrences of outgoing network behavior that elicit doubt. Unauthorized attempts to gain entry to essential servers.
To improve the occurrence of inaccurate alerts, it is essential to optimize the alert thresholds for
minimizing both false positives and false negatives.
- Develop and maintain a thorough Incident Response Plan (IRP) that clearly outlines:
Roles and responsibilities of individuals participating in incident response.
Categorizing occurrences and assessing their degrees of seriousness.
- The process of identifying, analyzing, reducing, removing, and recovering from incidents. To ensure the effectiveness of the Incident Response Plan (IRP), it is recommended to regularly carry
out tabletop exercises for evaluation and improvement purposes.
Student Assessment Guide: ICTCYS612
Version: v23.0
Page 26 of 35
Developed by: ACBI
Approved by: DoS
Issued: July 2021
Review: July 2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTCYS612 Design and implement virtualized cyber security infrastructure for organizations
6. Continuous Monitoring:
Implement round-the-clock monitoring to ensure prompt detection and response to incidents.
Automating repetitive tasks, such as analyzing logs and sending alerts, can significantly decrease the
amount of manual work required and improve response times.
Data Retention and Analysis
- Retain the log and event information for an appropriate duration to support forensic analysis and
investigations. Regularly examining historical data is crucial in order to identify patterns and potential weaknesses
within the network.
Regular audits and assessments play a crucial role in upholding a thorough evaluation procedure.
Regularly conducting security audits and vulnerability assessments is essential for identifying
weaknesses and enhancing the effectiveness of NSM (Network and Security Management). This helps
to ensure that the network and security systems are continuously improved.
Utilize vulnerability scanning software like Nessus or Qualys to identify and resolve any security
weaknesses.
9. Employee Training:
- Conduct thorough training sessions for IT and security professionals on NSM tools and
methodologies.
- Enhance the knowledge and comprehension of all employees regarding the importance of promptly
reporting security incidents. Student Assessment Guide: ICTCYS612
Version: v23.0
Page 27 of 35
Developed by: ACBI
Approved by: DoS
Issued: July 2021
Review: July 2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTCYS612 Design and implement virtualized cyber security infrastructure for organizations
10. Compliance Monitoring:
Ensuring that NSM practices align with regulatory requirements, such as GDPR, and industry
standards like ISO 27001 is crucial.
- Consistently oversee and offer regular updates regarding the state of adherence. By employing the NSM methodology, WESEC has the capability to proactively detect and neutralize
security weaknesses, minimize the impact of incidents, and maintain a strong cybersecurity posture.
This approach is tailored to the specific needs of the organization and aligns with established
standards in network security monitoring.
Student Assessment Guide: ICTCYS612
Version: v23.0
Page 28 of 35
Developed by: ACBI
Approved by: DoS
Issued: July 2021
Review: July 2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTCYS612 Design and implement virtualized cyber security infrastructure for organizations
D. Task D – Test infrastructure
Task
D
instructions
Task D follows on from Task C.
You are now required to test that your POC is working as per your design and organizational
objectives.
Ensure you have read the “ICTCYS612 Case study information” document provided on Moodle, then
answer the questions below.
D1. Test deployment of security infrastructure and its components according to technical
specifications
and
infrastructure
plan
requirements.
Take a screenshot(s) of your testing and insert them below.
Student Assessment Guide: ICTCYS612
Version: v23.0
Page 29 of 35
Developed by: ACBI
Approved by: DoS
Issued: July 2021
Review: July 2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTCYS612 Design and implement virtualized cyber security infrastructure for organizations
D2.
Obtain
and
analyse
test
results,
logs
and
user
feedback.
Answer in 150-300 words.
Logs, test results, and user comments must all be collected and analysed in order to properly evaluate
the network security monitoring strategy and deployment plan covered in the case study. This
procedure will provide insightful information about the strategy's general effectiveness.
Test Results:
We ran tests to look for flaws and assessments to look for vulnerabilities as part of our evaluation of
the network's security. Numerous vulnerabilities were found, most of which were caused by out-of-
date software and setup problems. These findings highlight how crucial it is to maintain network
security by regularly updating systems and putting in place continuous monitoring procedures.
Logs Analysis:
The team carefully examined traffic patterns while thoroughly examining network device records and
monitoring tools. This emphasises the significance of constant monitoring and real-time alarm
systems for spotting potential security concerns.They found numerous unauthorised access attempts
and suspicious activity through this extensive examination. User Feedback:
This feedback highlights the importance of ongoing user education and the implementation of an
incident reporting system that is more user-friendly. Many people have observed improved network
responsiveness and performance, according to the insightful information gleaned from IT employees
and end-user comments. However, there were also issues raised about how complicated the incident
response process was. Incident Reports:
Based on our analysis of incident reports and the corresponding responses, it was found that the
incident response plan effectively and promptly identified and controlled threats. However, after
reviewing post-incident documentation and analysis, it was discovered that certain areas could be
enhanced. In particular, there is a requirement to streamline the incident communication and
Student Assessment Guide: ICTCYS612
Version: v23.0
Page 30 of 35
Developed by: ACBI
Approved by: DoS
Issued: July 2021
Review: July 2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTCYS612 Design and implement virtualized cyber security infrastructure for organizations
reporting processes to improve efficiency.
Key Performance Indicators (KPIs):
We assessed the main measures of performance specified in the monitoring policy. The indicators for
detecting and responding to threats met our predetermined standards. Nevertheless, we intend to
introduce extra performance indicators aimed at enhancing the efficiency of resolving incidents in
order to improve overall effectiveness.
Based on the given parameters, the paraphrased text is as follows:
"After careful examination of test results, logs, and feedback from users, valuable insights have been
gained regarding the network security monitoring approach. These insights have enabled the
identification of areas that need improvement and have validated the strategy's effectiveness in
detecting and addressing security threats. The information obtained will be used to guide future
enhancements, ensuring that the strategy aligns precisely with WESEC's security goals and
operational needs."
D3. Troubleshoot and adjust implemented technologies according to organisational requirements and
user
feedback.
Take a screenshot(s) of your troubleshooting and adjustments and insert them below.
Student Assessment Guide: ICTCYS612
Version: v23.0
Page 31 of 35
Developed by: ACBI
Approved by: DoS
Issued: July 2021
Review: July 2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTCYS612 Design and implement virtualized cyber security infrastructure for organizations
Student Assessment Guide: ICTCYS612
Version: v23.0
Page 32 of 35
Developed by: ACBI
Approved by: DoS
Issued: July 2021
Review: July 2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTCYS612 Design and implement virtualized cyber security infrastructure for organizations
4. Student Self Checklist
A. Student Self Checklist for Tasks A - D
Candidate name:
Unit of Competency:
ICTCYS612 Design and implement virtualized cyber security infrastructure for
organizations
Instructions:
Place a tick ‘
✓
’ in the Yes (“Y”) column for each question you have completed all parts for.
Task A – Demonstrate knowledge of virtualized cyber security infrastructure
Did you:
Y
✓
A1:
Describe governance and protection principles of cyber security?
A2:
Explain which of the following methods can be used to protect against these cyber
security threats:
a.
Malware?
b.
Emotet?
c.
Denial of Service?
d.
Man in the Middle?
e.
Phishing?
f.
SQL Injection?
g.
Password Attacks?
A3:
Describe what kind of cyber security infrastructure can be used and features of that
cyber security infrastructure for the following important areas of cyber security:
a.
Application security?
b.
Business continuity planning?
c.
Disaster recovery planning?
d.
Operational Security (OPSEC)?
e.
Threat vectors?
A4:
Describe how cyber security can be designed and implemented for an organizational
business process?
Student Assessment Guide: ICTCYS612
Version: v23.0
Page 33 of 35
Developed by: ACBI
Approved by: DoS
Issued: July 2021
Review: July 2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTCYS612 Design and implement virtualized cyber security infrastructure for organizations
A5:
Describe organisational procedures applicable to designing and implementing
cybersecurity infrastructure for the following processes:
Documenting established requirements, risks and work performed?
Establishing requirements and features of cyber security infrastructure?
Establishing maintenance and alert processes?
Testing methods and procedures?
A6:
Explain key security risks for small to large enterprises today?
A7:
Explain tolerance of risk in an organisation?
A8: Research three industry standard cyber security providers? Identify who they are
and what products or services they offer?
A9: Explain industry standards and regulations applicable to implementing cyber
security infrastructure in an organisation?
A10: Explain organisation, infrastructure, and cyber security requirements?
Task B - Plan infrastructure Did you:
Y
✓
B1:
Analyse WESEC’s operations to determine their cyber security needs? Specify these
needs in a one-two page summary for the organisation’s executives?
B2: Research and identify industry standard network security options and security
technologies, which you may use as benchmark and inspiration for your design?
B3:
Determine data types, security levels, mission-critical network servers and secure
boundary requirements for the existing network of WESEC?
B4:
Design and document infrastructure requirements according to organisational
requirements?
B5: Document an implementation plan and timeframes for their POC, ensuring it
considers the following important tasks:
Prepare a network diagram?
Allocate IP scheme?
Decide what versions of the software they will be using?
Prepare implementation plan along with timelines?
Prepare firewall rules?
Prepare network monitoring policy?
Student Assessment Guide: ICTCYS612
Version: v23.0
Page 34 of 35
Developed by: ACBI
Approved by: DoS
Issued: July 2021
Review: July 2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTCYS612 Design and implement virtualized cyber security infrastructure for organizations
B6: Document a network security monitoring strategy according to the design?
B7: Set up a meeting with:
An employee at WESEC, as role played by another student in your unit?
Use the meeting to:
Present your documentation?
Seek feedback on the documentation and respond to the feedback?
After the meeting, record notes of what was discussed, including the feedback received?
Task C - Implement infrastructure
Did you:
Y
✓
C1:
Establish and create network boundaries according to the infrastructure plan
requirements?
C2:
Implement network and server technologies according to infrastructure plan
requirements?
C3:
Implement user security technologies according to infrastructure plan
requirements?
C4:
Set security levels and user access according to organisational requirements?
C5:
Establish a network security monitoring strategy according to plan requirements?
Task D – Test infrastructure
Did you:
Y
✓
D1:
Test deployment of security infrastructure and its components according to
technical specifications and infrastructure plan requirements?
D2:
Obtain and analyse test results, logs and user feedback?
D3:
Troubleshoot and adjust implemented technologies according to organisational
requirements and user feedback?
Student Assessment Guide: ICTCYS612
Version: v23.0
Page 35 of 35
Developed by: ACBI
Approved by: DoS
Issued: July 2021
Review: July 2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help