Updated_ICTNWK546 Task 1 Baatarsukh Chinbaatar
docx
keyboard_arrow_up
School
Greenwich English College *
*We aren’t endorsed by this school
Course
402
Subject
Information Systems
Date
Nov 24, 2024
Type
docx
Pages
7
Uploaded by BailiffAnteater3751
ASSESSMENT ANSWER BOOKLET
FULL NAME
Chinbaatar Baatarsukh
STUDENT ID
NVR
TERM
6
YEAR
2023
UNIT NAME
Manage network security
UNIT CODE
ICTNWK546
DUE DATE
10/12/2023
DATE SUBMITTED
TRAINER NAME
Rusha Sharma
Student Declaration
By submitting this assessment, I acknowledge and agree that:
1.
I declare that this assessment has been completed by me and is my own work.
2.
I have read and understood the assessment requirements for this unit.
3.
This assessment is submitted in accordance with the NVR Copying and Plagiarism
Policy. I also understand the serious nature of academic dishonesty (such as
plagiarism) and the penalties attached to being found guilty of committing such
offences.
4.
No part of this assessment has been copied from any other source without
acknowledgement of the source.
5.
No part of this assessment has been written by any other person, except to the
extent of collaboration and/or group work as defined in the assessment.
6.
A copy of the original assessment is retained by me and that I may be required to
submit the original assessment to the trainer upon request.
7.
I am aware that assessments are completed within a simulated work environment.
8.
I am aware of my appeal rights.
Student Name
Chinbaatar Baatarsukh
Date
10/11/2023
ICTNWK546 Manage Network Security
ICTNWK546 Manage network securityIssue date: 10/08/2021
NVR Education Australia
Page 1
ABN:
40 622 911 826
, RTO ID: 45529, CRICOS ID: 03794C
Level 10, 10 Barrack Street Sydney NSW 2000, Ph: 02 8970 4043, www.nvr.edu.au
ASSESSMENT ANSWER BOOKLET
Students, please read each question below and provide your answers. Please
DO NOT
COPY
from any website as you will need to
summarise in your own
words
what you have found for each question. Please make sure all questions
are answered in your own words.
Task 1 – Written Questions
Provide answers to all of the questions below:
1.
List two (2) types of ICT networks. Include a description of their configuration in your
answer.
The two types of ICT networks are LAN and WAN.
LAN: Through connections, local area networks (LANs) can connect computers and other
peripheral devices inside a constrained physical space with wires, Ethernet cables, fiber
optics, and Wi-Fi. Computers, printers, and special devices with huge disk storage capacities
known as file servers are the standard components of a local area network (LAN). Users on
a LAN may connect to neighbouring LANs or wide area networks (WANs).
WAN: Wide area networks, sometimes known as WANs, are networks that connect
computers and smaller networks to larger networks that span wider geographical areas,
sometimes even multiple countries. Modems, which are often supplied by the service
provider, are used by users in order to connect to the networks even if the computers
themselves may be linked by cables, optical fibres, or satellites. The Internet is the world's
most extensive wide-area network (WAN), consisting of networks and gateways connecting
billions of users on each continent.
2.
Complete the following table about network attacks, vulnerabilities, and security
technologies.
Network attack 1
Network attack 2
List two (2) types of
network
attack.
Briefly describe the
type of attack.
DDOS:A hostile effort to
interrupt the usual activity of a
targeted server, service, or
network is known as a
distributed
denial-of-service
attack . This is accomplished
Phishing: Phishing is a sort of social
engineering that is often employed
for the purpose of obtaining user
data such as login credentials and
credit card information. Phishing is
also known as spear phishing. It
ICTNWK546 Manage network securityIssue date: 10/08/2021
NVR Education Australia
Page 2
ABN:
40 622 911 826
, RTO ID: 45529, CRICOS ID: 03794C
Level 10, 10 Barrack Street Sydney NSW 2000, Ph: 02 8970 4043, www.nvr.edu.au
ASSESSMENT ANSWER BOOKLET
by overloading the target or its
neighbouring areas with a
torrent of Internet traffic.
occurs when an attacker pretends
as a trustworthy person in order to
fool a victim into email and web
browsing, instant message, or text
that the assailant has sent. This
might be done using email, instant
messaging, or text message.
Outline
the
vulnerabilities of the
ICT system that
may have led to
each of the attacks.
DDOS attack on the contents.
Attacks on DDoS
Infrastructure Driven by Politics
Weak Password. Poor Firewall
Configurations.
Unsecured Email.
Outdated Software's.
List
a
security
technology that can
prevent such an
attack
Firewall and intrusion detection
system
Antivirus
Use strong passwords.
Update software's regularly.
Don't open link from unknown
sources.
Install Firewalls.
3.
With the expansion of cloud services and new technologies, the use of mobile devices
and the Internet of Things (IoT), there have also emerged a number of security issues.
List two (2) examples of emerging security issues.
Insecure Passwords: IoT devices have a number of password-related issues.
Device manufacturers commonly have weak default passwords that users do not
change before or after deploying them. Additionally, manufacturers occasionally
include hardcoded passwords in their systems that users cannot change. These
weak passwords place the IoT devices at high-risk. As attackers can simply log
into these devices with these easily-guessed passwords or simple brute-force
attacks.
Untrusted Deployment Locations: IoT devices are often designed to be deployed
in public and remote places where an attacker may be able to gain physical
access to the devices. This physical access may allow the attacker to bypass
existing defenses within the devices.
4.
Outline the terms auditing and penetration testing that can be used to measure a
network’s security.
ICTNWK546 Manage network securityIssue date: 10/08/2021
NVR Education Australia
Page 3
ABN:
40 622 911 826
, RTO ID: 45529, CRICOS ID: 03794C
Level 10, 10 Barrack Street Sydney NSW 2000, Ph: 02 8970 4043, www.nvr.edu.au
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
ASSESSMENT ANSWER BOOKLET
An audit may be performed on the security of an information system to evaluate how well it
complies with a set of criteria that have been established beforehand. A security audit is the
name given to this examination. When doing a thorough examination of a system's security,
it is common practice to examine not just the system's software, information management
policies, and user behaviours, but also its physical configuration and its immediate
environment. A penetration test, sometimes referred to as a pen test, is a hypothetical cyber
attack that is carried out against your computer network in order to check for vulnerabilities
that may be exploited.
5.
Outline two (2) logging analysis techniques that can be used to measure the security of
a network.
While there are a variety of techniques that may be used for log analysis — including
normalization, pattern recognition, and correlation analysis — there are dozens of tools on
the market (both free and paid!)
6.
Outline two (2) types of security measures that can be put in place in a network.
Firewall: A firewall is a kind of network security device that monitors the flow of data and
chooses whether or not to admit or reject data packets based on a specified set of security
rules. Firewalls are used to protect networks from potential threats. Its purpose is to prevent
malicious traffic generated by hackers and viruses from accessing your internal network by
erecting a barrier between your business network and information coming in from other
sources (like the internet). This barrier is supposed to be created by the software.
VPN: A virtual private network, more often referred to as a VPN, enables you to maintain
your online privacy and confidentiality by transforming a public internet connection into a
private network. Virtual private networks, or VPNs, allow users to remain practically
untraceable online by concealing their internet protocol (IP) address. The most fundamental
benefit of using a virtual private network, or VPN, is that it encrypts your data and creates a
secure connection between your device and the VPN server.
7.
List a type of software that can be used for network security and summarise its
capabilities.
Bitdefender is widely considered to be the best effective network security software.
Avast CloudCare is the solution of choice for managed service providers that oversee
various networks.
Firemon is the most effective software for automating network security.
Watchguard is the most effective solution for providing real-time network visibility.
Qualys is the most effective solution for managing network vulnerabilities.
FireEye is the most effective solution for both threat detection and response.
Cisco Network Security is the most adaptable and flexible solution for network security.
ICTNWK546 Manage network securityIssue date: 10/08/2021
NVR Education Australia
Page 4
ABN:
40 622 911 826
, RTO ID: 45529, CRICOS ID: 03794C
Level 10, 10 Barrack Street Sydney NSW 2000, Ph: 02 8970 4043, www.nvr.edu.au
ASSESSMENT ANSWER BOOKLET
Webroot is the best antivirus software for small companies.
8.
List a type of hardware that can be used for network security and summarise its
capabilities.
Firewall: The internal network you control and the rest of the Internet are kept apart by
firewalls. They can prevent connections from being made on specific ports, from certain IP
addresses, and from computers or networks that meet other requirements. The network will
have an increased level of protection since the majority of firewalls' default settings are to
block all incoming traffic. The vast majority of companies use dedicated specialist hardware
since it can manage higher volumes of traffic and has more significant support from its
manufacturers.
Intrusion Protection Systems (IPS): Network-based intrusion prevention solutions are
designed to monitor all traffic that proactively passes through your network. IPS systems can
identify various network intrusions, ranging from malware on endpoint devices to denial-of-
service assaults. They can communicate with firewalls in real-time when new threats are
identified. For example, an intrusion prevention system (IPS) might identify a device with
malware based on the strange and suspicious network traffic it generates.
Network Access Control: Endpoint devices that are infected or configured insecurely should
not be allowed to connect to the network to maintain the network's high level of safety and
protection for sensitive data. Through the use of network access control devices, there is a
connection established between the condition of endpoint devices and network
authentication. Suppose an integrated solution is used to regulate access to the network. In
that case, it may be designed to guarantee that devices are unable to authenticate
themselves if they do not have the most current security updates installed on their respective
operating systems.
9.
Given the importance of network security, describe the key features that a network
security policy should include, as well as procedures that should be included.
Determining which network assets need to be safeguarded and establishing the methods
and rules that will safeguard the safety of these assets is the responsibility of a network
security policy, which may help reduce the number of security risks.
The following components are necessary for an effective information technology security
policy:
Purpose.
Audience.
Objectives regarding information security.
The policy on authority and access control, as well as your policy on physical security, are
included here.
Data classification.
ICTNWK546 Manage network securityIssue date: 10/08/2021
NVR Education Australia
Page 5
ABN:
40 622 911 826
, RTO ID: 45529, CRICOS ID: 03794C
Level 10, 10 Barrack Street Sydney NSW 2000, Ph: 02 8970 4043, www.nvr.edu.au
ASSESSMENT ANSWER BOOKLET
The management and maintenance of data.
Awareness of security procedures and conduct.
Responsibilities, legal rights, and ethical obligations.
10.
Outline two (2) network management and security process controls that can be put in
place to ensure network security.
Authentication: When a user attempts to join a network, the process of authenticating that
person by checking their credentials is called joining the network. Authentication of users is
required on both wired and wireless networks, which is done before resources on the
network are made available to users. User authentication often includes both a user ID and a
password as required fields for entry. Comparing a product to the information printed on its
label and validating a website using a digital certificate are two other authentication methods.
Authorization: Authorization is granting authorization to enter resources or carry out an
activity on a network. It is also known as authentication. Users of a multiuser system may
have their access rights customized according to the preferences of the system's network
administrators. Even the user privileges are up to their discretion. The authorization
mechanism gives the network administrator the ability to generate access permissions for
users and check the access rights that have been set for each user.
11.
Explain the importance of a risk management plan and procedures in network security
implementation.
With the assistance of a risk treatment plan, risks may be dealt with appropriately, and
appropriate defences can be put into place. The risk of being attacked online will decrease
due to this measure. Reduced costs while maintaining or increasing revenue: Most who
commit violent acts do so to amass monetary gain. Because of this, every organization is
susceptible to being targeted.
12.
Outline the process of developing risk management plans and procedures as part of
network security planning.
1. Landscape and regulatory summary
2. Overseeing and responsibilities of governance
3. Carry out an inventory of your assets
4. The categorization of the data
5. Evaluate the security safeguard that is currently available.
6. Carry out a risk evaluation in the cyberspace
7. Carry out an evaluation of the dangers presented by third parties
8. Develop a communication and response plan
9. Employee training
ICTNWK546 Manage network securityIssue date: 10/08/2021
NVR Education Australia
Page 6
ABN:
40 622 911 826
, RTO ID: 45529, CRICOS ID: 03794C
Level 10, 10 Barrack Street Sydney NSW 2000, Ph: 02 8970 4043, www.nvr.edu.au
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
ASSESSMENT ANSWER BOOKLET
13.
Explain how risk management should be built into cost analysis and budgeting of
network security. Give an example to illustrate your answer.
Performing a cost-benefit analysis is an excellent method for evaluating projects since it
simplifies the assessment process by reducing it to a single number. The average overall
cost of recovering from a ransomware attack has over doubled in only one year, jumping
from $761,106 in 2022 to $1.85 million in 2023. This figure represents a significant increase
from the previous year's figure.
Eg: if an organisation choses to accept a networking risk they will not invest in the risk to be
mitigated and draw an exception. On the other hand if the risk is unacceptable then an
investment is required to mitigate the risk.
ICTNWK546 Manage network securityIssue date: 10/08/2021
NVR Education Australia
Page 7
ABN:
40 622 911 826
, RTO ID: 45529, CRICOS ID: 03794C
Level 10, 10 Barrack Street Sydney NSW 2000, Ph: 02 8970 4043, www.nvr.edu.au