Updated_ICTNWK546 Task 1 Baatarsukh Chinbaatar

docx

School

Greenwich English College *

*We aren’t endorsed by this school

Course

402

Subject

Information Systems

Date

Nov 24, 2024

Type

docx

Pages

7

Uploaded by BailiffAnteater3751

Report
ASSESSMENT ANSWER BOOKLET FULL NAME Chinbaatar Baatarsukh STUDENT ID NVR TERM 6 YEAR 2023 UNIT NAME Manage network security UNIT CODE ICTNWK546 DUE DATE 10/12/2023 DATE SUBMITTED TRAINER NAME Rusha Sharma Student Declaration By submitting this assessment, I acknowledge and agree that: 1. I declare that this assessment has been completed by me and is my own work. 2. I have read and understood the assessment requirements for this unit. 3. This assessment is submitted in accordance with the NVR Copying and Plagiarism Policy. I also understand the serious nature of academic dishonesty (such as plagiarism) and the penalties attached to being found guilty of committing such offences. 4. No part of this assessment has been copied from any other source without acknowledgement of the source. 5. No part of this assessment has been written by any other person, except to the extent of collaboration and/or group work as defined in the assessment. 6. A copy of the original assessment is retained by me and that I may be required to submit the original assessment to the trainer upon request. 7. I am aware that assessments are completed within a simulated work environment. 8. I am aware of my appeal rights. Student Name Chinbaatar Baatarsukh Date 10/11/2023 ICTNWK546 Manage Network Security ICTNWK546 Manage network securityIssue date: 10/08/2021 NVR Education Australia Page 1 ABN: 40 622 911 826 , RTO ID: 45529, CRICOS ID: 03794C Level 10, 10 Barrack Street Sydney NSW 2000, Ph: 02 8970 4043, www.nvr.edu.au
ASSESSMENT ANSWER BOOKLET Students, please read each question below and provide your answers. Please DO NOT COPY from any website as you will need to summarise in your own words what you have found for each question. Please make sure all questions are answered in your own words. Task 1 – Written Questions Provide answers to all of the questions below: 1. List two (2) types of ICT networks. Include a description of their configuration in your answer. The two types of ICT networks are LAN and WAN. LAN: Through connections, local area networks (LANs) can connect computers and other peripheral devices inside a constrained physical space with wires, Ethernet cables, fiber optics, and Wi-Fi. Computers, printers, and special devices with huge disk storage capacities known as file servers are the standard components of a local area network (LAN). Users on a LAN may connect to neighbouring LANs or wide area networks (WANs). WAN: Wide area networks, sometimes known as WANs, are networks that connect computers and smaller networks to larger networks that span wider geographical areas, sometimes even multiple countries. Modems, which are often supplied by the service provider, are used by users in order to connect to the networks even if the computers themselves may be linked by cables, optical fibres, or satellites. The Internet is the world's most extensive wide-area network (WAN), consisting of networks and gateways connecting billions of users on each continent. 2. Complete the following table about network attacks, vulnerabilities, and security technologies. Network attack 1 Network attack 2 List two (2) types of network attack. Briefly describe the type of attack. DDOS:A hostile effort to interrupt the usual activity of a targeted server, service, or network is known as a distributed denial-of-service attack . This is accomplished Phishing: Phishing is a sort of social engineering that is often employed for the purpose of obtaining user data such as login credentials and credit card information. Phishing is also known as spear phishing. It ICTNWK546 Manage network securityIssue date: 10/08/2021 NVR Education Australia Page 2 ABN: 40 622 911 826 , RTO ID: 45529, CRICOS ID: 03794C Level 10, 10 Barrack Street Sydney NSW 2000, Ph: 02 8970 4043, www.nvr.edu.au
ASSESSMENT ANSWER BOOKLET by overloading the target or its neighbouring areas with a torrent of Internet traffic. occurs when an attacker pretends as a trustworthy person in order to fool a victim into email and web browsing, instant message, or text that the assailant has sent. This might be done using email, instant messaging, or text message. Outline the vulnerabilities of the ICT system that may have led to each of the attacks. DDOS attack on the contents. Attacks on DDoS Infrastructure Driven by Politics Weak Password. Poor Firewall Configurations. Unsecured Email. Outdated Software's. List a security technology that can prevent such an attack Firewall and intrusion detection system Antivirus Use strong passwords. Update software's regularly. Don't open link from unknown sources. Install Firewalls. 3. With the expansion of cloud services and new technologies, the use of mobile devices and the Internet of Things (IoT), there have also emerged a number of security issues. List two (2) examples of emerging security issues. Insecure Passwords: IoT devices have a number of password-related issues. Device manufacturers commonly have weak default passwords that users do not change before or after deploying them. Additionally, manufacturers occasionally include hardcoded passwords in their systems that users cannot change. These weak passwords place the IoT devices at high-risk. As attackers can simply log into these devices with these easily-guessed passwords or simple brute-force attacks. Untrusted Deployment Locations: IoT devices are often designed to be deployed in public and remote places where an attacker may be able to gain physical access to the devices. This physical access may allow the attacker to bypass existing defenses within the devices. 4. Outline the terms auditing and penetration testing that can be used to measure a network’s security. ICTNWK546 Manage network securityIssue date: 10/08/2021 NVR Education Australia Page 3 ABN: 40 622 911 826 , RTO ID: 45529, CRICOS ID: 03794C Level 10, 10 Barrack Street Sydney NSW 2000, Ph: 02 8970 4043, www.nvr.edu.au
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
ASSESSMENT ANSWER BOOKLET An audit may be performed on the security of an information system to evaluate how well it complies with a set of criteria that have been established beforehand. A security audit is the name given to this examination. When doing a thorough examination of a system's security, it is common practice to examine not just the system's software, information management policies, and user behaviours, but also its physical configuration and its immediate environment. A penetration test, sometimes referred to as a pen test, is a hypothetical cyber attack that is carried out against your computer network in order to check for vulnerabilities that may be exploited. 5. Outline two (2) logging analysis techniques that can be used to measure the security of a network. While there are a variety of techniques that may be used for log analysis — including normalization, pattern recognition, and correlation analysis — there are dozens of tools on the market (both free and paid!) 6. Outline two (2) types of security measures that can be put in place in a network. Firewall: A firewall is a kind of network security device that monitors the flow of data and chooses whether or not to admit or reject data packets based on a specified set of security rules. Firewalls are used to protect networks from potential threats. Its purpose is to prevent malicious traffic generated by hackers and viruses from accessing your internal network by erecting a barrier between your business network and information coming in from other sources (like the internet). This barrier is supposed to be created by the software. VPN: A virtual private network, more often referred to as a VPN, enables you to maintain your online privacy and confidentiality by transforming a public internet connection into a private network. Virtual private networks, or VPNs, allow users to remain practically untraceable online by concealing their internet protocol (IP) address. The most fundamental benefit of using a virtual private network, or VPN, is that it encrypts your data and creates a secure connection between your device and the VPN server. 7. List a type of software that can be used for network security and summarise its capabilities. Bitdefender is widely considered to be the best effective network security software. Avast CloudCare is the solution of choice for managed service providers that oversee various networks. Firemon is the most effective software for automating network security. Watchguard is the most effective solution for providing real-time network visibility. Qualys is the most effective solution for managing network vulnerabilities. FireEye is the most effective solution for both threat detection and response. Cisco Network Security is the most adaptable and flexible solution for network security. ICTNWK546 Manage network securityIssue date: 10/08/2021 NVR Education Australia Page 4 ABN: 40 622 911 826 , RTO ID: 45529, CRICOS ID: 03794C Level 10, 10 Barrack Street Sydney NSW 2000, Ph: 02 8970 4043, www.nvr.edu.au
ASSESSMENT ANSWER BOOKLET Webroot is the best antivirus software for small companies. 8. List a type of hardware that can be used for network security and summarise its capabilities. Firewall: The internal network you control and the rest of the Internet are kept apart by firewalls. They can prevent connections from being made on specific ports, from certain IP addresses, and from computers or networks that meet other requirements. The network will have an increased level of protection since the majority of firewalls' default settings are to block all incoming traffic. The vast majority of companies use dedicated specialist hardware since it can manage higher volumes of traffic and has more significant support from its manufacturers. Intrusion Protection Systems (IPS): Network-based intrusion prevention solutions are designed to monitor all traffic that proactively passes through your network. IPS systems can identify various network intrusions, ranging from malware on endpoint devices to denial-of- service assaults. They can communicate with firewalls in real-time when new threats are identified. For example, an intrusion prevention system (IPS) might identify a device with malware based on the strange and suspicious network traffic it generates. Network Access Control: Endpoint devices that are infected or configured insecurely should not be allowed to connect to the network to maintain the network's high level of safety and protection for sensitive data. Through the use of network access control devices, there is a connection established between the condition of endpoint devices and network authentication. Suppose an integrated solution is used to regulate access to the network. In that case, it may be designed to guarantee that devices are unable to authenticate themselves if they do not have the most current security updates installed on their respective operating systems. 9. Given the importance of network security, describe the key features that a network security policy should include, as well as procedures that should be included. Determining which network assets need to be safeguarded and establishing the methods and rules that will safeguard the safety of these assets is the responsibility of a network security policy, which may help reduce the number of security risks. The following components are necessary for an effective information technology security policy: Purpose. Audience. Objectives regarding information security. The policy on authority and access control, as well as your policy on physical security, are included here. Data classification. ICTNWK546 Manage network securityIssue date: 10/08/2021 NVR Education Australia Page 5 ABN: 40 622 911 826 , RTO ID: 45529, CRICOS ID: 03794C Level 10, 10 Barrack Street Sydney NSW 2000, Ph: 02 8970 4043, www.nvr.edu.au
ASSESSMENT ANSWER BOOKLET The management and maintenance of data. Awareness of security procedures and conduct. Responsibilities, legal rights, and ethical obligations. 10. Outline two (2) network management and security process controls that can be put in place to ensure network security. Authentication: When a user attempts to join a network, the process of authenticating that person by checking their credentials is called joining the network. Authentication of users is required on both wired and wireless networks, which is done before resources on the network are made available to users. User authentication often includes both a user ID and a password as required fields for entry. Comparing a product to the information printed on its label and validating a website using a digital certificate are two other authentication methods. Authorization: Authorization is granting authorization to enter resources or carry out an activity on a network. It is also known as authentication. Users of a multiuser system may have their access rights customized according to the preferences of the system's network administrators. Even the user privileges are up to their discretion. The authorization mechanism gives the network administrator the ability to generate access permissions for users and check the access rights that have been set for each user. 11. Explain the importance of a risk management plan and procedures in network security implementation. With the assistance of a risk treatment plan, risks may be dealt with appropriately, and appropriate defences can be put into place. The risk of being attacked online will decrease due to this measure. Reduced costs while maintaining or increasing revenue: Most who commit violent acts do so to amass monetary gain. Because of this, every organization is susceptible to being targeted. 12. Outline the process of developing risk management plans and procedures as part of network security planning. 1. Landscape and regulatory summary 2. Overseeing and responsibilities of governance 3. Carry out an inventory of your assets 4. The categorization of the data 5. Evaluate the security safeguard that is currently available. 6. Carry out a risk evaluation in the cyberspace 7. Carry out an evaluation of the dangers presented by third parties 8. Develop a communication and response plan 9. Employee training ICTNWK546 Manage network securityIssue date: 10/08/2021 NVR Education Australia Page 6 ABN: 40 622 911 826 , RTO ID: 45529, CRICOS ID: 03794C Level 10, 10 Barrack Street Sydney NSW 2000, Ph: 02 8970 4043, www.nvr.edu.au
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
ASSESSMENT ANSWER BOOKLET 13. Explain how risk management should be built into cost analysis and budgeting of network security. Give an example to illustrate your answer. Performing a cost-benefit analysis is an excellent method for evaluating projects since it simplifies the assessment process by reducing it to a single number. The average overall cost of recovering from a ransomware attack has over doubled in only one year, jumping from $761,106 in 2022 to $1.85 million in 2023. This figure represents a significant increase from the previous year's figure. Eg: if an organisation choses to accept a networking risk they will not invest in the risk to be mitigated and draw an exception. On the other hand if the risk is unacceptable then an investment is required to mitigate the risk. ICTNWK546 Manage network securityIssue date: 10/08/2021 NVR Education Australia Page 7 ABN: 40 622 911 826 , RTO ID: 45529, CRICOS ID: 03794C Level 10, 10 Barrack Street Sydney NSW 2000, Ph: 02 8970 4043, www.nvr.edu.au