ICTCYS612 Student Assessment Tasks Version 1.0

pdf

School

Northeastern University *

*We aren’t endorsed by this school

Course

612

Subject

Information Systems

Date

Feb 20, 2024

Type

pdf

Pages

28

Uploaded by PresidentPanther2925

Report
ICTCYS612 Design and implement virtualised cyber security infrastructure for organisations Page 1 of 28 Final Results Record Student name: Assessor name: Date Final assessment results Task Type Result Satisfactory Unsatisfactory Did not submit Assessment Task 1 Knowledge questions S U DNS Assessment Task 2 Project Portfolio S U DNS Overall unit results C NYC Feedback My performance in this unit has been discussed and explained to me. I would like to appeal this assessment decision. Student signature: ________________________________________ Date: ________________ I hereby certify that this student has been assessed by me and that the assessment has been carried out according to the required assessment procedures. Assessor signature: ______________________________________ Date: _______________
ICTCYS612 Design and implement virtualised cyber security infrastructure for organisations Page 2 of 28 CONTENTS Introduction ......................................................................................................................................... 3 Assessment Task 1: Knowledge Questions ....................................................................................... 4 Assessment Task 1: Checklist ............................................................................................................ 7 Assessment Task 2: Project Portfolio ................................................................................................. 8 Assessment Task 2: Checklist .......................................................................................................... 12
ICTCYS612 Design and implement virtualised cyber security infrastructure for organisations Page 3 of 28 Introduction The assessment tasks for ICTCYS612 Design and implement virtualised cyber security infrastructure for organisations are outlined in the assessment plan below. These tasks have been designed to help you demonstrate the skills and knowledge that you have learnt during your course. Please ensure that you read the instructions provided with these tasks carefully. You should also follow the advice provided in the IT Works Student User Guide . The Student User Guide provides important information for you relating to completing assessment successfully. Assessment for this unit ICTCYS612 Design and implement virtualised cyber security infrastructure for organisations describes the skills and knowledge required to research, design, implement and test virtualised cyber security infrastructure in a small to medium sized organisation. For you to be assessed as competent, you must successfully complete two assessment tasks: Assessment Task 1: Knowledge questions You must answer all questions correctly. Assessment Task 2: Project You must work through a range of activities and complete a project portfolio.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
ICTCYS612 Design and implement virtualised cyber security infrastructure for organisations Page 4 of 28 Assessment Task 1: Knowledge Questions Information for students Knowledge questions are designed to help you demonstrate the knowledge which you have acquired during the learning phase of this unit. Ensure that you: review the advice to students regarding answering knowledge questions in the IT Works Student User Guide comply with the due date for assessment which your assessor will provide adhere with your RTO’s submission guidelines answer all questions completely and correctly submit work which is original and, where necessary, properly referenced submit a completed cover sheet with your work avoid sharing your answers with other students. Assessment information Information about how you should complete this assessment can be found in Appendix A of the IT Works Student User Guide . Refer to the appendix for information on: where this task should be completed the maximum time allowed for completing this assessment task whether or not this task is open-book. Note : You must complete and submit an assessment cover sheet with your work. A template is provided in Appendix C of the Student User Guide. However, if your RTO has provided you with an assessment cover sheet, please ensure that you use that. i
ICTCYS612 Design and implement virtualised cyber security infrastructure for organisations Page 5 of 28 Questions Provide answers to all of the questions below: 1. List three features associated with implementation methodologies for cyber security. 2. Describe each of the following that are key features of a cyber security infrastructure. Features of cyber security infrastructure Provide a brief description Application security Business continuity planning Disaster recovery planning Operational security (OPSEC) Threat vectors 3. Describe the purpose of each of the following organisation procedures when designing and implementing cyber security infrastructure. Approval processes e.g. identifying and documenting cyber security requirements/features
ICTCYS612 Design and implement virtualised cyber security infrastructure for organisations Page 6 of 28 Risk management Establishing maintenance and alert processes Testing methods and procedures 4. List two cyber security risks. 5. List three factors that can influence tolerance of cyber security risk. 6. Describe an industry standard and regulation applicable to implementing cyber security infrastructure.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
ICTCYS612 Design and implement virtualised cyber security infrastructure for organisations Page 7 of 28 Assessment Task 1: Checklist Student’s name: Did the student provide a sufficient and clear answer that addresses the suggested answer for the following? Completed successfully? Comments Yes No Question 1 Question 2 Question 3 Question 4 Question 5 Question 6 Task outcome: Satisfactory Not satisfactory Assessor signature: Assessor name: Date:
ICTCYS612 Design and implement virtualised cyber security infrastructure for organisations Page 8 of 28 Assessment Task 2: Project Portfolio Information for students In this task, you are required to demonstrate your skills and knowledge by working through a number of activities and completing and submitting a project portfolio. You will need access to: a suitable place to complete activities that replicates an ICT environment including relevant hardware, software and components, as well as application and user security technologies and cyber security providers ICTCYS612 Simulation Pack or access to operational details required to determine cyber security requirements your learning resources and other information for reference Project Portfolio template. Ensure that you: review the advice to students regarding responding to written tasks in the IT Works Student User Guide comply with the due date for assessment which your assessor will provide adhere with your RTO’s submission guidelines answer all questions completely and correctly submit work which is original and, where necessary, properly referenced submit a completed cover sheet with your work avoid sharing your answers with other students. Assessment information Information about how you should complete this assessment can be found in Appendix A of the IT Works Student User Guide . Refer to the appendix for information on: where this task should be completed how your assessment should be submitted. Note : You must complete and submit an assessment cover sheet with your work. A template is provided in Appendix B of the Student User Guide. However, if your RTO has provided you with an assessment cover sheet, please ensure that you use that. i
ICTCYS612 Design and implement virtualised cyber security infrastructure for organisations Page 9 of 28 Activities Complete the following activities: 1. Carefully read the following: This project requires you to research, design, implement and test virtualised cyber security infrastructure on two different occasions. You can complete this project based on the case study organisations in the ICTCYS612 Simulation Pack or you can base it on two organisations that you are familiar with or working for. If you choose to complete the project based on the two organisations of your choice, it is important that they are both small to medium sized business and you can access information about the operational details required to determine cyber security requirements. You will also need to able to access all of the required hardware and software and components, as well as application and user security technologies and cyber security providers. Speak to your assessor to get approval if you want to base this on two organisations of your choice. You will be collecting evidence for this unit in a Project Portfolio. The steps you need to take are outlined below. 2. Preparation Make sure you are familiar with the organisations you are basing this assessment on and have read through the necessary background information. For the case study organisations, this is all of the documents included in the ICTCYS612 Simulation Pack . If it’s your own organisations, it’s important that you have this approved by your assessor. Complete Page 4 of your Project Portfolio for this unit. Read through the requirements of Section 1 and 2 of your Project Portfolio which include detailed guidance relevant to all the assessment activities. 3. Designing the virtualised cyber security infrastructure You are now to complete Section 1 of your Project Portfolio by preparing to design and then designing the virtualised cyber security infrastructure. This involves: Reviewing and reporting on each organisation’s operations to determine their cyber security needs Researching and identifying options for network security for each organisation, as well as security technologies that can be used. Determining the data types that need to be protected, required security levels and boundaries and mission critical server requirements.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
ICTCYS612 Design and implement virtualised cyber security infrastructure for organisations Page 10 of 28 Based on your review and research you are now to design the virtualised cyber security infrastructure for each organisation, as well as a plan for implementing the infrastructure including timelines and for monitoring the security of the network. In preparation for implementing the infrastructure for each organisation, you will also need to identify and obtain all of the tools you need to implement the infrastructure, as well as gain access to the network and data that needs to be protected. Answer all the questions in the Portfolio and then prepare a presentation to present your infrastructure designs in the next activity. Your presentation will be to a small group of students and your assessor will advise you of the date and time for the presentation. Your presentation is to be for approximately 15 minutes and you will be required to ask for feedback and then to incorporate this feedback into your design following the meeting. Complete Section 1 of your Project Portfolio. 4. Infrastructure designs presentation You are now to present your infrastructure designs. Your presentation will be approximately 15 minutes. Speak carefully to your presentation and ensure you clearly articulate the information using industry standard technical language. In addition use suitable questioning techniques to seek feedback and active listening skills to listen to feedback provided. This can either be viewed in person by your assessor or you may like to video record the session for your assessor to watch later. Your assessor can provide you with more details at this step. Make sure you follow the instructions above and meet the timeframes allocated. 5. Implement and test infrastructure Now that you have designed your virtualised cyber security infrastructure for each organisation, you are to implement your infrastructure as set out in your implementation plan. Once the infrastructure for each organisation is in place, you will also need to test it to ensure it is functioning correctly and adjust it as required. You will also need to speak to your assessor to get their feedback on your implementation of the design and testing. Complete Section 2 of your Project Portfolio. i
ICTCYS612 Design and implement virtualised cyber security infrastructure for organisations Page 11 of 28 6. Submit your completed Project Portfolio Make sure you have completed all sections of your Project Portfolio , answered all questions, provided enough detail as indicated and proofread for spelling and grammar as necessary. Remember to submit all necessary attachments. You are then to submit this to management (your assessor) via email. Your email must seek final sign off for the identify management plan, as well as seeking feedback (which you must also respond to).
ICTCYS612 Design and implement virtualised cyber security infrastructure for organisations Page 12 of 28 Assessment Task 2: Checklist Student’s name: Did the student: Completed successfully? Comments Yes No Design and implement cyber security infrastructure and review results against organisational needs on at least two different occasions? Analyse each organisation’s operations and determine and report on cyber security needs? Research and identify industry standard network security options and security technologies? Determine and report on data types, security levels, mission-critical network servers and secure boundary requirements? Design and document infrastructure requirements following organisation requirements? Determine and document implementation plan and timeframes? Obtain tools, network access and data as per organisational requirements? Plan and document network security monitoring strategy following organisational requirements? Distribute documentation and seek feedback? Use oral communication skills to articulate information using industry standard technical language?
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
ICTCYS612 Design and implement virtualised cyber security infrastructure for organisations Page 13 of 28 Use oral communication skills including using suitable questioning techniques to seek feedback and active listening skills to listen to feedback provided? Respond to feedback provided? Establish and create network boundaries following the infrastructure plan requirements? Implement network and server technologies as per the infrastructure plan requirements? Implement user security technologies as per the infrastructure plan requirements? Set security levels and user access as per the organisatio n’s requirements? Establish network security monitoring strategy according to plan requirements? Test deployment of security infrastructure and its components according to technical specifications and infrastructure plan requirements? Obtain and analyse test results, logs and user feedback? Adjust implemented technologies as per organisational requirements and user feedback? Task outcome: Satisfactory Not satisfactory Assessor signature: Assessor name: Date:
ICTCYS612 Design and implement virtualised cyber security infrastructure for organisations Page 14 of 28 Case Study IT Biz Solutions offers a wide range of Information and Communication Technology services to businesses of all sizes. Assume you are the IT Manager for IT Biz Solutions and you have been asked to consider the virtualised cyber security infrastructure for two case study organisations as follows: Jonathan’s Graphic Design – Business information Business type Graphic design business IT needs Wants to run two operating systems Mac and Windows therefore a virtual machine is required. Wants to make sure that the virtual machine is cyber secure. Data types Customer database stored on system, however, no bank details stored Accounting system Xero Files associated with graphic design Uses OneDrive Security levels Set for one user as single business owner. Mission critical network servers Through service providers i.e. Xero and OneDrive. Secure boundary requirements Must control input and outputs of digital estate. King Edward VII College Business information Business type Vocational college IT needs Wants to establish a virtual machine for testing software. Wants to make sure that the virtual machine is cyber secure. Data types Student management system RTO Manager Accounting system Xero Staff files
ICTCYS612 Design and implement virtualised cyber security infrastructure for organisations Page 15 of 28 Files associated with all aspects of operations e.g. academic documentation, enrolment documentation Security levels A multilevel security mode is needed such that everyone must have permission to access the system but specific access for specific data will be required. Mission critical network servers Through service providers i.e. RTO Manager, Xero and OneDrive. Secure boundary requirements Must control input and outputs of digital estate.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
ICTCYS612 Design and implement virtualised cyber security infrastructure for organisations Page 16 of 28 SITHCCC038 produce and serve food for buffets PROJECT PORTFOLIO ICTCYS612 Design and implement virtualised cyber security infrastructure for organisations
ICTCYS612 Design and implement virtualised cyber security infrastructure for organisations Page 17 of 28 CONTENTS Section 1: Virtualised cyber security infrastructure 19 Section 2: Implementation and testing 25
ICTCYS612 Design and implement virtualised cyber security infrastructure for organisations Page 18 of 28 Student name: Assessor: Date: Organisations this assessment is based on:
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
ICTCYS612 Design and implement virtualised cyber security infrastructure for organisations Page 19 of 28 Section 1: Virtualised cyber security infrastructure Complete this section for each organisation. Organisation 1 Organisation operations Provide an analysis of your chosen organisation’s operations. Describe the cyber security needs the organisation has based on their operations. Network security options and technologies Based on the organisation’s cyber security needs, identify and describe network security options, as well as suitable security technologies. Remember that these must relate to virtualised cyber security infrastructures. Include at least two options for network security and two security technologies. Requirements Describe the data types to be protected, security levels required and secure boundary requirements. Further, describe the mission- critical network servers that are part of the infrastructure.
ICTCYS612 Design and implement virtualised cyber security infrastructure for organisations Page 20 of 28 Infrastructure design Provide your design for the virtualised cyber security infrastructure. You can include this as a screenshot and attach it to your Portfolio. Implementation plan Provide your implementation plan for your design. Make sure you plan includes: Actions for implementation including network boundaries and technologies that will be used. responsibilities and timelines. Network security monitoring strategy Describe the strategy that will be used for monitoring the network security.
ICTCYS612 Design and implement virtualised cyber security infrastructure for organisations Page 21 of 28 Tools Outline the tools that you will use to implement the infrastructure. Explain how you will obtain access to the network and data you need. Presentation Include the title of your presentation here and attach it to your Portfolio. Feedback Document the feedback you received from the presentation regarding your design. Describe your response to this feedback and adjustments you will make. Attach: Screenshots Presentation
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
ICTCYS612 Design and implement virtualised cyber security infrastructure for organisations Page 22 of 28 Organisation 2 Organisation operations Provide an analysis of your chosen organisation’s operations. Describe the cyber security needs the organisation has based on their operations. Network security options and technologies Based on the organisation’s cyber security needs, identify and describe network security options, as well as suitable security technologies. Remember that these must relate to virtualised cyber security infrastructures. Include at least two options for network security and two security technologies. Requirements Describe the data types to be protected, security levels required and secure boundary requirements. Further, describe the mission- critical network servers that are part of the infrastructure.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
ICTCYS612 Design and implement virtualised cyber security infrastructure for organisations Page 23 of 28 Infrastructure design Provide your design for the virtualised cyber security infrastructure. You can include this as a screenshot and attach it to your Portfolio. Implementation plan Provide your implementation plan for your design. Make sure you plan includes: Actions for implementation including network boundaries and technologies that will be used. responsibilities and timelines. Network security monitoring strategy Describe the strategy that will be used for monitoring the network security.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
ICTCYS612 Design and implement virtualised cyber security infrastructure for organisations Page 24 of 28 Tools Outline the tools that you will use to implement the infrastructure. Explain how you will obtain access to the network and data you need. Presentation Include the title of your presentation here and attach it to your Portfolio. Feedback Document the feedback you received from the presentation regarding your design. Describe your response to this feedback and adjustments you will make. Attach: Screenshots Presentation
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
ICTCYS612 Design and implement virtualised cyber security infrastructure for organisations Page 25 of 28 Section 2: Implementation and testing Complete this section for each organisation. Organisation 1 Implementation You are to provide evidence of the implementation of your design. This should include screenshots that show: Network boundaries created Relevant technologies implemented Security levels set User access set Testing Run tests on your network which will also demonstrate how you monitor the network. Describe the tests you undertook and the results. Provide screenshots of the test results including logs.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
ICTCYS612 Design and implement virtualised cyber security infrastructure for organisations Page 26 of 28 User feedback Document the user feedback from your assessor. Adjustments Based on the tests you ran, monitoring and user feedback describe the adjustments you need to make. Attach: Screenshots
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
ICTCYS612 Design and implement virtualised cyber security infrastructure for organisations Page 27 of 28 Organisation 2 Implementation You are to provide evidence of the implementation of your design. This should include screenshots that show: Network boundaries created Relevant technologies implemented Security levels set User access set Testing Run tests on your network which will also demonstrate how you monitor the network. Describe the tests you undertook and the results. Provide screenshots of the test results including logs. User feedback Document the user feedback from your assessor.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
ICTCYS612 Design and implement virtualised cyber security infrastructure for organisations Page 28 of 28 Adjustments Based on the tests you ran, monitoring and user feedback describe the adjustments you need to make. Attach: Screenshots
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help