ICTCYS612 A1 -
docx
keyboard_arrow_up
School
Deakin University *
*We aren’t endorsed by this school
Course
606
Subject
Information Systems
Date
Feb 20, 2024
Type
docx
Pages
58
Uploaded by BrigadierAnteaterMaster276
Student
Assessment Guide:
ICTCYS612 Design and implement virtualized
cyber security infrastructure for organizations
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTCYS612 Design and implement virtualized cyber security infrastructure for organizations
Copyright 2023
Australian College of Business Intelligence
All rights reserved
Version: 23.0
Date Modified: July 2023
No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording or otherwise without the prior written permission of the Australian College of Business Intelligence.
Disclaimer:
The Australian College of Business Intelligence does not invite reliance upon, nor accept responsibility for, the information it provides. The Australian College of Business Intelligence makes every effort to provide a high-quality service. However, neither the Australian College of Business Intelligence, nor the providers of data, gives any guarantees, undertakings or warranties concerning the accuracy, completeness or up-to-date nature of the information provided. Users should confirm information from another source if it is of sufficient importance for them to do so.
Student Assessment Guide: ICTCYS612
Version: v23.0
Page 2 of 58
Developed by: ACBI
Approved by: DoS
Issued: July 2021
Review: July 2023
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTCYS612 Design and implement virtualized cyber security infrastructure for organizations
Content
s
1. Assessment Information
......................................................................................................
4
A. Purpose of assessment
........................................................................................................................
4
B. What you are required to do
...............................................................................................................
4
C. Competencies being assessed
.............................................................................................................
4
D. Important resources for completing this assessment
.........................................................................
5
E. A note on plagiarism and referencing
..................................................................................................
6
F. A note on questions with role plays
.....................................................................................................
6
G. Instructions for completing this assessment
.......................................................................................
6
2. Assessment Coversheet
.......................................................................................................
8
3. Assessment Questions
.........................................................................................................
9
A. Task A - Demonstrate knowledge of virtualized cyber security infrastructure
....................................
9
B. Task B -
Plan infrastructure ...............................................................................................................
21
C. Task C - Implement infrastructure
.....................................................................................................
31
D. Task D - Test infrastructure
...............................................................................................................
31
4. Student Self Checklist
........................................................................................................
53
Student Assessment Guide: ICTCYS612
Version: v23.0
Page 3 of 58
Developed by: ACBI
Approved by: DoS
Issued: July 2021
Review: July 2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTCYS612 Design and implement virtualized cyber security infrastructure for organizations
1. Assessment Information
A. Purpose of assessment
This assessment will develop your skills and knowledge required to research, design, implement and test
virtualised cyber security infrastructure in a small to medium sized organisation.
B. What you are required to do
For this assessment, you are required to complete 4 tasks:
Task A – Demonstrate knowledge of virtualized cyber security infrastructure
Task B – Plan infrastructure
Task C – Implement infrastructure
Task D – Test infrastructure
All tasks of this assessment require you to use the provided case study information relating to the fictional company Bains & Co.
C. Competencies being assessed
Elements
To achieve competency in this unit you must demonstrate your ability to:
1.
Prepare to design infrastructure
2.
Design and plan infrastructure
3.
Implement infrastructure
4.
Test infrastructure
Performance Evidence
Evidence of the ability to:
Student Assessment Guide: ICTCYS612
Version: v23.0
Page 4 of 58
Developed by: ACBI
Approved by: DoS
Issued: July 2021
Review: July 2023
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTCYS612 Design and implement virtualized cyber security infrastructure for organizations
Design and implement cyber security infrastructure and review results against organisational needs on at least two different occasions
Knowledge Evidence
You must demonstrate knowledge of:
Features and implementation methodologies of cyber security
Cyber security infrastructure features including:
o
Application security
o
Business continuity planning
o
Disaster recovery planning
o
Operational security (OPSEC)
o
Threat vectors
Organisational business processes and applicable cyber security requirements design and implementation
Organisational procedures applicable to designing and implementing cybersecurity infrastructure, including:
o
Documenting established requirements, risks and work performed
o
Establishing requirements and features of cyber security infrastructure
o
Establishing maintenance and alert processes
o
Testing methods and procedures
Security risks, and tolerance of risk in an organisation
Industry standard cyber security providers
Industry standards and regulations applicable to implementing cyber security infrastructure in an organisation
Organisation, infrastructure and cyber security requirements.
For further information on the competencies of this unit, please refer to: https://training.gov.au/Training/Details/ICTCYS612
D. Important resources for completing this assessment
To complete this assessment, please refer to the following resources provided on Moodle:
ICTCYS612 Design and implement virtualized cyber security infrastructure for organizations learner guide
ICTCYS612 Observation checklist
ICTCYS612 Marking Guide
ICTCYS612 Case study folder
Additional student assessment information
Student Assessment Guide: ICTCYS612
Version: v23.0
Page 5 of 58
Developed by: ACBI
Approved by: DoS
Issued: July 2021
Review: July 2023
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTCYS612 Design and implement virtualized cyber security infrastructure for organizations
E. A note on plagiarism and referencing
Plagiarism is a form of theft where the work, ideas, inventions etc. of other people are presented as your
own. When quoting or paraphrasing from a source such as the Internet, the source must be recognised. If you
are quoting a source, make sure to acknowledge this by including “quotation marks” around the relevant words/sentences or ideas. Note the source at the point at which it is included within your assessment, such as by using a citation. Then list the full details of the source in a ‘references’ section at the end of your assessment. All sources used for your assessment should be detailed in a ‘references’ section. It is advisable to never
copy another person’s work.
F. A note on questions with role plays
Task B, Question B7 involves a role play. For this question, as outlined below, you will be assessed on your ability to role play being an IT manager at WESEC, a company specialized in providing secretarial services for corporate organisations. This question requires you to lead a meeting and take notes on what is discussed. Please note: You will also need to attend separate meetings organised by other students whereby you role play being other people. This allows other students in your unit to also role play being the Senior Human Resources Manager. G. Instructions for completing this assessment
Answer the questions below using the spaces provided:
Answer all parts of each question
Use your own words and give examples wherever possible
The quality of your answer is more important than how long it is
Enter your answers in this document
You may use various sources of information to inform your answers, including your resources provided by ACBI, books, and online sources. You must acknowledge and cite your sources. Student Assessment Guide: ICTCYS612
Version: v23.0
Page 6 of 58
Developed by: ACBI
Approved by: DoS
Issued: July 2021
Review: July 2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTCYS612 Design and implement virtualized cyber security infrastructure for organizations
Submission via Moodle
Please refer to the “Instructions for Submitting Your Assessment” found within the unit course page on Moodle. NOTE: Please take care to follow all instructions listed. Assessments uploaded with a draft status on Moodle may not be graded.
Student Assessment Guide: ICTCYS612
Version: v23.0
Page 7 of 58
Developed by: ACBI
Approved by: DoS
Issued: July 2021
Review: July 2023
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTCYS612 Design and implement virtualized cyber security infrastructure for organizations
2. Assessment Coversheet
3. Assessment Questions
A. Task A - Demonstrate knowledge of virtualized cyber security infrastructure
Student Assessment Guide: ICTCYS612
Version: v23.0
Page 8 of 58
Developed by: ACBI
Approved by: DoS
Issued: July 2021
Review: July 2023
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTCYS612 Design and implement virtualized cyber security infrastructure for organizations
Task A instructions
Answer the following questions to demonstrate your knowledge of virtualized cyber security infrastructure.
A1. Describe governance and protection principles of cyber security.
NOTE: Refer to https://www.cyber.gov.au/acsc/view-all-content/guidance/cyber-security-principles to
inform your answer. Answer in 100-200 words.
Write your answer here
The four main actions of cyber security governance and protection are detect, respond, govern, and defend. It was stated in the Australian Government's Cyber Security Principles. Identifying and controlling security risks include things like designating a Chief Information Security Officer, figuring out the needs and worth of data and systems, and integrating security risk management procedures into organisational risk management frameworks. Implementing controls to lower security risks, such as creating and installing safe systems and applications, working with reliable vendors, encrypting data, limiting access, offering training, and backing up data, are all part of the protect activity. Monitoring systems and networks, assessing logs and warnings, reporting issues, and detecting and comprehending cyber security events are all part of the detect activity. Responding to and recovering from cyber security disasters entails a number of tasks, including controlling the issue, getting things back to normal, looking into the cause and consequences, and putting lessons learned into practise. A2. Explain which of the following methods can be used to protect against these cyber security threats:
a.
Malware
b.
Emotet
c.
Denial of Service
d.
Man in the Middle
e.
Phishing
f.
SQL Injection
g.
Password Attacks
Answer in 100-200 words.
Student Assessment Guide: ICTCYS612
Version: v23.0
Page 9 of 58
Developed by: ACBI
Approved by: DoS
Issued: July 2021
Review: July 2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTCYS612 Design and implement virtualized cyber security infrastructure for organizations
Write your answer here
a. Malware - Malware is a term that refers to any software or code that is designed to harm, disrupt, or compromise a computer system or network. Malware can be used by cybercriminals for various purposes, such as stealing data, extorting money, spying, or sabotaging operations. Malware can infect computers through various methods, such as spam emails, malicious websites, fake applications, or removable media.
To protect against malware
1.
Using antivirus software and updating it regularly.
2.
Keeping your software and operating system up to date.
3.
Using strong passwords and encryption.
4.
Backing up your data regularly.
b. Emotet - Emotet is a dangerous malware that can infect your device and steal your sensitive data. It
can also spread to other devices in your network and download additional malware. To protect from Emotet, you should follow these methods
1.
Stay up to date.
2.
Use a reliable antivirus program.
3.
Be careful with emails.
4.
Disable macros in Microsoft Office.
c. Denial of Service – Denial of service (DoS) attacks are cyberattacks that attempt to prevent or degrade the access of legitimate users to online services, such as websites, email, and DNS. DoS attacks can be carried out by flooding the target with unwanted traffic, exploiting vulnerabilities in the
target’s software or configuration, or hijacking the target’s service to redirect users to other malicious
sites.
To protect from DoS, 1.
Know your network’s traffic.
2.
Create a DoS response plan.
3.
Make your network resilient.
4.
Practice good cyber hygiene
d. Man in the middle attack - A man in the middle attack is a type of cyberattack where an attacker intercepts and alters the communication between two parties without their knowledge.
To protect against man in the middle attacks
1.
Using encryption to secure the data in transit.
2.
Using a virtual private network (VPN) to create a secure tunnel between your device and the destination server.
3.
Avoiding suspicious links and attachments that may contain malware or phishing attempts.
Student Assessment Guide: ICTCYS612
Version: v23.0
Page 10 of 58
Developed by: ACBI
Approved by: DoS
Issued: July 2021
Review: July 2023
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTCYS612 Design and implement virtualized cyber security infrastructure for organizations
e. Phishing is a type of cyberattack that tries to trick you into giving away your sensitive information or installing malicious software on your device.
To Protect against phishing 1.
Recognize the signs of phishing.
2.
Report suspicious messages to your email provider.
3.
Don’t respond to a phishing email.
f. SQL Injection - SQL injection is a common web attack technique that allows attackers to execute malicious SQL statements on a database through user input fields.
To protect against SQL Injection
1.
Filtering database inputs
2.
Using parameterized queries
3.
Restricting database access
g.
Password Attacks – to protect against password attacks 1.
Create complex password 2.
Change password regularly 3.
Use Multi-Factor Authentication
A3. Describe what kind of cyber security infrastructure you can use and features of that cyber security infrastructure for the following important areas of cyber security:
a.
Application security
b.
Business continuity planning
c.
Disaster recovery planning
d.
Operational Security (OPSEC)
e.
Threat vectors
Answer in 200-400 words.
Write your answer here
a. Application Security - Application security is the practice of protecting software application code and data against cyber threats. Some of the types of application security are
1.
Web Application Security
2.
Mobile Application Security
3.
Cloud Application Security
Cybersecurity infrastructure is the set of hardware, software, networks, policies, and procedures that enable the protection of information systems and data from cyberattacks. Cybersecurity Student Assessment Guide: ICTCYS612
Version: v23.0
Page 11 of 58
Developed by: ACBI
Approved by: DoS
Issued: July 2021
Review: July 2023
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTCYS612 Design and implement virtualized cyber security infrastructure for organizations
infrastructure can use various technologies and methods to achieve its goals, such as:
1.
Unified threat detection and response: This is a holistic approach to identifying and responding to cyber threats across different environments and devices. Unified threat detection and response can use tools such as artificial intelligence, machine learning, behavioral analysis, and automation to detect anomalies, prioritize risks, and orchestrate actions.
2.
Secure networking: This is the practice of designing and implementing networks that are resilient to cyberattacks and can support secure communication and data transfer. Secure networking can use tools such as VPNs, fire
b. Business Continuity Planning – Business continuity planning (BCP) is a vital tool that companies can use to plan for the restoration of normal operations after a business disrupting incident. There are different kinds of cybersecurity infrastructure that you can use for BCP, depending on your specific needs and objectives.
A cybersecurity strategy and governance framework that defines the roles and responsibilities
of the board, management, and staff in relation to cyber risks and resilience.
A cyber risk management and threat assessment process that identifies, analyses, evaluates, and treats the cyber risks that may affect your business continuity.
A collaboration and information sharing mechanism that enables you to exchange cyber threat intelligence and best practices with other organisations, security agencies, and law enforcement.
c. Disaster recovery planning - cybersecurity infrastructure that can be used for disaster recovery planning are
Backup systems: Backup systems store copies of data and applications in a secure location, such as a cloud service or an off-site facility. Backup systems can help restore data and applications in case of data loss or corruption due to a cyberattack.
Redundant systems: Redundant systems provide alternative or duplicate resources, such as servers, networks, or power sources, that can take over in case of a failure or outage of the primary systems. Redundant systems can help maintain availability and performance of critical services during a cyberattack.
Encryption systems: Encryption systems use mathematical algorithms to transform data into unreadable formats that can only be decrypted with a key. Encryption systems can help protect data from unauthorized access or modification during a cyberattack.
d. Operational Security - cyber security infrastructure that can be used for operational security
Cybersecurity Operations Center (CSOC): A CSOC is a centralized unit that monitors, detects, analyzes and responds to cyber threats and incidents affecting the organization’s networks and systems.
Industrial Control Systems (ICS): ICS are systems that control physical processes and operations in critical infrastructure sectors, such as energy, water, transportation, manufacturing and health care. ICS are often composed of sensors, actuators, controllers, Student Assessment Guide: ICTCYS612
Version: v23.0
Page 12 of 58
Developed by: ACBI
Approved by: DoS
Issued: July 2021
Review: July 2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTCYS612 Design and implement virtualized cyber security infrastructure for organizations
communication networks and human-machine interfaces.
Cyber Security Infrastructure Frameworks: Cyber security infrastructure frameworks are sets of standards, guidelines and best practices that help organizations design, implement, manage and improve their cyber security infrastructure.
e. Threat Vector - Threat Vector is a term used to describe the method or mechanism that cybercriminals use to gain illegal, unauthorized access to computer systems and networks. It is also the name of a cyber security company that provides solutions for threat detection, prevention, and response.
Social engineering: This is the manipulation of human psychology to trick people into revealing sensitive information or performing actions that compromise their security. For instance, phishing emails, fake websites, or phone calls that impersonate legitimate entities and ask for personal or financial data.
Credential theft: This is the stealing of usernames and passwords that grant access to various accounts and systems. For instance, keyloggers, malware, or brute force attacks that capture or guess login credentials.
A4. Describe how cyber security can be designed and implemented for an organizational business process.
Answer in 100-200 words.
Write your answer here
Cyber security is the protection of information and systems from cyber threats, such as unauthorized access, modification, or destruction. Cyber security can be designed and implemented for an organizational business process by following some principles and approaches, such as:
Security by design: This is a methodology that integrates security into every stage of the system development life cycle, from the initial design to the deployment and maintenance. Security by design aims to reduce the number of vulnerabilities and risks in the system, and to
make it easier to apply patches and updates.
Security by default: This is a configuration that ensures that the system is secure out of the box, without requiring any additional user actions or settings. Security by default means that the system has the most restrictive security settings possible, and that only the minimum necessary permissions and features are enabled.
Virtualisation: This is a technology that creates a simulated environment for running applications or systems, isolated from the physical hardware. Virtualisation can enhance cyber security by allowing for more flexibility, scalability, and resilience of the system.
Automation: This is a process that uses software or hardware to perform tasks without Student Assessment Guide: ICTCYS612
Version: v23.0
Page 13 of 58
Developed by: ACBI
Approved by: DoS
Issued: July 2021
Review: July 2023
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTCYS612 Design and implement virtualized cyber security infrastructure for organizations
human intervention. Automation can improve cyber security by reducing human errors, increasing efficiency, and enhancing consistency of the system.
A5. Describe organisational procedures applicable to designing and implementing cybersecurity infrastructure for the following processes:
Documenting established requirements, risks and work performed
Establishing requirements and features of cyber security infrastructure
Establishing maintenance and alert processes
Testing methods and procedures
Answer in 200-400 words.
Write your answer here
a. Organisational procedures applicable to designing and implementing cybersecurity infrastructure for the documenting established requirements, risks and work performed are:
Analyse the organisation’s operations to determine cyber security needs, such as data types, security levels, mission-critical network servers and secure boundary requirements.
Research and identify industry standard network security options and security technologies.
Design and document infrastructure requirements according to organisational requirements, such as network boundaries, network and server technologies, user security technologies, security levels and user access
b. organisational procedures applicable to designing and implementing cybersecurity infrastructure for establishing requirements and features of cyber security infrastructure are:
Analyse organisation’s operations to determine cyber security needs.
Research and identify industry standard network security options and security technologies.
Determine data types, security levels, mission-critical network servers and secure boundary requirements.
Design and document infrastructure requirements according to organisational requirements
Determine and document implementation plan and timeframes
c. Organisational procedures applicable to designing and implementing cybersecurity infrastructure Student Assessment Guide: ICTCYS612
Version: v23.0
Page 14 of 58
Developed by: ACBI
Approved by: DoS
Issued: July 2021
Review: July 2023
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTCYS612 Design and implement virtualized cyber security infrastructure for organizations
for establishing maintenance and alert processes may vary depending on the specific organisation, industry and regulatory requirements.
Documenting established requirements, risks and work performed.
Establishing requirements and features of cyber security infrastructure.
Testing methods and procedures
d. Organisational procedures applicable to designing and implementing cybersecurity infrastructure for testing methods and procedures are the steps and guidelines that an organisation follows to ensure that the cyber security infrastructure is effective, reliable and secure.
Documenting established requirements, risks and work performed according to organisational
standards and policies.
Establishing requirements and features of cyber security infrastructure based on the security threats, needs and objectives of the organisation.
Establishing maintenance and alert processes for risk and security threats according to organisational procedures and best practices.
Testing the deployment of cyber security infrastructure and its components according to organisational testing procedures, such as using test cases, scenarios, scripts, tools and metrics.
A6. Explain key security risks for small to large enterprises today.
Answer in 100-200 words.
Write your answer here
Key security risks for small to large enterprises today are the threats and vulnerabilities that can compromise the confidentiality, integrity, and availability of their data, systems, and networks. Some of the most common and serious security risks are
Ransomware attacks: Ransomware is a type of malicious software that encrypts the victim’s files and demands a ransom for their decryption.
Phishing attacks: Phishing is a form of social engineering that involves sending fraudulent emails or other messages that appear to come from legitimate sources, such as banks, suppliers, or colleagues.
Malware attacks: Malware is a general term for any software that is designed to harm or exploit a computer system or network.
Supply chain attacks: Supply chain attacks are a type of cyberattack that targets the vendors, partners, or service providers of an enterprise, rather than the enterprise itself.
State-sponsored cyberattacks: State-sponsored cyberattacks are cyberattacks that are carried out by or on behalf of a foreign government or entity. State-sponsored cyberattacks can have various motives, such as espionage, sabotage, influence operations, or warfare.
Student Assessment Guide: ICTCYS612
Version: v23.0
Page 15 of 58
Developed by: ACBI
Approved by: DoS
Issued: July 2021
Review: July 2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTCYS612 Design and implement virtualized cyber security infrastructure for organizations
A7. Explain tolerance of risk in an organisation.
Answer in 100-200 words.
Write your answer here
Tolerance of cyber risk in an organisation is the degree to which the organisation is willing to accept the potential consequences of a cyber-attack. It reflects the organisation’s appetite for investing in cybersecurity measures and the trade-offs between the costs and benefits of such measures. Different organisations may have different levels of tolerance for cyber risk, depending on their business objectives, industry, regulatory environment, stakeholder expectations, and other factors.
Some of the steps that organisations can take to define and manage their cyber risk tolerance are
Cybersecurity can help organisations protect their reputation, customer trust, intellectual property, and competitive advantage. It can also enable innovation, digital transformation, and operational efficiency.
Understand the economic drivers and impact of cyber risk. Organisations should assess the potential financial losses and other damages that could result from a cyber attack, such as legal liabilities, regulatory fines, reputational harm, operational disruption, and loss of market share.
Align cyber-risk management with business needs. Organisations should align their cybersecurity strategy and policies with their business strategy and objectives. They should also involve the board and senior management in setting the cyber risk tolerance level and overseeing the cyber-risk management process.
Encourage systemic resilience and collaboration. Organisations should adopt a holistic approach to cybersecurity that covers people, processes, technology, and governance.
A8. Research three industry standard cyber security providers. Identify who they are and what products or services they offer.
Answer in 200-400 words.
Write your answer here
Three industry standard cyber security providers are:
Student Assessment Guide: ICTCYS612
Version: v23.0
Page 16 of 58
Developed by: ACBI
Approved by: DoS
Issued: July 2021
Review: July 2023
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTCYS612 Design and implement virtualized cyber security infrastructure for organizations
Palo Alto Networks: This is a global leader in comprehensive security solutions that protect networks, clouds, and endpoints from cyber threats. Some of their products and services include firewalls, threat intelligence, cloud security, endpoint protection, and security operations1.
Fortinet: This is a multinational company that provides network security appliances and services for enterprises, service providers, and government organizations. Some of their products and services include firewalls, antivirus, intrusion prevention, VPN, web filtering, and
security analytics1.
Cisco: This is a worldwide leader in IT, networking, and cybersecurity solutions that help businesses of all sizes connect, communicate, and collaborate securely. Some of their products and services include routers, switches, wireless, security cameras, firewalls, VPN, email security, and web security
A9. Explain industry standards and regulations applicable to implementing cyber security infrastructure in an organisation.
Answer in 100-200 words.
Write your answer here
Cyber security is the protection of information systems and data from cyber threats, such as unauthorized access, modification, or impairment. Cyber security is essential for any organisation that
relies on digital technologies to conduct its business operations, provide services, or store sensitive information. There are various industry standards and regulations that apply to implementing cyber security infrastructure in an organisation, depending on the nature and scope of its activities, the type
of data it handles, and the legal obligations it has to comply with.
Some of the common standards and regulations that affect Australian organisations are:
Essential Eight: This is a set of eight basic mitigation strategies developed by the Australian Cyber Security Centre (ACSC) to help organisations prevent and limit the impact of cyber attacks.
Information Security Manual (ISM): This is a cyber security framework that outlines the principles, controls, and guidance for protecting information systems and data from cyber threats.
Privacy Act 1988: This is a federal law that regulates how organisations collect, use, disclose, and store personal information about individuals. Personal information is any information or opinion that identifies or could reasonably identify an individual.
Notifiable Data Breaches (NDB) scheme: This is a scheme that requires organisations covered Student Assessment Guide: ICTCYS612
Version: v23.0
Page 17 of 58
Developed by: ACBI
Approved by: DoS
Issued: July 2021
Review: July 2023
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTCYS612 Design and implement virtualized cyber security infrastructure for organizations
by the Privacy Act to notify individuals and the Office of the Australian Information Commissioner (OAIC) when they experience a data breach that is likely to result in serious harm to any of the individuals whose personal information is involved.
A10. Explain organisation, infrastructure, and cyber security requirements.
Answer in 100-200 words.
Write your answer here
Organisation: An organisation should have a clear cyber security strategy and governance structure, as well as policies and procedures for managing cyber risks and incidents. An organisation should also provide cyber security awareness and training for its staff, contractors, and partners, and ensure that they comply with the relevant laws and regulations. An organisation should also conduct regular cyber security assessments and audits to identify and address any gaps or weaknesses in its cyber security posture.
Infrastructure: An organisation should ensure that its critical infrastructure assets, such as energy, water, transport, communications, health, banking, and defence systems, are protected from cyber attacks that could compromise their availability, integrity, or confidentiality. An organisation should also implement security-by-design and security-by-
default principles in the development and deployment of its infrastructure systems, as well as
apply best practices for securing its networks, devices, applications, and data. An organisation
should also monitor and respond to any cyber threats or incidents affecting its infrastructure assets.
Cyber security: An organisation should adopt a risk-based approach to cyber security, and implement appropriate controls and measures to prevent, detect, and respond to cyber attacks. An organisation should also follow the guidance and standards provided by the Australian Cyber Security Centre (ACSC), such as the Information Security Manual (ISM), the Essential Eight Maturity Model, and the Australian Government Information Security Manual (AGISM). An organisation should also report any significant cyber incidents to the ACSC or other relevant authorities.
Student Assessment Guide: ICTCYS612
Version: v23.0
Page 18 of 58
Developed by: ACBI
Approved by: DoS
Issued: July 2021
Review: July 2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTCYS612 Design and implement virtualized cyber security infrastructure for organizations
B. Task B – Plan infrastructure Task B instructions
You are an IT manager at WESEC, a company specialized in providing secretarial services for corporate
organisations. You are part of the information technology department. Your responsibilities include introducing innovation and efficiency and looking after the information security implementation. In Task B you are to design and plan infrastructure for your virtualized POC infrastructure.
Read the “ICTCYS612 Case study information” document provided on Moodle, then answer the questions below.
Please note: WESEC is a fictional company invented for the purpose of this assessment.
B1. Analyse WESEC’s operations to determine their cyber security needs. Specify these needs in a one-two page summary for the organisation’s executives.
Answer in 300-600 words.
Write your answer here
Summary for the organisation’s executives.
WESEC is a secretarial services provider for the corporate that focuses on information security, business continuity, risk management, data protection and project management. The cyber security needs of WESEC are:
To protect the confidentiality, integrity and availability of the information systems and data that the company and its clients rely on.
To comply with the relevant laws and regulations regarding information security and data protection in the countries and regions where the company operates or provides services.
To prevent or mitigate the impact of cyber attacks, such as phishing, malware, ransomware, data breaches, hacking, identity theft and scams, that could compromise the company’s reputation, operations and finances.
To establish and maintain a cyber security policy that defines the roles and responsibilities, standards and procedures, tools and technologies, training and awareness, monitoring and reporting, incident response and recovery, and continuous improvement of the cyber security
program.
To create an emergency management plan that outlines the steps to take in case of a cyber incident, such as identifying the source and scope of the attack, containing and eradicating Student Assessment Guide: ICTCYS612
Version: v23.0
Page 19 of 58
Developed by: ACBI
Approved by: DoS
Issued: July 2021
Review: July 2023
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTCYS612 Design and implement virtualized cyber security infrastructure for organizations
the threat, restoring normal operations, analysing the root cause and lessons learned, and implementing corrective actions.
To consider getting cyber security insurance that covers the costs of cyber incidents, such as legal fees, fines, compensation, investigation, remediation, restoration and reputation management.
To seek cyber security advice from trusted sources, such as the Australian Cyber Security Centre (ACSC), which provides resources, tools and guidance for small businesses to improve their cyber security posture.
B2. Research and identify industry standard network security options and security technologies, which you may use as benchmark and inspiration for your design.
Answer in 100-200 words.
Write your answer here
Network security.
There are many industries standard network security options and security technologies that you can use as a benchmark and inspiration for your design. Some of the most common and effective ones are:
Firewall/NGFW: Firewalls are a mechanism for controlling inbound and outbound network traffic. They can filter packets based on rules, protocols, ports, IP addresses, and other criteria. Next-generation firewalls (NGFW) are firewalls that also provide additional features such as application awareness, intrusion prevention, malware detection, and identity-based policies.
Intrusion Prevention Systems (IPS): IPS is an active security solution that is deployed on the network edge and is able to detect and block attacks as they happen. IPS can use various techniques such as signatures, anomalies, behavior analysis, and reputation to identify and stop malicious traffic.
Data Loss Prevention (DLP): DLP is a security solution that monitors and prevents sensitive data from leaving the network. DLP can scan data in motion, at rest, or in use, and apply policies to encrypt, quarantine, or block unauthorized data transfers.
Security Information and Event Management (SIEM): SIEM is a security solution that collects, analyzes, and correlates logs and events from various sources across the network. SIEM can provide real-time visibility, alerting, reporting, and forensics for security incidents.
DDoS Protection: DDoS protection is a security solution that mitigates distributed denial-of-
service (DDoS) attacks that aim to overwhelm the network resources or services with malicious traffic. DDoS protection can use various methods such as traffic filtering, rate limiting, scrubbing, or redirection to defend against different types of DDoS attacks.
Log Management: Log management is a security solution that collects, stores, and manages Student Assessment Guide: ICTCYS612
Version: v23.0
Page 20 of 58
Developed by: ACBI
Approved by: DoS
Issued: July 2021
Review: July 2023
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTCYS612 Design and implement virtualized cyber security infrastructure for organizations
logs from various sources across the network. Log management can help with compliance, auditing, troubleshooting, and security analysis.
Secure Web Gateway (SWG): SWG is a security solution that monitors and controls web traffic. SWG can enforce policies on web access, block malicious or inappropriate websites, scan web content for malware or data leaks, and provide encryption for web traffic.
B3. Determine data types, security levels, mission-critical network servers and secure boundary requirements for the existing network of WESEC.
Answer in 100-200 words.
Write your answer here
Data Types
Synthetic testing and virtual software agent data:
One method for better understanding a user's experience with an application is to predict their behavior through synthetic testing. It's possible that cloud apps lack performance metrics and visibility, which are essential to ensuring users get the service they expect. IT can use virtual software agents to monitor these apps continuously and get data from them. This will ensure that the apps provide the route quality and latency needed for the best possible end-user experience.
Network telemetry data:
In networking, telemetry is the process of gathering data from several sources through a series of automated communication procedures and sending it to a receiving device for analysis purposes. Network telemetry and contemporary network monitoring are covered in this blog. Network telemetry data mostly comes from two sources: flow data and SNMP data."Flow" is a general term that includes NetFlow and several of its variants, including sFlow, jFow, IPFIX, and others. Each of them offers performance information on every device and interface along the source-to-destination chain, offering an insightful view of Internet traffic across a network.
Application recognition data:
The second version of the protocol, called Network-Based Application Recognition (NBAR or NBAR2), offers a method for categorizing and controlling bandwidth for network applications on specific routers. With the use of this data, network managers may observe the variety of applications that are running on the network at any one time and decide how much bandwidth to allot to each one in order to get the most out of the resources that are available.
Student Assessment Guide: ICTCYS612
Version: v23.0
Page 21 of 58
Developed by: ACBI
Approved by: DoS
Issued: July 2021
Review: July 2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTCYS612 Design and implement virtualized cyber security infrastructure for organizations
B4. Design and document infrastructure requirements according to organisational requirements.
Answer in 100-200 words.
Write your answer here
Organizational needs for infrastructure requirements:
There will be 4 divisions of the network:
Network 1: A Linux 64 OS operating system with four network interfaces will be used to set up the firewall in this network.
The router's IP address, 192.168.1.1, is configured as the default DNS for interface enp0s3. Automatic DHCP will be used for this setup.
The manual IP addresses and default DNS settings for the other interfaces, enp0s10, enp0s28, and enp0s9, will be set to 192.168.1.1.
Network 2: In this network, a second virtual machine will serve as both a web server and a backup, and the DMZ will be configured to 192.168.1.3.
Network 3: The Monitoring virtual machine in this network will be configured on a 64-bit Linux operational system, and its IP address is 192.168.2.2. This virtual machine will serve as the network's monitoring station.
Network 4: In this network, the company's database will be stored on two virtual machines. Ubuntu 64 OS is running on these virtual computers.
B5. Document an implementation plan and timeframes for your POC. Your important tasks will be:
Prepare a network diagram
Allocate IP scheme
Decide what versions of the software you will be using
Prepare implementation plan along with timelines
Student Assessment Guide: ICTCYS612
Version: v23.0
Page 22 of 58
Developed by: ACBI
Approved by: DoS
Issued: July 2021
Review: July 2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTCYS612 Design and implement virtualized cyber security infrastructure for organizations
Prepare firewall rules
Prepare network monitoring policy
NOTE: You may refer to the “Implementation plan template” provided on Moodle to inform your answer. Answer in 300-600 words.
Write your answer here
IP Scheme:
Device
Interface
IP Address Netmask
Gateway
NW01
VM-OL-FW-01
FW
DHCP
NW02
VM-OL-FW-01
DMZ
192.168.1.3
255.255.255.0
DHCP
VM-UB-WB-01
WEB
192.168.2.3
255.255.255.0
192.168.1.3
NW03
VM-OL-FW-01
MNT
192.168.2.1
255.255.255.0
DHCP
Student Assessment Guide: ICTCYS612
Version: v23.0
Page 23 of 58
Developed by: ACBI
Approved by: DoS
Issued: July 2021
Review: July 2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTCYS612 Design and implement virtualized cyber security infrastructure for organizations
VM-OL-MNT-01
MNT
192.168.2.2
255.255.255.0
192.168.2.1
NW04
VM-OL-FW-01
PRD
192.168.3.1
255.255.255.0
DHCP
VM-UB-DB-01
PRD
192.168.3.2
255.255.255.0
192.168.3.1
VM-UB-DB-02
PRD
192.168.3.3
255.255.255.0
192.168.3.1
Software Versions Oracle VM VirtualBox 6.1
Ubuntu 64 OS
Linux 64 OS
pfSense CE 2.5.2
Implementation Plan
Week 1
Design, Plan, Set up Virtual Machines, FW1, and allocate IP’s
Week 2
Configure DMZ, MNT and PRD network
Week 3
Configure firewall rules Week 4
Network Monitoring tool setup
Week 5
Testing vms
Firewall Rules Sour
ce IP
Sourc
e Netw
ork
Destina
tion
Devi
ce Nam
e IP Address
Device Name
IP Address
Servic
e Port
port
TCP/
UDP
DM
Z
Web
80,8080
TCP
DM
Z
DNS 1
192.168.
1.6
DNS
53
DM
Z
DNS 1
192.168.
1.6
NTP
123
Student Assessment Guide: ICTCYS612
Version: v23.0
Page 24 of 58
Developed by: ACBI
Approved by: DoS
Issued: July 2021
Review: July 2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTCYS612 Design and implement virtualized cyber security infrastructure for organizations
MN
T
DMZ
192.168.1.
0/24
MNT 1
192.168.
2.5
SNM
P
161,162
MN
T
PRD
192.168.3.
0/24
MNT 1
192.168.
2.5
SNM
P
161,162
DMZ
192.168.1.
0/24
MNT 1
192.168.
2.5
SYSL
OG
514
PRD
192.168.3.
0/24
MNT 1
192.168.
2.5
SYSL
OG
514
DMZ
192.168.1.
0/24
MNT 1
192.168.
2.5
SSH
22
PRD
192.168.3.
0/24
MNT 1
192.168.
2.5
SSH
22
PR
D
Web
1
192.168.
1.3
DMZ
DB 1
192.168.
3.5
ODBC
8470,71,7
5,76
PR
D
Web
1
192.168.
1.3
DMZ
DB 1
192.168.
3.5
ODBC
8470,71,7
5,76
PR
D
Mail 1
192.168.
3.6
SNM
P
25
PR
D
Mail 1
192.168.
3.6
POP3
995, 110
PR
D
Mail 1
192.168.
3.6
IMAP
143, 993
B6. Document a network security monitoring strategy according to the design.
Answer in 200-400 words.
Write your answer here
ManageEngine Network administrators can manage routers, firewalls, servers, switches, and printers with an integrated console thanks to OpManager, a complete network monitoring tool.
OpManager provides a wide range of performance management and fault management features. It offers easy-to-use yet effective Customizable Dashboards and CCTV views, along with business views, quick reports, and instant device status displays.
Additionally, OpManager offers a plethora of custom reports and graphs that provide network administrators with a wealth of information regarding the condition of their servers, networks, and applications.
On our virtual machine, we're going to install and configure OpManager. In order to configure traffic to balance the system, OpManager monitors, analyzes, and reports on network traffic patterns and bandwidth used by various devices and applications via sFlow, IPFIX, jFlow, and NetFlow.
Student Assessment Guide: ICTCYS612
Version: v23.0
Page 25 of 58
Developed by: ACBI
Approved by: DoS
Issued: July 2021
Review: July 2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTCYS612 Design and implement virtualized cyber security infrastructure for organizations
B7. THE SCENARIO:
Now you need to distribute your documentation to others. Set up a meeting with:
An employee at WESEC, as role played by another student in your unit
WHAT YOU NEED TO DO BEFORE YOUR MEETING:
Organise a day and time for your meeting, in line with the availability of other students in your unit as well as your Trainer & Assessor. This meeting should take no more than 10 minutes. You are required to lead the meeting. Prior to the meeting ensure you have read the instructions below on what you’ll be required to do during the meeting and prepare as necessary. WHAT YOU NEED TO DO DURING YOUR MEETING:
Use the meeting to:
Present your documentation
Seek feedback on the documentation and respond to the feedback
Ensure you take note of what you discuss during the meeting.
WHAT YOU NEED TO DO AFTER YOUR MEETING:
Record notes of what was discussed during your meeting, including the feedback you received. Answer in 75-150 words.
Meeting notes
Student Assessment Guide: ICTCYS612
Version: v23.0
Page 26 of 58
Developed by: ACBI
Approved by: DoS
Issued: July 2021
Review: July 2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTCYS612 Design and implement virtualized cyber security infrastructure for organizations
Write your answer here
Meeting minutes During this meeting, a WESEC employee was given a tour of the intended solutions and technologies that will be deployed throughout the network. According to the feedback, it is crucial for WESEC that system logs and firewall logs be sent to a different server for accessibility, monitoring, and alerting purposes. All log events in a distributed environment should be routed to the log server, where they are combined and made accessible for log analysis.
The project can begin because what was presented complies with the company's requirements.
Matteo Morse is a WESEC employee.
Student Assessment Guide: ICTCYS612
Version: v23.0
Page 27 of 58
Developed by: ACBI
Approved by: DoS
Issued: July 2021
Review: July 2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTCYS612 Design and implement virtualized cyber security infrastructure for organizations
C. Task C – Implement infrastructure
Task C instructions
Task C follows on from Task B.
You are to implement your design with the tools and software you have created based on your network design.
Ensure you have read the “ICTCYS612 Case study information” document provided on Moodle, then answer the questions below. C1. Establish and create network boundaries according to the infrastructure plan requirements.
Take a screenshot(s) of the network boundaries and insert them below.
Insert your screenshot(s) here
Student Assessment Guide: ICTCYS612
Version: v23.0
Page 28 of 58
Developed by: ACBI
Approved by: DoS
Issued: July 2021
Review: July 2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTCYS612 Design and implement virtualized cyber security infrastructure for organizations
C2. Implement network and server technologies according to infrastructure plan requirements.
Take a screenshot(s) of your implementation and insert them below.
Insert your screenshot(s) here
Student Assessment Guide: ICTCYS612
Version: v23.0
Page 29 of 58
Developed by: ACBI
Approved by: DoS
Issued: July 2021
Review: July 2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTCYS612 Design and implement virtualized cyber security infrastructure for organizations
Student Assessment Guide: ICTCYS612
Version: v23.0
Page 30 of 58
Developed by: ACBI
Approved by: DoS
Issued: July 2021
Review: July 2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTCYS612 Design and implement virtualized cyber security infrastructure for organizations
Student Assessment Guide: ICTCYS612
Version: v23.0
Page 31 of 58
Developed by: ACBI
Approved by: DoS
Issued: July 2021
Review: July 2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTCYS612 Design and implement virtualized cyber security infrastructure for organizations
Student Assessment Guide: ICTCYS612
Version: v23.0
Page 32 of 58
Developed by: ACBI
Approved by: DoS
Issued: July 2021
Review: July 2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTCYS612 Design and implement virtualized cyber security infrastructure for organizations
C3. Implement user security technologies according to infrastructure plan requirements.
Student Assessment Guide: ICTCYS612
Version: v23.0
Page 33 of 58
Developed by: ACBI
Approved by: DoS
Issued: July 2021
Review: July 2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTCYS612 Design and implement virtualized cyber security infrastructure for organizations
Take a screenshot(s) of your implementation and insert them below.
Insert your screenshot(s) here
Student Assessment Guide: ICTCYS612
Version: v23.0
Page 34 of 58
Developed by: ACBI
Approved by: DoS
Issued: July 2021
Review: July 2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTCYS612 Design and implement virtualized cyber security infrastructure for organizations
Student Assessment Guide: ICTCYS612
Version: v23.0
Page 35 of 58
Developed by: ACBI
Approved by: DoS
Issued: July 2021
Review: July 2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTCYS612 Design and implement virtualized cyber security infrastructure for organizations
C4. Set security levels and user access according to organisational requirements.
Take a screenshot(s) of the security levels and user access and insert them below.
Insert your screenshot(s) here
Student Assessment Guide: ICTCYS612
Version: v23.0
Page 36 of 58
Developed by: ACBI
Approved by: DoS
Issued: July 2021
Review: July 2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTCYS612 Design and implement virtualized cyber security infrastructure for organizations
Student Assessment Guide: ICTCYS612
Version: v23.0
Page 37 of 58
Developed by: ACBI
Approved by: DoS
Issued: July 2021
Review: July 2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTCYS612 Design and implement virtualized cyber security infrastructure for organizations
Student Assessment Guide: ICTCYS612
Version: v23.0
Page 38 of 58
Developed by: ACBI
Approved by: DoS
Issued: July 2021
Review: July 2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTCYS612 Design and implement virtualized cyber security infrastructure for organizations
Student Assessment Guide: ICTCYS612
Version: v23.0
Page 39 of 58
Developed by: ACBI
Approved by: DoS
Issued: July 2021
Review: July 2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTCYS612 Design and implement virtualized cyber security infrastructure for organizations
Student Assessment Guide: ICTCYS612
Version: v23.0
Page 40 of 58
Developed by: ACBI
Approved by: DoS
Issued: July 2021
Review: July 2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTCYS612 Design and implement virtualized cyber security infrastructure for organizations
Student Assessment Guide: ICTCYS612
Version: v23.0
Page 41 of 58
Developed by: ACBI
Approved by: DoS
Issued: July 2021
Review: July 2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTCYS612 Design and implement virtualized cyber security infrastructure for organizations
Student Assessment Guide: ICTCYS612
Version: v23.0
Page 42 of 58
Developed by: ACBI
Approved by: DoS
Issued: July 2021
Review: July 2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTCYS612 Design and implement virtualized cyber security infrastructure for organizations
C5. Establish a network security monitoring strategy according to plan requirements.
NOTE: You may refer to the “Additional information – vendor resources” resource provided on Moodle to inform your answer. Answer in 300-600 words.
Write your answer here
Student Assessment Guide: ICTCYS612
Version: v23.0
Page 43 of 58
Developed by: ACBI
Approved by: DoS
Issued: July 2021
Review: July 2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTCYS612 Design and implement virtualized cyber security infrastructure for organizations
Student Assessment Guide: ICTCYS612
Version: v23.0
Page 44 of 58
Developed by: ACBI
Approved by: DoS
Issued: July 2021
Review: July 2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTCYS612 Design and implement virtualized cyber security infrastructure for organizations
Student Assessment Guide: ICTCYS612
Version: v23.0
Page 45 of 58
Developed by: ACBI
Approved by: DoS
Issued: July 2021
Review: July 2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTCYS612 Design and implement virtualized cyber security infrastructure for organizations
Student Assessment Guide: ICTCYS612
Version: v23.0
Page 46 of 58
Developed by: ACBI
Approved by: DoS
Issued: July 2021
Review: July 2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTCYS612 Design and implement virtualized cyber security infrastructure for organizations
Student Assessment Guide: ICTCYS612
Version: v23.0
Page 47 of 58
Developed by: ACBI
Approved by: DoS
Issued: July 2021
Review: July 2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTCYS612 Design and implement virtualized cyber security infrastructure for organizations
Student Assessment Guide: ICTCYS612
Version: v23.0
Page 48 of 58
Developed by: ACBI
Approved by: DoS
Issued: July 2021
Review: July 2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTCYS612 Design and implement virtualized cyber security infrastructure for organizations
D. Task D – Test infrastructure
Task D instructions
Task D follows on from Task C.
You are now required to test that your POC is working as per your design and organizational objectives.
Ensure you have read the “ICTCYS612 Case study information” document provided on Moodle, then answer the questions below.
D1. Test deployment of security infrastructure and its components according to technical specifications and infrastructure plan requirements.
Take a screenshot(s) of your testing and insert them below.
Insert your screenshot(s) here
The communication model used on the Internet is fundamentally dependent on ports. Ports are used for all Internet communication. There are two types of ports found in every IP address: UDP and TCP ports. An IP address can have up to 65,535 of each type.
You cannot run additional services on a port once one service is running on it. For instance, if you start Apache on port 80 after you've started Nginx, the operation will fail because the port is already in use.
It is possible to determine whether our sensitive resources are exposed through open ports with the use of free tools. We had software once. One of the most widely used free open-source port scanning tools is Nmap, short for Network Mapper.
The command "nmap -st -p 880,443 192.168.1.119" was utilized to check if the ports "80" and "443" in our Firewall Virtual Machine were open. Filtered indicates that Nmap is unable to determine whether a port is open or closed because it is blocked by a firewall, filter, or other network obstruction.
Student Assessment Guide: ICTCYS612
Version: v23.0
Page 49 of 58
Developed by: ACBI
Approved by: DoS
Issued: July 2021
Review: July 2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTCYS612 Design and implement virtualized cyber security infrastructure for organizations
the same command was tested using a different IP address (Router), and the following is the outcome:
Student Assessment Guide: ICTCYS612
Version: v23.0
Page 50 of 58
Developed by: ACBI
Approved by: DoS
Issued: July 2021
Review: July 2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTCYS612 Design and implement virtualized cyber security infrastructure for organizations
As you can see, our router has ports 80 and 443. This indicates that an application running on the target computer is waiting for connections or packets on that port.
D2. Obtain and analyse test results, logs and user feedback.
Answer in 150-300 words.
Write your answer here
A great firewall is pfSense, which records all of your traffic. You can install packages on it to filter unwanted traffic. An outstanding load-balancer is pfSense: (Several WAN and load balancing) The aggregation and fail-over function flawlessly. If your company uses several ISPs to guarantee that your
clients can always access their data, this is ideal. additionally aids in the distribution of bandwidth. They also have IPsec enabled in the settings, but I don't know enough about it to go into detail. I felt the pfSense GUI was really cool. Its abundance of reporting graphs for monitoring all networks is why I find it so cool.
A hacker can use any open port as an attack vector to gain access to the system. It just so happens that the most frequently open ports on the servers are 80 and 443.
About OpManager: It's a tool for managing and monitoring networks that lets you check the throughput and performance of networking devices as well as firewalls, storage devices, load balancers, wifi routers, and connections, as well as their threshold speeds. Monitoring the Student Assessment Guide: ICTCYS612
Version: v23.0
Page 51 of 58
Developed by: ACBI
Approved by: DoS
Issued: July 2021
Review: July 2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTCYS612 Design and implement virtualized cyber security infrastructure for organizations
performance and storage of servers and virtual machines is also helpful in order to estimate the additional needs and report that information to the company's upper management.
OpManager demonstrated an accommodating graphical user interface and provided satisfactory network data monitoring when compared to other monitoring software.
D3. Troubleshoot and adjust implemented technologies according to organisational requirements and user feedback.
Take a screenshot(s) of your troubleshooting and adjustments and insert them below.
Insert your screenshot(s) here
As we discussed this meeting, WESEC knows how important is record logging and one requirement.
was that these logs should be sent to another server for reasons of accessibility, monitoring & alerting. This was successfully done using the pfSense firewall system log feature.
Student Assessment Guide: ICTCYS612
Version: v23.0
Page 52 of 58
Developed by: ACBI
Approved by: DoS
Issued: July 2021
Review: July 2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTCYS612 Design and implement virtualized cyber security infrastructure for organizations
Student Assessment Guide: ICTCYS612
Version: v23.0
Page 53 of 58
Developed by: ACBI
Approved by: DoS
Issued: July 2021
Review: July 2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTCYS612 Design and implement virtualized cyber security infrastructure for organizations
Student Assessment Guide: ICTCYS612
Version: v23.0
Page 54 of 58
Developed by: ACBI
Approved by: DoS
Issued: July 2021
Review: July 2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTCYS612 Design and implement virtualized cyber security infrastructure for organizations
Student Assessment Guide: ICTCYS612
Version: v23.0
Page 55 of 58
Developed by: ACBI
Approved by: DoS
Issued: July 2021
Review: July 2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTCYS612 Design and implement virtualized cyber security infrastructure for organizations
4. Student Self Checklist
A. Student Self Checklist for Tasks A - D
Candidate name:
Unit of Competency:
ICTCYS612 Design and implement virtualized cyber security infrastructure for organizations
Instructions:
Place a tick ‘
✓
’ in the Yes (“Y”) column for each question you have completed all parts for.
Task A – Demonstrate knowledge of virtualized cyber security infrastructure
Did you:
Y
✓
A1:
Describe governance and protection principles of cyber security?
✓
A2:
Explain which of the following methods can be used to protect against these cyber security threats:
a.
Malware?
b.
Emotet?
c.
Denial of Service?
d.
Man in the Middle?
e.
Phishing?
f.
SQL Injection?
g.
Password Attacks?
✓
A3:
Describe what kind of cyber security infrastructure can be used and features of that cyber security infrastructure for the following important areas of cyber security:
a.
Application security?
b.
Business continuity planning?
c.
Disaster recovery planning?
d.
Operational Security (OPSEC)?
e.
Threat vectors?
✓
A4:
Describe how cyber security can be designed and implemented for an organizational
business process?
✓
A5:
Describe organisational procedures applicable to designing and implementing ✓
Student Assessment Guide: ICTCYS612
Version: v23.0
Page 56 of 58
Developed by: ACBI
Approved by: DoS
Issued: July 2021
Review: July 2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTCYS612 Design and implement virtualized cyber security infrastructure for organizations
cybersecurity infrastructure for the following processes:
Documenting established requirements, risks and work performed?
Establishing requirements and features of cyber security infrastructure?
Establishing maintenance and alert processes?
Testing methods and procedures?
A6:
Explain key security risks for small to large enterprises today?
✓
A7:
Explain tolerance of risk in an organisation?
✓
A8: Research three industry standard cyber security providers? Identify who they are and what products or services they offer?
✓
A9: Explain industry standards and regulations applicable to implementing cyber security infrastructure in an organisation?
✓
A10: Explain organisation, infrastructure, and cyber security requirements?
✓
Task B - Plan infrastructure Did you:
Y
✓
B1:
Analyse WESEC’s operations to determine their cyber security needs? Specify these needs in a one-two page summary for the organisation’s executives?
✓
B2: Research and identify industry standard network security options and security technologies, which you may use as benchmark and inspiration for your design?
✓
B3:
Determine data types, security levels, mission-critical network servers and secure boundary requirements for the existing network of WESEC?
✓
B4:
Design and document infrastructure requirements according to organisational requirements?
✓
B5: Document an implementation plan and timeframes for their POC, ensuring it considers the following important tasks:
Prepare a network diagram?
Allocate IP scheme?
Decide what versions of the software they will be using?
Prepare implementation plan along with timelines?
Prepare firewall rules?
Prepare network monitoring policy?
✓
B6: Document a network security monitoring strategy according to the design?
✓
Student Assessment Guide: ICTCYS612
Version: v23.0
Page 57 of 58
Developed by: ACBI
Approved by: DoS
Issued: July 2021
Review: July 2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTCYS612 Design and implement virtualized cyber security infrastructure for organizations
B7: Set up a meeting with:
An employee at WESEC, as role played by another student in your unit?
Use the meeting to:
Present your documentation?
Seek feedback on the documentation and respond to the feedback?
After the meeting, record notes of what was discussed, including the feedback received?
✓
Task C - Implement infrastructure
Did you:
Y
✓
C1:
Establish and create network boundaries according to the infrastructure plan requirements?
✓
C2:
Implement network and server technologies according to infrastructure plan requirements?
✓
C3:
Implement user security technologies according to infrastructure plan requirements?
✓
C4:
Set security levels and user access according to organisational requirements?
✓
C5:
Establish a network security monitoring strategy according to plan requirements?
✓
Task D – Test infrastructure
Did you:
Y
✓
D1:
Test deployment of security infrastructure and its components according to technical specifications and infrastructure plan requirements?
✓
D2:
Obtain and analyse test results, logs and user feedback?
✓
D3:
Troubleshoot and adjust implemented technologies according to organisational requirements and user feedback?
✓
Student Assessment Guide: ICTCYS612
Version: v23.0
Page 58 of 58
Developed by: ACBI
Approved by: DoS
Issued: July 2021
Review: July 2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help