ICTNWK423 Project Portfolio Solved

pdf

School

Lead College Parramatta *

*We aren’t endorsed by this school

Course

ICTNWK423

Subject

Information Systems

Date

Dec 6, 2023

Type

pdf

Pages

10

Uploaded by MateSeahorse6403

Report
Project Portfolio (Student) ICTNWK423 - Manage network and data integrity
Lead College Pty Ltd RTO No: 41489 CRICOS Code: 03636F Project Portfolio (Student) ICTNWK423 Manage network and data integrity Page 2 CONTENTS Section 1: Assess requirements 4 Section 2: ICT systems audit 5 Section 3: Data protection systems implementation 6
Lead College Pty Ltd RTO No: 41489 CRICOS Code: 03636F Project Portfolio (Student) ICTNWK423 Manage network and data integrity Page 3 Student name: Md Safiyan Ahmed Assessor: Fredro Harjanto Date: 10/11/2023 Business this assessment is based on: Audit Office
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Lead College Pty Ltd RTO No: 41489 CRICOS Code: 03636F Project Portfolio (Student) ICTNWK423 Manage network and data integrity Page 4 Section 1: Assess requirements ICT systems details Outline the information provided to you at the meeting (either in your RTO or workplace) regarding: organisation structure and responsibility for data integrity ICT hardware and software (including versions and update timing) current security measures in place, including access and user privileges current back up arrangements timing of updates security policies and procedures in place procedures and guidelines for conducting ICT systems audits. Tech/Support department, IT management, enterprise architecture, IT maintenance, Network/System administration, and IT security. RAM, Modem, Processor (Intel Core i7), Hard disk, Scanner, Webcam, CD-ROM, Cooling Fan. Operating Systems, Virus Protection, Debuggers, Disk Cleaner, Disk Check, Encryption Software. Access Control, Firewall, Antivirus software, Backup System privileges and Object privileges. Ascertain which data needs to be backed up, how frequently it needs to be backed up, and choose and put into practise a trustworthy backup and recovery solution. Check and keep an eye on the backup system. Timing of new security updates is released quarterly. Remote access, Password creation, Password management, Portable media, Acceptable use, and Get help creating your security policies. Analytical review, Inquiry, Observation, Inspection, and recalculation. ICT security policies and procedures Summarise the ICT security policies and procedures in place. Briefly comment on the sufficiency of these policies and procedures, specifically whether security access and user privileges are sufficient for the data protection required. Remote access is one of the ICT security measures that are in place. Creating and managing passwords, transportable media, and appropriate use. My analysis indicates that these rules are sufficient and trustworthy to improve the company's ideal data protection. A user's capacity to carry out a specific action is determined by their user privileges. Access control restricts who has access to what information and services. It limits what can be sent, saved, and copied from the system.
Lead College Pty Ltd RTO No: 41489 CRICOS Code: 03636F Project Portfolio (Student) ICTNWK423 Manage network and data integrity Page 5 Section 2: ICT systems audit ICT systems audit Conduct the audit following the procedures and guidelines advised by the assessor. This will include developing the ICT checklist and then using this to conduct the audit, making notes in the checklist as you go. Document the results of the audit. Your report must include: summary of issues identified from the audit threats to data (actual or potential) recommendations on additional data protection systems and controls to be implemented, including anti-virus and anti- malware software and back up solutions a plan for the back up solution, including data to be backed up, the type of back up and a schedule for the back up. It should ensure a real time back up as well as a data sync solution network monitoring tools that will be suitable for checking performance once the data protection systems have been put in place (suggest at least two that could be used). Include the title of your report here and attach it to your Portfolio. The report can be in any format as long as it includes the above information. Remember to include clear, specific and relevant language in your report so as to ensure clarity for all readers. The ICT Checklist. A user of this suite of tools can assess the advantages and disadvantages of an organization's IT practises, policies, and operations, as well as its data technology infrastructure. Up-to-date operational status. Projected serviceable life. Developer and Manufacturer warranty and support Dependencies. Asset worth. The necessity for redundancy and redundancy status. Access controls such as passwords and codes. Summary Of Issues Identified from The Audit. The common concerns identified include: a) Wrong user access granted based on job duties and access not disabled upon expiry of engagement. When user access controls are implemented correctly, misuse and alteration of state data are prevented. b) Nonconformity with passcodes and passwords. In the end, consistent password specifications such as minimum length, complexity, and expiration dates create the legitimacy of the user's purported uniqueness and safeguard IT resources and data. c)Absence of a proper episodic operator entrance review. Erroneous access is detected by the operator's access evaluation. Periodic user access reviews support and guarantee that permissions are issued in accordance with business needs. D)Lack of enough separation of obligations.
Lead College Pty Ltd RTO No: 41489 CRICOS Code: 03636F Project Portfolio (Student) ICTNWK423 Manage network and data integrity Page 6 Operator access should be distributed so that no single person oversees every important stage of a process. When risks are present, data gets corrupted. Threats to data are identified and highlighted in the audit report. Computer Viruses These are computer programmes with the ability to mimic and influence other processors. The company can utilise anti-virus software to protect against software viruses. Security hacker Unauthorised access is obtained to a machine and network. White-hat exploits It is employed to find weak points to stop attacks from malevolent black- hat hackers. Phishing attacks Hackers attempt to trick users into performing suggested actions, such as clicking on links in emails that direct them to phoney websites, under a tactic known as "online fraud." Here, cybercriminals assume the identity of a reliable source, such the bank or even your employer. Recommendations. The following recommendations are made by the report and are related to administration modification, controls, logical access, and IT governance. A risk assessment of its information and data systems should be carried out by the state audit office and documented. In a same vein, to confirm compliance, the state office ought to review and revise the data technology security rules. The state office needs to fix the weaknesses in its data systems that were identified in the secret word settings. Permit the proper assignment of operator access rights based on user responsibilities. Create and document a formal management process modification. Establish a process to check the accuracy and completeness of the information entered in the database of legal contracts. Create a series of initiatives that will improve contractor compliance by utilising crucial provisions for essential data security. A Plan for the backup solution. Organisations have different backup demands than other organisations because of their unique requirements. After reviewing the Office Audit report case study, we found that the data that requires backup includes administrative databases, personnel files, accounting and financial records, state assets like cars, laptops, and mobile devices,
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Lead College Pty Ltd RTO No: 41489 CRICOS Code: 03636F Project Portfolio (Student) ICTNWK423 Manage network and data integrity Page 7 software programmes, clients, customers, and visitors, and lastly state website databases. Type of Backup. Data will be kept in numerous geographical locations, with distinct users, varying degrees of security requirements, and a variety of data formats and kinds. We will also choose and employ the Full Backup option because the client wants a high degree of data protection, has a sizable amount of storage, and needs to back up a lot of data. Since you clone all selected data and significantly create a copy for every object the user needs to protect at all times, this backup kind is the best and most complete available. Although it is comprehensive and sufficient, it also takes a lot of time. We are then informed that continuous data protection is accomplished, specifically bagging every type of data the operator stores, since we have chosen the full backup option. The audit report will leverage two essential network monitoring tools, namely Nagios Core and Zabbix, to comprehensively collect and analyse network information. These tools play a pivotal role in providing network providers with valuable data that showcases the status of network applications, identifies the root causes of network issues, highlights active devices, and offers insights into the overall framework of network traffic. Nagios Core, a robust monitoring solution, encompasses a user-friendly dashboard view, a versatile set of community plugins, and an effective alert system. These features collectively contribute to a streamlined monitoring experience, allowing for quick visualization of network health, easy access to critical information, and prompt alerts in the event of anomalies or issues. On the other hand, Zabbix stands out as a powerful network monitoring software that utilizes Simple Network Management Protocol (SNMP) and Internet Protocol Monitoring Protocol (IPMP) to tap into open sources of network data. This enables Zabbix to provide a comprehensive view of network performance, facilitating the identification of potential issues and ensuring the efficient management of network resources. Together, Nagios Core and Zabbix form a robust monitoring framework, empowering network
Lead College Pty Ltd RTO No: 41489 CRICOS Code: 03636F Project Portfolio (Student) ICTNWK423 Manage network and data integrity Page 8 administrators with the tools needed to maintain optimal network performance, troubleshoot effectively, and proactively address potential challenges. Attach: ICT systems audit report, including ICT audit checklist
Lead College Pty Ltd RTO No: 41489 CRICOS Code: 03636F Project Portfolio (Student) ICTNWK423 Manage network and data integrity Page 9 Section 3: Data protection systems implementation Data protection systems implementation Based on your audit findings you are to implement at least two of the data protection systems you have identified as being suitable. One of the solutions must relate to antivirus and anti-malware solutions and the other solution can be one of your choice. Take screenshot of your work, include the titles of your screenshots here and a description of what they show. Attach the screenshots to your Portfolio. Following audit findings, implement robust data protection with an industry-leading antivirus/anti-malware solution, incorporating real-time scanning and heuristic analysis. This fortifies defences against viruses, ransomware, and other threats. Additionally, deploy a tailored data protection solution, such as encryption software, data loss prevention, network access control, or multi-factor authentication, addressing specific vulnerabilities identified in the audit. This layered approach ensures comprehensive security, safeguarding sensitive data in transit and at rest. Continuous monitoring, updates, and assessments will be maintained for sustained effectiveness. Backup solution Based on your planning for back up, implement the solution you have identified. Take screenshot of your work, include the titles of your screenshots here and a description of what they show. Attach the screenshots to your Portfolio. Organisations have different backup demands than other organisations because of their unique requirements. After reviewing the Office Audit report case study, we found that the data that requires backup includes administrative databases, personnel files, accounting and financial records, state assets like cars, laptops, and mobile devices, software programmes, clients, customers, and visitors, and lastly state website databases. Network monitoring Using the tools that you identified, measure the performance of the ICT system. Is the performance as expected? Explain why or why not. Take screenshot of your work, include the titles of your screenshots here and a description of what they show. Attach the screenshots to your Portfolio. Using Nagios Core and Zabbix, the performance of the ICT system is effectively measured. Both tools provide a comprehensive view of network applications, root causes of issues, active devices, and overall traffic, facilitating proactive monitoring. Nagios Core's user-friendly dashboard, community plugins, and alert system contribute to a streamlined experience, allowing quick visualization and timely issue resolution. Zabbix, leveraging SNMP and IPMP, taps into open sources for a detailed network performance view. Together, they form a robust framework empowering administrators to maintain optimal performance. If the performance aligns with expectations, it indicates effective system management and the tools' utility. Deviations may result from hardware/software issues, network congestion, or configuration problems. Regularly updated alert systems in
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Lead College Pty Ltd RTO No: 41489 CRICOS Code: 03636F Project Portfolio (Student) ICTNWK423 Manage network and data integrity Page 10 Nagios Core and Zabbix facilitate prompt issue identification and resolution. In conclusion, the performance assessment hinges on the real-time insights provided by Nagios Core and Zabbix. If disparities exist, a detailed analysis using these tools would pinpoint the root causes, allowing administrators to promptly address and optimize the ICT system. Attach: Screenshots