Security代写 | CP2414 Assignment 1 Security checklist


CP2414 Assignment 1 Security checklist
WARNING: This is not a group project. Each student must individually complete all parts of their submission.
Students must start with a new document and they must not have another person’s file in their possession at any time. Students may discuss the task with each other, but each student must write their assignment independently and not show their work to other students.
This assignment has been divided into two (2) parts:
Part I – Identify and analyse threats to a company. Also, research and source appropriate devices/software justifying choices (feasibility, efficiency, etc.).
Part II – Design a secured network.
1. A single Word document (.docx) – containing all parts.
NOTE: The assignment template can be found at the end of this assignment sheets. Scenario:
An Australian advertising company, iCreative, has grown concerned by the global rise in cybercrime and ransomware.
They have asked you to:
• For all branches – Identify and analyse application and networking-based threats to their
company; and
• For the Brisbane branch only – recommend preventative and mitigative technologies
and strategies for potential intrusion and attacks on the network.
About the company:
iCreative is a growing advertising company consisting of three branches: The Brisbane (main) branch; the Launceston branch; and the Portland branch. Each branch has five departments and there are approximately 25 employees per department. The Brisbane branch has 1 mail server, 2 web servers, and 2 database servers. The Launceston and Portland branches are smaller branches and so they each have only 1 mail server and 1 database server.
All branches have high-speed networks; however, the traffic can be quite heavy on weekdays. This is especially true for the Brisbane branch.

Part I. Potential Threats
You have been provided with a list of complaints from employees about the workstations at iCreative:
• Complaint 1 (Derek): My computer takes forever to start up and shut down. It is just so slow all the time no matter what I am doing or what program is open.
• Complaint 2 (Lexie): I feel like my hard drive is rather small. It only has about 30 document files on it but I keep receiving a notification telling me that my hard drive is nearly full now. I brought this to the IT department and asked for a bigger hard drive but they told me that my hard drive is already 2 TB in size and so I shouldn’t need a bigger one. Instead, they told me to just uninstall any programs that I don’t use. The only programs that are installed, though, are the ones the IT department installed on there for me and one extra program that I installed and use every day.
• Complaint 3 (Meredith): It takes forever to download a file from the database servers. It doesn’t even matter what the size of the file is.
• Complaint 4 (Alex): I keep receiving email notifications for “Undeliverable message” but when I look at the messages they aren’t actually emails that I have sent. This is so annoying and such a waste of time.
• Complaint 5 (Richard): I don’t seem to be able to download updates for the antivirus software or the operating system. It’s so frustrating.
• Complaint 6 (Mark): I get very annoyed with the fan in my computer. It’s just so loud. It seems to be spinning really fast and all the time. Even with no programs open the fan is going crazy.
• Complain 7 (All employees): Difficulty accessing the website, mail and database servers.
From the complaints above, you are required to analyse and identify the threat/s (if there are any). You must also make a recommendation on strategies and technologies (i.e. hardware and software) to prevent and mitigate the problems.
1. Your threat analysis and identification should ONLY concern network security and
NOT hardware or software.
2. It is possible that the complaints are connected to one another.
Part II. Firewall, Honeypot/s, and Other Network Security Technologies Planning and Design for Brisbane Branch
Employing firewalls, honeypots, and other network security technologies can be an effective means of protecting the company networks. As such, you are required to design a network security configuration for the Brisbane branch of the company. To do this, you will need to consider the existing devices (see “About the company” – Brisbane branch ONLY), the hardware/software solutions you recommended in Part I, and additional honeypot/s.
You are required to:
1. Draw your proposed secure network diagram, including: a. Firewall/s
b. Other Network Security Technologies (hardware and/or software)

c. Honeypot/s
d. Existing devices (e.g. servers, workstations, router, switches)
2. Explain and justify the configuration diagram with respect to:
a. The type and placement of each firewall;
b. The honeypot location/s and quantity;
c. The placement and purpose of each piece of hardware/software.
Suggested Report Structure/Template
For the highest marks possible, you should READ THE RUBRIC and submit your report using the following proposed structure:
Part I. Potential Threats
For each employee complaint: Complaint [number] – [name]:
• [Identified threat/s] – [Discussion and comprehensive explanation for the identified threat/s]
• Solution – [Recommended solution for threat] Overarching Threat:
[If an overarching threat exists you should discuss this here. See IMPORTANT NOTE]
Part II. Firewall/s, honeypot/s, and other network security technologies Planning and Design
• Diagram
• Explanation and justification of the proposed configuration.
End of Assignment 1


本网站支持淘宝 支付宝 微信支付  paypal等等交易。如果不放心可以用淘宝交易!

E-mail: [email protected]  微信:itcsdx