CIS098-2 Operational Information Security Management

Post New Homework

CIS098-2 Operational Information Security Management - University of Bedfordshire

Assignment - Modelo T&T Case Study v2.0

Learning outcome 1: Demonstrate the following knowledge and understanding

Provide an advanced understanding of knowledge and awareness of tools and techniques for cyber defence, threat intelligence and information governance in terms of their effectiveness and suitability for threat mitigations in different organisational contexts.

Learning outcome 2: Demonstrate the following skills and abilities
Be able to design, implement and apply information security management solutions, strategies and technologies to mitigate loss, respond to multi- faceted attacks and mitigate against evolving threat landscapes.

This assessment will involve an investigation of a case study and delivery of a secure network simulating the business in this study. You are required to provide a complete secure network simulation for the business in the case study and write a technical document listing recommendation for vulnerability mitigations and comments/justifications for your security design. Show your testing strategy with all necessary commands explained. You should achieve the following:

• An investigative technical report
• Configure the systems in the Packet Tracer file supplied with this assignment.
• Test and ensure full connectivity is demonstrated in your simulation. A full testing strategy should be provided and evidenced.
• Add and configure security devices (e.g. Firewalls, etc.) and security features (port security, secure authentication, etc.) to full secure the network from external intrusions and internal attacks.
• Include configuration testing and command evidence in the technical report

• Design a cyber defence mechanism for a given scenario
• Implement a cyber defence solution for a given scenario
• Present and explain the rationale behind choices made for a given cyber defence scenario
• Design a testing approach to demonstrate system security for a cyber defence solution that you have designed

Assessment Tasks

You work as the Information Security Manager for Modelo T&T you have been asked to evaluate the current network security at Modelo T&T and make recommendations for improvements, including a simulation of the upgraded/secured network design.
You will need to produce and hand in the following:
- Technical Document - this is to contain a full write up of your threat analysis and security recommendations. This should be a technical document written to InfoSec Technical people.
- Secure Network Configuration (packet tracer activity simulation)
Technical Document - Designing a Cyber-Defence Solution (Tasks 1, 2 and 3) - 40%
[Note: for these tasks you are expected to use a range of respected sources to back-up your recommendations and you will need to cite these sources clearly in your technical report using Harvard referencing - a related References list must also be included with your report.]

Task 1 - Vulnerability and Risk Assessment (suggested length: 1000 words)
Outline the security issues (e.g. suspected vulnerabilities, potential threats, risks) to the company and create a draft risk assessment outline with potential mitigations to ensure the protection of the company's assets.

Note: The company intends to hire a contractor to carry out a full risk assessment, but they would like you to provide a brief overview and examples of the types of things you would specifically like them to check (note that your discussion should be listed as bullet points of potential vulnerabilities with a CVSS, or STRIDE evaluation). You could include considerations such as: known vulnerabilities, key assets, potential threat vectors, consequences to the business of a cyber-incident or breach, etc. Also, if the company were to expand to allow card payment transactions, what additional security standards would they have to comply with?

Task 2 - Network Nodes and Endpoints Hardening Recommendations/Checklist (suggested length: 1 table)
Write a security checklist for the all the network nodes and endpoints, i.e. a list of items that a technician could check and date/tick to say that the node/end-point was ‘secured'. This should also address the proposed addition of a card payment system.

Task 3 - Network Segmentation and use of secure remote communications (suggested length: 800 words)

1. Write a brief description in your technical report of the benefits to network segmentation and how it helps in providing security while relating your discussion to how this concept is applied in this case study.

2. Write a brief description explain how secure remote communications have been and can be further extended to provide extra security in this case study. Clearly state where secure remote communications can be extended giving exact areas related to the case study. Include recommendations for why this is a good idea into your technical report. This should also address the proposed addition of a card payment system.

Task 4 - Secure Network Configuration - Packet Tracer Simulation Activity and Testing

You will be provided with a Packet Tracer activity that is a simulation of the Modelo T&T Network and asked to carry out some key security configurations to model a more secure design for the company.

The Packet Tracer activity will ‘score' your attempt (and you can click ‘show incomplete items' to see what you have correct and still to do). Please note this score is INDICATIVE but may not be exactly the score you will get for this section - an instructor will still look at your configuration. You will need to submit your packet tracer file with your technical report.

Attachment:- Operational Information Security Management.rar

Post New Homework
Captcha

Looking tutor’s service for getting help in UK studies or college assignments? Order Now