ICTNWK502 Case Study Template
Use the template below to help you structure your report for the case study assessment task
1. Introduction
Your report should have an introduction section where you identify the decision-maker the report is aimed at, e.g. with a statement “This report has been written by (your list of team members) for (the name of the decision-maker the report is addressed to)
2. Analyse enterprise data security requirements
what are the business requirements for the city council this encryption proposal needs to address? What problems do they need to solve?
3. Create a new or review an existing security plan to determine appropriate encryption methods,
Based on their cu
ent security practices and plans, what encryption-related technologies would you recommend the council adopt. Give
ief reasons why they should adopt the technologies you suggest.
4. Review a range of encryption technologies and rank the most appropriate options.
Here you should list at least two encryption technologies, ranking them in importance. Briefly explain which technology is the most important to adopt.
5. Assess the costs associated with each encryption option.
You should provide the cost (e.g. licensing costs) of any software you recommend. If there is no cost, that also should be noted.
6. Analyse effect of encryption technologies on user roles and responsibilities.
This section of the report should highlight any impact on user roles and responsibilities. For example, what extra responsibilities might the network administrator and help desk need to assume if your solution is implemented?
7. Inform user of new encryption technologies and the effect it has on their responsibilities. For example, what training would users of the network need to undertake to be able to use the technology you are implementing. Who needs to be trained and what kind of training do they need.
8. Analyse implementation of the encryption technologies, confirming function and performance. How would you verify that emails are being signed, and that performance of other software on the servers has not been adversely affected by encryption measures?
9. Review help desk records for problems concerning implementation and take appropriate action. The help desk is a good source of information of what is going wrong with the implementation, as this is where e
ors are being reported. What action do you recommend be taken about the problems reported to the help desk? How can you use this information to help improve the use of the technology
10. Review system logs for encryption issues and compromises. Based on the e
or log shown in the case study, what caused John Jackson’s email problem, and what needs to be done to fix the problem?