Great Deal! Get Instant $10 FREE in Account on First Order + 10% Cashback on Every Order Order Now

ICTNWK511 Manage network security Student Assessment Tasks © RTO Works XXXXXXXXXXStrathfield College RTO: 91223 CRICOS Provider Code: 02736K Page 2 Assessment Task 2: Network security project Task...

1 answer below »
ICTNWK511 Manage network security Student Assessment Tasks
© RTO Works XXXXXXXXXXStrathfield College RTO: 91223 CRICOS Provider Code: 02736K Page 2
Assessment Task 2: Network security project
Task summary
You are required implement and manage security functions throughout a network.
This assessment is to be completed in the simulated work environment in the RTO.
Required
• Access to textbooks and other learning materials
• Computer with Microsoft Office and internet access
• Access to a network
• Network support tools, including network simulation software (such as CISCO packet tracer)
• Manufacturer’s recommendations (relevant to the network simulation software).
• Network Components Diagram
• Network Security Plan Template
• Network Security Review Template
• Security Incident Form
• Security Policy
• Security Standards such as at https:
www.cisco.com/c/en/us/about/press/internet-protocol-
journal
ack-issues/table-contents-38/104-standards.html
• Sign Off Sheet
Timing
Your assessor will advise you of the due date of these submissions.
Submit
• Email with Network Security Review attached
• Email with Network Security Plan attached
• Email with Revised Network Security Plan attached
• Email with the following files attached:
o Security Measures Screen Shots
o Updated Security Policy
o Security Incident Form
o Security Incident Response Procedures
• Email with the following attached:
o Security Incident Screen Shots.
o Completed Security Incident Form
o Completed Sign Off Sheet.
https:
www.cisco.com/c/en/us/about/press/internet-protocol-journal
ack-issues/table-contents-38/104-standards.html
https:
www.cisco.com/c/en/us/about/press/internet-protocol-journal
ack-issues/table-contents-38/104-standards.html
ICTNWK511 Manage network security Student Assessment Tasks
© RTO Works XXXXXXXXXXStrathfield College RTO: 91223 CRICOS Provider Code: 02736K Page 3
Assessment criteria
For your performance to be deemed satisfactory in this assessment task, you must satisfactorily address all
of the assessment criteria. If part of this task is not satisfactorily completed, you will be asked to complete
further assessment to demonstrate competence.
Assessment Task 2 Instructions
Complete the following activities:
1. Review existing system.
Research the range of network threats and attacks that can affect a computer network.
Based on your research, review the simulated ICT system and associated networks, as well as
the cu
ent security system in place.
Identify cu
ent threats and risks to your RTO’s simulated network.
Write a report that includes the following:
• A definition of a network threat and descriptions of at least three common threats to a
network
• A definition of a network attack and descriptions of at least three common attacks to a
network
• Why attacks occur, where they come from and how they occur.
• A definition of a network vulnerabilities and descriptions of at least three common network
vulnerabilities.
• Cu
ent threats and risks to your RTO’s simulated network.
Use the Network Security Review Template to guide your work.
2. Send an email to your assessor.
The text of the email should be in grammatically co
ect English, written in an appropriate (polite,
usiness-like) style.
It should introduce and summarise the contents of the attachment and ask for their feedback.
Attach your Network Security Review to the email.
ICTNWK511 Manage network security Student Assessment Tasks
© RTO Works XXXXXXXXXXStrathfield College RTO: 91223 CRICOS Provider Code: 02736K Page 4
3. Develop a network security plan.
You are required to design a network security plan for the RTO’s simulated network.
The plan should mitigate the attacks you described in your network security review.
Your network security plan should include the following:
• An introduction
• A definition of the various phases of the network security design process.
• A
ief summary of all of the ICT assets that your RTO has in place. Your summary should
also include a categorisation of each asset and a calculation of their value.
• Threats and risks associated with each asset based on your cu
ent asset analysis, and
your assessment of the RTO network in your network security review.
• Based on identified threats from task 1, categorise the threats and create a threat model.
The threat model you create may be updated based on feedback after the meeting.
• Proposed risk management plan.
• Proposed network diagram, including associated explanation and technical information.
• Technical information on the routers configuration and how security measures will be
configured based on security policies
• Auditing and monitoring a
angements.
Use Network Security Plan Template to guide your work.
4. Send an email to your assessor.
The text of the email should be in grammatically co
ect English, written in an appropriate (polite,
usiness-like) style.
It should introduce and summarise the contents of the attachment and ask for their feedback.
Request a place, date and time when you can discuss
Attach your Network Security Plan to the email.
5. Meet your assessor to discuss the security measures.
You are required to meet and discuss your Network Security Plan.
Carefully go through your plan, explaining all of its components.
During the meeting, you are required to demonstrate effective communication skills including:
• Speaking clearly and concisely
• Asking questions to identify different perspectives on the security design.
• Responding to questions as required
• Using active listening techniques to confirm and clarify understanding.
Your assessor will provide feedback which you will need to input into your plan. Take notes on
this.
ICTNWK511 Manage network security Student Assessment Tasks
© RTO Works XXXXXXXXXXStrathfield College RTO: 91223 CRICOS Provider Code: 02736K Page 5
6. Revise your Network Security Plan
Review your plan, making the changes suggested by your assessor.
Save this version of your plan as your plan as Revised Network Security Plan
7. Send an email to your assessor.
The text of the email should be in grammatically co
ect English, written in an appropriate (polite,
usiness-like) style.
It should introduce and summarise the contents of the attachment and ask for their feedback.
Request a place, date and time when you can discuss your security plan.
Attach your Revised Network Security Plan to the email.
8. Design security measures
Assume that you have been given approval to proceed and you are to design the security
measures for the network components.
The network components are as included in the Network Component Diagram provided to you
and you are required to:
• Configure the required IP address (based on the network component diagram provided).
• Configure and apply an Access Control List (ACL) that will permit the Admin PC with static
IP Address XXXXXXXXXXto access the office router resources, while blocking the entire
PC from the office route.
• Use the network simulation software (e.g. CISCO packet tracer) to create this diagram.
Take screen shots of all of your work and save these as Security Measures Screen Shots.
9. Finalise the network security design
Following completion of the network security design, assume that you have been asked to
develop a security policy to ensure full network security.
There is an existing Security Policy in place but you are required to develop an additional
security policy that reflects your network design. In developing your Security Policy, you should
also take into account relevant Security Standards as per the link provided to you.
Save this as Updated Security Policy.
ICTNWK511 Manage network security Student Assessment Tasks
© RTO Works XXXXXXXXXXStrathfield College RTO: 91223 CRICOS Provider Code: 02736K Page 6
10. Develop an auditing and incident procedure.
In the next activity, you are required to respond to a security incident.
However, there is cu
ently no procedure in place to address security incidents, and you have
een asked to develop a Security Incident Form so that such incidents can be recorded.
You are also required to create security incident response procedures, which should be included
in the Updated Security Policy. This should address both auditing and incident response.
11. Send an email to your assessor.
The text of the email should be in grammatically co
ect English, written in an appropriate (polite,
usiness-like) style.
It should introduce and summarise the contents of the attachments and ask for their feedback.
Attach the following files to the email:
• Security Measures Screen Shots
• Updated Security Policy
• Security Incident Form
• Security Incident Response Procedures
12. Respond to a security incident.
Assume that you have been informed that there has been an incident related to a security
each as follows:
Incident: Someone took control of the router, as the password was not configured in the router.
It is unclear what damage has been caused or potential problems that may arise.

You are required to respond to the security incident appropriately. This must include configuring
the password in the router (relevant to the previous network component design you were
provided with). You must complete all required steps including commands used to configure the
password.
At the end of this task, complete the required testing to check that the issue is resolved.
Take screenshots of your work to provide to your assessor. Save these as Security Incident
Screen Shots.
In addition, complete the incident form you created, documenting the security incident. Submit
your completed form to your assessor.
Sign off on the work by using the Sign off sheet.
ICTNWK511 Manage network security Student Assessment Tasks
© RTO Works XXXXXXXXXXStrathfield College RTO: 91223 CRICOS Provider Code: 02736K Page 7
13. Send an email to your assessor.
The text of the email should be in grammatically co
ect English, written in an appropriate (polite,
usiness-like) style.
It should introduce and summarise the contents of the attachments and ask for their feedback.
Attach the following files to the email:
• Security Incident Screen Shots.
• Completed Security Incident Form
• Completed Sign Off Sheet.
ICTNWK511 Manage network security Student Assessment Tasks
© RTO Works XXXXXXXXXXStrathfield College RTO: 91223 CRICOS Provider Code: 02736K Page 8
    Assessment Task 2: Network security project
    Task summary
    Required
    Timing
    Submit
    Assessment criteria
    Assessment Task 2 Instructions
    1. Review existing system.
    2. Send an email to your assessor.
    3
Answered Same Day Jun 01, 2021 ICTNWK511 Training.Gov.Au

Solution

Amit answered on Jun 09 2021
141 Votes
This document is Network Security Design Plan Template.
It is part of the supporting resources for Assessment Task 2 of ICTNWK511
Network security plan
Introduction
The network security is most important task for any developed network. All the deployed resources and possible unauthorized access to the network can be protected with it. The possible attacks on the developed network for any organization can also be prevented by implementing a proper network security plan. The access controls and methods to prevent possible attacks on the set infrastructure of any organization are defined in the network security plan. Each organization maintains their own network security plan and regular updates in this plan are ca
ied out for protection of developed network.
Steps to be taken
· Planning: Planning is the most important phase in the development of network security plan. All the existing infrastructure of the organization are analysed in this phases. The possible security risks and related threats are identified in this phase. The network vulnerabilities are also analysed. The planning to secure the network against identified issues and their possible occu
ence are mainly done in this phase.
· Building: as the possible issues and vulnerabilities in the network are identified, then, the possible methods to prevent such attacks and vulnerabilities are developed in building phase. The polices to handle the possible identified vulnerabilities are developed.
· Managing: The development of network security plan is not enough. It requires regular updates and proper management for removing the identified vulnerabilities. The complement management to implement developed security plan and required updates are performed in this phase.
ICT assets.
    Resources
    functions
    Quantity
    List importance for the organization (value)
    Category
    DNS serve
    The web hosting services are mainly maintained by this server.
    1
    Highly important as it maintains the DNS services for this organization.
    Network component: hardware
    Office server
    All the data storage operations of the office work...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here