Great Deal! Get Instant $10 FREE in Account on First Order + 10% Cashback on Every Order Order Now

in this assignment I have attached 2 files. Please make sure u complete all the task of the assignment.In Task 2 you need to use my student id XXXXXXXXXXand student name- Preetpal Singh for data...

1 answer below »
in this assignment I have attached 2 files. Please make sure u complete all the task of the assignment.In Task 2 you need to use my student id XXXXXXXXXXand student name- Preetpal Singh for data encryption standard according to the table given in attached file.Also the screenshot should be attached with the assignment.Please complete all the questions asked in the assignment.
Answered Same Day May 03, 2021

Solution

Amit answered on May 16 2021
152 Votes
Title of the assignment: IS Security and Risk Management
Student’s name:
Professor’s name:
Course title: SBM4304
Date: 5/15/2019
Table of Contents
1.    First task    3
2.    Introduction    3
3.    Recognition of threats switch
outer of Booktopia    3
4.    Security threat mitigation to servers of Booktopia    5
5.    Ensuring web services availability through Windows server 2016    6
6.    Employees of Booktopia impacting IS    7
7.    Recommendations for Booktopia employees for reducing risks    7
8.    Web and email server auditing with auditing tools of Windows server 2016    8
9.    Second task    9
10.    Encryption and decryption of my name and ID    9
11.    Conclusion    10
12.    References:    12
1. First task
2. Introduction
Australia is very large and great country and books are the main reason for its great society. The Booktopia which is one of the largest online stores of books and providing services related to books delivery is selected as the IT based organization for completing this assignment. The Australian book readers and other readers from any physical location can use this web space for purchasing books. The complete sell and orders of books at Booktopia are managed with online platform. So, Booktopia organization has developed an effective IT infrastructure with help of different devices and maintaining effective security for them. To purchase any book, each user has to provide his personal details and banking details. So, Booktopia is storing this information in its server and windows server 2016 is best to store this information. This server can assure the availability and performance of the web space defined by Booktopia. The effective tools of server and employee awareness towards security at Booktopia can help in maintaining desired CRM.
3. Recognition of threats switch
outer of Booktopia
The Booktopia organization is an IT based organization which is a large online book store and serving to Australian book readers. The web server of Booktopia is responsible to maintain all its services of book orders, sales and stock management. As Booktopia is working on the bases of its IT infrastructure, so, any vulnerability to its IT infrastructure of devices can cause serious security issues to it. The hackers prefer to use the network devices like switches and routers to make all unauthorized access in any existing IT infrastructure. The Booktopia has to take essential and much required steps for identification of any vulnerability in the network devices so that the operational flow of book selling can be effectively managed. The below explained threat types cab occur to network devices of Booktopia:
a) Complete hijacking of used switches and routers: The switches and routers are most commonly attacked network devices by hackers with false IP. The data packets are sent by hackers by using the false IP and with IP spoofing, the exact predictions of IP for used switch and router is made by hackers. When, the hacker is able to manage the operations of any network device like switches and routers, then, all unauthorized alterations to the network packets and data can be done by hackers. The session hijacking, relay atatcke and death attacks are common attacks of this type.
) Attack on protocols of network devices: Each network device has its own protocol which contains the rule set defining the operations of that device. These protocols are the primary elements on which complete working and availability with performance of any network device is based. The hackers attack the working prototypes of these network devices for managing unauthorized access. When, the hacker is able to manage the operations of any network device like switches and routers because of protocol control, then, all unauthorized alterations to the network packets and data can be done by hackers.
The Booktopia is maintaining different standards for protection of any possible hacking attack on their network devices. The network devices contain few automatic and inbuilt functions which automatically executed during possibility of any hacking attack. The detailed explanations of security methods used by network devices for protecting IT infrastructure of Booktopia are presented underneath:
a) Passing control to parallel devices: When the IT infrastructure of Booktopia detects any attack on their devices, then, that devices start passing the controls to nea
y active parallel device and behaviors like dead terminal. Once the terminal or network device is not providing any services or only providing limited services, the complete network attack with that device is not possible for that hacker.
) IP fragmentation: The networking devices like switches and routers used in IT infrastructure of Booktopia can perform the fragmentation of allocated IP addresses. Because of this technique, the unauthorized IP addresses will be filtered by these devices and they are not allowed to make any changes in data...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here