Manage network security
1. Answer the following questions regarding the industry-standard ICT networks and their configuration
1.1. Explain the term “ICT networks” using 20-40 words.
1.2. What is network configuration? Answer using 20-40 words.
1.3. What are the three (3) types of network?
2. Answer the following questions regarding the network attacks, vulnerabilities and related weaknesses of installed infrastructure, including:
· security technologies
· emerging security issues
2.1. What are network vulnerabilities? Answer using 20-40 words.
2.2. What are network security attacks? Answer using 20-40 words.
2.3. What is the relation between security weakness and vulnerability? Answer using 20-40 words.
2.4. Identify four (4) emerging security technologies.
2.5. Identify four (4) emerging security issues.
3. Answer the following questions regarding the network security measures, including:
· auditing and penetration testing techniques
· logging analysis techniques
· organisational network infrastructure
· capabilities of software and hardware solutions
· general features of emerging security policies, with depth in security procedures
· network management and security process controls
3.1. What are the three (3) basic network security measures?
3.2. Identify two (2) auditing and penetration testing techniques
3.3. Explain the reasons for using network logging analysis techniques in terms of network security perimeter issue? Answer using XXXXXXXXXXwords.
3.4. What do you mean by organisational network infrastructure keeping network security perimeter in prospect?
3.5. Explain the purpose of special hardware and software solutions like intrusion detection systems (IDS) to secure computer networks and host computers. Answer using 30-60 words.
3.6. What are security policies and procedures? What general features should be included in the security procedures. Answer using 30-60 words.
3.7. What are network security controls? Answer using 30-60 words.
4. Answer the following questions regarding the network security implementation risk management plans and procedures, including:
· network security planning
· implementation
· cost analysis and budgeting.
4.1. What is the purpose of network security planning? Explain using 20-40 words.
4.2. What is security implementation? Answer using 20-40 words.
4.3. Explain the purpose of cost analysis and budgeting for network security implementation using 20-40 words.
5. Identify the five (5) most common network attacks and explain each in XXXXXXXXXXwords.
6. Identify the five (5) most common vulnerabilities of a network. Explain each in XXXXXXXXXXwords.
7. Identify the six (6) weakness of a network that can cause network attacks.
8. Identify five (5) emerging security technologies used to secure a network.
9. Identify six (6) security technologies used to secure organisation networks from web-based attacks. Write XXXXXXXXXXwords for each.
10. Identify five (5) emerging security issues. Explain each in XXXXXXXXXXwords.
11. What is network auditing? Write your answer in XXXXXXXXXXwords.
12. Identify ten (10) tools used for network auditing.
13. Explain network penetration in XXXXXXXXXXwords.
14. Identify ten (10) network penetration tools.
15. What is a log analysis? Write your answer in XXXXXXXXXXwords.
16. Identify five (5) best practices to analyse network logs. Write your answer in XXXXXXXXXXwords.
17. Identify twenty (20) tools used to monitor and analyse network logs.
18. What is organisational network infrastructure? Write your answer in 40-80 words.
19. How do you differentiate between IT infrastructure and network infrastructure? Write your answer in XXXXXXXXXXwords.
20. Identify five (5) features of an effective security policy.
21. Identify four (4) procedures used for network security. Write XXXXXXXXXXwords for each procedure.
22. Identify seven (7) basic security and management controls applicable to all networks.
23. List five (5) essential features of a successful network security policy and explain each in XXXXXXXXXXwords.
24. What are nine (9) essential elements of network security planning?
25. Identify eight (8) types of information that must be included in an ideal risk management plan.
26. Identify eight (8) steps to implement network security.
Business Plan Template
Manage network security
Scenario:
You have been working in ABC bank as an IT manger. ABC Bank wants to open a new
anch in another city and for this they already purchased a double story building. It consists of one server room on its second floor, 2 management room on second floor and one board room on the 1st floor. The following IT infrastructure will be delivered to the new location according to requirement list raised by you.
A. Twenty (20) HP I7 computers
B. Four (2) Cisco 24 port switches
C. Two (2) Hp ProLiant servers
D. One (1) NBN connection
E. Two (2) Wi fi Route
F. One Wireless access point
G. Two (2) Sharp MX-4111N all in one printers
H. One (1) Biometric sensor
I. One (1) server rack
J. Sixty (60) patch cords(network cables)
Malware attack has been a critical issue for ABC Bank Last month a number of computer systems were out-of-order and caused significant financial damaged to the organisation.
Company officials want you to prepare a detailed report regarding the network security plans so that this report can be shared with company’s risk analyst. After the approval of the risk analyst, the IT head can give you the go ahead for setting up the network design with the suggested changes.
Task 1:
In this assessment task:
• The student will act as themselves
• The trainer assessor will act as the risk analyst/ your supervisor
You need to prepare a report that includes the following information:
A. All three (3) phases of network security design
• Defining planning phase for network security design according to organisational requirements
• Defining building phase for network security design according to organisational requirements
• Defining managing phase for network security design according to organisational requirements
o Planning Phase, including the following:
Most suitable network topology according to office layout
Server roles
The operating system for servers and workstations
Applications requirement
The bandwidth requirement for internet
Antivirus requirements for servers and workstations
Security measures for network equipment
Access control
Wi-fi Access point location
Backup Strategy
o Building Phase of network security design, including the following:
Risk assessment methods
Security measures
Costing of network design
Planned Network design feedback given by security analyst and IT head
Incident reporting matrix
The threat model for risk assessment
Determine attacker scenarios and threats according to network security design specifications
Design and document network components security measures
Develop and document security policies
Submit document to required personnel and seek and respond to feedback
o Managing phase, including the following information:
Incident reporting
Security level matrix
Facilities level
Escalation matrix
B. Risks assessment, including the following information:
Possible reasons
Attackers scenarios and possible threats
o Determine major threat themes to network security
o Determine the potential origin of major threats according to network security design specifications
o Identify industry standard common network vulnerability types
o Design and document threat model according to network security design specifications
Common network vulnerabilities
Who can be a risk to the network?
Level of risk
C. Risk management strategy
Assets that need to be secured
Asset’s approximate value (search form internet)
Analysis on security risks
o Determine required elements of risk management according to network security design specifications
o Identify organisational assets requiring protection
o Categorise and document assets and determine their value according to organisational requirements
o Determine and document risk management plan according to organisational requirements
Reason for the security of the asset
Design security incidents response
o Design and document auditing and incidents response procedure
o Submit to required personnel, seek and respond to feedback
A risk management plan including the following information
• No.
• Risk (What can happen)
• Source (How this can happen)
• Possible Impact of Risk
• Possible Treatment
• Effectiveness of cu
ent plan
• Likelihood
• Consequence
• Acceptable/Unacceptable
Task 2 :
This task is in continuation of task 1
In this task :
· The student will act as an ICT technician
· The traine
assessor will act as a risk analyst.
· The student will hold a meeting with the risk analyst to collect feedback on the network security design
Task 3:
This task is in continuation of Task 2
In this task:
· The student will act as themselves
· The traine
assessor will act as a security analyst.
· The student will implement the network design developed
You have submitted your proposed network report to the security analyst and after a few minor changes you received the go ahead from the IT head. Now it is the time for you to put your design into practice. You are required to perform the below tasks.
A. Create network security design for network component by including the following:
o Physical security requirements of sever
o Server access rights
o Physical Security of Switches
o Password requirements of router, switches
o Wi-Fi security encryption
o Wi-Fi access point security
B. Create the Security incident report template including the following
o Reported by
o Date of reporting
o Title /Role
o Incident No
o Incident Type
o Date of Incident
o Location
o City
o State
o Zip Code
o Incident Description
o Contact of the involved party
o Police Report filed Precinct
o Reporting Office
o Phone
o Follow up Action
o Supervisor Name
o Supervisor Signature
o Date
Task 4:
This task is in continuation of task 3
In this task:
· The student will act as themselves
· The student will implement the network security design developed.
After finalising the network security design and incident response template, it is the time for you to implement the final network security design. You want to test the working and reliability of the network design against the known vulnerabilities. To check the plan for a final sign off the following activities need to be performed and the required changes made.
• Testing of security design against the following vulnerabilities
o USB Drive access
o Wireless access point authentication
o SQL Injections
o Smartphone or digital devices authentication
o Email Filtering
o Database exposure
o Security patch updating
o Password policy
During the testing document, the incidents in the incident response template designed in part A of this assessment task to make required changes to complete the sign off template below.
Assessment-2
Task-1 Report :
A. All three (3) phases of network security design
Defining planning phase for network security design according to organisational requirements
Most suitable network topology according to office layout
Server roles
The operating system for servers and workstations
Applications requirement
The bandwidth requirement for internet
Antivirus requirements for servers and workstations
Security measures for network equipment
Access control
Wi-fi Access point location
Backup Strategy
Defining building phase for network security design according to organisational requirements :
Risk assessment methods
Security measures
Costing of network design
Planned Network design feedback given by security analyst and IT head
Incident reporting matrix
The threat model for risk assessment
Determine attacker scenarios and threats according to network security design specifications
Design and document network components security measures
Develop and document security policies
Submit document to required personnel and seek and respond to feedback
Defining managing phase for network security design according to organisational requirements
Incident reporting
Security level matrix
Facilities level
Escalation matrix
B. Risks assessment, including the following information:
Possible reasons
Attackers scenarios and possible threats
· Determine major threat themes to network security
· Determine the potential origin of major threats according to network security design