Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Angkatan Tentera Malaysia (ATM) is the armed forces of Malaysia, consists of three branches, namely the Malaysian Army, Royal Malaysian Navy and the Royal Malaysian

Angkatan Tentera Malaysia (ATM) is the armed forces of Malaysia, consists of three branches, namely the Malaysian Army, Royal Malaysian Navy and the Royal Malaysian Air Force. ATM has more than 100,000 active personnel located nationwide and even worldwide. It is very critical for ATM to have a highly secure network connections for these locations. The network is not only used for country's safety purposes system (weapons inventory system, assets mobilization system etc) but also for less-critical internal system such as payroll system, attendance system etc.

As the Network Security Manager for ATM, your tasks are to:

  1. Provide ATM's background in terms of network management including the business operations (eg. running 24/7, multiple data centres) and the security needs (eg. secure environment for its personnel) of the ATM's network.
  2. Analyse THREE possible internal attacks that can be launched at ATM. In your analysis, provide the following for each of the internal attacks identified:
    1. Description of the internal attack
    2. Example scenario on how the attack is launched
    3. Security measure to eliminate the attack
  3. Analyse THREE possible external attacks that can be launched at ATM. In your analysis, provide the following for each of the external attacks identified:
    1. Description of the external attack
    2. Example scenario on how the attack is launched
    3. Security measure to eliminate the attack
  4. Provide the importance of implementing controls against network attacks based on
  5. Preventive control to be implemented in ATM with appropriate example
  6. Detective control to be implemented in ATM with appropriate example
  7. Corrective control to be implemented in ATM with appropriate example
  8. Propose and discuss THREE key aspects (security controls) of approaching towards a good cyber security for ATM to prevent ethical issues on network security
    1. Description of the key aspect (security control)

Provide appropriate example in relation to ethical issues on network security

Rubrics

1. Introduction

  • Angkatan Tentera Malaysia (ATM) background in terms of network management including the business operations (eg. running 24/7, multiple data centres).
  • Description about the security needs of ATM (You may use your creative imagination here).

2. Discussion on THREE types of internal network attacks that can be launched in ATM:

  • Description of the internal attack
  • Example scenario on how the attack is launched
  • Security measure to eliminate the attack

3. Discussion on THREE types of external network attacks that can be launched in ATM :

  • Description of the external attack
  • Example scenario on how the attack is launched
  • Security measure to eliminate the attack

4. Discussion about the importance of implementing controls against network attacks based on:

  • Preventive control to be implemented in ATM with appropriate example
  • Detective control to be implemented in ATM with appropriate example
  • Corrective control to be implemented in ATM with appropriate example

5. Propose and discuss THREE key aspects (security controls) of approaching towards a good cyber security for ATM to prevent ethical issues on network security

  • Description of the key aspect (security control)
  • Provide appropriate example in relation to ethical issues on network security

6. Conclusion

  • Summarize the important points discussed

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Data Communications and Networking

Authors: Behrouz A. Forouzan

5th edition

73376221, 978-0073376226

More Books

Students also viewed these Computer Network questions