Question
Case Study IT Biz Solutions offers a wide range of Information and Communication Technology services to businesses of all sizes. Assume you are the IT
Case Study
IT Biz Solutions offers a wide range of Information and Communication Technology services to businesses of all sizes.
Assume you are the IT Manager for IT Biz Solutions and you have been asked to consider the virtualised cyber security infrastructure for two case study organisations as follows:
Jonathan's Graphic Design - Business information
Business type | Graphic design business |
IT needs | Wants to run two operating systems - Mac and Windows - therefore a virtual machine is required. Wants to make sure that the virtual machine is cyber secure. |
Data types | Customer database stored on system, however, no bank details stored Accounting system - Xero Files associated with graphic design Uses OneDrive |
Security levels | Set for one user as single business owner. |
Mission critical network servers | Through service providers i.e. Xero and OneDrive. |
Secure boundary requirements | Must control input and outputs of digital estate. |
King Edward VII College - Business information
Business type | Vocational college |
IT needs | Wants to establish a virtual machine for testing software. Wants to make sure that the virtual machine is cyber secure. |
Data types | Student management system - RTO Manager Accounting system - Xero Staff files Files associated with all aspects of operations e.g. academic documentation, enrolment documentation |
Security levels |
|
Mission critical network servers | Through service providers i.e. RTO Manager, Xero and OneDrive. |
Secure boundary requirements | Must control input and outputs of digital estate. |
- List three features associated with implementation methodologies for cyber security.
- Describe each of the following that are key features of a cyber security infrastructure.
Features of cyber security infrastructure | Provide a brief description |
---|---|
Application security | |
Business continuity planning | |
Disaster recovery planning | |
Operational security (OPSEC) | |
Threat vectors |
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started