Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Case Study IT Biz Solutions offers a wide range of Information and Communication Technology services to businesses of all sizes. Assume you are the IT

Case Study

IT Biz Solutions offers a wide range of Information and Communication Technology services to businesses of all sizes.

Assume you are the IT Manager for IT Biz Solutions and you have been asked to consider the virtualised cyber security infrastructure for two case study organisations as follows:

Jonathan's Graphic Design - Business information

Business type Graphic design business
IT needs

Wants to run two operating systems - Mac and Windows - therefore a virtual machine is required.

Wants to make sure that the virtual machine is cyber secure.

Data types

Customer database stored on system, however, no bank details stored

Accounting system - Xero

Files associated with graphic design

Uses OneDrive

Security levels Set for one user as single business owner.

Mission critical network servers

Through service providers i.e. Xero and OneDrive.

Secure boundary requirements

Must control input and outputs of digital estate.

King Edward VII College - Business information

Business type Vocational college
IT needs

Wants to establish a virtual machine for testing software.

Wants to make sure that the virtual machine is cyber secure.

Data types

Student management system - RTO Manager

Accounting system - Xero

Staff files

Files associated with all aspects of operations e.g. academic documentation, enrolment documentation

Security levels
  1. A multilevel security mode is needed such that everyone must have permission to access the system but specific access for specific data will be required.

Mission critical network servers

Through service providers i.e. RTO Manager, Xero and OneDrive.

Secure boundary requirements

Must control input and outputs of digital estate.

  1. List three features associated with implementation methodologies for cyber security.
  2. Describe each of the following that are key features of a cyber security infrastructure.
Features of cyber security infrastructure Provide a brief description
Application security
Business continuity planning
Disaster recovery planning
Operational security (OPSEC)
Threat vectors

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Welcome To Management

Authors: Ryan Hawk, General Stanley McChrystal

1st Edition

1260458059, 978-1260458053

More Books

Students also viewed these General Management questions

Question

=+What is the response variable?

Answered: 1 week ago