Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Evaluate the operation of system management and security software including improvements to the associated administration policies and procedures (C5, PLOI). SCENARIO: The Company KCP is

image text in transcribedimage text in transcribedimage text in transcribed

Evaluate the operation of system management and security software including improvements to the associated administration policies and procedures (C5, PLOI). SCENARIO: The Company KCP is a major supplier of material and services to the industrial sector. Its business model relies on electronic transactions with key customers and suppliers. To support its business model that heavily relies on e-transactions, the company has a Tier III data center which is located in Kuala Lumpur. Recently, in the board meeting, the management of KLP has decided to review the current operations of the network that includes system management, security software, administration policies and procedures that are implemented currently in the company's network. In this regard, the management has directed the CTO to start the review process and submit the report with proposals/recommendation within the second quarter of the current financial year. The CTO has started reviewing the network by presenting a list of questions to his technical team to carry out reviews on the areas (Refer Questions) that needs more attention and helps optimizing the performance of the network. Question 1 Systems management refers to the centralized administration of the IT (Information Technology) in an organization. Good system management is the backbone of an IT-based organization. When implemented effectively, it makes the delivery of IT much easier, making the employees adapt faster and be more productive. Knowing these facts, you are asked to propose at least FIVE IT functions/subsets that oversees the IT requirements of KCP Company. Your answer should include detailed discussions on these IT functions. (Total: 25 marks) Question 2 Evaluate the operation of system management and security software including improvements to the associated administration policies and procedures (C5, PLOI). IDS and IPS systems are two parts of network infrastructure that detect and prevent intrusions by hackers. Both systems compare network traffic and packets against a database of cyber threats. The systems then flag offending packets. Though these two systems are used by KCP Company to prevent and detect hackers, but, still hackers are using some methods to evade IDS in KCP Company. You are assigned to evaluate all the possible methods that are used for evading IDS and choose the prominent evasive techniques used by attackers to dodge IDS detection. Your answer should also include detailed discussion of evasive techniques as well. (Total: 25 marks) SCENARIO: The Company KCP is a major supplier of material and services to the industrial sector. Its business model relies on electronic transactions with key customers and suppliers. To support its business model that heavily relies on e-transactions, the company has a Tier III data center which is located in Kuala Lumpur. Recently, in the board meeting, the management of KLP has decided to review the current operations of the network that includes system management, security software, administration policies and procedures that are implemented currently in the company's network. In this regard, the management has directed the CTO to start the review process and submit the report with proposals/recommendation within the second quarter of the current financial year. The CTO has started reviewing the network by presenting a list of questions to his technical team to carry out reviews on the areas (Refer Questions) that needs more attention and helps optimizing the performance of the network. Question 3 System-level security refers to the architecture, policy and processes that ensure data and system security on individual computer systems. It facilitates the security of standalone and/or network computer systems/servers from events and processes that can exploit or violate its security or stature. Taking into account of these facts, you are tasked with proposing the security measures at the system level. What are the security measures to be proposed for KCP Company at the system level? Discuss each security measure in detail. Question 1 (Total: 25 marks) Question 4 Systems management refers to the centralized administration of the IT Information Technology) in an organization. Good system management is the backbone of an IT-based organization. When implemented effectively, it makes the delivery of IT much easier, making the employees adapt faster and be more productive. Knowing these facts, you are asked to propose at least FIVE IT functions/subsets that oversees the IT requirements of KCP Company. Your answer should include detailed discussions on these IT functions. (Total: 25 marks) An organization's policies are at the heart of its business operations. They detail exactly how employees should handle certain issues, ensuring that everybody is on the same page and following agreed best practices. Effective policies are all the more important now that the GDPR (General Data Protection Regulation) is in place. With regard to these facts, you are tasked to propose data protection policies that are to be included in KCP Company's security policy document. What are the data protection policies (at least FIVE) you are planning to propose? Also, your answer should also include the discussion of each policy. (Total: 25 Marks) Question 2 Evaluate the operation of system management and security software including improvements to the associated administration policies and procedures (C5, PLOI). IDS and IPS systems are two parts of network infrastructure that detect and prevent intrusions by hackers. Both systems compare network traffic and packets against a database of cyber threats. The systems then flag offending packets. Though these two systems are used by KCP Company to prevent and detect hackers, but, still hackers are using some methods to evade IDS in KCP Company. You are assigned to evaluate all the possible methods that are used for evading IDS and choose the prominent evasive techniques used by attackers to dodge IDS detection. Your answer should also include detailed discussion of evasive techniques as well. (Total: 25 marks) SCENARIO: The Company KCP is a major supplier of material and services to the industrial sector. Its business model relies on electronic transactions with key customers and suppliers. To support its business model that heavily relies on e-transactions, the company has a Tier III data center which is located in Kuala Lumpur. Recently, in the board meeting, the management of KLP has decided to review the current operations of the network that includes system management, security software, administration policies and procedures that are implemented currently in the company's network. In this regard, the management has directed the CTO to start the review process and submit the report with proposals/recommendation within the second quarter of the current financial year. The CTO has started reviewing the network by presenting a list of questions to his technical team to carry out reviews on the areas (Refer Questions) that needs more attention and helps optimizing the performance of the network. Question 3 System-level security refers to the architecture, policy and processes that ensure data and system security on individual computer systems. It facilitates the security of standalone and/or network computer systems/servers from events and processes that can exploit or violate its security or stature. Taking into account of these facts, you are tasked with proposing the security measures at the system level. What are the security measures to be proposed for KCP Company at the system level? Discuss each security measure in detail. Question 1 (Total: 25 marks) Question 4 Systems management refers to the centralized administration of the IT Information Technology) in an organization. Good system management is the backbone of an IT-based organization. When implemented effectively, it makes the delivery of IT much easier, making the employees adapt faster and be more productive. Knowing these facts, you are asked to propose at least FIVE IT functions/subsets that oversees the IT requirements of KCP Company. Your answer should include detailed discussions on these IT functions. (Total: 25 marks) An organization's policies are at the heart of its business operations. They detail exactly how employees should handle certain issues, ensuring that everybody is on the same page and following agreed best practices. Effective policies are all the more important now that the GDPR (General Data Protection Regulation) is in place. With regard to these facts, you are tasked to propose data protection policies that are to be included in KCP Company's security policy document. What are the data protection policies (at least FIVE) you are planning to propose? Also, your answer should also include the discussion of each policy. (Total: 25 Marks)

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Expert Oracle9i Database Administration

Authors: Sam R. Alapati

1st Edition

1590590228, 978-1590590225

More Books

Students also viewed these Databases questions