Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

provide all the solutions of 202020_CRS180_VU21988_2of2_V8_LEARNER case study for networking? for assessment Satisfactory Comment Yes No The following has been submitted for assessment: Part A

provide all the solutions of 202020_CRS180_VU21988_2of2_V8_LEARNER case study for networking?

for assessment

Satisfactory

Comment

Yes

No

The following has been submitted for assessment:

Part A - Background

Part B - Ransomware and DDoS

Part C - Network Security vs. Cyber Security

Part D - Security Policy

Part E - Test Configuration

Criteria

Part A - Background

Marking criteria for each product document/s supplied:

1.

Design a Physical AND Logical topology diagram

2.

Implement IPv4 or IPv6 addressing scheme.

3.

Prepare a list of security equipment, both hardware & software recommended in your network design

4.

Recommendations of software that increase the security of the business from cyber security attacks.

5.

List all external resources used in response to the case study

Part B - Ransomware and DDoS

Marking criteria for each product document/s supplied:

1

Research and current example of DDoS Attack

2

Research and current example of Ransomware Attack

Part C - Network Security vs. Cyber Security

Marking criteria for each product document/s supplied:

1

Network Security definitions with appropriate examples given

2

Cyber Security definitions with appropriate examples

3

Differences between the two concepts explained.

Part D - Security Policy

Marking criteria for each product document/s supplied:

1

Draft Security Policy covering three (3) elements.

Part E - Test Configuration

Marking criteria for each product document/s supplied:

1

Create x2 Virtual machines and configure both machines with IPv4 addresses.

2

Test connectivity of the virtual machines using CMD commands (Netstat/Ping)

3

Testing your machines for external connectivity by pinging a public IP Server. (8.8.8.8).

4

Identify and test the tools for network/Cyber security testing

-Nmap commands

5

Advise of any connectivity issues that you may have from an unsuccessful ping attempt.

6

Basic Configuration of a Router or Switch using Packet Tracer & script.

7

Connect the cables to network - Console & Straight Through

cabling

Section F - Feedback to Student

Has the student successfully completed this assessment task?

Yes

No

Additional Assessor comments (as appropriate):

Resubmission allowed:

Yes

No

Resubmission due date:

Assessor name:

Assessor signature:

Student signature:

Date assessed:


Metaploit Inc - Office Floor Plan



Supporting document

Assessment Task 2: Case Study Answers

Unit code:

VU21988

Unit title:

Utilise basic network concepts and protocols required in cyber security

Student ID:

Student name:

Date of submission:

Student signature:

Part A: Background

You are a consultant for a small IT Consulting firm and have been approached by Metasploit Inc to put forward a recommendation/solution to enhance their security stance.

The business currently has 16 open space workstations, 3 enclosed office spaces, reception area, conference room and a kitchenette plus a small storage room. The floor plan of the current premise is attached. The existing infrastructure is capable of ethernet connections but requires upgrading for wireless coverage.

Each open space workstation has its own desktop computer and is connected to the internal filing system. Every 3 months the organisation runs a trainee program where 4 new trainees join the firm for 2 weeks these 4 trainees must be seated together and have appropriate access levels given to them.

Management is concerned about internal security of files/data in general and does not want all staff members to have access to all areas of the network server, this includes trainees. They currently have x1 physical server that acts as a file server for all departments in the organisation.

Management have also noticed an increase in abnormal amount of suspected phishing emails. Complaints from staff regarding unusual/slow performance of computer network have also increased. Although Metasploit Inc have no plausible reason for the increase in suspect emails, Management is wanting to implement a suitable data backup system which backs up daily to the cloud and to an in-house physical device.

Further requirements for consideration are solid end-point solution which will check all end devices on the current network for unusual behaviour.

To ensure you meet the client's requirements, your report should include the following areas

1.Prepare a logical and physical topology of the premises

2.An IP design that meets the needs of their new office and business.

3.Prepare a list of any network and (if necessary) security equipment required to run the office, you must include a switch, router, wireless access point and firewall (hardware or software)

4.Recommendations for securing their business at a software level and how it protects from cyber-attacks.

Your client has also expressed concern regarding the firm's vulnerability to cybersecurity attacks. You are required to provide the following additional reports to the client:

Part B - Ransomware and DDoS

Research one (1) current DDoS & Ransomware Attack with focus on the following criteria.

-How was each attack conducted/started?

-How did the attack spread?

-List any specific targets, if none, who were the targets

-What were the effects/consequences of your chosen attack?

-Who was held responsible for the attacks - individual or group

-Were there any business consequences?

Part C - Network Security vs. Cyber Security

You client has significant confusion regarding the differences between 'Network & Cyber' Security. Conduct some research regarding the key differences between both and document your research accordingly.Consider reviewing the following resources as a start of your own research.

-www.nist.gov

-www.cisco.com

-www.acsc.gov.au

-www.sans.org

Part D - Security Policy

All organizations, particularly corporate organizations are required to have a policy document called a 'Security Policy' this policy document is generally a smaller section of a larger document called an Information Technology Policy.

Based on the Case Study Scenario above, you are required to conduct research into a security policy, create your own 'draft' SecPol. Your draft SecPol should cover three (3) of the following areas:

-Acceptable Use Policy

-Confidential data Policy

-Password Policy

-Email Policy

-Physical Security Policy

-BYOD Policy

Part E - Test Configuration

You are now required to 'test' a segment of your network solution as a demonstration to your client.

a)Create two (2) virtual machines using VMware Workstation or Oracle VirtualBox. Create a Windows Operating System & a Linux OS.

b)Assign both machines a host IPv4 address using a network address of your choice.

c)Test connectivity of each machine to each other by using different CMD commands

d)Using one (1) virtual machine, verify connectivity to a public server address.

e)Using Packet Tracer, build the PC - Switch - Router - PC topology. Cable the topology using the appropriate cables, this includes console cabling to the switch and router. You must identify the types of cabling you have used.

f)Use the following script to configure part of the initial basic settings. You are then required to finalise all other basic configurations. Other basic configurations include:


a.Line console

b.Vty console

c.IP addressing - router interface

#Script:

conf t

hostname TRS-80CoCo

enable secret class

no ip domain-lookup

banner motd $NO UNAUTHORISED ACCESS ALLOWED$

exit

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Auditing and Assurance services an integrated approach

Authors: Alvin a. arens, Randal j. elder, Mark s. Beasley

14th Edition

133081605, 132575957, 9780133081602, 978-0132575959

More Books

Students also viewed these Computer Network questions