Order For Similar Custom Papers & Assignment Help Services

Fill the order form details - writing instructions guides, and get your paper done.

Posted: May 1st, 2022

CP2414 Assignment 1

CP2414 Assignment 1
Security checklist
WARNING: This is not a group project. Each student must individually complete all parts of their submission.
Students must start with a new document and they must not have another person’s file in their possession at any time. Students may discuss the task with each other, but each student must write their assignment independently and not show their work to other students.
Introduction:
This assignment has been divided into two (2) parts:
Part I – Identify and analyse threats to a company. Also, research and source appropriate devices/software justifying choices (feasibility, efficiency, etc.).
Part II – Design a secured network.
Part III – Citation and Referencing.
Deliverables:
1. A single Word document (.docx) – containing all parts.
2. Font – Calibri 11, Line Spacing 1.5
3. Use IEEE referencing, see https://libguides.jcu.edu.au/IEEE
NOTE: The assignment template can be found at the end of this assignment sheets.
Scenario:
An Asian medical research company, TheNEWMED, has grown concerned by the global rise in cybercrime and ransomware.
They have asked you to:
• For all branches – Identify and analyse application and networking-based threats to their company; and
• For the Singapore branch only – recommend preventative and mitigative technologies and strategies for potential intrusion and attacks on the network.
About the company:
TheNEWMED is a growing medical research company consisting of two branches: The Singapore (main) branch and the Jakarta branch. Each branch has five departments and there are approximately 65 employees per department. The Singapore branch has 2 mail servers, 3 web servers, and 3 database servers. The Indonesia branch is a smaller branch and so it has only 1 mail server and 1 database server.
All branches have high-speed networks; however, the traffic can be quite heavy on weekdays. This is especially true for the Singapore branch.
Part I. Potential Threats
You have been provided with a list of complaints from employees about the workstations at TheNEWMED:
• Complaint 1 (Sue Allen): My computer takes a long time to start up and shut down. It seems like there are other programs which I don’t use running when I start my computer as well.
• Complaint 2 (Tom Cally): I think my system is infected because I’ve got customers and colleagues informing me that I’ve been sending them emails, this is very weird because my job doesn’t really concern sending out emails to my colleagues, let alone customers.
• Complaint 3 (Christina Sam): I often get the blue screen of death; my workstation keeps crashing. I found it to be so frustrating.
• Complaint 4 (M Louise): It takes forever to download a file from the company servers. It doesn’t even matter what the size or type of the file are.
• Complaint 5 (Richard Lee): I get a lot of pop-ups on my screen; I have never visited any bad (inappropriate) websites.
• Complaint 6 (Joe Oliver): The fan in my computer is just so loud. It seems to be spinning really fast and all the time. Even when I am not using it.
• Complain 7 (All employees): Difficulty accessing the website, mail and database servers.
From the complaints above, you are required to analyse and identify the threat/s (if there are any). You must also make a recommendation on strategies and technologies (i.e. hardware and software) to prevent and mitigate the problems.
IMPORTANT NOTE: You are needed to analyze and identify the threat(s) based on the complaints presented above (if there are any). A advice on techniques and technologies (i.e., computer hardware and software) to prevent and alleviate the difficulties must also be included.
NOTE OF IMPORTANCE:
The threat analysis and identification should only involve network security, not hardware or software, according to the following rule: 1.
The complaints may be related to one another, which is a possibility.
Continuing with Part II. Planning and design of network security technologies such as firewalls, honeypots, and other network security technologies for the Singapore branch
1. Your threat analysis and identification should ONLY concern network security and NOT hardware or software.
2. It is possible that the complaints are connected to one another.
Part II. Firewall, Honeypot/s, and Other Network Security Technologies Planning and Design for Singapore Branch
Employing firewalls, honeypots, and other network security technologies can be an effective means of protecting the company networks. As such, you are required to design a network security configuration for the Singapore branch of the company. You can make assumptions, but clearly state your assumptions in the report. You will need to consider the existing devices (see “About the company” – Singapore branch ONLY), the hardware/software solutions you recommended in Part I, and additional honeypot/s.
You are required to:
1. Draw your proposed secure network diagram, including:
a. Firewall/s
b. Other Network Security Technologies (hardware and/or software)
c. Honeypot/s
d. Existing devices (e.g. servers, workstations, router, switches)
2. Explain and justify the configuration diagram with respect to:
a. The type and placement of each firewall;
b. The honeypot location/s and quantity;
c. The placement and purpose of each piece of hardware/software.
Part III. Use correct IEEE referencing style, see https://libguides.jcu.edu.au/IEEE.
Suggested Report Structure/Template
For the highest marks possible, you should READ THE RUBRIC and submit your report using the following proposed structure:
Part I. Potential Threats For each employee complaint:
Complaint [number] – [name]:
• Identify the problem/s stated by the employee/s.
• [Identified threat/s] – [Assignment help – Discussion and comprehensive explanation for the identified threat/s]
• Solution – [Recommended solution for threat] Overarching Threat:
[If an overarching threat exists you should discuss this here. See IMPORTANT NOTE]
Part II. Firewall/s, honeypot/s, and other network security technologies Planning and Design
• Diagram
• Explanation and justification of the proposed configuration.
End of Assignment 1

Order | Check Discount

Tags: free printable nursing study guides, nursing study guides free, nursing study guides worksheets, nursing study hub, nursing study material

Assignment Help For You!

Special Offer! Get 20-25% Off On your Order!

Why choose us

You Want Quality and That’s What We Deliver

Top Skilled Writers

To ensure professionalism, we carefully curate our team by handpicking highly skilled writers and editors, each possessing specialized knowledge in distinct subject areas and a strong background in academic writing. This selection process guarantees that our writers are well-equipped to write on a variety of topics with expertise. Whether it's help writing an essay in nursing, medical, healthcare, management, psychology, and other related subjects, we have the right expert for you. Our diverse team 24/7 ensures that we can meet the specific needs of students across the various learning instututions.

Affordable Prices

The Essay Bishops 'write my paper' online service strives to provide the best writers at the most competitive rates—student-friendly cost, ensuring affordability without compromising on quality. We understand the financial constraints students face and aim to offer exceptional value. Our pricing is both fair and reasonable to college/university students in comparison to other paper writing services in the academic market. This commitment to affordability sets us apart and makes our services accessible to a wider range of students.

100% Plagiarism-Free

Minimal Similarity Index Score on our content. Rest assured, you'll never receive a product with any traces of plagiarism, AI, GenAI, or ChatGPT, as our team is dedicated to ensuring the highest standards of originality. We rigorously scan each final draft before it's sent to you, guaranteeing originality and maintaining our commitment to delivering plagiarism-free content. Your satisfaction and trust are our top priorities.

How it works

When you decide to place an order with Dissertation App, here is what happens:

Complete the Order Form

You will complete our order form, filling in all of the fields and giving us as much detail as possible.

Assignment of Writer

We analyze your order and match it with a writer who has the unique qualifications to complete it, and he begins from scratch.

Order in Production and Delivered

You and your writer communicate directly during the process, and, once you receive the final draft, you either approve it or ask for revisions.

Giving us Feedback (and other options)

We want to know how your experience went. You can read other clients’ testimonials too. And among many options, you can choose a favorite writer.