Main Menu

My Account
Online Free Samples
   Free sample   Cyber security assignment providing security solutions for case scenarios

Cyber Security Assignment: Providing Security Solutions for the Case Scenarios

Question

Task: Write a report on cyber security assignment addressing the below scenarios:
Scenario No. 1
A representative from a company/organization has called your consulting firm, needing your expertise on securing the company/organizations’ network infrastructure. Your job, as a network security expert/consultant, is to take a preliminary look at the existing infrastructure of the company/organization in question and recommend a workable security solution. The consultant shall provide the following:

1. An initial report and schematic of the company/organization infrastructure with all security deficiencies noted
2. The security solution, which shall include the following:
a. List of devices/software needed
b. Type of device/software chosen
c. Quantity and unit price for each device/software package (student may use either open source or COTS)
d. Total price of time and material to implement solution
e. Justification of why the devices/software were chosen for solution
3. A schematic of the network with the solution installed

Scenario No. 2
A representative for a religious organization/church has contacted your consulting firm in order to provide a security solution for missionaries in the field. Some field personnel are deployed to hostile environments and nations where interception and monitoring of all communications are commonplace. Any interception of communication (email, skype, zoom, etc.) deemed prohibited by country’s government are subject to tracing communication back to originator with subsequent arrest, prosecution, imprisonment, and in extreme cases, execution of offending party(ies). Your job, as a security expert/consultant, is to provide a solution which will prevent/circumvent communication eavesdropping and interception by hostile entities.

The consultant shall provide the following:
1. An initial report and schematic of the company/organization infrastructure with all security deficiencies noted
2. The security solution, which shall include the following:
a. List of devices/software needed
b. Type of device/software chosen
c. Quantity and unit price for each device/software package (student may use either open source or COTS)
d. Total price of time and material to implement solution
e. Justification of why the devices/software was chosen for solution

3. A schematic of the network with the solution installed

Answer

Case Scenario 1
Introduction

This report on cyber security assignment is dependent on a specific case scenario, in which an organizational representative demands to have the expertise for the purpose of securing the network infrastructure of the organization effectively and efficiently. Basically, the network security refers to some policies as well as configurations framed for the purpose of protecting the accessibility, confidentiality, along with the integrity of the network of the computer as well as information through the utilization of different effective and efficient hardware and software technology. Moreover, the main purpose of this report is to provide an effective security solution to the organization, through which they can avoid the major security deficiencies that occurred in the organization.

Company infrastructure with all network security deficiencies
Network security has been considered as one of the most essential and sensitive parts of the organizational infrastructure, to be concerned. Furthermore, the organization may go through different security deficiencies in relation to the network infrastructure. Furthermore, the leading deficiencies are noted in the following section:

• Poor visibility on the network: Perhaps a leading fault the organization is capable of making during the configuration of the specific and significant policies of network security. Nowadays, the company using a complex as well as vast network, along with that the organization frequently face problems for gaining overall and effective visibility of the network infrastructure of the organization(Noguerol and Branch, 2018). Furthermore, it hampers the capability of putting well-built rules and regulations in place, such as when a specific policy has transformed it may have a negative impact on the security and may reduce the security standard as well.
• Poor alignment of policies concerning the organizational network security: The organizational businesses have been considered as insightful towards the specific and significant factor that they should conform with measures for the purpose of protecting the significant organizational assets, but when that stops them concerning the use of the functions necessary for accomplishing the work, they will identify routes in the order of these specific and significant policies(Shavellet al., 2019). Moreover, the solution tends of providing proper visibility regarding the way of maintaining the connectivity of application following the fundamental policies of network protection.
• Leaving open weaknesses: Nowadays the different sorts of cybercrimes have become much complicated than the previous decade. Furthermore, different new techniques have also been found by the criminals for creating different unknown challenges for the organization with a shocking and higher rate, such as approx 18 million matchless samples of malware had been found(Sage, 2018). In addition, constantly the hackers are trying to find out the organizational vulnerabilities so that leaving open vulnerabilities has been considered as a major deficiency for the network security of the organization.
• Preparation of inflexible rules and regulations: Striking the accurate and effective stability among convenience as well as security has been considered as much tough job,but the way of making sure about the rules and regulations has been adhering to. Thus, the organization should necessarily hold tools and technologies in place, which enable the organization to simply adhering to as well as administrating the different specific and significant policies in regards to network security of the organization.

Security Solution
List of the chosen software

A softwaresolution is needed here, in this organization for providing an efficient level of network security to the organization. Here, in this case, the selection of any of the firewall solutions will most suitable for securing the network infrastructure of the organization.

Type of chosen software
This section will briefly explain the type of software identified in the above section to provide an effective network solution.Firewall, this specific software is engaged for better protection of the server data.The firewalls were framed for only permitting particular ports as well as protocols, but were necessarily unaware since to whether the web services being accessed are malicious.

Quantity and unit price for each device/software package
Quantity of firewalls strictly depends on the count of users goes for accessing a single firewall. However, in this case, as the organization has several employees so that it should contain a minimum of two firewalls, whether one of the firewalls can handle 150 users most at a time. The price of purchasing each of the firewalls is $25,000.

Total price and time for implementing the solution
The total price for the implementation of the security solution will be near about $50,000. The total time needed for completion of this network security solution development project will be approximate 1 month, as it will include different individual tasks, and for gaining proper and effective results from that significant task, there should be sufficient time for accomplishing each of this.

Justification for chosen software for the solution
Here, in this case, the firewall has been chosen as a security solution in order to improve the network infrastructure of the organization. The firewall has been chosen here, since it can be considered as a shield or barrier, which stops those sorts of access, which are unauthorized, for a private or business network(Wang et al., 2017). Furthermore, it will also support the organization to enhance the device protection, which has connectivity with the organizational network, such as the LAN or internet(Shyam and Doddi, 2019). In addition, it will also monitor the traffic of the organizational network and having the capability of specifying as well as blocking the traffic that is unwanted. Thus, it has been chosen here in this case, for improving the network security infrastructure of the organization, and can be considered as the most suitable one as well. Schematic of the network with the solution installed

Schematic of the network with the solution

Figure: Schematic of the network with the solution

Conclusion
For providing an effective and efficient network security solution to the organization, this report had initially identified and explains the different network security deficiencies in the company's network infrastructure. Furthermore, depending on those dependencies, it had suggested the security solution for mitigating and protecting the organizational network infrastructure, where it had discussed the chosen software, its type, quantity as well as unit price in case of every software package. In addition, this section had also conveyed the total price and time needed for the purpose of implementing the recommended solution, along with that justify why the solution is suitable in this case. At the end of the document, it hadincluded a Schematic of the network with the solution installed.

Case Scenario 2
Introduction

This portion of the report based on another case scenario, whether a church tends to have a security solution in order of preventinginterception as well as communication eavesdropping through hostile entities. Here, this report will initially report the security deficiencies, and thereafter it will prepare a solution basing upon the problem scenario of the religious organization. This report will also include theschematic of the network with the solution installed. Company infrastructure with all security deficiencies There are different security deficiencies within the church for which the issue of interception or eavesdropping of communication between the premises of the church. Those specific and significant deficiencies are briefly explained in the following section.

• Poor associated quick response strategy:The churches should have a team of security in place, and the specific team may contain ushers,greeters, along with the different volunteers in the church. But only the security from the volunteers is not enough for answering questions like how to mitigate, identify rather respond so quickly(Alblwi and Shujaee, 2017).However, appropriate boundary alarms as well as surveillance including the system of shooter detection ought to be here in this case. Furthermore,systems of critical communication are also missing here in the church, which has been considered as one of the major factors for quick management of these sorts of dangers like interception oreavesdropping of communication.
• Informal control of access:Furthermore, this religious organization should be capable of offering free access to parishioners of the church. Due to this open-door policy, the church’s security is getting vulnerable.Moreover, any processes, which radically hamper the agility of the organization otherwise the ability of an organizational staff for the purpose of doing the job allocated to that staff, will mostly give its outcome into them being avoided rather overlooked(Fu and Shuanlin, 2019). Furthermore, another major threat is that the employees of this organization will locate a workaround, which is having the capability of holding major implications of compliance as well as security. Thus, the organization should necessarily hold tools and technologies in place, which enable the organization to simply adhering to as well as administrating the different specific and significant policies in regards to network security of the organization(Kompara and Hölbl, 2018). In addition, anything, which pushes the individuals for changing the path of their working drastically, or reduces the agility of the organization, has been considered as counterproductive. Enhanced safety interwoven including the agility of the organization has been considered as the main objective.
• The public viewing of the security: Few persons have faith in that incorporating extensive security within this kind of organization diverts the worshippers concerning the actual purpose of them for being in the church premises, but the protection of the church is important. Fortunately, the integrators of security nowadays supply several devices, which will be suitable within the religious organization’s architecture without being clear. Expertly situated stations of low-key IP cell, wireless CCTV, as well asnoiseless alarms, enable the organization for keeping the members protected during minimization of this system's visibility(Wang et al., 2019). Moreover, the rate of identification of new malware samples is observed as 200,000/day(Buckley and Ali, 2016). Therefore, it can be simply conveyed that the organization should maintain the rules and regulation in relation with the security infrastructure of the organization updated through performing continuous system analysis as well as patches that needs a centralized system of administration, which monitor throughout the entire environment of information technology.

Security Solution
List of the chosen software
A proper security solution demands to have a proper software solution. Here, in this case, secure web gateways will be a suitable choice for the issues in this scenario.

Type of chosen software
Secure web gateway has been framed for the purpose of performing online filtering along with that also for the purpose of blocking the websites, which have been included in the blacklist. This specific device intended for being utilized freely of one another, along with that is utilized for the purpose of securing the periphery concerning the infrastructure of the company. VPN gateway is a suitable option in this case, for protecting the communicationeavesdropping as well as an interception.

Quantity and unit price for each device/software package
Furthermore, in this case, two secure web gates are enough for the purpose of checking web traffic through different verification techniques. Each of the secure web gates can hold the price of $11000-$15000. Total price and time for implementing the solution The complete cost for the execution of the security arrangement will be close to about $30,000. The absolute time required for the fruition of this system security arrangement advancement undertaking will be an estimated half of the month, as it will incorporate distinctive individual errands, and for increasing legitimate and powerful outcomes from that critical assignment, there ought to be adequate time for achieving every one of this.

Justification for chosen software for the solution
The VPN gateway, which has been considered as a secure web gateway needs to be implemented in this case. The tunnel implemented through the site-to-site VPN will allow the church for sharing its resources as well as a network among its remote and main users, without any thinking about the distance(Pudelko et al., 2010). Furthermore, devices in between a single Local Area Network is capable of communicating with the other connected devices with another Local Area Network, as they are two different sections of a similar network(Jingyaoet al., 2019). Schematic of the network with the solution installed

Schematic of the network with the solution

Figure: Schematic of the network with the solution

Conclusion
This portion of the report provides an effective solution to secure the infrastructure of the church. This specific security solution suggested by the above discussion will help the church to reduce the appearance of different issues, like eavesdropping or interception of communication through hostile entities. ?

List of References
Noguerol, L.O. and Branch, R., 2018. Leadership and electronic data security within small businesses: An exploratory case study. Journal of Economic Development, Management, IT, Finance, and Marketing, 10(2), pp.7-35.

Alblwi, S. and Shujaee, K., 2017.A survey on wireless security protocol WPA2.In Proceedings of the International Conference on Security and Management (SAM) (pp. 12-17). The Steering Committee of The World Congress in Computer Science, Computer Engineering and Applied Computing (WorldComp). Sage, O., 2018. System and Method For Assessing Network Security Risks. U.S. Patent Application 15/153,894.

Shavell, M., Jiang, K. and Reyes, J., Symantec Corp, 2019. Systems and methods for detecting network security deficiencies on endpoint devices.U.S. Patent 10,348,755.

Fu, Y. and Shuanlin, L.I.U., Alibaba Group Holding Ltd, 2019. Method and system for detecting eavesdropping during data transmission.U.S. Patent 10,491,383.

Kompara, M. and Hölbl, M., 2018.Survey on security in intra-body area network communication. Cyber security assignmentAd Hoc Networks, 70, pp.23-43.

Buckley, M.E. and Ali, S.M., BlackBerry Ltd, 2016. Method and apparatus for anti-eavesdropping in vunerable NFC applications.U.S. Patent 9,287,935.

Wang, H.M., Zhang, X. and Jiang, J.C., 2019. UAV-involved wireless physical-layer secure communications: Overview and research directions. IEEE Wireless Communications, 26(5), pp.32-39.

Shyam, G.K. and Doddi, S., 2019. Achieving Cloud Security Solutions through Machine and Non-Machine Learning Techniques: A Survey. Journal of Engineering Science & Technology Review, 12(3). Wang, L., Jajodia, S. and Singhal, A., 2017. Network Security Metrics (pp. 1-207). Switzerland: Springer.

Pudelko, M., Emmerich, P., Gallenmüller, S. and Carle, G., 2020, June.Performance Analysis of VPN Gateways. In 2020 IFIP Networking Conference (Networking) (pp. 325-333). IEEE.

Jingyao, S., Chandel, S., Yunnan, Y., Jingji, Z. and Zhipeng, Z., 2019, March. Securing a Network: How Effective Using Firewalls and VPNs Are?.In Future of Information and Communication Conference (pp. 1050-1068).Springer, Cham.

Tags:
NEXT SAMPLE

Related Samples

Question Bank

Looking for Your Assignment?

Search Assignment
Plagiarism free Assignment

FREE PARAPHRASING TOOL

PARAPHRASING TOOL
FREE PLAGIARISM CHECKER

FREE PLAGIARISM CHECKER

PLAGIARISM CHECKER
FREE PLAGIARISM CHECKER

FREE ESSAY TYPER TOOL

ESSAY TYPER
FREE WORD COUNT AND PAGE CALCULATOR

FREE WORD COUNT AND PAGE CALCULATOR

WORD PAGE COUNTER



AU ADDRESS
9/1 Pacific Highway, North Sydney, NSW, 2060
US ADDRESS
1 Vista Montana, San Jose, CA, 95134
ESCALATION EMAIL
support@totalassignment
help.com