ASSESSMENT RECORD / FEEDBACK SHEET Course: ICT60215 Advanced Diploma of Network Security Name: Student ID: Unit Code and Name: ICTNWK502 Implement secure encryption technologies Assessment Task Number...

1 answer below »
its a network security


ASSESSMENT RECORD / FEEDBACK SHEET Course: ICT60215 Advanced Diploma of Network Security Name: Student ID: Unit Code and Name: ICTNWK502 Implement secure encryption technologies Assessment Task Number and Title: #2 Case Study Date Submitted: Trainer’s Name: · All assessments must be in a neat and readable format. · Students are required to retain a duplicate of any assignment submitted, both written & disk copy. · Please refer to the Student Handbook for the Assessment Policy. · Plagiarism is an academic misconduct and is unacceptable to Pacific College of Technology. I certify that the work submitted is my own. I have acknowledged material taken from websites, textbooks and articles. Student Signature: Date: FEEDBACK Signed (Trainer/Assessor) Date: Feedback provided by the trainer Date: Please retain this as proof of submission Unit name: Assignment No: Received By: Date: Course : ICT60215 Advanced Diploma of Network Security Unit Code and Name : ICTNWK502 Implement secure encryption technologies Trainer/Assessor : Assessment item : #2- Case Study Due date : Week 5 (Extension upon trainer’s approval only) Context and Purpose of the assessment: This assessment will assess your skills and knowledge in the area of ‘ICTNWK502 Implement secure encryption technologies’ unit. This assessment activity deals with the following elements of performance and critical aspects of evidence: Question Element Performance Criteria 1 1-3 1.1, 1.2, 1.3, 1.4, 1.5, 2.1, 2.2, 2.3, 3.1, 3.2, 3.3, 3.4 · The assessment tasks for the unit assume that you will work in the Information Technology industry. Case studies/ exercises used in this assessment reflect a workplace scenario. · The student must have access to a Computer, Printer and Microsoft Office Suite Applications for doing the assessment for this unit. · If you are not sure about any aspect of this assessment, please ask for clarification from your assessor. If the assessment is not satisfactory, the trainer will allow one more attempt to the assessment item. · The responses to assessment questions should be in your own words and examples from workplace should be used wherever possible. Task 1: Case Study: Company ABC is a multinational company in Australia which has its branches all over the world. It has few servers like database server, Web server, Mail server and Storage Devices and different vendor’s network and switching devices to operate its activities through the online. Based on the above brief information, provide your suggestions as per the below to secure the company ABC’s data and the network: Activity 1: Analyze and plan to implement the new encryption technique -Mention the advantages of encrypting data -Provide the number of storage system that needs to be encrypted -Mention the data-at-rest and data-in-motion encryption strategy which you are going to implement. -Provide the date to be completed Activity 2: Outline the effects and the performance of the purposed encryption technology. -What could be the disadvantages or drawbacks of implementing encryption technology? -Will that cause any traffic congestion or bandwidth utilization issues? Activity 3: Provide cost and necessary suggestions to the management for implementing security system. -Calculate the total cost you have noticed while implementing encryption technology -Provide feedbacks in terms of security, cost and efficiency. Activity 4: -Provide your opinion whether it is necessary to implement encryption technology or not. Task 2: Case Study: Company deploys full disk encryption policy on laptops One billion dollar company isn't taking chances with data stored on its laptops. It deployed full disk encryption on every machine, an increasingly popular security strategy. The laptop storing the company's trade secrets or the laptop containing proprietary partner and customer data, and the company's financial information. The Company can afford neither to be not left behind in a cab or hotel room, nor be stolen by a determined thief working for a competitor, or one looking to sell hardware on eBay. Task 1. List two latest full disk encryption methods with appropriate examples. 2. Explain different benefits of full disk encryption or known shortcoming with the technology. 3. Explain the associated cost for full rollout of full disk encryption on every laptop (assume 25 k employees). 4. Suggest whether this approach is either unnecessary/unrealistic or good. 5. Explain Symantec endpoint encryption for windows. To be completed by Trainer Competent Not yet competent to be reassessed DS-SP-07/17 CS-ICTNWK502 V2.0 RTO Provider Code: 91151 CRICOS Provider Code: 02668F Page 3 of 4
Answered Same DayAug 31, 2020ICTNWK502Training.Gov.Au

Answer To: ASSESSMENT RECORD / FEEDBACK SHEET Course: ICT60215 Advanced Diploma of Network Security Name:...

Amit answered on Sep 03 2020
155 Votes
ASSESSMENT RECORD / FEEDBACK SHEET
Course: ICT60215 Advanced Diploma of Network Security
Name:
Student ID:
Unit Code and Name: ICTNWK502 Implement secure encryption technologies
Assessment Task Number and Title: #2 Case Study
Date Submitted:
Trainer’s Name:
· All assessments must be in a neat and readable format.
· Students are required to retain a duplic
ate of any assignment submitted, both written & disk copy.
· Please refer to the Student Handbook for the Assessment Policy.
· Plagiarism is an academic misconduct and is unacceptable to Pacific College of Technology.
I certify that the work submitted is my own. I have acknowledged material taken from websites, textbooks and articles.
Student Signature:
Date:
FEEDBACK
Signed (Trainer/Assessor)
Date:
Feedback provided by the trainer
Date:
Please retain this as proof of submission
Unit name:
Assignment No:
Received By:

Date:
Course
: ICT60215 Advanced Diploma of Network Security
Unit Code and Name
: ICTNWK502 Implement secure encryption technologies
Trainer/Assessor
:
Assessment item
: #2- Case Study
Due date
: Week 5 (Extension upon trainer’s approval only)
Context and Purpose of the assessment:
This assessment will assess your skills and knowledge in the area of ‘ICTNWK502 Implement secure encryption technologies’ unit. This assessment activity deals with the following elements of performance and critical aspects of evidence:
    Question
    Element
    Performance Criteria
    1
    1-3
    1.1, 1.2, 1.3, 1.4, 1.5, 2.1, 2.2, 2.3, 3.1, 3.2, 3.3, 3.4
    
    
    
· The assessment tasks for the unit assume that you will work in the Information Technology industry. Case studies/ exercises used in this assessment reflect a workplace scenario.
· The student must have access to a Computer, Printer and Microsoft Office Suite Applications for doing the assessment for this unit.
· If you are not sure about any aspect of this assessment, please ask for clarification from your assessor. If the assessment is not satisfactory, the trainer will allow one more attempt to the assessment item.
· The responses to assessment questions should be in your own words and examples from workplace should be used wherever possible.
Task 1: Case Study:
Company ABC is a multinational company in Australia which has its branches all over the world. It has few servers like database server, Web server, Mail server and Storage Devices and different vendor’s network and switching devices to operate its activities through the online. Based on the above brief information, provide your suggestions as per the below to secure the company ABC’s data and the network:
Activity 1:
Analyze and plan to implement the new encryption technique
-Mention the advantages of encrypting data
-Provide the number of storage system that needs to be encrypted
-Mention the data-at-rest and data-in-motion encryption strategy which you are going to implement.
-Provide the date to be completed
Answer:
The method which is used to convert the plaintext (readable text) in to an encoded text (unreadable text) and to again convert encoded text into plain text a decryption key is required is known as encryption. The advantages of encryption date for ABC Company are listed below:
· An all time security is provided to database of ABC Company.
· The integrity of database can easily be maintained.
· The privacy of database can be effectively managed.
· The implementation of FIPS, HIPPA etc. improves reliability of database and ABC Company.
· The across device databases in ABC Company can also be protected by data encryption.
The storage systems of ABC Company which requires...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here