assessment type: problem based scenario - individual report and presentation purpose: this assessment will allow students to demonstrate a network design based on a real ti scenario. this assessment...

1 answer below »
assessment type: problem based scenario - individual report and presentation purpose: this assessment will allow students to demonstrate a network design based on a real ti scenario. this assessment contributes to learning outcomes c and d. •value: 30% (report 25%, presentation 5%) due date: weak 11 (report), week 12 (presentation topic: network design report and presentation task details: in this assessment, students must demonstrate their understanding of critical thinking context by examining given problems and proposing solutions using the methods explored in the un students will choose a solution, then implement and evaluate their solution. students must submit a that outlines the steps they followed to solve the problems. the approximate word length is up to 1500 words with topology diagrams. the report should be presented with supporting material as appendices, such as the calculations for the ip addressing scheme practical assignment brief bank of adelaide has different branches

Answered 4 days AfterSep 01, 2022

Answer To: assessment type: problem based scenario - individual report and presentation purpose: this...

Shubham answered on Sep 06 2022
73 Votes
Identification of problem
Two Branches of Bank of Adelaide are impacted by ransomware and DDoS attacks. This can create issues for customers as servers of both branches are not in reach and there is threat of losing personal information like credit card number and other related bank details. In a DDoS attack, the website is flooded w
ith requests and it is done during a short period of time and it aims to overwhelm the site that causes the crash. The distributed elements can come from multiple locations at the same time and it can cause a system to crash. The attack becomes vulnerable to the bank because of the volume of requests and in this case the site stopped working (Chadd, 2018). This has affected the reputation of the bank and the server becomes unavailable because of overloading that can have a negative impact on the search ranking. This attack could render more vulnerable attacks like hacking that focuses on getting the sit down and security system can be bypassed. While the server is down, the bank is facing a huge loss and the bank will have to pay to get security experts to get out of the situation and rebuild the site.
Ransomware is the malware that can encrypt files on the target device and make the network inaccessible to users and business till the business pays a ransom. This attack can be the easiest way for sending malicious threats and making bucks quickly. Ransomware attack for Bank of Adelaide can have devastating consequences for the business as it has resulted in loss of confidential information of customers and server downtime. This can be the situation where the bank will have a large sum of money for regaining access to the data. This attack can spread quickly and it can affect multiple systems and devices along with a server that stores all the data of a bank (Arora, Yadav and Sharma, 2021). This attack can encrypt business critical files and it has resulted in shutting down two of the branches of the bank. It has also resulted in a bad market image for the bank along with loss of revenue and customer trust. The reputation of the bank is damaged seriously and existing confidential information customer data could be leaked as result of the attack. The bank will have to pay a regulatory fine for gaining sensitive customers that are compromised during the attack along with financial burden.
Topology Diagram
Figure 1: Topology Diagram
Proposed solution
The proposed plan requires development of an attack response plan for understanding and working according to the problem. This requires technical expertise and competencies that are necessary for the system and the system checklist for ensuring that all assets are protected from threat. This requires an incident response team for defining and successful responsibilities like notifying key stakeholders and ensuring better communication throughout the organization. A multilevel protection strategy is required for infrastructure, application and network that include prevention management system that is combined with firewall, anti-spam and content filtering for providing security layer to identification of traffic inconsistencies and monitor activities. It is important to identify weaknesses in the network for ensuring that the network is secure. Vulnerability assessment includes identification of security exposures and...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here