BHI & CAE ASSESSMENT COVER SHEET This form must be attached to the front of all submitted hard copy assessments. Student Details: Student to complete Student Name: Xuan Yu(Faith) Tiong Student ID : s...

1 answer below »
Hi, i need my cyber security report assignment done


BHI & CAE ASSESSMENT COVER SHEET This form must be attached to the front of all submitted hard copy assessments. Student Details: Student to complete Student Name: Xuan Yu(Faith) Tiong Student ID : s10094267 Student Declaration: By signing below, I declare that the work submitted here is my own work and it does not include work which is plagiarised, copied in whole or in part from another student or other source such as published books, internet or journals without due acknowledgement in the text. Student Signature: Xuan Yu Tiong Date: 4/3/2021 Assessment Details: Teacher to complete Course National ID and Title 22334VIC Certificate IV in Cyber Security Unit/s National ID and Title VU21991 - Implement Network Security Infrastructure for an Organization Instructor Guide Assessment Task number and name Assessment Task 1: An anatomy of a cyber attack Date due: Sunday after session 3 class Date submitted: Assessor Name: TBA Assessment Result and Feedback Result |_| Satisfactory |_| Not yet Satisfactory Re-submit date if required: Feedback: Assessor’s signature: Date: Assessment Review If you believe that you have been assessed unfairly, you have the right to request an informal assessment review. When your assessment cover sheet is returned to you, you can request an informal review by filling in the section below and returning it to your assessor or the Operations Manager of your area. If you are not satisfied with the outcome, you can apply for a formal review of assessment on the application form located on the Box Hill Institute Website https://goo.gl/Pb3Rtx VCE courses: VCAA rules and regulations replace the above assessment review. Please see your VCE Teacher or VCE Coordinator for further discussion. I request a review of my assessment for the following reasons (not applicable to VCE courses): Student Signature Date Instructions to Student Assessment task name Assessment Task 1: An anatomy of a cyber attack Assessment task type Report/Questioning/Meeting Time allowed Week 1 – 3 in class and at home as required Where the assessment will take place In timetabled classroom Personal protective equipment required N/A Emergency procedures Report Issues to Teacher or coordinators as appropriate Equipment provided PC on campus during class time Individual or group work Individual & Group Work Support equipment allowed i.e.: calculator, dictionary All tools as appropriate for the assessment Context and conditions of assessment Assessment must be conducted in a safe environment where evidence gathered demonstrates consistent performance of typical activities experienced in the knowledge management – research field of work and include access to: · workplace information systems, equipment and resources · workplace policies and procedures · Case studies and, where possible, real situations. Assessors must satisfy NVR/AQTF assessor requirements. What to submit The completed report is to be submitted to StudentWeb under the Assessment Task 1: An anatomy of a cyber attack How to submit Submit the completed document (this document) to the Assessment Task 1: An anatomy of a cyber attack section on StudentWeb. How to present your work Complete this word document and answer all questions in the spaces provided. The coversheet must be submitted when uploading to StudentWeb. How many attempts at assessment are permitted Students will be given 2 attempts to resubmit an assessment; additional attempts must be organized with teacher and student prior to submission. Naming protocol for electronic files ID_AT1_API.doc E.g.: S10054440_AT1_ API.doc All files that do not have this naming convention will be sent back to you as it resembles part of you assessment that the information is corrected handled and stored. How will the assessment judgement be made |_| Observation checklist |_| Exemplar |_|Performance checklist |_| Rubric |_| Answer guide |_| - Safety If at any time during the learning and assessment process, your Trainer/Assessor considers that the safety of any person is at risk they will abort the session. Reasonable Adjustment Students identifying as having a disability may access reasonable adjustment to enable them to participate in training and assessment on the same basis as other students. Students can learn more about this through the Learners with a disability policy and procedure on the Box Hill Institute website http://www.boxhill.edu.au/for-students/student-support or by calling Student Life on 9286 9891, by emailing the Disability liaison service on [email protected] or by calling into the Student Life office at Elgar Campus in E3.G56, just near the cafeteria. Special Consideration Where a student anticipates that a result will be impacted by special circumstances such as ill health or bereavement, application can be made for special consideration. Forms can be accessed from the Student Life office at Elgar Campus in E3.G56 or downloaded at: http://www.boxhill.edu.au/for-students/student-information/forms-and-downloads. VCE courses: Supplementary exam procedures apply. Please see your VCE Teacher or VCE Coordinator for further discussion. VU21991 AT1 – An Anatomy of a Cyber Attack The following criteria will be used for this assessment: Examine modern network security threats and attacks Network security architectures is identified Select group of modern cyber security threats and attacks are examined in detail. Tools and procedures to mitigate the effects of malware and common network attacks are identified Background Information: Using the information from the ABC Widgets Franchise company, you have been approached to provide a briefing report for them to help them make an informed decision regarding improving and hardening their security systems: Your Task: Is to develop a briefing report for the company that: 1. Provide an overview of different security architectures ABC Widgets Franchise to deploy. Give some advantages and disadvantages of each solution 2. To describe in detail a typical security threat or attack (examples may include Trojans, Spoofing, Phishing, Spear phishing, Man in the middle, Password attacks, emerging, others) 3. To provide a summary of tools and procedures that can be used to mitigate such attacks VU21991 Implement network security infrastructure for an organization AT1 Version 2 Jan 2020
Answered 1 days AfterMay 12, 2021VU21991Box Hill Institute

Answer To: BHI & CAE ASSESSMENT COVER SHEET This form must be attached to the front of all submitted hard copy...

Deepti answered on May 13 2021
140 Votes
Overview
Network Architecture
Network architecture proposed in this report includes framework of the structure, standards, policies and functional behavior of the network of the target company ABC Widgets. It includes se
curity and network features of the company network. The organization, integration and synchronization of the components of cybersecurity system are included in the architecture. The major components of the architecture are identity management, access and border control, and training. Features of this architecture include
· Network Components-Include workstations, NICs, repeaters, switches, routers, gateways.
· Security components- Include firewall, Intrusion Detection System, Intrusion Protection system, anti-virus software
· Security Standards- Published specification that establishes a rule or guideline for the network containing technical specification like IEC 27000 series.
· Security policies and procedures
Advantages
The architecture shall reduce cyberattacks. It will ensure that an attack should be small in size and impact and they are difficult for cyber threats to detect and penetrate. It will ensure that the sensitive and confidential data of the company is encrypted through end-to-end encryption techniques during transition. It will detect, mitigate and counter all types of cyber attacks using countermeasures like IPS. Network performance improves with lower end point traffic. With clear access rules, it is easier to log and monitor the activities over the network. Network errors can be tracked and fixed easily.
Disadvantages
It is challenging to balance privacy, protection and security with the available resources along with managing business operations simultaneously. With several devices, on the network with several users accessing them and multiple ways of accessing and storing data, it becomes difficult to limit access to the network and still accomplish all the tasks. Disadvantages like loss of control, vendor lock-in, data loss, data breach, insider theft and unsecured APIs entail implementation of network architecture.
Security Threats
Modern cyber security threats and attacks that can disrupt the business of the target company are...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here