ICTNWK502 Case Study Template Use the template below to help you structure your report for the case study assessment task 1. Introduction Your report should have an introduction section where you...

1 answer below »
Plz check it



ICTNWK502 Case Study Template Use the template below to help you structure your report for the case study assessment task 1. Introduction Your report should have an introduction section where you identify the decision-maker the report is aimed at, e.g. with a statement “This report has been written by (your list of team members) for (the name of the decision-maker the report is addressed to) 2. Analyse enterprise data security requirements what are the business requirements for the city council this encryption proposal needs to address? What problems do they need to solve? 3. Create a new or review an existing security plan to determine appropriate encryption methods, Based on their current security practices and plans, what encryption-related technologies would you recommend the council adopt. Give brief reasons why they should adopt the technologies you suggest. 4. Review a range of encryption technologies and rank the most appropriate options. Here you should list at least two encryption technologies, ranking them in importance. Briefly explain which technology is the most important to adopt. 5. Assess the costs associated with each encryption option. You should provide the cost (e.g. licensing costs) of any software you recommend. If there is no cost, that also should be noted. 6. Analyse effect of encryption technologies on user roles and responsibilities. This section of the report should highlight any impact on user roles and responsibilities. For example, what extra responsibilities might the network administrator and help desk need to assume if your solution is implemented? 7. Inform user of new encryption technologies and the effect it has on their responsibilities. For example, what training would users of the network need to undertake to be able to use the technology you are implementing. Who needs to be trained and what kind of training do they need. 8. Analyse implementation of the encryption technologies, confirming function and performance. How would you verify that emails are being signed, and that performance of other software on the servers has not been adversely affected by encryption measures? 9. Review help desk records for problems concerning implementation and take appropriate action. The help desk is a good source of information of what is going wrong with the implementation, as this is where errors are being reported. What action do you recommend be taken about the problems reported to the help desk? How can you use this information to help improve the use of the technology 10. Review system logs for encryption issues and compromises. Based on the error log shown in the case study, what caused John Jackson’s email problem, and what needs to be done to fix the problem?
Answered Same DayJun 07, 2020ICTNWK502Training.Gov.Au

Answer To: ICTNWK502 Case Study Template Use the template below to help you structure your report for the case...

Amit answered on Jun 10 2020
151 Votes
Full Name :
    
    Student ID :
    
    Subject :
    
    Assignment No :
    
    Due Date :
    
    Lecturer’s Name :
    
Encryption technologies and their roles
Your Name:
Your Email:
College name, University name, Country name
Table of Contents
1.    Introduction    3
2.    Analysis of security requirements for city council    3
3.    Recommended encryption for city council and supporting reasons    4
4.    Adoptable encryption technology among two encryption technologies    6
5.    Cost analysis of encryption applications    7
6.    Roles and responsibilities of user towards encr
yption technologies    9
7.    Training end user for using newly selected encryption technology    10
8.    Performance, confirming function and implementation of the encryption technologies    11
9.    Possible improvements and recommendations for help desk    12
10.    Compromises and issues of encryption based on system logs    13
11.    References:    14
1. Introduction
The introduction portion is dedicated to student information. Here, you have to provide details of yourself or complete group with role and decision makers.
This report has been written by (your list of team members) for (the name of the decision-maker the report is addressed to).
2. Analysis of security requirements for city council
The security of central data base server is most important thing to consider. This central data base server is providing services to complete city and nearby 60000 individual users. The most important thing is that the police department of city is also using same server to store the created data. So, there are so many business requirements which requires proposal of encryption for city council. Some of the business requirements for city council to implement encryption are listed below:
1. A central server is providing complete services to all the citizens and related departments. Each department or individual has to use a separate folder for storing the created files. Any unauthorized access can cause serious issues for city council.
2. The communication system of police department is responsible to share confidential information. If encryption is not implemented, then, any unauthorized person can create data breach for accessing this confidential information. With help of encryption, the security of police department communication can be improved.
3. The help desk communication is also not secured. The implementation of encryption application will improve the security of communication among end user and help desk representative.
There are so many problems exist in given system of city council. The most common problems which require to be solved are listed below:
1. The security of police department communication system is most important which need to be solved [Abd-El-Hafiz et al, 2015].
2. The security of individual data stored on central server is most important which need to be solved.
3. The security of help desk system used in city council is most important which need to be solved.
3. Recommended encryption for city council and supporting reasons
The existing security plan of city council is quite impressive so, implementation of encryption can increase its reliability. The points to show the main recommendations for security plan are listed below:
1. The use of password with digital certificate will improve the security system of city council.
2. Not sharing the password and fixed time to expire the password is good idea. So, city council can use the same mechanism.
3. An authentication permission from network administrator to use any external storage device is good idea. So, city council can use the same mechanism.
4. The use of encrypted passwords on boot time of laptops is also good idea. So, city council can use the same mechanism.
5. The installation of any application with permissions from network administrator is also good idea. So, city council can use the same mechanism.
The method through which the plain text is being converted into a encoded version so that only authorized person having the decryption key is only allowed to view that data is known as encryption. By help of encryption, the end to end protection of transmitted data on network of city council can be provided and security can be improved. There are so many encryption techniques available from which the city council can select any techniques. Some of the encryption techniques with deployment reasons are listed below:
1. Whole disk encryption of complete network: In this technique the complete disks of data server can be encrypted.
2. Encryption on folder level or single user files: There are 60000 persons using the services of this city council network and each is having separate folders. So, it is a good encryption technique for individual user.
3. Encryption on application level of database: In this encryption technique, the data base security on application level is improved by this encryption technique.
4. Encryption on email messages and network traffic: By using this encryption technique, the email messages and network traffic can be secured.
All of the above listed encryption techniques are quite impressive but “encryption on folder level or single user files” is recommended by me. The reasons for this recommendation are listed below:
1. The unauthorized access to file or folders of any individual can completely be removed.
2. By using this technique, the security of data stored on central database server of city council can be improved.
3. The security of sensitive information of police department is also improved.
4. The...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here