ITNE2002 Network and Information Security Assignment March 2020 Total Marks: 20% Individual Assignment The purpose of the assignment is to assess students on the following Learning Outcomes: LO1:...

1 answer below »
File attached


ITNE2002 Network and Information Security Assignment March 2020 Total Marks: 20% Individual Assignment The purpose of the assignment is to assess students on the following Learning Outcomes: LO1: Describe security architecture, standards and protocols, and techniques of risk mitigation relating to network and information security LO2: Compare and contrast a range of information security risks and privacy issues as well as counter measures adopted in industry LO3: Identify and explain key features of appropriate technologies and products relating to network and information security LO4: Model infrastructure, application, operational and information security for a network LO5: Apply security controls and standard compliance policies to maintain confidentiality, integrity and availability, including encryption and firewall defence mechanisms Copyright © 2020 VIT, All Rights Reserved. Assignment Overview Ian Smith is the CEO of a data analytics company in Melbourne, Australia. Ian Smith requested you to consult them in updating their infrastructure in such a way that it enables their employees to work from home. The employees of analytics company are working with health dataset and they have to comply with the government and international regulations. The company is currently hosting all data sets inside an on premise server. The company has provided company laptops to its employees, in which they do not have administrative privileges. You also have noticed that, once all the employees are allowed to connect to the on premise from home, the network perimeter devices and WAN links of the company will not be sufficient to handle the load of incoming traffic. Considering all these factors, you decided to use a public cloud platform and enable most of the employees to access data sets from the public cloud. The senior data scientists are only allowed to access the on premise server. The changes conducted by senior data scientists will be synced with the public cloud. Task 1: Review the article, “Issues And Challenges of Data Security In A Cloud Computing Environment”, to develop an understanding of the cloud platform and security aspects. The Article is uploaded on the LMS. Write a report on the article which covers the following points. (300 words): • Introduction to the paper and main work. • Detail description of the methodologies employed in the paper. • Details of security architecture, protocols and risk mitigation techniques used. • Your comments on the advantages/disadvantages/superiority Task 2 : Prepare a table which includes information security risks and privacy issues that the company would encounter when they change from their current setup to a setup where most their employees are allowed to access the data sets from a public cloud, and only their senior data scientists are only allowed to access the on premise server. (250 words) Task 3: Then you should conduct a research on identifying appropriate technologies and products (including the services provided in a public cloud platform) that could be deployed for implementing countermeasures for the risks and issues in the previous task. Write a report which evaluates the features of those identified technologies, products and cloud platform, Copyright © 2020 VIT, All Rights Reserved. and explain how it mitigate the information security risks and privacy issues listed in Task 2. (300 words) Task 4: Draw a detailed network topology diagram and clearly indicate the locations where you would deploy the technologies products and cloud platform discussed in Task 3. (250 words) Task 5: Draft procedures which would complement the Work from Home policy of this company. You should explain how these procedures will enable the company to maintain confidentiality, integrity and availability. (300 words) __________________________________________________________________________________ Submission Guidelines: The report should have a consistent, professional, and well-organized appearance. 1. Your report should include the following:  The cover page must identify student names and the ID numbers, unit details, and the assignment details.  The assignment must use 12-point font size and at least single line spacing with appropriate section headings.  In-text referencing in IEEE style must be cited in the text of the report and listed appropriately at the end in a reference list. 2. The report must be submitted in soft (electronic) copy as a Microsoft Word document on the LMS in Turnitin dropbox. Assignments submitted on the LMS will only be accepted. 3. Late penalty applies on late submission, 10% per day would be deducted. 4. The assignments will go through Turnitin and plagiarism penalty will be applied. The report must be submitted in soft (electronic) copy as a Microsoft Word document via the upload link available on Moodle. Marking Guide: 100 Marks Item Description Marks Copyright © 2020 VIT, All Rights Reserved. Report Layout The report style, language and structure should be appropriate. All screenshots and descriptions need to be compiled and in a single final report and any given suggestions need to be incorporated. The report must contain i. Cover page with Unit Code, Unit Name, Student Name and Student ID ii. Table of Contents iii. Introduction iv. Technical Discussion v. Critical Analysis vi. Conclusion 5 Introduction The students should include purpose of the report, sections covered which should convince the reader that the report is worth reading. Word count limit – 125 words 10 Technical Discussion This section should include the discussions related to Task 1-5. You should break down this section into five tasks and stick to the guidelines given in those tasks. 70 Conclusion Summarize your findings. Word count limit – 125 words 10 References Should follow IEEE style 5 untitled Issues And Challenges of Data Security In A Cloud Computing Environment Prof.(Dr.) Pradeep Kumar Sharma University of Engineering & Management, Jaipur Jaipur, Rajasthan, India [email protected] Prof. (Dr.) Prem Shankar Kaushik, Prerna Agarwal, Payal Jain, Shivangi Agarwal, Kamlesh Dixit Shree Digamber Institute of Technology, Dausa, Rajasthan, India Abstract— Now customers can opt for software and information technology services according to his requirements and can get these services on a leased basis from the network service provider and this has the facility to scale its requirements to up or down. This service is known as cloud computing, provided by the infrastructure provider which is a third party provider. Cloud computing provides many advantages to the customer like scalability, better economics of scaling, its ability to recover from problems , its ability to outsource non-core activities and flexibility. Cloud computing is a better option for the organizations to take as their best option without any initial investment and day by day frequent and heavy use of cloud computing is increasing but despite all the benefits a cloud offers to an organization there are certain doubts and threats regarding the security issues associated with a cloud computing platform. The security issues primarily involve the external control over organizational structure and management and personal and private data of the organization can be compromised. Personal and private data in this computing environment has a very high risk of breach of confidentiality, integrity and availability. Growth of cloud computing is mainly hampered due to these security concerns and challenges. Proper security arrangements are need to be placed before selecting the service provider for any cloud computing service and customers need to be very careful about understanding the risks of security breaches and challenges of using this new computing environment. This detailed study discusses about some of the challenges associated with cloud computing services and security issues related to this platform. Keywords— Cloud Computing, Cloud Cryptography, Cloud Service, Cloud Security Controls, Cloud Security, Computer Network, Distributed Computing, Security. Security Threats. I. INTRODUCTION Cloud computing is emerging as the best suited utility for organizations who dreamt for economic, feasible, flexible and scalable computing service for its day to day activities. The cloud computing offers network of centralized computing infrastructure which can be deployed very fast and can also be scalable as per user requirements with great efficiency and minimum burden of managing the system [1]. With its un- precedented advantages, cloud computing enables a fundamental paradigm shift in how we deploy and deliver computing services. Users and organizations can avoid spending large amount of money and resources creating large capital outlays when purchasing and managing software and hardware, as well as dealing with the operational overhead therein [1]. Overall security and privacy has been the major concern in comparison to the benefits offered by a cloud [2]. It is very difficult to control or manage a cloud by users as all the resources of a cloud are from outside. Cloud computing still faces problems related to security threats from internal and external sources though it has more powerful and reliable capabilities for management and has reliable cloud computing system infrastructure. There are many examples of security breach in the recent times [2] like Apple’s iPad subscriber privacy leak [25], Amazon S3’s recent downtime [26], and Gmail’s mass email deletions (27). Cloud service provider organizations usually don’t examine data sent or received by user to the cloud and users don’t have any access to the internal procedures of a cloud, hence leading to possibility of data breach. Additionally, owing to hardware virtualization, multiple users can now share the same physical infrastructure, which runs their distinct application instances simultaneously. From user point of view cloud computing seems to be very insecure due to privacy and security vulnerabilities arises from its multi-tenancy feature [3]. It is not possible for user to get control of his data and computing applications until a strong security measure and privacy guarantee are not in place. User will not give priority to scalability, flexibility and economic availability over its privacy and security of his personal data. More motivation is required towards addressing security issues and providing more trustworthy solutions for making a cloud more helpful and
Answered Same DayOct 04, 2021ITNE2002

Answer To: ITNE2002 Network and Information Security Assignment March 2020 Total Marks: 20% Individual...

Neha answered on Oct 25 2021
145 Votes
Cloud computing Security risks and issues
The cloud computing is a very merge which is very helpful for the organizations who are dreaming to have flexible, economic, scalable and feasible services for their regular activities in the organization. The cloud computing is known for offering network to have a cent
ralised infrastructure for the computation and it can also deploy the necessities of the organization and it is easy to scale system as per requirement of the user to increase the efficiency and reduce the burdens of managing the whole system. There are very different advantages of cloud computing which helps to have a fundamental paradigm into the organization to understand how we can deploy or delivered the different services to the users. Organizations and the users keep try to avoid any expenses for creating their capital outlays to purchase and manage the hardware and software and also to deal with the different operational overhead. They can save a lot of money with cloud computing. The main and important concept of using the cloud computing is the infrastructure which it provides enter processes which are shared by them to handle the request of the user where he can take the resources on the rent for some time and use them as per the requirement without having any ownership of someone else. There are different methods which can allow us to Access the data in cloud computing. There are different security controls which are provided by the cloud computing to manage the security of the data which is present over the cloud. It provides Deterrent controls in which the basic architecture of cloud is made secure to handle the potential attacks. It is possible to inform the security management about the attack so that they can take preventive measures. Preventive controls can be taken to prevent the cloud and take proper actions for mitigating any damage of the system abuse.
Information security risks and privacy issues
    Security Threat
    Description
    Confidentiality for the user data threat
    · the cloud provider can be a malicious user.
· The customer can be a malicious cloud user.
· The 3rd party on the supporting party can be a malicious user.
    External attacker threats
    · there can be attack on the cloud infrastructure from a remote software.
· the remote software can attack over the cloud applications.
· remote hardware attack can take place against the cloud.
· there can be social engineering of the users or the customers of cloud.
    Data leakage
    · There can be a failure of any physical transport system all the electronic system which is used for data and backup over the cloud.
· There can be failure of the security access rights across different domains.
    Data segregation
    · there can be incorrect configuration about the virtual hypervisors or the machines.
· The user may define the security parameters incorrectly.
    User access
    · the reason can be poor access management or the poor identity procedures.
    data quality
    · The organization may have faulty infrastructure or application components.
    Change management
    · it...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here