Cyber Security Assignment

Need someone to help me with Cyber Security assignment of 1500 words.The work is half practical and half theoretical.

All needed information is provided in the attached file. You should follow the marking criteria and provide screenshots on some ethical hacking techniques.  

Get Help With a similar task to - Cyber Security Assignment

Login to view and/or buy answers.. or post an answer
Additional Instructions:

Designing and Developing Products for the Cyber security Coursework Brief Academic year and term: Module title: Module code: Module Convener: Learning outcomes assessed within this piece of work as agreed at the programme level meeting Students who successfully complete this module will be able to: 1. Identify and critically analyse information security threats to computer networks and management information systems. (management of information systems | Managing information systems) 2. Critically evaluate the range of effective security controls used to protect system and user data. 3. Synthesize solutions to security problems through effective information security governance. 4. Create understanding of professional, social, ethical and legal issues associated with cyber security. Type of assessment: 1. Individual Assessment: Individual report (1500 words) (this will assess learning outcome 3). 2. Examination: Individual examination (2 hours) (this will assess learning outcomes 1,2 and 4). Assessment deadline: Coursework1: Individual Assessment – 40% Assignment Report 40% (1500 words): Individual assignment based on the given scenario. Individual Report Submission by 26/03/2020 (no later than 2pm). This should be submitted via Turnitin as a Microsoft Word file. Examination: Examination – 60% (2 hours- unseen) from w/c: 20/04/20 to w/c:27/04/20 An end of course examination will be conducted in week 12 which follows delivery structure and exercises set in the workshops. This examination will assess module learning outcomes 1,2 and 4. Kind reminder: You MUST make a reasonable attempt at your assignment and submit it. Failure to do so may result in CAPPED Resit and/or failure of the module. It is also student’s full responsibility to ensure that all assignments are submitted on the correct link and on time before the submission date. Coursework Brief Using the given scenario, students will demonstrate in-depth understanding of information security governance outcomes with management directives and will provide guidance for Information Security Managers on how to develop an information security strategy within the organisation’s governance framework and how to drive that strategy through an information security program. Individual Assessment – 40% You have just been appointed Security Manager in a multinational pharmaceutical company in West Midlands. You are in charge of physical, IT and information/data security. The company conducts research into medicines and vaccines for the treatment of HIV/AIDS, tuberculosis and malaria on behalf of the WHO. You have a quick observation done before you start your actual work which is the following: The organisation applies information governance standard ISO27001 and implements a security strategy which is not imposed on everybody due to each person’s differing workloads. These are six departments within this company: · Research and Development, · Personnel, · Marketing and Business Development, · Strategic Operations and Management, · Information Technology, · Customer Services. Diagram 1: The Company’s internet R&D is the one department with good security (biometric and card-based access control systems and running its own network which is isolated from the company's network). R&D is not shown in the company's network diagram below, since it is not connected to the rest of the intranet. All offices are on the ground floor with servers (email, ftp, web servers etc) and document filling rooms and photocopiers in the basement. Employees have easy access to these rooms for filing copies of their day to day documents. In each department, there are a number of workstations, network printers, USB based local printer/plotter/scanners, USB and network drives. Employees often go out of the premises for lunch. Some staff members have lunch at the riverside local Pub called "The Host" which is only 40 meters away from the complex. A number of employees spend their lunchtime break listening to their iPods or simply surfing the internet and (some in their personal Laptops or mobile and some in their workstations). There is a smoking area just outside the building and the smoking point is conveniently situated next to the staff car park which is open for visitors and contractors as well. Contractors and visitors need to sign in a visitor’s book before entering the premises which is by the entrance and then pick a blank pass in which they need to enter some of their detail (name) and wear at all time to move from department to department. The problem is that in the past there have been several incidents of industrial espionage which led the Company to hire a Security Manager (yourself) to tighten security. These incidents took place across departments including R&D and went unnoticed and unpunished. Task 1: [45%] You will need to investigate the ethical hacking/ penetration testing/ other tools or techniques to find and create a list of threats to physical, IT infrastructure and information/data security within this organisation. Critically evaluate the choice of your investigation tools and techniques using screenshots and appropriate description of each step. For anything not mentioned, you are to assume that it is not present: e.g. secure locks, armed guards etc. You are free to make any assumptions you wish regarding your understanding of the various operations of the company, providing that you clearly state these. You should compile your list of threats (10 threats, sort them by importance) in order of importance and use a table such as the one below to provide extra information. Table 1: Example as reference. Asset Threat Loss Countermeasure Equipment Theft: (brief scenario e.g. Dr Evil comes through the unlocked window) Logitech wireless keyboard Install Alarm, hire guards, landmines etc Task 2: [45%] The current security strategy is not effectively managed and may result in further problems if not dealt with immediately. Therefore, you will write an information security policy for management purposes. It should identify suitable countermeasures and how these will be implemented, e.g. through awareness training, monitoring, feedback and reporting. Presentation, Report Layout and References: [10 %] You are required to use the appropriate report layout and formatting style (see the guidelines below) as well as academic citations and a reference list. Your report should be free from grammatical and spelling errors. Deliverables: Coursework 1 Coursework 1 is an individual report and will be submitted as a word document (1500 words in total including all diagrams, documentation and description) via Turnitin on Moodle and must include all the required components. Coursework 1 is worth 40% of the overall assignment. The marking criteria are outlined below. Marking Criteria – Coursework 1 Functionality Criteria /Deliverables Marks Task 1: Set up a virtual environment (such as VMWire or Virutal box) and create instance (such as Kali, windows machine) then using tools (Namp/Xenmap , Wireshark) and provided screenshots . (10 Marks) You have used the ethical hacking/penetration testing techniques to identify the threat vulnerabilities by using appropriate tools like network sniffer, port scanner, and system log analysis, auditing (physical security) and evaluate critically. (20 Marks) You have considered the whole scenario and produced a list of likely security threats based on their potential risk. (10 Marks) Your explanation is thorough and supported with academic literature, as well as examples. (5 Marks) 45 Task 2: You have discussed the importance of having a security policy in an organisation. You have outlined a short brief between security governance and security policy. You have used academic literature to support your arguments. (10 Marks) The policy must include: Background and purpose. (5 Marks) Scope. (5 Marks) Roles and responsivities (5 Marks) Policy framework (5 Marks) Distribution, training and implementation (5 Marks) Monitoring, feedback and reporting (5 Marks) Business continuity (5 Marks) 45 Presentation, Report Layout and References Your report is well laid out and formatted according to the given requirements. Your report is free from grammatical and spelling errors. The Harvard system has been used to cite work where necessary and a list of references is also provided. 10 Total 100 2 of 6 InternetCustomer ServiceManagementMarketingITPersonnelRouter/firewall-1Router/firewall-2Router 4Stack of switchesBackup linkBackup linkWeb/email/DNS/FTP server Internet Customer Service Management Marketing IT Personnel Router /firewall-1 Router /firewall-2 Router 4 Stack of switches Backup link Backup link Web/email/DNS /FTP server

Related Questions

Similar orders to Cyber Security Assignment
28
Views
0
Answers
TCP and Attacks on TCP
Consider these attacks on TCP: SYN Flooding, NULL Flooding, Information Covert channel, Timing Covert channel and DDoS. From the perspective of the attacker, which do you think is the easiest to launch? Which is the most difficult? From the perspective...
12
Views
0
Answers
Laravel Rating System
admins can: Update admin info Insert user account Update user account Delete user account Update book attribute...
47
Views
0
Answers
Database Design
Please put it in a Microsoft Word document....
32
Views
0
Answers
LAB Assignment Network Management using Wireshark tool
Hello I have a LAB Assignment in Network Management using Wireshark Tool. just want an explanation of the steps mentioned in the attached file if possible. Please find the detail in the attached file...