Approved-online-essay-writers

Security Assessment & Spyon Technologies – IT Computer Science Assignment Help

Assignment Task


Task 

Security Assessment

A-Plus Writing Help For University Students

Get expert assistance in any academic field. All courses and programs covered.

Get Help Now!

About this assessment
You are allowed to refer to your text books, notes and the Internet during the Assessment.
The documentation and research work must be entirely your own.
By commencing this assessment you confirm that you have read and agree to abide by the ACIT Academic Honesty PolicyA


These assessment tasks provide an opportunity for you to demonstrate the competencies required to identify cyber security risks and design, plan and deploy cyber security solutions. 

Assessment questions and tasks
Your task, as a group of 2 or 3 people, is to redesign the network security infrastructure for Spyon Technologies so that it meets the business requirements for the organisation, and to write a detailed proposal which you will submit to Spyon Technologies for consideration.

To complete this task, you will submit a final design proposal to Spyon Technologies which will include:

  • a detailed list of business requirements that must be met by the network security design
  • a complete and detailed discussion of the network security design proposal. This must include complete logical diagrams of the redesigned network and a discussion of the techniques and technologies used, e.g. Clustering, zones, policies, authentication, encryption, and VPN’s
  • details of how the network security design will meet all the business requirements

You will also need to:
Prepare implementation plans
Document the network design and present the documentation to the appropriate person for approval
Present the design in a clear and logical fashion
Provide advice to the client on reasons for your design choice.


The most important idea to keep in mind is that the goal of any proposal is to convince potential clients to award you their contracts.
The scenario and questions below will guide you through many of the things you will need to consider for your proposal. You need to answer the questions and then write your proposal.


Scenario
You are employed by Spyon Technologies, a global business that manufactures weapons and military technology and equipment.  You work in the cyber security division as a network engineer. Your role is to assist with the planning and implementation of security measures and general network infrastructure.


Company profile
Spyon Technologies is a global security and aerospace company that employs about 120,000 people worldwide and is principally engaged in the research, design, development, manufacture, integration, and sustainment of advanced technology systems, products, and services. The Corporation’s sales from continuing operations are $46.5 billion P/A.


The company’s primary business is in supplying military equipment to Governments around the world.
Company’s Security Statement: Cyber Security attacks continue to increase in frequency and sophistication for the Aerospace and Defense industry.  Adversaries are targeting anyone who possesses the sensitive information they seek including the government, prime contractors, and suppliers.  It is imperative that our suppliers understand what’s at stake and recognize our shared role in protecting sensitive information and intellectual property. 
A single mistake or breach could have enormous consequences for our customers, our business, the Aerospace & Defense Industry, and national security.
The Spyon Technologies Cyber Security Alliance combines the strengths of market leading companies’ solutions and integrates their best practices, hardware, software and tools within the NexGen Cyber Innovation and Technology Center. The Alliance Companies include APC by Schneider Electric, ArcSight, CA, Cisco, Citrix, CyberPoint, Dell, EMC Corporation and its RSA Security Division, FireEye, HP, Intel, Juniper Networks, McAfee, Microsoft, NetApp, Radware, RedHat, Splunk, Symantec, Trustwave, Verizon and VMware.


IT Services
Spyon Technologies uses the following server technologies:
1.Web servers for the company intranet and Web applications.  This is accessed by remote workers.
2.Mail servers – Used by internal and external staff
3.Unified Communications servers


Security Requirements
Much of Spyon Technologies business dealings involve top secret military projects with governments around the world.  It is imperative that the details of these projects remain confidential. The following security measures are required:
1. The security perimeter must prevent all unauthorized access to company data.
2. All WAN links must be encrypted and secured.
3. All electronic communication within the company and with third parties must be encrypted and digitally signed.
4. Measures must be put in place to protect against DOS, DDOS, viruses, and all other cyber security threats.
5. The solution must be fault tolerant by eliminating single points of failure


Question 1
a. Would you describe Spyon Technologies security requirements as high, medium, or low? Why?
b. What types of security measures would you use to address each of the security requirements listed?


Question 2
Spyon Technologies has adopted the following risk evaluation criteria using a qualitative risk assessment methodology.
In order to calculate the risk level for each risk that is to be examined, it is necessary to calculate the impact of the threat occurring and the likelihood (or probability) of the threat occurring.


Question 3
Using your list of threats, create a table that lists the defences for each threat


Question 4
Design the firewall configuration. Ref: How to Design a Secure DMZ
Your design should include the following:
1.The name of each security zone you will create
2.The inter zone policy objectives including
a.Traffic allowed into the zone
b.Traffic allowed between the zones
c.Other security measures to be implemented in the policy
3.Method of securing traffic from site to site
4.Method of securing traffic to and from the public internet


Question 5
Write the Juniper SRX configuration required to implement all the functionality described in your answer above. You may refer to the SRX lab configurations. You will need to provide your IP addressing scheme as a separate table.


Question 6
Design failover redundancy for the firewall so that a stateful failover of processes and services will occur in the event of system or hardware failure. Provide a diagram of your design and a description of how failover will be achieved in the event of a failure.


Question 7
Provide a typical failover redundancy configuration for a Juniper SRX firewall. 


Question 8
Provide a typical site to site VPN configuration for a Juniper SRX firewall. 


Question 9
Is the network traffic traversing the IPSEC VPN encrypted using  symmetric or asymmetric encryption? Explain the difference between these 2 methods. Compare 3 algorithms that could be used to encrypt the IPSEC VPN traffic.  List the tests you will perform to verify that your security measures and VPN are functioning as expected. 


Question 10
You want to encrypt email communications between all company staff and business associates. What program could you use to do this? What are the advantages of this program? What type of encryption would be used? What encryption algorithms could be used? 


Question 11
You want to ensure the integrity of email and other digital communication. How can this be achieved? What algorithms could be used?


Question 12
What authentication processes could you use to verify the identity of the person from who you are receiving email and other digital communication and to verify your identity to people you are sending communications to?  What algorithms could be used? 

Question 13
Evaluate the following providers of digital certificates and create a comparison table.  The table should compare the cost and advantages of the certificate services offered by each.
Thawte
Go Daddy
Comodo
GlobalSign
GeoTrust
Symantic


Question 14
Provide a brief summary of Kerberos and NTLM Authentication. Describe the benefits of Kerberos Authentication. 


Question 15
Provide a brief summary of Biometrics for Authentication. Describe the benefits of using Biometrics for Authentication. List 3 devices you could use to provide Biometric Authentication? 


Question 16
Explain the concept of digital certificates and how they work including:
The relationship between user certificates and root certificates and the function of root certificates
The role of Certificate Authorities
The role of Registration Authorities
The function of a digital certificate repository


Question 17
What are the factors that contribute to encryption strength?


Question 18
You are reviewing help desk records and discover that emails to some recipients are not able to be encrypted while emails to other recipients are. What is the cause of this and how could it be resolved?


Question 19
Explain what a replay attack is and describe 2 methods of protection. 


Question 20
Describe 5 security threats that can be caused by issues within the organisation. 


Question 21
Explain the difference between WEP, WPA and WPA2. 


Question 22
Explain authentication, authorization, and accounting (AAA). Your explanation should include the functions of a RADIUS server and it role in the resource accounting process. 


Question 23
Describe the function and operation both IPSEC and MPLS VPN’s.  Compare these 2 technologies in terms of their ability to provide QoS, guaranteed bandwidth, and changing security requirements like the need for secure voice or video. 


Question 24
Describe and compare CHAP and PAP authentication protocols.


Question 25
Write your proposal to Spyon Technologies.

This IT Computer Science Assignment has been solved by our IT Computer Science Expert at TV Assignment Help. Our Assignment Writing Experts are efficient to provide a fresh solution to this question. We are serving more than 10000+ Students in Australia, UK & US by helping them to score HD in their academics. Our Experts are well trained to follow all marking rubrics & referencing Style. Be it a used or new solution, the quality of the work submitted by our assignment experts remains unhampered. 

You may continue to expect the same or even better quality with the used and new assignment solution files respectively. There’s one thing to be noticed that you could choose one between the two and acquire an HD either way. You could choose a new assignment solution file to get yourself an exclusive, plagiarism (with free Turn tin file), expert quality assignment or order an old solution file that was considered worthy of the highest distinction.

Welcome to our Online Essay Writing Agency. Securing higher grades costing your pocket? Order your assignment online at the lowest price now! Our online essay writers are able to provide high-quality assignment help within your deadline. With our homework writing company, you can order essays, term papers, research papers, capstone projects, movie review, presentation, annotated bibliography, reaction paper, research proposal, discussion, or another assignment without having to worry about its originality – we offer 100% original content written completely from scratch

We write papers within your selected deadline. Just share the instructions

PLACE YOUR ORDER