CBSN4103 NETWORK SECURITY – This assignment is Identify the appropriate components to prevent and detect attacks in network environment.

This assignment identify the appropriate components to prevent and detect attacks in network environment.

<h3 class="entry-title" style="white-space: normal;"CBSN4103 NETWORK SECURITY– Identify the appropriate components to prevent and detect attacks in network environment.

  Part 1

Objective

This assignment is aim  identify the appropriate components to prevent and detect attacks in network environment.

Requirements

  1. The Cleanup Project (TCP) is a leading waste management company in West Malaysia. TPC offers a comprehensive range of waste management services, including collection, transportation, recycling and disposal. They are committed to providing their customers with sustainable and environmentally friendly waste management solutions through their multiple Waste to Energy (WTE) facility sites. These WTE facility sites are equipped with latest technologies to collect data from the sensors installed in the incinerators, the boilers, the turbine and other machines. The data will then be stored in the server at the WTE facility site and then forwarded to the servers at the TCP’s headquarters in Selangor. Due to their successful waste management services, TPC has a huge number of customers. The management of the company has decided to expand its services in West Malaysia to reach up to East Malaysia (Sabah and Sarawak).

     

    As the Senior Network Security Consultant in TCP, your tasks are to:      

    • Provide the background of the company including the business operations (eg. running 24/7, multiple servers) and the security needs (eg. secure environment for its staff) of the company’s network.
    • Analyse THREE possible internal attacks that can be launched at the company. In your analysis, provide the following for each of the internal attacks identified:
      1. Description of the internal attack
      2. Example scenario on how the attack is launched
      3. Security measure to eliminate the attack
    • Analyse THREE possible external attacks that can be launched at the company. In your analysis, provide the following for each of the external attacks identified:
    1. Description of the external attack
    2. Example scenario on how the attack is launched
    3. Security measure to eliminate the attack
    • Propose and discuss THREE key aspects (security controls) of approaching a good cyber security for the company to prevent ethical issues on network security
    1. FIRST key aspect (security control) of approaching a good cyber security for the company with appropriate example
    2. SECOND key aspect (security control) of approaching a good cyber security for the company with appropriate example
    3. THIRD key aspect (security control) of approaching a good cyber security for the company with appropriate example

 

Part II

Online Class 

Discuss the following topic(s) in the forum and submit proof of your participation in the online discussions:

 

  1.  

Obtain a Resolution for this Assessment. Engage Experts to Complete this Assignment on Your Behalf, Well Before the Deadline.

Answer

Recent Solved Questions

Request Answer of this Assignment

1 Step 1
keyboard_arrow_leftPrevious
Nextkeyboard_arrow_right