Professional Documents
Culture Documents
ICTNWK546 Project Portfolio Tilak Adhikari
ICTNWK546 Project Portfolio Tilak Adhikari
ICTNWK546 Project Portfolio Tilak Adhikari
Student Version
ICTNWK546
Manage network security
CONTENTS
Section 1: Security design preparation 5
Section 2: Security design and policy 7
Assessor: Zaman
Date:
Business this assessment is This assessment is based in the ICT related company known as IT
based on: linked group. The main aim of this company is the convert the ICT
products to the values for their customers.
ICT assets The categorization of the ICT assets of the IT biz company are given
Provide an as below:
overview
of the
organisati
High Medium Low
on’s
assets that
Detailed information Components Different kinds of
need
required for software
protecting. And Data
networking
Remembe
r assets
Servers Computers, routers
are not
just and switches
physical
assets.
Categorise
each of
the assets
in terms of
their value.
The value
does not
need to be
a
monetary
Threat Malware: It enters to the system via the rogue software that are designed in such a
modelling way that it seems genuine. Not only the normal hackers the big companies had also
Describe done such kinds of frauds for
at least Monitoring and stealing the data from their customers. The entered malware can
three defect the computer directly by making it malfunctions or monitoring the user’s
major activity without being known by the user the while time. Once it gets infected even
threats to after uninstalling that rogue software will not solve the problem.
network
security This attack is also more likely to happen within the IT Biz company as there is no
that can any security and these kinds of attack preventing system available within the
happen to company.
any Basically, his type of attack cannot be performed easily and seen in daily basis. But
organisati
since the company has many confidential data and information about the users and
on, as well
the employees and also no any kind of security systems it can be the target of this
as where
kind of attack at any time.
these
threats
originate
from.
For each
threat,
describe a
system
vulnerabilit
y that may
have led to
the threat.
Presentation ☐
Attach:
Hardware
Particulars Cost(AUD $)
Firewalls $1800
HP Printers $750
Software
Antivirus $1000
Total $21400
The users and the staff members always should backup their
files in the cloud or the internet rather than in the local disk
as to will be erased after backing up. They should be
informed in regular basis by the IT teams of the company.
Hot backup
The backup should be done hourly, daily and regularly as it
should be made available for restoration within 2 hours.
This backup are only accessible to the system admins and
are only used for making the system back up and cannot be
share with anyone else.
Offline backup
This kind of backup is made on weekly or the monthly basis
which are used for backing up the data in different data
centre. They are stored in the tapes and should be available
within 24 hours for restoration if any kind of incident
happens.
The information about the staff and the users should not be
leaked by any means and should be made available only for
the offsite backup.
Auditing processes