Uploaded by puzhal kumar

Security

advertisement
lOMoARcPSD|15864868
Unit 5 Security HND in computing Final assignment
HND in Computing (ESOFT Metro Campus)
StuDocu is not sponsored or endorsed by any college or university
Downloaded by Keerthu (keerthu481m@gmail.com)
lOMoARcPSD|15864868
Higher Nationals
Internal verification of assessment decisions – BTEC (RQF)
INTERNAL VERIFICATION – ASSESSMENT DECISIONS
Programme title
BTEC Higher National Diploma in Computing
Assessor
Unit(s)
Assignment title
Student’s name
Internal Verifier
Unit 05: Security
EMC Cloud Solutions
M.M.M.Inshaf
List which assessment
criteria the Assessor has
awarded.
Pass
Merit
Distinction
INTERNAL VERIFIER CHECKLIST
Do the assessment criteria awarded match
those shown in the assignment brief?
Is the Pass/Merit/Distinction grade awarded
justified by the assessor’s comments on the
student work?
Has the work been assessed
accurately?
Y/N
Y/N
Y/N
Is the feedback to the student:
Give details:
• Constructive?
• Linked to relevant assessment
criteria?
Y/N
Y/N
• Identifying opportunities for
improved performance?
Y/N
• Agreeing actions?
Y/N
Does the assessment decision need
amending?
Y/N
Assessor signature
Date
Internal Verifier signature
Date
Programme Leader signature (if
required)
Date
Downloaded by Keerthu (keerthu481m@gmail.com)
lOMoARcPSD|15864868
Confirm action completed
Remedial action taken
Give details:
Assessor signature
Date
Internal Verifier
signature
Date
Programme Leader
signature (if required)
Date
Downloaded by Keerthu (keerthu481m@gmail.com)
lOMoARcPSD|15864868
Higher Nationals - Summative Assignment Feedback Form
Student Name/ID
M.M.M.Inshaf / KAN/A-008235
Unit Title
Unit 05: Security
Assignment Number
1
Assessor
Submission Date
Date Received 1st
submission
Re-submission Date
Date Received 2nd
submission
Assessor Feedback:
LO1. Assess risks to IT security
Pass, Merit & Distinction
P1
Descripts
LO2. Describe IT security solutions.
P2
M1
D1
Pass, Merit & Distinction
Descripts
P4
M2
D1
P3
LO3. Review mechanisms to control organisational IT security.
Pass, Merit & Distinction
Descripts
P5
P6
M3
M4
P8
M5
D3
D2
LO4. Manage organisational security.
Pass, Merit & Distinction
Descripts
Grade:
P7
Assessor Signature:
Date:
Assessor Signature:
Date:
Resubmission Feedback:
Grade:
Internal Verifier’s Comments:
Signature & Date:
* Please note that grade decisions are provisional. They are only confirmed once internal and external moderation has taken place and grades decisions have
been agreed at the assessment board.
Downloaded by Keerthu (keerthu481m@gmail.com)
lOMoARcPSD|15864868
Pearson
Higher Nationals in
Computing
Unit 5 : Security
Downloaded by Keerthu (keerthu481m@gmail.com)
lOMoARcPSD|15864868
General Guidelines
1. A Cover page or title page – You should always attach a title page to your assignment. Use previous page as
your cover sheet and be sure to fill the details correctly.
2. This entire brief should be attached in first before you start answering.
3. All the assignments should prepare using word processing software.
4. All the assignments should print in A4 sized paper, and make sure to only use one side printing.
5. Allow 1” margin on each side of the paper. But on the left side you will need to leave room for binging.
Word Processing Rules
1. Use a font type that will make easy for your examiner to read. The font size should be 12 point, and should be
in the style of Time New Roman.
2. Use 1.5 line word-processing. Left justify all paragraphs.
3. Ensure that all headings are consistent in terms of size and font style.
4. Use footer function on the word processor to insert Your Name, Subject, Assignment No, and Page
Number on each page. This is useful if individual sheets become detached for any reason.
5. Use word processing application spell check and grammar check function to help edit your assignment.
Important Points:
1. Check carefully the hand in date and the instructions given with the assignment. Late submissions will not be
accepted.
2. Ensure that you give yourself enough time to complete the assignment by the due date.
3. Don’t leave things such as printing to the last minute – excuses of this nature will not be accepted for failure
to hand in the work on time.
4. You must take responsibility for managing your own time effectively.
5. If you are unable to hand in your assignment on time and have valid reasons such as illness, you may apply (in
writing) for an extension.
6. Failure to achieve at least a PASS grade will result in a REFERRAL grade being given.
7. Non-submission of work without valid reasons will lead to an automatic REFERRAL. You will then be asked
to complete an alternative assignment.
8. Take great care that if you use other people’s work or ideas in your assignment, you properly reference them,
using the HARVARD referencing system, in you text and any bibliography, otherwise you may be guilty of
plagiarism.
9. If you are caught plagiarising you could have your grade reduced to A REFERRAL or at worst you could be
excluded from the course.
Downloaded by Keerthu (keerthu481m@gmail.com)
lOMoARcPSD|15864868
Student Declaration
I hereby, declare that I know what plagiarism entails, namely to use another’s work and to present it as my own
without attributing the sources in the correct way. I further understand what it means to copy another’s work.
1. I know that plagiarism is a punishable offence because it constitutes theft.
2. I understand the plagiarism and copying policy of the Edexcel UK.
3. I know what the consequences will be if I plagiaries or copy another’s work in any of the assignments for this
program.
4. I declare therefore that all work presented by me for every aspects of my program, will be my own, and where
I have made use of another’s work, I will attribute the source in the correct way.
5. I acknowledge that the attachment of this document signed or not, constitutes a binding agreement between
myself and Edexcel UK.
6. I understand that my assignment will not be considered as submitted if this document is not attached to the
attached.
02/11/2018
inshaf404@gmail.com
Student’s Signature:
(Provide E-mail ID)
Date:
(Provide Submission Date)
Downloaded by Keerthu (keerthu481m@gmail.com)
lOMoARcPSD|15864868
Assignment Brief
Student Name /ID Number
M.M.M.Inshaf / KAN/A-008235
Unit Number and Title
Unit 5- Security
Academic Year
2017/2018
Unit Tutor
Assignment Title
EMC Cloud Solutions
Issue Date
Submission Date
IV Name & Date
Submission Format:
The submission is in the form of an individual written report. This should be written in a concise, formal business
style using single spacing and font size 12. You are required to make use of headings, paragraphs and subsections
as appropriate, and all work must be supported with research and referenced using the Harvard referencing system.
Please also provide an end list of references using the Harvard referencing system.
Unit Learning Outcomes:
LO1 Assess risks to IT security.
LO2 Describe IT security solutions.
LO3 Review mechanisms to control organisational IT security.
LO4 Manage organisational security.
Downloaded by Keerthu (keerthu481m@gmail.com)
lOMoARcPSD|15864868
Assignment Brief and Guidance:
EMC Cloud Solutions is reputed as the nation’s most reliable Cloud solution provider in Sri Lanka.
A
number of high profile businesses in Sri Lanka including Esoft Metro Camps network, SME Bank Sri Lanka and
WEEFM are facilitated by EMC Cloud Solutions. EMC Cloud provides nearly 500 of its customers with SaaS,
PaaS & IaaS solutions with high capacity compute and storage options. Also EMC is a selected contractor for Sri
Lanka, The Ministry of Defense for hosting government and defense systems.
EMC’s central data center facility is located at Colombo Sri Lanka along with its corporate head-office in
Bambalapitiya. Their premises at Bambalapitiya is a six story building with the 1 st floor dedicated to sales and
customer services equipped with public wifi facility. Second-floor hosts HR, Finance and Training & Development
departments and the third-floor hosts boardroom and offices for senior executives along with the IT and Data center
department. Floor 4,5,6 hosts computer servers which make up the data center.
With the rapid growth of information technology in Kandy area in recent years, EMC seeks opportunity to extend
its services to Kandy, Sri Lanka. As of yet, the organization still considers the nature of such extension with what to
implement, where is the suitable location and other essential options such as security are actually being discussed.
You are hired by the management of EMC Solutions as a Security Expert to evaluate the security-related specifics
of its present system and provide recommendations on security and reliability related improvements of its present
system as well as to plan the establishment of the extension on a solid security foundation.
Downloaded by Keerthu (keerthu481m@gmail.com)
lOMoARcPSD|15864868
Activity 01
Assuming the role of External Security Consultant, you need to compile a report focusing on following elements to
the board of EMC Cloud Solutions;
1.1 Identify types of security risks EMC Cloud is subject to, in its present setup and the impact, such issues would
create on the business itself.
1.2 Develop and describe security procedures for EMC Cloud to minimize the impact of issues discussed in section
(1.1) by assessing and treating the risks.
Activity 02
2.1 Discuss how EMC Cloud and its clients will be impacted by improper/ incorrect configurations which are
applicable to firewalls and VPN solutions.
2.2 Explain how following technologies would benefit EMC Cloud and its Clients by facilitating a ‘trusted
network’. (Support your answer with suitable illustrations).
i) DMZ
ii) Static IP
iii)NAT
2.3 Discuss the benefits of implementing network monitoring systems.
Activity 03
3.1 Formulate a suitable risk assessment procedure for EMC Cloud solutions to safeguard itself and its clients.
3.2 Explain the mandatory data protection laws and procedures which will be applied to data storage solutions
provided by EMC Cloud. You may also highlight on ISO 3100 risk management methodology.
3.3 Comment on the topic, ‘IT Security & Organizational Policy’
Downloaded by Keerthu (keerthu481m@gmail.com)
lOMoARcPSD|15864868
Activity 04
4.1 Develop a security policy for EMC Cloud to minimize exploitations and misuses while evaluating the
suitability of the tools used in an organizational policy.
4.2 Develop and present a disaster recovery plan for EMC Cloud for its all venues to ensure maximum uptime for
its customers (Student should produce a PowerPoint-based presentation which illustrates the recovery plan within
15 minutes of time including justifications and reasons for decisions and options used).
4.3 ‘Creditors, directors, employees, government and its agencies, owners / shareholders, suppliers, unions, and
the other parties the business draws its resources’ are the main branches of any organization. Discuss the role of
these groups to implement security audit recommendations for the organization.
Downloaded by Keerthu (keerthu481m@gmail.com)
lOMoARcPSD|15864868
Table of Contents
Table of Figures ............................................................................................................ 13
Interaction ..................................................................................................................... 14
Task 1: Assuming the role of External Security Consultant, you need to compile a report
focusing on following elements to the board of EMC Cloud Solutions; ......................... 15
Task 1.1: Identify types of security risks EMC Cloud is subject to, in its present setup
and the impact, such issues would create on the business itself. ................................. 15
What is EMC? ....................................................................................................... 15
Task 1.2: Develop and describe security procedures for EMC Cloud to minimize the
impact of issues discussed in section (1.1) by assessing and treating the risks. ........... 17
Task 2: .......................................................................................................................... 20
Task 2.1: Discuss how EMC Cloud and its clients will be impacted by improper/
incorrect configurations which are applicable to firewalls and VPN solutions. ........... 20
Task 2.2: Explain how following technologies would benefit EMC Cloud and its
Clients by facilitating a ‘trusted network’. (Support your answer with suitable
illustrations). ............................................................................................................. 23
What is trusted network?........................................................................................ 23
Task 2.3: Discuss the benefits of implementing network monitoring systems. ............ 27
What is network monitoring? ................................................................................. 27
Task 3: .......................................................................................................................... 29
Task 3.1: Formulate a suitable risk assessment procedure for EMC Cloud solutions to
safeguard itself and its clients. ................................................................................... 29
Penetrate testing ..................................................................................................... 29
Task 3.2: Explain the mandatory data protection laws and procedures which will be
applied to data storage solutions provided by EMC Cloud. You may also highlight on
ISO 3100 risk management methodology. ................................................................. 31
General data protection regulation (GDPR) ............................................................ 31
Page 11 of 37
M.M.M.INSHAF
KAN/A-008235
Downloaded by Keerthu (keerthu481m@gmail.com)
lOMoARcPSD|15864868
ISO 3100 risk management methodology. .............................................................. 32
Task 4: .......................................................................................................................... 33
Task 4.1: Develop a security policy for EMC Cloud to minimize exploitations and
misuses while evaluating the suitability of the tools used in an organizational policy. 33
What is Security Policies? ...................................................................................... 33
Bibliography.................................................................................................................. 35
Page 12 of 37
M.M.M.INSHAF
KAN/A-008235
Downloaded by Keerthu (keerthu481m@gmail.com)
lOMoARcPSD|15864868
Table of Figures
Figure 1 ......................................................................................................................... 24
Figure 2 ......................................................................................................................... 25
Figure 3 ......................................................................................................................... 26
Figure 4 ......................................................................................................................... 32
Page 13 of 37
M.M.M.INSHAF
KAN/A-008235
Downloaded by Keerthu (keerthu481m@gmail.com)
lOMoARcPSD|15864868
Interaction
EMC Cloud Solutions is reputed as the nation’s most reliable Cloud solution provider in
Sri Lanka. A number of high profile businesses in Sri Lanka including Esoft Metro
Camps network, SME Bank Sri Lanka and WEEFM are facilitated by EMC Cloud
Solutions. EMC Cloud provides nearly 500 of its customers with SaaS, PaaS & IaaS
solutions with high capacity compute and storage options. Also EMC is a selected
contractor for Sri Lanka, The Ministry of Defense for hosting government and defense
systems.
EMC’s central data center facility is located at Colombo Sri Lanka along with its
corporate head-office in Bambalapitiya. Their premises at Bambalapitiya is a six story
building with the 1st floor dedicated to sales and customer services equipped with public
wifi facility. Second-floor hosts HR, Finance and Training & Development departments
and the third-floor hosts boardroom and offices for senior executives along with the IT
and Data center department. Floor 4,5,6 hosts computer servers which make up the data
center.
With the rapid growth of information technology in Kandy area in recent years, EMC
seeks opportunity to extend its services to Kandy, Sri Lanka. As of yet, the organization
still considers the nature of such extension with what to implement, where is the suitable
location and other essential options such as security are actually being discussed.
You are hired by the management of EMC Solutions as a Security Expert to evaluate the
security-related specifics of its present system and provide recommendations on security
and reliability related improvements of its present system as well as to plan the
establishment of the extension on a solid security foundation.
Page 14 of 37
M.M.M.INSHAF
KAN/A-008235
Downloaded by Keerthu (keerthu481m@gmail.com)
lOMoARcPSD|15864868
Task 1: Assuming the role of External Security Consultant,
you need to compile a report focusing on following elements to
the board of EMC Cloud Solutions;
Task 1.1: Identify types of security risks EMC Cloud is subject to, in its
present setup and the impact, such issues would create on the business
itself.
What is EMC?
EMC storage refers back to the diverse storage products, systems and services being
supplied by means of EMC organization, which encompass disk, flash and hybrid
storage structures and arrays. These systems are offered to corporations of all sizes so
that you can fulfill their storage wishes, and blended with EMC's data management
approach services, enable organizations to arrange unstructured information as well as
to recognition on reducing storage value and increasing security or safety.
EMC offers an extensive variety of storage alternatives. Starting from the flagship
product EMC to ultra-modern offerings inside the all flash section. Also it gives a
spread of alternatives based totally available on the market and necessities inside the
SAN and NAS segments.
Above scenario EMC Cloud provides nearly 500 of its customers with SaaS, PaaS &
IaaS solutions with high capacity compute and storage options. In their all the cloud
system will storing in EMC cloud. Bamabalapitya branch is logical and physical
security control. There are so many impact, such issues are held on bambalabiya branch.
First we want to clearly understand why this type of impact, such issues is held on EMC
center.
The Weakness
There to type of security weakness included
1. Physical security weakness
2. Logical security weakness
What is physical security?
Physical security is the protection of personnel, hardware, software, networks and data
from Physical actions and occasions that could cause critical loss or harm to an
Page 15 of 37
M.M.M.INSHAF
KAN/A-008235
Downloaded by Keerthu (keerthu481m@gmail.com)
lOMoARcPSD|15864868
employer, organization or organization. This includes safety from fireplace, flood,
natural disasters, theft and terrorism
Physical security weakness

There are no have CCTV facility to identify the physical threats

They’re not have a high security environment in Bamaplabiya branch mainly
first, second and third floors.

There are no have high fast data transfer.

No have a educative staff in EMC center
What is logical security?
Logical security protects laptop or computer software program by means of
discouraging person extra through implementing person identifications, passwords and
authentication,
Logical security weakness

There are no have proper Antivirus and anti-spyware software

In EMC center easily can hack EMC system

No have a proper firewalls security

There are no have high a fast internet connation(example: VPN)

No have a backup facilities
In this weakness there are so many impact, issues are held on EMC center
Page 16 of 37
M.M.M.INSHAF
KAN/A-008235
Downloaded by Keerthu (keerthu481m@gmail.com)
lOMoARcPSD|15864868
Task 1.2: Develop and describe security procedures for EMC Cloud to
minimize the impact of issues discussed in section (1.1) by assessing and
treating the risks.
What we want to do?
physical security prevents and discourages attackers from getting into a building by
using putting in fences, alarms, cameras, protection guards and puppies, digital get
admission to manage, intrusion detection and administration get right of entry to
controls. the distinction among logical protection and physical protection is logical
protection protects get
Physical security requirements need to additionally be considered at some point of the
construction phase of latest builds or the modification of existing facilities, as those are
in all likelihood to be subject to extraordinary risks and problems(issues). attention
should be given to:

identification and assessment of existing and new protection risks

identification of safety requirements for both the development works and any
modifications to the safety of the facility itself (this will depend on whether the
construction works are adjoining to or within the facility)

Determination of the transition of the security measures from ‘production phase’
into everyday operations.
Want to fix CCTV
A closed — circuit TV camera (CCTV) records videos and photos for security,
surveillance or different private purposes. security cameras have grow to be an essential
issue in security and are in particular used for surveillance functions. facts display that
putting in a CCTV camera reduces crimes inside the place protected as much as 95%.
CCTV’s are used by many for numerous reasons. each organization has CCTV’s
installed for 24x7 surveillance in EMC center.
Page 17 of 37
M.M.M.INSHAF
KAN/A-008235
Downloaded by Keerthu (keerthu481m@gmail.com)
lOMoARcPSD|15864868
Implement Firewall
Let’s assume that you work at a business enterprise with 500 employees. the
organization will therefore have hundreds of computer systems that each one have
network cards connecting them together..
Without a firewall in place, all of those hundred of computers are at once handy to
everybody on the internet. Someone who is aware of what she or he is doing can probe
those computers, attempt to make FTP connections to them, try to make telnet
connections to them and so on. If one employee makes a mistake and leaves a security
hollow, hackers can get to the machine and make the most the hole.
With a firewall in area, the landscape is tons exclusive. a organization will location a
firewall at every connection to the net the firewall can implement safety regulations
Access to data center
A data center is a large group of computer servers that are connected together. Every
organization, whether big or small, has a large amount of data that are needed to be
stored somewhere in EMC center. A data center is essential to store, manage, process,
and distribute large amounts of data of an organization. In case of any disaster, a data
center professional can help in recovering the lost data. In today’s modern era, every
organization needs to have a data center for its smooth running. For EMC center, it is
better to take suggestions of an expert in this field.
Data which can be read and understood without any special efforts are known as plaintext or clear-text. The method to disguise these plain-text in such a way as to hide its
substance is known as data encryption.
Page 18 of 37
M.M.M.INSHAF
KAN/A-008235
Downloaded by Keerthu (keerthu481m@gmail.com)
lOMoARcPSD|15864868
Data encrypted
In other words, data encryption is one of the mechanisms which are used to protect
confidential information of users like personal documents, pictures, online transaction or
any other important things which user would not like to share with anyone, unless they
are permitted.
Encryption works through mathematical formula which is known as cipher and a key to
convert readable data (Plain Text) into a form that no one can understand (Cipher Text).
The cipher is the general way for encryption, & the associated key makes that encrypted
data unique. In order to achieve Encryption, there are 3 widely used methods, Hashing,
Symmetric & Asymmetric methods. These are 3 of the methods which are used widely.
Insuring the company
This is the most valuable think we can do for natural disasters or any other problem. Its
help to recover our company easily
Page 19 of 37
M.M.M.INSHAF
KAN/A-008235
Downloaded by Keerthu (keerthu481m@gmail.com)
lOMoARcPSD|15864868
Task 2:
Task 2.1: Discuss how EMC Cloud and its clients will be impacted by
improper/ incorrect configurations which are applicable to firewalls
and VPN solutions.
What is VPN?
A virtual private network (VPN) is a network that uses a public telecommunication
infrastructure, such as the Internet, to provide remote offices or individual users with
secure access to their organization's network. In a VPN, the computers at each end of the
tunnel encrypt the data entering the tunnel and decrypt it at the other end.
Here are some important uses of VPN:
1) Use Public wi-fi securely: Public Wi-Fi offers no encryption security to its users,
and your signals are broadcast for anyone savvy enough to eavesdrop, therefore some
people use VPNs at Wi-Fi hotspots to prevent snoopers from collecting private
information. Generally, the most effective way to keep your data from entering the
wrong hands is by using a VPN service which makes all Internet use totally private and
secure.
2) Secure Communication between Sites: Many businesses today have branch offices,
and connect these branches to the main office over the Internet using a site-to-site VPN
connection. For example, businesses can enable workers with laptops on the road or at
home to connect to the company network as if they were sat at a desk in the office. A
company that has offices in two locations can connect them using a VPN across the
internet so there appears to be one network. Linking remote sites with a main office lets
users send and receive information via a secure connection. Employees can use file
servers and printers which are not physically in the same office.
Page 20 of 37
M.M.M.INSHAF
KAN/A-008235
Downloaded by Keerthu (keerthu481m@gmail.com)
lOMoARcPSD|15864868
3) Bypass the Web Censorship and Content Surveillance: Some countries put up
firewalls to restrict what their residents see, hear, and share with other people within and
beyond their borders. Connecting to a VPN server will enable you to 'tunnel out' of the
censorship restrictions and access the full World Wide Web.
In our EMC center
Regarding your last question, simply using a VPN service doesn't hide your true identity
or your location. If you don't secure your browser and PC there are many ways to be
identified and tracked.
Firewall
Let’s assume that you work at a business enterprise with 500 employees. the
organization will therefore have hundreds of computer systems that each one have
network cards connecting them together..
Without a firewall in place, all of those hundred of computers are at once handy to
everybody on the internet. Someone who is aware of what she or he is doing can probe
those computers, attempt to make FTP connections to them, try to make telnet
connections to them and so on. If one employee makes a mistake and leaves a security
hollow, hackers can get to the machine and make the most the hole.
With a firewall in area, the landscape is tons exclusive. a organization will location a
firewall at every connection to the net the firewall can implement safety regulations
Encryption
Encryption is the process to switch statistics securely in a secretive way. It protects your
information over the net. It enables to guard your privateness or anonymity and
conversations, whether video, voice, or textual content.
Encryption is wanted when you don't need everybody else to have get entry to.
Allow me explain how it's implementing:

When you switch your data or information over the net, the information first
dispatched on your local network.

Then your statistics sent for your net service issuer who can view this
information.

And then in the end, the information gets the supposed person.
Page 21 of 37
M.M.M.INSHAF
KAN/A-008235
Downloaded by Keerthu (keerthu481m@gmail.com)
lOMoARcPSD|15864868
So, throughout this complete process several man or woman can get entry to your
information. Subsequently, the encryption is needed to preserve your information secure
& unreadable.
The pleasant way to encrypt your data over the net is using SSL (Secure Socket Layer)
that encrypt your statistics and make customers assured to technique.
Page 22 of 37
M.M.M.INSHAF
KAN/A-008235
Downloaded by Keerthu (keerthu481m@gmail.com)
lOMoARcPSD|15864868
Task 2.2: Explain how following technologies would benefit EMC
Cloud and its Clients by facilitating a ‘trusted network’. (Support your
answer with suitable illustrations).
What is trusted network?
Such networks permit information to be transferred transparently. The machines using a
trusted network are typically administered by way of an administrator to ensure that
private and secured records are not leaked. Get entry to this network is restrained.
Computer systems the use of trusted networks are greater secured and exclusive due to
best firewalls.
What is DMZ?
De-Militarized Zone refers to a subset of network which is directly accessible from
Internet/external networks. DMZ or Dematerialized Zone is like another layer of
Security (firewall) in your network. Demilitarized zone. It means only one device will
be connected to public network while other devices will be safe and connected to private
network.
DMZ is a physical or logical subnet that separates your inner compter network from
public network, i.e. internet
Things to know about DMZ network:

It shields internal network or intranet from direct external/Internet access

DMZ network may screen network traffic and allow only a subset of traffic
towards internal network.

DMZ network may provision network security features like access control, rate
limiting.
Page 23 of 37
M.M.M.INSHAF
KAN/A-008235
Downloaded by Keerthu (keerthu481m@gmail.com)
lOMoARcPSD|15864868
(Obodoeze, 2016)
Figure 1
Static IP
Static IP is an IP address assigned permanently to a computer and cannot be changed
dynamically from time to time and you must have to configure address manually by
going into network options. But Dynamic IP address is a kind of IP address offered by
the ISP (Internet Service Providers) and changes from time to time, since Dynamic IP
address is assigned by a Protocol named DHCP I.E. Dynamic Host Configuration
Protocol, which assigns the IP addresses temporarily.
Now this public IP is of two types.
1) Dynamic
2) Static
Advantages of Static IP:

Remote access – with a static IP address you can get entry to your computer
irrespective of where you're in the world. The usage of applications consisting
of remote administrator and computer anywhere you may log into your work or
home computer no matter where you're. Even though you could set the
connection up no matter what sort of IP address with you have, you want a set
address with to hold it in any other case the program will not be capable of
discovering your pc whilst your pc refreshes its dynamic address.
Page 24 of 37
M.M.M.INSHAF
KAN/A-008235
Downloaded by Keerthu (keerthu481m@gmail.com)
lOMoARcPSD|15864868

Anonymous FTP – it approaches that anyone the usage of the FTP software
can get entry to documents in a unique listing of your website online. it’s
known as nameless FTP due to the fact the username used to get entry to is
“anonymous.” many net hosting providers require a static IP for the anonymous
FTP function to paintings well.
You want to access your internet site by way of FTP or internet browser even if
the area call is inaccessible, which include domain name propagation periods.

Less downtime – on each time your IP address with refreshes you run the
threat of downtime from the server. At the same time as that is typically best for
a very quick time.
(hotcomm)
Figure 2
Page 25 of 37
M.M.M.INSHAF
KAN/A-008235
Downloaded by Keerthu (keerthu481m@gmail.com)
lOMoARcPSD|15864868
Networks address translation protocol (NAT)
What is NAT?
Networks address translation protocol (NAT) affords a one-to-one translation from IP
address. That is generally utilized in an enterprise that desires to give an internal system
get entry to to the internet with a single public IP address translating to a single IP
address with within the personal address area.
When you make an internet request, your device sent the request to the router. The
router, knowing that your IP address is not routable, codes your IP address and port for
this session, translates the address to its out bound IP address, and assigns a source port
that is available and forward the request to the destination.
When the responses come back from the destination, the router performs a lookup and
finds the IP address and source port for the device that started the query. It changes the
IP address and source port to those in the table and forwards it to the device.
This way, you can communicate with a device outside your subnet without having to use
the unroutrable IP address.
(Vader, 2012)
Figure 3
Page 26 of 37
M.M.M.INSHAF
KAN/A-008235
Downloaded by Keerthu (keerthu481m@gmail.com)
lOMoARcPSD|15864868
Task 2.3: Discuss the benefits of implementing network monitoring
systems.
What is network monitoring?
Network Monitoring by and large deals with monitoring all elements of a network
including servers, routers, firewalls, traffic & bandwidth, network device configurations
and the applications hosted in them.
Also, a holistic network monitoring doesn't end with just monitoring and providing
information. Here's a list of a few key aspects of network monitoring:
1. Application performance

Application Discovery and Dependency Mapping (ADDM)

Anomaly Detection

Fault Management with Root Cause Analysis
2. Network performance

Health, availability and performance of network and its devices

Fault detection, alerts and troubleshooting

Network visualisation and usage trends

Capacity-planning

Bandwidth usage analysis

Network traffic analysis (Based on speed, usage, packets and volume)

QoS policy performance monitoring

Traffic shaping

WLC controller monitoring (Usage by SSID, access points, clients and apps)
3. Configuration, change and compliance management

Configuration back

Real-time change tracking

Config change and network compliance
Page 27 of 37
M.M.M.INSHAF
KAN/A-008235
Downloaded by Keerthu (keerthu481m@gmail.com)
lOMoARcPSD|15864868
4. IP Address management

Switch Port Mapping

MIB Browser
5. Network security analysis

Firewall policy management

Log analysis

Anomaly alerts

Firewall compliance and device management
To understand and troubleshoot network issues effectively, it is imperative that all the
elements of a network are monitored centrally and the alerts are in correlation.
Page 28 of 37
M.M.M.INSHAF
KAN/A-008235
Downloaded by Keerthu (keerthu481m@gmail.com)
lOMoARcPSD|15864868
Task 3:
Task 3.1: Formulate a suitable risk assessment procedure for EMC
Cloud solutions to safeguard itself and its clients.
Penetrate testing
What is Penetrate testing?
Penetration testing is done to determine if there is a way to break into your network.
Penetration testing’s is usually done by someone outside of your company who is trying
to determine the easiest way into your network.

First, they test your firewall looking for open ports on the firewall itself. If they
find SSH, HTTP, HTTPS open on the firewall they will try to determine the
type of firewall and use the default logins for that make and manufacturer.
Sometimes it’s that easy. If the default password doesn't work they use the
default user and hit the firewall with a password cracker. If the default user is
still in place most firewalls will fall in 4 hours.

Next,your firewall has survived. Same process on the the name servers, web
servers, mail servers, VPN and any other servers they find on the Internet side
of your network. Most Linux installs default to root SSH on any interface.
Penetration testers know this and will use the root user name and hit the box
with a password cracker. Again probably in, in under 4 hours.

Email servers make wonderful targets. Every known Send mail exploit is tried.
Is the server an open relay? Will it forward spam?

The VPN is tested to see if traffic can be intercepted and read.

The web server gets attacked to see if they can determine the server type,
Apache, Tomcat, IIS, and the underlying applications, PHP, PERL, Java, .NET.
All known vulnerabilities are tested.

Windows Servers are hit with every known method of attack, basically there is
an encyclopedia of vulnerabilities and unless you have been religious in your
patching they will find the holes. Remember root on Linux, Administrator
works well on Windows.

And to make matters just a little more fun; you have to turn off programs such
as fail to ban or port sentry which will catch and disconnect the attempts to
Page 29 of 37
M.M.M.INSHAF
KAN/A-008235
Downloaded by Keerthu (keerthu481m@gmail.com)
lOMoARcPSD|15864868
hack you. However, they will allow you to keep programs such Snort (intrusion
detection) running. You will learn the meaning of Snot, from that test.
Some companies will stop at this point and issue a report; telling you every
vulnerability they have found. Others will do social testing.
Page 30 of 37
M.M.M.INSHAF
KAN/A-008235
Downloaded by Keerthu (keerthu481m@gmail.com)
lOMoARcPSD|15864868
Task 3.2: Explain the mandatory data protection laws and procedures
which will be applied to data storage solutions provided by EMC
Cloud. You may also highlight on ISO 3100 risk management
methodology.
General data protection regulation (GDPR)
GDPR is the brand new set of records safety rules with the intention to take impact in
may additionally 2018. GDPR will alternate the manner that businesses, particularly,
marketers can perform.
You need to remember the grounds that you will use to process the facts from the
subsequent:

consent

performance of a contract

pleasing a criminal duty

important interests

completing a public task

legitimate interests

special category

criminal offence
For entrepreneurs, it's more greater than probably that you'll want to establish consent
out of your subscribers to market to them. To market to a contact, they need to be
obtained with a double choose-in subscription system. This confirms that the contact
wants to hear from you. it blessings the marketer as the contact has additionally
confirmed that they are interested about the content they're going to be dispatched
If you are but to prepare for GDPR, it's far nicely worth considering how the regulations
will impact your business now. You’ll want to be organized for the implementation of
the new regulations on the 25th may 2018. This will mean changing the way that touch
records is treated on your enterprise.
You can also need to trade the way that statistics is processed as soon as you have got
gathered it.
Page 31 of 37
M.M.M.INSHAF
KAN/A-008235
Downloaded by Keerthu (keerthu481m@gmail.com)
lOMoARcPSD|15864868
(onelogin)
Figure 4
ISO 3100 risk management methodology.
Risk affecting agencies will have outcomes in terms of economic performance and
professional recognition, as well as environmental, protection and societal results.
Therefore, managing with rick correctly allows businesses to carry out nicely in a n
environment full of uncertainty.
ISO 31000:
ISO 31000: risk management – suggestions, affords ideas, framework and a manner for
handling risk. It may be used by any employer regardless of its size, activity or zone.
The use of ISO 31000 can help companies increase the chance of reaching objectives or
goals improve the identity of possibilities and threats and correctly allocate and use
assets for risk treatment.
But, ISO 31000 cannot be used for certification purposes, however does provide
guidance for inner or external audit programmers’. Companies the usage of it could
evaluate their risk management. Practices with a world over known benchmark,
supplying sound ideas for powerful management and company governance.
(iso)
Page 32 of 37
M.M.M.INSHAF
KAN/A-008235
Downloaded by Keerthu (keerthu481m@gmail.com)
lOMoARcPSD|15864868
Task 4:
Task 4.1: Develop a security policy for EMC Cloud to minimize
exploitations and misuses while evaluating the suitability of the tools
used in an organizational policy.
What is Security Policies?
Identifies the guidelines and procedures for all people accessing and the use of a
corporation's IT assets and assets. Effective IT Security policy is a version of the
company’s subculture, wherein rules and tactics are driven from its employees'
technique to their facts and work.
A security policy is a written document in an employer outlining a way to defend the
company from threats, consisting of computer security threats, and how to cope with
situations after they do arise.
Safety policy should identify all of a corporation's assets in addition to all of the
capability threats to those belongings. Organization employees need to be stored
updated on the corporation's security rules. The rules themselves must be updated
regularly as properly
User and Password security policy
A user account policy is a file which outlines the requirements for soliciting for and
preserving an account on pc structures or networks, generally within an enterprise. It is
very critical for huge websites in which users usually have bills on many systems. some
sites have customers study and signal an account policy as a part of the account request
technique.
•
Use an encrypting method to store your password.
•
Yours a password given policy
•
Password ought to by no means be shared with any other character for any cause
•
if an worker believes his password has been compromised, he should right now
contact the it department so his password may be changed.
•
if an worker desires to change his password he should touch it department.
Internet usage policies
Page 33 of 37
M.M.M.INSHAF
KAN/A-008235
Downloaded by Keerthu (keerthu481m@gmail.com)
lOMoARcPSD|15864868
This pattern net utilization coverage applies to all employees of company who have get
entry to computers and the net to be used within the performance of their work. Use of
the net by using employees of company is authorized and endorsed in which such use
helps the desires and objectives of the enterprise. But, access to the internet thru
company is a privilege and all personnel ought to adhere to the policies regarding
computer laptop, e-mail and internet usage. Violation of those regulations ought to
result in disciplinary and/or prison motion leading as much as such as termination of
employment. Employees may also be held individually liable for damages resulting
from any violations of this policy. All employees are required to renowned receipt and
affirm that they have understood and conform to abide by the regulations hereunder.
Page 34 of 37
M.M.M.INSHAF
KAN/A-008235
Downloaded by Keerthu (keerthu481m@gmail.com)
lOMoARcPSD|15864868
Bibliography
hotcomm. (n.d.). Retrieved 11 01, 2018, from www.hotcomm.com:
https://hotcomm.com/FAQ/FAQ_staticIPXP.asp
iso. (n.d.). Retrieved 11 02, 2018, from www.iso.org: https://www.iso.org/iso-31000risk-management.html
Obodoeze, f. c. (2016, October ). researchgate. Retrieved 11 01, 2018, from
www.researchgate.net: https://www.researchgate.net/figure/An-organizations-theApplication-and-database-servers-protected-by-a-Demilitarized-Zone_fig8_322465819
onelogin. (n.d.). Retrieved 11 02, 2018, from www.onelogin.com:
https://www.onelogin.com/compliance/gdpr
Vader, D. (2012, May 05). tomicki. Retrieved 11 01, 2018, from www.tomicki.net:
https://www.tomicki.net/naptd.php
https://searchsecurity.techtarget.com/definition/physical-security [Accessed 31 October
2018]
https://www.careerride.com/Networking-trusted-and-untrusted-networks.aspx[Accessed
31 October 2018]
https://www.greennet.org.uk/support/what-are-benefits-having-dedicated-ip-address
[Accessed 02 November 2018]
https://www.techopedia.com/definition/4099/security-policy[Accessed 01 November
2018]
https://searchsecurity.techtarget.com/definition/security-policy[Accessed 29 October
2018]
https://en.wikipedia.org/wiki/User_account_policy[Accessed 02 November 2018]
https://www.gfi.com/pages/sample-internet-usage-policy [Accessed 02 November 2018]
Page 35 of 37
M.M.M.INSHAF
KAN/A-008235
Downloaded by Keerthu (keerthu481m@gmail.com)
lOMoARcPSD|15864868
Grading Rubric
Grading Criteria
Achieved
Feedback
LO1 Assess risks to IT security
P1 Identify types of security risks to organisations.
P2 Describe organizational security procedures.
M1 Propose a method to assess and treat IT security risks.
LO2 Describe IT security solutions
P3 Identify the potential impact to IT security of incorrect
configuration of firewall policies and thirparty VPNs.
P4 Show, using an example for each, how implementing a DMZ,
static IP and NAT in a network can improve Network Security.
M2 Discuss three benefits to implement network monitoring systems
with supporting reasons.
D1 Investigate how a ‘trusted network’ may be part of an IT security
solution.
LO3 Review mechanisms to control organisational IT
security
M.M.M.INSHAF
Page 36 of 37
KAN/A-008235
Downloaded by Keerthu (keerthu481m@gmail.com)
lOMoARcPSD|15864868
P5 Discuss risk assessment procedures.
P6 Explain data protection processes and regulations as applicable to
an organisation.
M3 Summarise the ISO 31000 risk management methodology and its
application in IT security.
M4 Discuss possible impacts to organizational security resulting
from an IT security audit.
D2 Consider how IT security can be aligned with organisational
policy, detailing the security impact of any misalignment.
LO4 Manage organizational security
P7 Design and implement a security policy for an organisation.
P8 List the main components of an organisational disaster recovery
plan, justifying the reasons for inclusion.
M5 Discuss the roles of stakeholders in the organisation to
implement security audit recommendations.
D3 Evaluate the suitability of the tools used in an organisational
policy.
M.M.M.INSHAF
Page 37 of 37
KAN/A-008235
Downloaded by Keerthu (keerthu481m@gmail.com)
Download