Uploaded by Kamlesh Kumar

Unit 5 Assignment (Spring 2022)

advertisement
Pearson
Higher National in
Computing
Unit 5: Security
ASSIGNMENT
BRIEF
This
This Assignment
Assignment Brief
Brief is
is the
the property
property of
of
THE
MILLENNIUM
UNIVERSITY
COLLEGE
THE MILLENNIUM UNIVERSITY COLLEGE
Higher National Certificate/Diploma in Computing
Assignment Brief
Pearson Reg. Number
Student Name
Academic Year
Unit 5: Security
2021-22
Unit Tutor
Zoha Farooq
Assignment Title
Computer System Security, Policies and Procedures
Issue Date
7-Mar-2022
Submission Date
29-May-2022
Unit Number and Title
Submitted On
Internally Verified?
IV Name
 Yes
 No
Mir Wajid Ali
18-Dec-2021
IV Date
Student Declaration
I solemnly declare that the work submitted for this assignment is my own and research sources
are fully acknowledged.
Student Signature:
Date:
Tutor Signature:
Date:
Submission Format
The submission is in the form of one individual report and two policy documents. Report should
be written in a concise, formal business style using single spacing and font size 12. You are
required to make use of headings, paragraphs, subsections and illustrations as appropriate, and
all work must be supported with research and referenced using the Harvard referencing system.
Please also provide a bibliography using the Harvard referencing system. You are required to
submit your work for plagiarism checking. No work will be considered if it contains plagiarism
more than the acceptable level defined as per TMUC’s plagiarism policy:
The individual report will be titled as “Managing IT Security of an Organization” and it will
contain the complete evidences for both the Part 1 and Part 2, and will contain a partial
evidence for Part 3. The evidences required in the report are:
Part 1
A dedicated section in your report having title “IT Security Risks and Procedures” comprising
the evidence as per the requirements given under the scenario. The recommended word count
for this Part is 1500 words but there is no penalty on exceeding this word count.
Part 2
A dedicated section in your report having title “ISO 31000 Risk Management Methodologies”
This Assignment Brief is the property of
THE MILLENNIUM UNIVERSITY COLLEGE
comprising the evidence as per the requirements given under the scenario. The recommended
word count for this Part is 1500 words but there is no penalty on exceeding this word count.
Part 3
In this part, you will create a dedicated section in your report having title “Roles of
Stakeholders in Implementing IT Security in an Organization” comprising the evidence as
per the requirements given under the scenario. The recommended word count for this Part is
1000 words but there is no penalty on exceeding this word count.
Beside, this section in the report, you will create two individual policy documents having
titles “IT Security Policy for BISE” and “Disaster Recovery Plan for BISE”. Both the policies
will carry a formal policy structure having, Introduction, Purpose, Body of the Policy, Policy
Owner, Sign off. Body of the policy will carry the major information about the policy. The
recommended word count for each policy is 1000 words but there is no penalty on exceeding
this word count.
Unit Learning Outcomes:
LO1 Assess risks to IT security
LO2 Describe IT security solutions
LO3 Review mechanisms to control organisational IT security
LO4 Manage organisational security
Assignment Brief and Guidance:
CrypTech Inc. is a digital security company that provides security consultancy and implementation
services to the IT industry in Pakistan. The company is a multi-segment organization comprising
of organizational units of Forensics, Offensive Security, Information Security Management and
Audits, and Secure Development. All these units are extensively working in the field of
Information and Digital Security.
You have recently joined CrypTech as a Trainee IT Security Specialist and currently you are
associated with the Information Security Management Unit. This unit has been involved in the
development of IS policies and procedures and risk assessment for various organizations followed
by their deployment and onwards, their audit. You are currently working with Information
Security Management group of the unit.
Part 1
Your unit has been given a new client organization “Board of Intermediate & Secondary
Education”. The client is a government entity managing educational programs for SSC and HSSC.
The client manages all the data digitally, however, it is experiencing some anomalies in their
digital processes and are doubtful that there is some sort of tempering to their records is
happening either internally or externally. The organization has decided to seek your company’s
expertise in this regard and desire to develop and implement a proper information security system
in their organization.
In this regard, your team lead has assigned you the responsibility to come up with the
list of renowned potential security risks and best possible mitigating procedures used
by the organizations. Assess the client’s organization against these potential risks using
appropriate risk assessment methodology of your own choice i.e. ISO 27001.
Furthermore, from preliminary discussion with the client’s technical team, it is observed that:
This Assignment Brief is the property of
THE MILLENNIUM UNIVERSITY COLLEGE


organization has implemented a 3rd Party VPN (CISCO) to connect its main office with 2
branch offices securely and has also implemented a network Firewall (CISCO)
they have an in-house Webserver hosted within the network which is directly accessible
from both the internet and the intranet at the same time.
In this regard, your team lead has assigned you the responsibility to analyze these
observations and come up with the possibilities where any misconfiguration to VPN and
Firewall may have a potential impact on the organizations IT Security and whether
implementing a Webserver directly connected to both the public and private networks
at the same time is recommended or not. If not, then do share, the best approaches
(i.e. DMZ, Static IP, NAT) that can ensure the security of the organization’s data. Also,
suggest how the implementation of Network Monitoring Systems will be beneficial for
organization’s security.
Suggest and give a conclusive and justified review of minimum three physical and three
virtual security measures that you feel, will be helpful for the client organization to
ensure the integrity of its IT security.
Part 2
The contract has been signed between the client and your company, and you are part of the
project team.
The client has asked about how your team will be taking up this project and, in this regard,
your team lead has tasked you to develop a report where you will cover the following aspects
to support client for developing a proper understanding about the Information Security
Management and Audits:
How the Risk assessment procedures defined in ISO 31000 risk management
methodology are effective in assessing organizational risks and how this standard plays
an effective role in the IT security?
Since the client’s organization is directly handling the public information, which is
extremely critical in nature hence, Data Protection processes needs to be applied to
ensure compliance with the relevant regulations i.e. Data Protection Act.
Security Policy and Organizational Policy, sometimes contradict with eachother and in
this regard, how an organization can align its security policy with its organizational
policy and managing any misalignment through IT Security Audits?
Part 3
The audit of the client’s IT infrastructure with regards to Information Security has been
completed and now your team has developed the Security Policy and disaster recovery plan to
be implemented in the client’s organization.
In this regard, you team lead has assigned you the responsibility to identify the
stakeholders and assign them the roles, and finalizing the security policy and detailed
disaster recovery plans, so that the same can be discusses, agreed and implemented
along with the suitable tools that will ensure security of the organization.
Please access HN Global for additional resources support and reading for this unit. For further
guidance and support on report writing please refer to the Study Skills Unit on HN Global.
Link to www.highernationals.com
This Assignment Brief is the property of
THE MILLENNIUM UNIVERSITY COLLEGE
Grading Criteria
Learning Outcome
Pass
LO1 Assess risks to IT P1 Identify types of
security
security risks to
organisations.
Merit
M1 Propose a method
to assess and treat IT
security risks.
P2 Describe
organisational security
procedures.
LO2 Describe IT
security solutions
P3 Identify the
potential impact to IT
security of incorrect
configuration of
firewall policies and
third-party VPNs.
M2 Discuss three
benefits to implement
network monitoring
systems with supporting
reasons.
Distinction
D1 Evaluate a
minimum of three
physical and virtual
security measures
that can be
employeed to ensure
the integrity of the
organizational
security.
P4 Show, using an
example for each, how
implementing a DMZ,
static IP and NAT in a
network can improve
Network Security.
LO3 Review
P5 Discuss risk
M3 Summarise the ISO
mechanisms to
assessment procedures. 31000 risk management
control organisational
methodology and its
IT security
application in IT
P6 Explain data
security.
protection processes
and regulations as
applicable to an
M4 Discuss possible
organisation.
impacts to
organisational security
resulting from an IT
security audit.
D2 Consider how IT
security can be
aligned with
organisational policy,
detailing the security
impact of any
misalignment.
LO4 Manage
organisational
security
D3 Evaluate the
suitability of the tools
used in an
organisational policy
P7 Design and
implement a security
policy for an
organisation.
P8 List the main
components of an
organisational disaster
recovery plan,
justifying the reasons
for inclusion.
M5 Discuss the roles of
stakeholders in the
organisation to
implement security
audit
recommendations.
This Assignment Brief is the property of
THE MILLENNIUM UNIVERSITY COLLEGE
Download