SlideShare a Scribd company logo
1 of 1
Download to read offline
You've been hired as a network and information security officer for a private IT security firm
that offers private and public clients security services and expertise. You've been given the task
of providing network and information security to a company that deals with data communication
and e-commerce. Because their business is rapidly expanding, they must develop effective
network security strategies because: Security breaches can be extremely costly in terms of
business disruption and potential financial losses. Increasing amounts of sensitive data are being
exchanged over the internet or intranets that are connected to it. It was discovered that hackers
were attempting to take advantage of the company's less technical employees. As a result, the
organisation has asked you to supply a complete security solution. Available Assets: Information
assets - Databases: Contains information critical to your business. - Data files: Information stored
within file outside of a database. Software assets - Application software: Implements business
processes. - System software: Operating Systems, Mobile OS', VOIP, Firewall etc. Physical
assets - Computer equipment: Desktops, laptops, phones, servers. - Communication equipment:
PBX, POP gateway, routers, switches. - Storage media: Off/on site backup media, software
inventory, etc. - Technical equipment: UPS, server racks, wiring closet(s), etc. - Security
equipment: Firewall. Your company carried out the security risk assessment for the hazard
identification, risk analysis, and risk evaluation based on the available assets. As a result, they
identified several threats: 1) Database threats a. Credential threats b. Privilege Threats c. System
Threats i. SQL injections ii. Cloud 2) Network Security Threats a. Network Ransomware Attacks
b. Denial of Service Attacks
c. Identity Spoofing d. SSL/TLS Attacks e. Penetration Testing f. Browser Attacks Based on the
security risk assessment, your task is to create a report that includes the following information:
Purpose of the Project (Background) Based on your company's Risk assessment, justify and
answer the following questions - Explain briefly about the identified threats (any two from each
identified threats) Based on the identified threats, explain the possible consequences of failing to
manage threats. Propose
Solution
Overview of Security Mechanism Propose a solution, which employs a security mechanism
including, cryptographic algorithms, network access control and other possible security
solutions. Justify the selection of your security mechanism. Explain how the company will
maintain the security (security policies), considering the CIA triads. The company has both
software and hardware firewalls. Explain the purpose of having both firewalls. Conclusion

More Related Content

Similar to Youve been hired as a network and information security officer for a.pdf

Honeypots for Cloud Providers - SDN World Congress
Honeypots for Cloud Providers - SDN World CongressHoneypots for Cloud Providers - SDN World Congress
Honeypots for Cloud Providers - SDN World Congress
Vallie Joseph
ย 
ME Information Security
ME Information SecurityME Information Security
ME Information Security
Mohamed Monsef
ย 
Security Awareness Training by Fortinet
Security Awareness Training by FortinetSecurity Awareness Training by Fortinet
Security Awareness Training by Fortinet
Atlantic Training, LLC.
ย 
Network security model.pptx
Network security model.pptxNetwork security model.pptx
Network security model.pptx
ssuserd24233
ย 
CIA-Triad-Presentation.pdf
CIA-Triad-Presentation.pdfCIA-Triad-Presentation.pdf
CIA-Triad-Presentation.pdf
BabyBoy55
ย 

Similar to Youve been hired as a network and information security officer for a.pdf (20)

security onion
security onionsecurity onion
security onion
ย 
IoT Threat Intel - Steppa
IoT Threat Intel - SteppaIoT Threat Intel - Steppa
IoT Threat Intel - Steppa
ย 
Honeypots for Cloud Providers - SDN World Congress
Honeypots for Cloud Providers - SDN World CongressHoneypots for Cloud Providers - SDN World Congress
Honeypots for Cloud Providers - SDN World Congress
ย 
PROJECT REPORT.docx
PROJECT REPORT.docxPROJECT REPORT.docx
PROJECT REPORT.docx
ย 
SMB Network Security Checklist
 SMB Network Security Checklist SMB Network Security Checklist
SMB Network Security Checklist
ย 
Cisa ransomware guide
Cisa ransomware guideCisa ransomware guide
Cisa ransomware guide
ย 
Skillmine-InfoSecurity-VAPT-V.2.
Skillmine-InfoSecurity-VAPT-V.2.Skillmine-InfoSecurity-VAPT-V.2.
Skillmine-InfoSecurity-VAPT-V.2.
ย 
ME Information Security
ME Information SecurityME Information Security
ME Information Security
ย 
Data Leakage Prevention
Data Leakage Prevention Data Leakage Prevention
Data Leakage Prevention
ย 
Splunk for Security Breakout Session
Splunk for Security Breakout SessionSplunk for Security Breakout Session
Splunk for Security Breakout Session
ย 
Cloud Computing & Security
Cloud Computing & SecurityCloud Computing & Security
Cloud Computing & Security
ย 
Guard Era Security Overview Preso (Draft)
Guard Era Security Overview Preso (Draft)Guard Era Security Overview Preso (Draft)
Guard Era Security Overview Preso (Draft)
ย 
Security Awareness Training by Fortinet
Security Awareness Training by FortinetSecurity Awareness Training by Fortinet
Security Awareness Training by Fortinet
ย 
Network security model.pptx
Network security model.pptxNetwork security model.pptx
Network security model.pptx
ย 
So You Want a Job in Cybersecurity
So You Want a Job in CybersecuritySo You Want a Job in Cybersecurity
So You Want a Job in Cybersecurity
ย 
cybersecurity-careers.pdf
cybersecurity-careers.pdfcybersecurity-careers.pdf
cybersecurity-careers.pdf
ย 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
ย 
nullcon 2011 - Enterprise Paradigm for Controlling Data Leakage
nullcon 2011 - Enterprise Paradigm for Controlling Data Leakagenullcon 2011 - Enterprise Paradigm for Controlling Data Leakage
nullcon 2011 - Enterprise Paradigm for Controlling Data Leakage
ย 
CIA-Triad-Presentation.pdf
CIA-Triad-Presentation.pdfCIA-Triad-Presentation.pdf
CIA-Triad-Presentation.pdf
ย 
Criminal IP ASM | Threat Intelligence-based Automated Attack Surface Managem...
Criminal IP ASM | Threat Intelligence-based  Automated Attack Surface Managem...Criminal IP ASM | Threat Intelligence-based  Automated Attack Surface Managem...
Criminal IP ASM | Threat Intelligence-based Automated Attack Surface Managem...
ย 

More from familycitymen

What contributed to the increase in Caterpillars earnings per share .pdf
What contributed to the increase in Caterpillars earnings per share .pdfWhat contributed to the increase in Caterpillars earnings per share .pdf
What contributed to the increase in Caterpillars earnings per share .pdf
familycitymen
ย 
(0)This activity is important because, as a manager, you must .pdf
(0)This activity is important because, as a manager, you must .pdf(0)This activity is important because, as a manager, you must .pdf
(0)This activity is important because, as a manager, you must .pdf
familycitymen
ย 

More from familycitymen (6)

your instructor for approval. 2. Using Microsoft Office Powerpoint 20.pdf
your instructor for approval. 2. Using Microsoft Office Powerpoint 20.pdfyour instructor for approval. 2. Using Microsoft Office Powerpoint 20.pdf
your instructor for approval. 2. Using Microsoft Office Powerpoint 20.pdf
ย 
You are concerned about encryption and ransomware on server fil.pdf
You are concerned about encryption and ransomware on server fil.pdfYou are concerned about encryption and ransomware on server fil.pdf
You are concerned about encryption and ransomware on server fil.pdf
ย 
What is the significance of authentication It allows access to resou.pdf
What is the significance of authentication It allows access to resou.pdfWhat is the significance of authentication It allows access to resou.pdf
What is the significance of authentication It allows access to resou.pdf
ย 
What is important when planning a large meeting or event all of t.pdf
What is important when planning a large meeting or event all of t.pdfWhat is important when planning a large meeting or event all of t.pdf
What is important when planning a large meeting or event all of t.pdf
ย 
What contributed to the increase in Caterpillars earnings per share .pdf
What contributed to the increase in Caterpillars earnings per share .pdfWhat contributed to the increase in Caterpillars earnings per share .pdf
What contributed to the increase in Caterpillars earnings per share .pdf
ย 
(0)This activity is important because, as a manager, you must .pdf
(0)This activity is important because, as a manager, you must .pdf(0)This activity is important because, as a manager, you must .pdf
(0)This activity is important because, as a manager, you must .pdf
ย 

Recently uploaded

Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
ย 

Recently uploaded (20)

Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
ย 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
ย 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
ย 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
ย 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
ย 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
ย 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
ย 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
ย 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
ย 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
ย 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
ย 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
ย 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
ย 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
ย 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
ย 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
ย 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
ย 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
ย 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
ย 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
ย 

Youve been hired as a network and information security officer for a.pdf

  • 1. You've been hired as a network and information security officer for a private IT security firm that offers private and public clients security services and expertise. You've been given the task of providing network and information security to a company that deals with data communication and e-commerce. Because their business is rapidly expanding, they must develop effective network security strategies because: Security breaches can be extremely costly in terms of business disruption and potential financial losses. Increasing amounts of sensitive data are being exchanged over the internet or intranets that are connected to it. It was discovered that hackers were attempting to take advantage of the company's less technical employees. As a result, the organisation has asked you to supply a complete security solution. Available Assets: Information assets - Databases: Contains information critical to your business. - Data files: Information stored within file outside of a database. Software assets - Application software: Implements business processes. - System software: Operating Systems, Mobile OS', VOIP, Firewall etc. Physical assets - Computer equipment: Desktops, laptops, phones, servers. - Communication equipment: PBX, POP gateway, routers, switches. - Storage media: Off/on site backup media, software inventory, etc. - Technical equipment: UPS, server racks, wiring closet(s), etc. - Security equipment: Firewall. Your company carried out the security risk assessment for the hazard identification, risk analysis, and risk evaluation based on the available assets. As a result, they identified several threats: 1) Database threats a. Credential threats b. Privilege Threats c. System Threats i. SQL injections ii. Cloud 2) Network Security Threats a. Network Ransomware Attacks b. Denial of Service Attacks c. Identity Spoofing d. SSL/TLS Attacks e. Penetration Testing f. Browser Attacks Based on the security risk assessment, your task is to create a report that includes the following information: Purpose of the Project (Background) Based on your company's Risk assessment, justify and answer the following questions - Explain briefly about the identified threats (any two from each identified threats) Based on the identified threats, explain the possible consequences of failing to manage threats. Propose Solution Overview of Security Mechanism Propose a solution, which employs a security mechanism including, cryptographic algorithms, network access control and other possible security solutions. Justify the selection of your security mechanism. Explain how the company will maintain the security (security policies), considering the CIA triads. The company has both software and hardware firewalls. Explain the purpose of having both firewalls. Conclusion