Network Security and Cryptography module. I started with Risk assessment in Task 1, explaining Risk Control in Task 2, Task 3 is a Network Diagram and Maintaining Security in Task 4 as well as Reflective commentary in Task 5.
1. Award: Level 5 Diploma in Computing (L5DC)
Module Title: Network Security and Cryptography
Assignment Title: Together Trust
Examination Cycle: December 2018
Candidate Name: Mojakwe. A Mojakwe
NCC Education Centre: Institute of Development Management,
Botswana
Candidate No: 00173107
Submission Date: 05-11-2018
Marker’s Comment:
Moderator’s comments:
Moderated Mark: ________________ Final mark: _________________________
Network Security and Cryptography December2018
2. _________________________________________________________________________________________
Action.mjk.mojakwe@gmail.com .IDM.2018
Page 1 of 20
STATEMENT AND CONFIRMATION OF OWN WORK
Each NCC Education accessed assignment submitted by you must have this statement attached
to the assignment as cover page or it will not be accepted for marking. Please insure that this
statement is either firmly attached to the cover of the assignment or electronically inserted into
the front of assignment.
Student Declaration
I have read and understood NCC Education’s Policy on Academic Dishonesty and Plagiarism.
I can confirm the following:
Program/Qualification Name: Level 5 Diploma in Computing (L5DC)
Student ID/Registration number: 00173107
Name: Mojakwe A Mojakwe
Centre Name: Institute of Development Management,
Botswana
Module Name: Network Security and Cryptography
Module Leader: Mr. Tadios Munodawafa
Number of words: 1779
I confirm that this is my own work and that I have not plagiarized any part of it. I have read also
noted the assessment criteria and pass mark for assignment.
Due Date: …………………………………………………………..
Student Signature: …………………………………………………………..
Submitted Date: …………………………………………………………..
3. _________________________________________________________________________________________
Action.mjk.mojakwe@gmail.com .IDM.2018
Page 2 of 20
Table of Contents
ACKNOWLEDGEMENTS ...................................................................................................................... 3
INTRODUCTION .................................................................................................................................4
Task 1................................................................................................................................................ 5
A) Electronically held information assets ......................................................................................... 5
B) A Table Listing the Assets............................................................................................................ 5
Task 2................................................................................................................................................ 6
a) Threats and Security Measures ...................................................................................................6
b) ISO27001 and Cyber Essentials Relevance.................................................................................... 8
c) Recommendation....................................................................................................................... 9
Task 3.............................................................................................................................................. 10
a) Network Diagram..................................................................................................................... 10
Task 4.............................................................................................................................................. 13
Task 5.............................................................................................................................................. 14
CONCLUSION................................................................................................................................... 14
REFERENCE...................................................................................................................................... 15
PLAGIARISMREPORT ....................................................................................................................... 17
4. _________________________________________________________________________________________
Action.mjk.mojakwe@gmail.com .IDM.2018
Page 3 of 20
ACKNOWLEDGEMENTS
I would like to thank all those who assisted me in making this project a success. Firstly, I would
like to thank my lecturer Mr. Tadios Munodawafa for all his effort and guidance during the entire
course of this module. My thanks also goes to my classmates for their existence as team working
mates, not forgetting the Almighty God for the time I took for the completion of this assignment.
5. _________________________________________________________________________________________
Action.mjk.mojakwe@gmail.com .IDM.2018
Page 4 of 20
INTRODUCTION
In this assignment I have been tasked for identification of key security challenges, that Together
Trust is faced and make recommendation for solutions, insuring that measures of security are put
into place in most effective way.
Risk assessment of the most valuable information assets, which is divided into tasks in Network
Security and Cryptography module. I started with Risk assessment in Task 1, explaining Risk
Control in Task 2, Task 3 is a Network Diagram and Maintaining Security in Task 4 as well as
Reflective commentary in Task 5.
6. _________________________________________________________________________________________
Action.mjk.mojakwe@gmail.com .IDM.2018
Page 5 of 20
Task 1
A) Electronically held information assets
Patient record data - This information is critical for Trust charity. It's confidentiality,
integrity and availability is of utmost importance.
Financial systems Records – Financial Information that may be required for its
confidentiality and integrity.
Radio and Chemo therapies data – Data kept to avoid ad-hoc decisions in a crisis.
Email - This method of exchanging messages between people using electronic devices
is confidential.
Employees data - HR professionals have a lot to keep track of Healthcare data, and to
stay Checking compliant. Contact information for the employee directory, Social Security
numbers and pay history.
B) A Table Listing the Assets.
Asset
(a)
Threat
(b)
CIA?
(b)
Likelihood
(c)
Impact
(c)
Risk
(d)
Patient personal
data
Disclosure C Medium Low Low
Disk problem A Low Low Very Low
Fire A Low Medium Low
Pseudonymisation
Technical Failure
C Low Medium Low
Financial systems
records
Unauthorised Access I Low Low Very Low
Disclosure C Low Low Very Low
Modifying Data C Low Low Very Low
Radio and Chemo
Therapies Data
Catastrophic damage A Medium Low Low
Fire A Low Medium Low
E-mails Virus and hacking
attacks
I High Low Medium
Ransomware attack C Medium Medium Medium
Spam, Spyware threats C High High Very
High
Employee’s Data Catastrophic damage A Medium Low Low
Identity theft/
Masquerade
I Low Low Very Low
7. _________________________________________________________________________________________
Action.mjk.mojakwe@gmail.com .IDM.2018
Page 6 of 20
Task 2
a) Threatsand Security Measures
Disclosure
Revealing or releasing a private data to an individual who is not authorized to see it.
I recommend that leaders should avoid having conversation over the phone or via e-
mail. Directly talk to a representative face to face (Kroenke & Tingling, 2011).
Disk problem/Corruption
Hard disk Corruption malfunctions can happen anytime due to the phishing emails and
virus attacks downloaded by Together Trust users.
I recommend Onsite and Offsite backups to recover data.
Fire
Fire can cause loss of important information assets in the trust, it may be caused by
lightening or corrupted electric appliance.
Proactive fire prevention programs and proper inspection, testing, and maintenance of
fire detection should be carried out.
Pseudonymisation Technical Failure
Is a technique used to reduce the chance that personal data records and identifiers lead
to the identification of the natural person or data subject, whom they belong to.
General Data Protection Regulation (GDPR) explicitly recommends pseudonymization of
personal data as one of several ways to reduce risks from the perspective of the data
subject (Cédric & Nédélec, 2018).
Unauthorised Access
Someone gaining access to servers or emails, using one’s else's account or other more
method.
Authenticator, hardware or software firewall updates and setting up malware protection
is the best.
Modifying Data
Altering some portion of a legitimate message to produce an unauthorized effect.
Encryption is necessary to ensure integrity (digitalguardian, 2018).
8. _________________________________________________________________________________________
Action.mjk.mojakwe@gmail.com .IDM.2018
Page 7 of 20
Catastrophic-damages
Storms, power-outage, floods, earthquakes, and complete loss of healthcare
infrastructure as well as data systems.
Digitize and back-up duplicate documents, Physical copies need to be also made and
stored on onsite and offsite backups.
Virus and hacking attacks
Unauthorised perpetrator deliberately and knowingly attacks a healthcare infrastructure,
components, data and systems.
Viruses refers programs that are executable, replicating and infecting other programs.
Turning On firewall security, antivirus software, setting up automatic update (Fox News,
2014).
Ransomware attack
It is a kind of malware that encrypts data, blocking access to it until a fee is paid to the
attacker.
Prevention is better that cure, the following best practices will help to prevent
ransomware attacks;
o Security awareness training
o updating devices and systems regularly
o Real-time traffic monitoring
o Reliable secure backups and recovery plan (researchgate, 2018).
Spam, Spyware threats
Spam is a message links sent through the Internet, to large number of emails, with
intention of phishing, advertising, spread of malware.
Spyware is a piece of malware that tricks into installing it by disguising itself as the one
desired.
Together Trust need to install Vulnerability Scanner, Antispyware Firewall and Intrusion
Detection Systems (bullguard, 2018).
Identity theft
Capturing authentication sequences and replay after a valid authentication, enabling
authorisation entity of fewer privilege obtaining extra privileges, by impersonating entity
that has right privilege.
Users should make sure to logout their user accounts after using internet.
Two Factor Authentication (2FA) is needed as an extra layer of protection used to ensure the
security of online accounts beyond just a username and password.
9. _________________________________________________________________________________________
Action.mjk.mojakwe@gmail.com .IDM.2018
Page 8 of 20
b) ISO27001and Cyber Essentials Relevance
ISO/IEC 27001 is International Standard for Implementing Information Security Management
System (ISMS), while Cyber Essentials guard against the common cyber threats, demonstrating
commitment to cyber security.
1. Risk Management
Regularly review of risk management registers, agreeing with the board for appropriate
measures basically on costs benefit analysis as well as Trust risk tolerance which
complies to ISO 27001 standard Risk assessment.
2. Secure Configuration
Insures patching of systems, installing anti-virus / anti-malware is updated and running,
which complies to ISO 27001 Security policy.
3. Network Security
Preventing unauthorised access to a network and connected devices, through regular
penetration tests of network, monitoring and filtering content, as well as firewalls.
Relating to ISO 27001 Access Control.
4. Malware Prevention
Producing policies and establishing antimalware defence across the Trust, based on
ISO 27001 Organisation of information Security.
5. Removable Media Control
Manages the use of all removable media.
o Policy-based data encryption
o Port management solutions
o Monitoring and reporting
This relate to Access control, Communications and operations management
on ISO 27001.
6. User Education and Awareness
Ensures employees training, and behaviour expected of them. Complies with ISO 27001
Information systems acquisition, development and maintenance.
7. Managing User Privileges
Insures that all users on the system have the correct access privileges, and access
rights for leavers are removed. Complies with Human resources security on ISO 27001.
8. Incident Management
Insures continuity in the event of cyber-attack. Incident Management Policy, Staff
awareness training, Business continuity planning, Disaster recovery systems and
procedures and Secure offsite backup solutions. Complies with ISO 27001 Information
security incident management.
9. Monitoring
Continuously monitoring all systems and Networks, analysing logs for unusual activity
that could indicate an attack and identify a potential issue before it becomes more
serious. Relates to ISO 27001 Compliance.
10.Home and Mobile Working
Ensuring secure remote access solutions and authentication systems.
Mobile Device Management and Cloud Data Encryption. Complies with new and
updated ISO 27001 2013 standard controls (onboardonline and techtarget, 2018).
12. _________________________________________________________________________________________
Action.mjk.mojakwe@gmail.com .IDM.2018
Page 11 of 20
b) The network diagram at (a) Figure 1 above uses class C private IP address ranging from
192.168.0.0 to 192.168.255.255 and DHCP is used to allocate addresses within the Trust
Charity IP network users.
Also firewalls will be configured such that valid IP address are translated into
the appropriate private address through Network Address Translation (NAT).
The diagram consists of the following subnets;
I. Screened Subnet, hosting only servers that need to allow access to and from the
Internet.
II. Shared Services Subnet, hosting internal DNS, Mail, Web, and File or Print Servers.
Includes NIDS with SPAN configuration to protect the segment services.
III. Application Subnet, providing extra layer of defence against attacks on critical assets.
IV. Management Subnet, defining Access Control Lists (ACLs) on appropriate devices
(e.g. firewalls, switches, routers and hosts) denying administration access by any
device that is not defined to the Subnet.
c) Network design meets the security requirements identified in Tasks 1 & 2 since;
I. Border router is installed generally to be the first line of network defence, to define a
limited set of high level rules in the router’s Access Control List (ACL).
II. De-Militarized Zone (DMZ), containing a hub communicating with a Network Intrusion
Detection System (NIDS) and Bastion host designed and configured to withstand
attacks.
III. Firewall is installed providing a secured network.
IV. Distribution level Routers or the access layer Switches connecting hosts (servers,
workstations) are connected making sure other security features; Port Security, VLANs
can easily be configured, through communication with servers, which is less vulnerable
compared to WIFI.
V. A Screened Subnet DMZ, contains DNS server, web server as well as mail server is
available to protect sensitive organizational systems, resources and blocking the most
casual threats.
Screened subnetwork refers to logical or physical subneting that separate internal local
area network (LAN) from an untrusted networks, usually internet.
Also has a NIDS.
VI. Also has a NIDS installed on Shared Services Subnet, Application Subnet as well as
Screened Subnet which is similar to activated security alarm system, watching for
known behaviours, indicating suspicious activity and systems break-ins. NIDS sensor is
usually connected to a hub, tap, or Switch Port Analyser (SPAN).
14. _________________________________________________________________________________________
Action.mjk.mojakwe@gmail.com .IDM.2018
Page 13 of 20
Task 4
A good policy is to keep computers and wireless network secure to protect Together Trust’s
critical data.
Auditing Network Regularly- Periodic scan should be done in order to identify
unauthorized computers and devices that may have accessed the network through
wireless or directly.
Updating Operating System Patches - Updating Computer Operating System security
patches may help prevent malware and viruses from the Trust data operating system or
network.
Updating Malware Definitions and Antivirus - Making sure and confirming up-to-date
Malware definitions and Antivirus. This protects computer from attacks and maintain the
network security.
Establishing Wireless Devices Policy – Ensuring that devices maintain same security
standards of Trust computers through staff training.
Checking Firewall Security Settings - Ensuring the protection of the Trust from recent
viruses, worms as well as hackers, through firewall settings (Zorro, 2012).
15. _________________________________________________________________________________________
Action.mjk.mojakwe@gmail.com .IDM.2018
Page 14 of 20
Task 5
a) Problems I had and how solved them.
I had challenges throughout this assignment, I had a network issue when i
wanted to do a research which led me to visit different libraries and websites for
more research.
It was difficult to find important points from the research due to the limitation of
words, and I had to paraphrase my assignment based on its requirements.
It was difficult to use MS Visio, Edraw software since it was my first time to use
them. I ended up designing on Adobe Illustrator, designing some icons from
scratch so that I have them as PNG files.
b) If I were to start again, I would definitely do;
Will buy a network router from Orange, so that I do my research even at
home.
Find activated MS Visio and Edraw software for my Diagram.
Design my diagram on A3 paper size so that I can identify more robust
encryption protocols compared to the ones chosen in this article.
CONCLUSION
In conclusion, this assignment gave me a complete knowledge of understanding all Network
Security and Cryptography components, security maintenance, risk control and assessment.
Network Security is used nowadays in order protect or encrypt files or documents
This module gave mea solid foundation in Network Security, Cryptography skills since I am eager
to learn and have advanced technology of Network Security and Cryptography knowledge and
skills.
16. _________________________________________________________________________________________
Action.mjk.mojakwe@gmail.com .IDM.2018
Page 15 of 20
REFERENCE
1. Bullguard (2018). Bullguard security center. [online] Spyware threat to online
privacy. Available from: https://www.bullguard.com/bullguard-security-
center/internet-security/internet-threats/spyware-threat-to-online-privacy.aspx/
[Accessed 27 September 2018].
2. Christopher, J.A. and Audrey, D. (2002). Managing Information Security Risks.
Addison-Wesley Longman Publishing Co., Inc.
3. csoonline (2018). 10 ways to prevent, detect and recover from ransomware and
zero day threats. [online] Ransomware. Available from:
https://www.csoonline.com/article/3287099/ransomware/10-ways-to-prevent-
detect-and-recover-from-ransomware-and-zeroday-threats.html/ [Accessed 27
September 2018].
4. European Union, Data Protection Working Party (2014) Opinion 05/2014:
Anonymisation Techniques. 55654346. Europa: Practical Law. Available from
https://www.pdpjournals.com/docs/88197.pdf [Accessed 17 September 2018].
5. Kroenke, D.M., Gemino, A., Tingling, P. (2011). Experiencing MIS (Third
Canadian Edition). New Jersey: Pearson Education Inc.
6. Ncsc. (2018). Cyber Essentials. [online] National Cyber Security Centre.
Available from: https://www.cyberessentials.ncsc.gov.uk/ [Accessed 23
September 2018].
7. Networkmagazineindia (2018). Identifying and classifying assets. [online]
Security. Available from:
http://www.networkmagazineindia.com/200212/security2.shtml/ [Accessed 27
September 2018].
8. Novastor. (2018). Top 6 data loss causes and top 10 preventions. [online]
Novabackup blog. Available from: http://novabackup.novastor.com/blog/top-6-
data-loss-causes-and-top-10-preventions/ [Accessed 18 September 2018].
17. _________________________________________________________________________________________
Action.mjk.mojakwe@gmail.com .IDM.2018
Page 16 of 20
9. Onboardonline (2018). Industry article index. [online] 10 steps to cyber security.
Available from: https://www.onboardonline.com/industry-article-
index/features/10-steps-to-cyber-security/ [Accessed 29 September 2018].
10.Researchgate. (2018). Ransomware attacks detection, prevention and cure.
[online] ResearchGate Publication. Available from:
https://www.researchgate.net/publication/308736523_Ransomware_attacks_det
ection_prevention_and_cure [accessed Sep 19 2018].
11.S3 amazonaws. (2018). Risk Terminology [online]. Emerald Group Publishing
Limited. Available from: https://ss-
usa.s3.amazonaws.com/c/308451531/media/58a2f1495f44c/Risk-
Terminology.pdf [Accessed 7 September 2018].
12.strengtheningnonprofits (2018). Resources. [online] Managing crisis. Available
from: http://www.strengtheningnonprofits.org/resources/e-
learning/online/managingcrisis/default.aspx?chp=4/ [Accessed 28 September
2018].
13.Techtarget (2018). Definition. [online] ISO-27001. Available from:
https://whatis.techtarget.com/definition/ISO-27001/ [Accessed 27 September
2018].
18. _________________________________________________________________________________________
Action.mjk.mojakwe@gmail.com .IDM.2018
Page 17 of 20
PLAGIARISM REPORT
Turnitin Originality Report
Processed on: 29-Oct-2018 10:04SAST
ID: 1028292225
Word Count: 1920
Submitted: 3
NSC ASSIGNMENT By Mojakwe Mojakwe
Similarity Index
3%
Similarityby Source
Internet Sources:
N/A
Publications:
N/A
Student Papers:
3%
include quoted exclude bibliography exclude small matches dow nload print
mode:
quickview (classic) report
1% match (student papers from 07-Oct-2015)
Submitted to KMD Computer Center on 2015-10-07
1% match (student papers from 10-Jan-2017)
Submitted to Softwarica College of IT & E-Commerce on 2017-01-10
1% match (student papers from 30-Jun-2018)
Submitted to Champlain College on 2018-06-30
1% match (student papers from 05-May-2017)
Submitted to KMD Computer Center on 2017-05-05
INTRODUCTION In this assignment I have been tasked for identification of key security
challenges, that Together Trust is faced and make recommendation for solutions, insuring
that measures of security are put into place in most effective way. Risk assessment of the
most valuable information assets, which is divided into tasks in Network Security and
Cryptography module. I started with Risk assessment in Task 1, explaining Risk Control in
Task 2, Task 3 is a Network Diagram and Maintaining Security in Task 4 as well as
Reflective commentary in Task 5. A) Electronically held information assets ? Patient record
data - This information is critical for Trust charity. It's confidentiality, integrity and availability
is of utmost importance. ? Financial systems Records – Financial Information that may be
required for its confidentiality and integrity. ? Radio and Chemo therapies data – Data kept
to avoid ad-hoc decisions in a crisis. ? Email - This method of exchanging messages
between people using electronic devices is confidential. ? Employees data - HR
professionals have a lot to keep track of Healthcare data, and to stay Checking compliant.
Contact information for the employee directory, Social Security numbers and pay history. B)
A Table Listing the Assets. Asset (a) Threat (b) CIA? (b) Likelihood (c) Impact (c) Risk (d)
Patient personal Disclosure C Medium Low Low data Disk problem A LowLow Very Low
Fire A Low Medium Low Pseudonymisation Technical Failure C Low Medium Low
Financial systems Unauthorised Access I Low Low Very Low records Disclosure C Low
Low Very Low Modifying Data C Low Low Very Low Radio and Chemo Catastrophic
damage A Medium Low LowTherapies Data Fire A Low Medium Low E-mails Virus and
hacking attacks I High Low Medium Ransomware attack C Medium Medium Medium
Spam, Spyware threats C High High Very High Employee’s Data Catastrophic damage A
Medium Low Low Identity theft/ Masquerade I Low Low Very Low a) Threats and Security
Measures Disclosure • Revealing or releasing a private data to an individual who is not
19. _________________________________________________________________________________________
Action.mjk.mojakwe@gmail.com .IDM.2018
Page 18 of 20
authorized to see it. • I recommend that leaders should avoid having conversation over the
phone or via e- mail. Directly talk to a representative face to face (Kroenke & Tingling,
2011). Disk problem/Corruption • Hard disk Corruption malfunctions can happen anytime
due to the phishing emails and virus attacks downloaded by Together Trust users. • I
recommend Onsite and Offsite backups to recover data. Fire • Fire can cause loss of
important information assets in the trust, it may be caused by lightening or corrupted electric
appliance. • Proactive fire prevention programs and proper inspection, testing, and
maintenance of fire detection should be carried out. Pseudonymisation Technical Failure •
Is a technique used to reduce the chance that personal data records and identifiers lead to
the identification of the natural person or data subject, whom they belong to. • General Data
Protection Regulation (GDPR) explicitly recommends pseudonymization of personal data as
one of several ways to reduce risks from the perspective of the data subject (Cédric &
Nédélec, 2018). Unauthorised Access Someone gaining access to servers or emails, using
one’s else's account or other more method. • Authenticator, hardware or software firewall
updates and setting up malware protection is the best. Modifying Data • Altering some
portion of a legitimate message to produce an unauthorized effect. • Encryption is
necessary to ensure integrity (digitalguardian, 2018). Catastrophic-damages • Storms,
power-outage, floods, earthquakes, and complete loss of healthcare infrastructure as well
as data systems. • Digitize and back-up duplicate documents, Physical copies need to be
also made and stored on onsite and offsite backups. Virus and hacking attacks •
Unauthorised perpetrator deliberately and knowingly attacks a healthcare infrastructure,
components, data and systems. Viruses refers programs that are executable, replicating
and infecting other programs. • Turning On firewall security, antivirus software, setting up
automatic update (foxnews, 2014). Ransomware attack • It is a kind of malware that
encrypts data, blocking access to it until a fee is paid to the attacker. • Prevention is better
that cure, the following best practices will help to prevent ransomware attacks; o Security
awareness training o updating devices and systems regularly o Real-time traffic monitoring
o Reliable secure backups and recovery plan (researchgate, 2018). Spam, Spyware threats
• Spam is a message links sent through the Internet, to large number of emails, with
intention of phishing, advertising, spread of malware. Spyware is a piece of malware that
tricks into installing it by disguising itself as the one desired. • Together Trust need to install
Vulnerability Scanner, Antispyware Firewall and Intrusion Detection Systems (bullguard,
2018). Identity theft • Capturing authentication sequences and replay after a valid
authentication, enabling authorisation entity of fewer privilege obtaining extra privileges, by
impersonating entity that has right privilege. • Users should make sure to logout their user
accounts after using internet. Two Factor Authentication (2FA) is needed as an extra layer
of protection used to ensure the security of online accounts beyond just a username and
password. b) ISO27001 and Cyber Essentials Relevance ISO/IEC 27001 is International
Standard for Implementing Information Security Management System (ISMS), while Cyber
Essentials guard against the common cyber threats, demonstrating commitment to cyber
security. 1. Risk Management Regularly review of risk management registers, agreeing with
the board for appropriate measures basically on costs benefit analysis as well as Trust risk
tolerance which complies to ISO 27001 standard Risk assessment. 2. Secure Configuration
Insures patching of systems, installing anti-virus / anti-malware is updated and running,
which complies to ISO 27001 Security policy. 3. Network Security Preventing unauthorised
access to a network and connected devices, through regular penetration tests of network,
monitoring and filtering content, as well as firewalls. Relating to ISO 27001 Access Control.
4. Malware Prevention Producing policies and establishing antimalware defence across the
Trust, based on ISO 27001 Organisation of information Security. 5. Removable Media
Control Manages the use of all removable media. o Policy-based data encryption o Port
management solutions o Monitoring and reporting This relate to Access control,
Communications and operations management on ISO 27001. 6. User Education and
Awareness Ensures employees training, and behaviour expected of them. Complies with
ISO 27001 Information systems acquisition, development and maintenance. 7. Managing
User Privileges Insures that all users on the system have the correct access privileges, and
20. _________________________________________________________________________________________
Action.mjk.mojakwe@gmail.com .IDM.2018
Page 19 of 20
access rights for leavers are removed. Complies with Human resources security on ISO
27001. 8. Incident Management Insures continuity in the event of cyber-attack. Incident
Management Policy, Staff awareness training, Business continuity planning, Disaster
recovery systems and procedures and Secure offsite backup solutions. Complies with ISO
27001 Information security incident management. 9. Monitoring Continuously monitoring all
systems and Networks, analysing logs for unusual activity that could indicate an attack and
identify a potential issue before it becomes more serious. Relates to ISO 27001
Compliance. 10. Home and Mobile Working Ensuring secure remote access solutions and
authentication systems. Mobile Device Management and Cloud Data Encryption. Complies
with new and updated ISO 27001 2013 standard controls (onboardonline and techtarget,
2018). c) Recommendation 1. Encryption Together Trust needs to be encrypted using
S/MIME encryption process, which supports encryption of emails through public key
technology; Message-Integrity, Authentication, email Privacy Data Security. For wireless,
using the Wi-Fi protected Access (WPA-2) including AES which is considered a stronger
algorithm. a) Network Diagram b) The network diagram at (a) Figure 1 above uses class C
private IP address ranging from 192.168.0.0 to 192.168.255.255 and DHCP is used to
allocate addresses within the Trust Charity IP network users. Also firewalls will be
configured such that valid IP address are translated into the appropriate private address
through Network Address Translation (NAT). The diagram consists of the following subnets;
I. Screened Subnet, hosting only servers that need to allow access to and from the Internet.
II. Shared Services Subnet, hosting internal DNS, Mail, Web, and File or Print Servers.
Includes NIDS with SPAN configuration to protect the segment services. III. IV. Application
Subnet, providing extra layer of defence against attacks on critical assets. Management
Subnet, defining Access Control Lists (ACLs) on appropriate devices (e.g. firewalls,
switches, routers and hosts) denying administration access by any device that is not defined
to the Subnet. c) Network design meets the security requirements identified in Tasks 1 & 2
since; I. Border router is installed generally to be the first line of network defence, to define
a limited set of high level rules in the router’s Access Control List (ACL). II. De-Militarized
Zone (DMZ), containing a hub communicating with a Network Intrusion Detection System
(NIDS) and Bastion host designed and configured to withstand attacks. III. IV. V. VI. VII.
Firewall is installed providing a secured network. Distribution level Routers or the access
layer Switches connecting hosts (servers, workstations) are connected making sure other
security features; Port Security, VLANs can easily be configured, through communication
with servers, which is less vulnerable compared to WIFI. A Screened Subnet DMZ, contains
DNS server, web server as well as mail server is available to protect sensitive
organizational systems, resources and blocking the most casual threats. Screened
subnetwork refers to logical or physical subneting that separate internal local area network
(LAN) from an untrusted networks, usually internet. Also has a NIDS. Also has a NIDS
installed on Shared Services Subnet, Application Subnet as well as Screened Subnet which
is similar to activated security alarm system, watching for known behaviours, indicating
suspicious activity and systems break-ins. NIDS sensor is usually connected to a hub, tap,
or Switch Port Analyser (SPAN). The Console installed at Management Subnet, used for
remote administration of device or hosts in the other various subnets. Ideally SSH or Telnet
(through a VPN) would be used for the remote administration of network devices (Margaret
Rouse & Shricha, 2015). A good policy is to keep computers and wireless network secure to
protect Together Trust’s critical data. ? Auditing Network Regularly - Periodic scan should
be done in order to identify unauthorized computers and devices that may have accessed
the network through wireless or directly. ? Updating Operating System Patches - Updating
Computer Operating System security patches may help prevent malware and viruses from
the Trust data operating system or network. ? Updating Malware Definitions and Antivirus -
Making sure and confirming up-to-date Malware definitions and Antivirus. This protects
computer from attacks and maintain the network security. ? Establishing Wireless Devices
Policy – Ensuring that devices maintain same security standards of Trust computers
through staff training. ? Checking Firewall Security Settings - Ensuring the protection of the
Trust from recent viruses, worms as well as hackers, through firewall settings (Zorro, 2012).
21. _________________________________________________________________________________________
Action.mjk.mojakwe@gmail.com .IDM.2018
Page 20 of 20
a) Problems I had and how solved them. I had challenges throughout this assignment, I had
a network issue when i wanted to do a research which led me to visit different libraries and
websites for more research. It was difficult to find important points from the research due to
the limitation of words, and I had to paraphrase my assignment based on its requirements.
It was difficult to use MS Visio, Edraw software since it was my first time to use them. I
ended up designing on Adobe Illustrator, designing some icons from scratch so that I have
them as PNG files. b) If I were to start again, I would definitely do; ? Will buy a network
router from Orange, so that I do my research even at home. ? Find activated MS Visio and
Edraw software for my Diagram. ? Design my diagram on A3 paper size so that I can
identify more robust encryption protocols compared to the ones chosen in this article. Task
1 Task 2 Task 3 Task 4 Task 5