Ngoc-ASM1-Security.pdf - Qualification BTEC Level 5 HND...

This preview shows page 1 - 6 out of 31 pages.

1 Qualification BTEC Level 5 HND Diploma in Computing Unit number and title Unit 5: Security Submission date 10/23/2019 Date Received 1st submission Re-submission Date Date Received 2nd submission Student Name Do Minh Ngoc Student ID BHAF180239 Class BHAF-1810-2.1 Assessor name Le Van Thuan Student declaration I certify that the assignment submission is entirely my own work and I fully understand the consequences of plagiarism. I understand that making a false declaration is a form of malpractice. Student’s signature Ngoc Grading grid P1 P2 P3 P4 M1 M2 D1
2 Summative Feedback: Resubmission Feedback: Grade: Assessor Signature: Date: Signature & Date:
3 Contents I. Introduction. ......................................................................................................................................... 4 II. Identify types of security risk to organizations. .................................................................................... 5 1. Internet and network attacks. .......................................................................................................... 5 1.1. Malware: ................................................................................................................................... 5 1.2. Botnets. ..................................................................................................................................... 9 1.3. Backdoors. ................................................................................................................................. 9 1.4. Denial of Service (DoS) attacks and Distributed Denial of Service (DDoS). ............................ 10 1.5. Spoofing. ................................................................................................................................. 11 2. Unauthorized access and use. ........................................................................................................ 11 3. Hardware theft. ............................................................................................................................... 15 4. Software theft. ................................................................................................................................ 15 5. Information theft. ........................................................................................................................... 16 6. System failure. ................................................................................................................................ 16 III. Describe organizational security procedures .................................................................................. 17 IV. Propose a method to assess and treat Information Technology (IT) risks. .................................... 19 V. Identify the potential impact to IT security of incorrect configuration of firewall policies and third- party VPNs ................................................................................................................................................... 21 1. Definition: ....................................................................................................................................... 21 2. The purpose of firewall and VPN: ................................................................................................... 21 3. The impact of incorrect configuration of firewall policies and third-party VPNs to IT security. .... 21 VI. Show, using an example for each, how implementing a demilitarized zone (DMZ), static IP and Network Address Translation (NAT) in a network can improve Network Security. ................................... 22 1. DMZ: ................................................................................................................................................ 22 2. Static IP: .......................................................................................................................................... 25 3. NAT: ................................................................................................................................................. 25 VII. Discuss three benefits to implement network monitoring systems with supporting reasons. ...... 27 1. Definition. ....................................................................................................................................... 27 2. The benefits. ................................................................................................................................... 27 VIII. Investigate how a ‘trusted network’ may be part of an IT security solution. ................................. 28 IX. Conclusion. ...................................................................................................................................... 30 X. References. ......................................................................................................................................... 31
4 I. Introduction. Nowadays, with the rapid development speed of information technology, most of the information of organizations and individuals is stored on computer and server systems. The increasingly demanding practice of operating environment needs to share its information with others online. However, new problems arise that are important information that is located on servers or on the transmission line that can be stolen, modified or counterfeited. The ways of network attacks are increasingly sophisticated and complex. That can seriously affect the activities of agencies, organizations and individuals. In this assignment, a variety types of security risks to organization are identified. Moreover, the descriptions of organizational security procedure are also shown. In addition, this assignment also identifies the potential impact to IT security of incorrect configuration of firewall policies and third-party VPNs. Finally, this assignment shows, how implementing a DMZ, static IP and NAT in a network can improve Network Security with examples.
5 II. Identify types of security risk to organizations.

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture