CIS098-2 Operational Information Security Management Assignment – Bedfordshire University UK.

Subject Code & Title : CIS098-2 Operational Information Security Management
Assignment number and title : Assignment 1 – Modelo T&T Case Study v2.0
Assessment type : Artefact
Weighting of assessment : 60%
Unit learning outcomes :
1. Demonstrate the following knowledge and understanding

Provide an advanced understanding of knowledge and awareness of tools and techniques for cyber defence, threat intelligence and information governance in terms of their effectiveness and suitability for threat mitigations in different
organisational contexts.
2.Demonstrate the following skills and abilities
Be able to design, implement and apply information security management solutions, strategies and technologies to mitigate loss, respond to multi- faceted attacks and mitigate against evolving threat landscapes.
CIS098-2 Operational Information Security Management Assignment – Bedfordshire University UK.

CIS098-2 Operational Information Security Management Assignment

What am I required to do in this assignment?
This assessment will involve an investigation of a case study and delivery of a secure network simulating the business in this study. You are required to provide a complete secure network simulation for the business in the case study and write a technical document listing recommendation for vulnerability mitigations and comments/justifications for your security design. Show your testing strategy with all necessary commands explained. You should achieve the following:

• An investigative technical report
• Configure the systems in the Packet Tracer file supplied with this assignment.
• Test and ensure full connectivity is demonstrated in your simulation. A full testing strategy should be provided and evidenced.
• Add and configure security devices (e.g. Firewalls, etc.) and security features (port security, secure authentication, etc.) to full secure the network from external intrusions and internal attacks.
• Include configuration testing and command evidence in the technical report

Is there a size limit?
You are required to following and meet the Assessment 1 Specifications section as stated below.

What do I need to do to pass? (Threshold Expectations from UIF)
In order to pass Assessment 1 you will need to:
• Design a cyber defence mechanism for a given scenario
• Implement a cyber defence solution for a given scenario
• Present and explain the rationale behind choices made for a given cyber defence scenario
• Design a testing approach to demonstrate system security for a cyber defence solution that you have designed

How do I produce high quality work that merits a good grade?
By addressing all the assessment requirements as stated in the Assessment 1 Brief details at the end of this document and following the comments in the Marks & Feedback section below.

How does assignment relate to what we are doing in scheduled sessions?

CIS098-2 Operational Information Security Management Assignment – Bedfordshire University UK.

Assessment 1 require the submission of an artefact and technical report as specified in the format outlined in the detailed assessment brief for the unit which will draw upon your knowledge and skills of cyber defence.

Assessment 2 Specification

Assessment 1 Details – MODELO T&T Case Study v2.0

You are asked to investigate Modelo T&T, a small private microbiology laboratory located in south London which has a local area network and collaborates with 2 other hospitals as part of a single NHS trust.

Patients laboratory examinations (blood, urine, etc.) are ordered either by registered NHS GPs (in which case the patient needs to have a referral in order for the tests to be paid on the NHS), or privately (in which case the patient pays the cost).

The laboratory consists of 8 employees:

• 2 secretaries, responsible for answering phones, making appointments for blood and other tests and taking payment information from the patients. They are also responsible for posting the results (either using Royal Mail or a courier service).

• 2 GPs, that are responsible for checking the test results and making recommendations.
• 4 microbiologists that are responsible for processing the blood samples in order to get results.
• Lately, the laboratory’s reputation has spread, and it receives a lot of private patients that wish to have blood checks.

This has resulted in a great increase in telephone calls, asking to book appointments or get information of alternative methods of paying (for now only cash or online payment is accepted – currently only through a third-party such as PayPal).

The laboratory’s computer network consists of 8 PCs on a simple Wi-Fi network with WAN connection to the Internet and VPN used to secure the connections between the laboratory and the other hospitals. There is one Microsoft Windows Server 2008 servicing the Modelo T&T network, and most of the data is currently stored and shared via an American cloud storage provider with their data centre located in Arizona. Modelo T&T network has:

• Computers 1 and 2 – used by the secretaries to book appointments, write confidential letters to patients, send communications to patients and other health professionals at the 3 hospitals and other clinics, and hold transaction details.

• Computers 3 and 4 – used by the GPs to access patients’ files, update them adding medication prescriptions, and recommendations.

• Computers 5 to 8 – used by the microbiologists to access patients’ files and add the blood test results.

• Server – used as a backup solution, to store all patients’ files, letters, communications with others, and transactions, for extra security. The server is also connected to the hospital’s network, to exchange patient information.

• Wi-Fi Network: there is a Wi-Fi Network in the company cafeteria for general use.

• All client computers are running Windows 10. All clients and server are connected to one switch which is connected to the gateway router. The VPN is connected from the server to the end destination servers at the 3 hospitals.

For security, Modelo T&T uses AVAST free and the default Windows firewall on all machines. The network is being managed by a young person who has basic networking knowledge and Windows servers/clients configuration knowledge.

Modelo T&T wishes to create an online system, in which the patients will be able to book appointments for tests. Private patients will need to pay for the services.

CIS098-2 Operational Information Security Management Assignment

Assessment Tasks
You work as the Information Security Manager for Modelo T&T you have been asked to evaluate the current network security at Modelo T&T and make recommendations for improvements, including a simulation of the upgraded/secured network design.

You will need to produce and hand in the following:

• Technical Document – this is to contain a full write up of your threat analysis and security recommendations. This should be a technical document written to InfoSec Technical people.
• Secure Network Configuration (packet tracer activity simulation)

Technical Document – Designing a Cyber-Defence Solution (Tasks 1, 2 and 3) – 40%
[Note: for these tasks you are expected to use a range of respected sources to back-up your recommendations and you will need to cite these sources clearly in your technical report using Harvard referencing – a related References list must also be included with your report.]

Task 1 – Vulnerability and Risk Assessment

Outline the security issues (e.g. suspected vulnerabilities, potential threats, risks) to the company and create a draft risk assessment outline with potential mitigations to ensure the protection of the company’s assets.

Note: The company intends to hire a contractor to carry out a full risk assessment, but they would like you to provide a brief overview and examples of the types of things you would specifically like them to check (note that your discussion should be listed as bullet points of potential vulnerabilities with a CVSS, or STRIDE evaluation). You could include considerations such as: known vulnerabilities, key assets, potential threat vectors, consequences to the business of a cyber-incident or breach, etc. Also, if the company were to expand to allow card payment transactions, what additional security standards would they have to comply with?

Task 2 – Network Nodes and Endpoints Hardening Recommendations/Checklist (suggested length: 1 table)
Write a security checklist for the all the network nodes and endpoints, i.e. a list of items that a technician could check and date/tick to say that the node/end-point was ‘secured’. This should also address the proposed addition of a card payment system.

Task 3 – Network Segmentation and use of secure remote communications
1.Write a brief description in your technical report of the benefits to network segmentation and how it helps in providing security while relating your discussion to how this concept is applied in this case study.

2.Write a brief description explain how secure remote communications have been and can be further extended to provide extra security in this case study. Clearly state where secure remote communications can be extended giving exact areas related to the case study. Include recommendations for why this is a good idea into your technical report. This should also address the proposed addition of a card payment system.

Task 4 – Secure Network Configuration – Packet Tracer Simulation Activity and Testing
You will be provided with a Packet Tracer activity that is a simulation of the Modelo T&T Network and asked to carry out some key security configurations to model a more secure design for the company.

The Packet Tracer activity will ‘score’ your attempt (and you can click ‘show incomplete items’ to see what you have correct and still to do). Please note this score is INDICATIVE but may not be exactly the score you will get for this section – an instructor will still look at your configuration. You will need to submit your packet tracer file with your technical report.

50% of this assignment mark will be for the PT grade and 10% for demonstrating testing and connectivity and providing configuration outputs.

[Please note: the PT file already has been configured with some information (to save you time) – do not restart/erase the devices. Add your student details as the USER details when you first open the Packet Tracer that also would help identify your work]

REALLY IMPORTANT NOTE: You need to use Packet Tracer 32-bit version 8.x. Do not forget to save regularly (perhaps with a new file name after every part – in-case something goes wrong).

Using the Packet Tracer activity provided, you will be asked to complete the following (configuration details are given separately):

CIS098-2 Operational Information Security Management Assignment – Bedfordshire University UK.

CIS098-2 Operational Information Security Management Assignment

4.1 Intermediary device hardening
4.2 Securing Remote Access to the Router (SSH)
4.3 Configure VLANs on Switch 1
4.4 Confirm DHCP is working and test basic connectivity between hosts
4.5 Switch Port Security
4.6 Wi-Fi Configuration and Securing
4.7 Access-control-lists
4.8 Configure Protocols
4.9 Documentation of your configuration

In your technical document please include, in addition to all the evidence required in the PKA file, a screenshot of your completed packet tracer activity showing the score (and network diagram in the background).

ORDER This CIS098-2 Operational Information Security Management Assignment NOW And Get Instant Discount

Order Your Assignment