Assignment title: Information


Advance Security (IT Security Management) Assignment 2 Assignment Overview For this assignment you will design and develop a business security systems for storing, accessing, securing and backing up the data. You have to discuss the use of the security tools and hardware in order to create the secure environment. This exercise gives student the opportunity to improve their skills in building security and to implement a backup and recovery plans. This assignment also gives the student to create a business impact analysis for business continuity planning purposes. Marks will be awarded based on the sophistication and the difficulties of the implemented design. Federation University Australia is one of the nation's leading regional universities that have several campuses around Australia. It has a population of more than 23,000 international and domestic students and staff. Their main campus are located in Ballarat, Australia, they provide online teaching as well. FedUni has contacted you to be their information security project manager. Additional details about this university are: • Since FedUni is a huge domestic university, its staff and student are divided into various departments. There are several responsibilities for each one of those departments: marketing, business, human resources, training and education, finance, health, housing, quality assurance, IT security, IT help desk and research and development. Each department has their responsibility and can access their own information and are not allowed to access other department information. While higher people from each department has a privilege to access sensitive information, for example, the finance manager will have extra privilege to access sensitive information, while the rest of his team cannot. • As a security manger you have an access to different department documentations. Further, you are liable to coordinate and liaise with different representative from the different department. Your contact is directly with CISO. • The university deals with many off-campus student and staff, which they request to access the university's resources and VPN. • FedUni has a large number of short visiting scholars who visit the campus during the year. Those scholars have an access to the university's resources (labs and printers). Description of the assessment: Answer the following points. This task requires you to do literature research on internet, magazines, publications of journal or conference, textbook. This is an individual assignment. Therefore, it is very important to write the findings in your own words. The aforementioned scenario must be discussed while replying to the below questions: Q1) For the organization, what are the controls (technical, physical or administrative) that you will implement to make it secure and fulfills the CIA triad within the university and departments and when contacting the internet? (Provide a figure for your controls and explain why using them). Please note that you have to mention technical/physical and administrative controls (10 marks) Q2) What kind of risks that you might accept (not to implement controls for them) and why? For the risks that you either decided to accept, or for the unexpected risk, how do you plan to handle them? (2 marks) Q3) Give an example of a duty of the Incident response planning, Disaster recovery planning and Business continuity planning when having an unexpected event. (3 marks) Q3) Refer back to any resource to explain the difference between HIDS and NIDS? (You have to write from 500- 1000 words.) (5 marks) Q4) Literature review on Signature based detection and anomaly based detection? (You have to write from 500- 1000 words.) (5 marks) Use at least 5 references Plagiarism All used sources must be properly acknowledged with references and citations, if you did not create it. Quotations and paraphrasing are allowed but the sources must be acknowledged. Failure to do so is regarded as plagiarism and the minimum penalty for plagiarism is failure for the assignment. The act of given your assignment to another student is classified as a plagiarism offence. Copying large chucks and supplying a reference will result in zero marks as you have not contributed to the report. By the due date, you must submit: • The cover page must identify student (name and number), teaching staff, and assignment. • The assignment must use 12 point font size minimum and at least single line spacing with appropriate section headings. • Reference sources (IEEE style) must be cited in the text of the report, and listed appropriately at the end. Late submission of assignments will be penalised as follows: • For assignments 1 to 5 days late, a penalty of 10% (of total available marks) per day. • For assignments more than 5 days late, a penalty of 100% will apply. Your submission must be compatible with the software (PDF/Word) in MIT, Computer Laboratories/Classrooms. Extensions: Under normal circumstances extensions will not be granted. In case of extenuating circumstances— such as illness—a Special Consideration form, accompanied by supporting documentation, must be received before 3 working days from the due date. If granted, an extension will be only granted only by the time period stated on the documentation; that is, if the illness medical certificate was for one day, an extension will be granted for one day only. Accordingly the student must submit within that time limit. Penalties may apply for late submission without an approved extension. Penalties: Academic misconduct such as cheating and plagiarism incur penalties ranging from a zero result to program exclusion. Page 2 of 3 Marking criteria: Marks are allocated as indicated on each question, taking the following aspects into account: Aspects Description Analysis (if appropriate) Investigation, comparison, discussion Explanation/justification Description/answer to the question Presentation Inadequate structure, careless presentation, poor writing Reference style Proper referencing if required Plagiarism Copy from another student, copy from internet source/textbook, copy from other sources without proper acknowledgement Marking Rubric for Exercise Answers Grade Mark HD 80%+ D 70%-79% CR 60%-69% P 50%-59% Fail < 50% Excellent Very Good Good Satisfactory Unsatisfactory Analysis Logic is clear and easy to follow with strong arguments Consistency logical and convincing Mostly consistent and convincing Adequate cohesion and conviction Argument is confused and disjointed Effort/Difficul ties/ Challenges The presented solution demonstrated an extreme degree of difficulty that would require an expert to implement. The presented solution demonstrated a high degree of difficulty that would be an advance professional to implement. The presented solution demonstrated an average degree of difficulty that would be an average professional to implement. The presented solution demonstrated a low degree of difficulty that would be easy to implement. The presented solution demonstrated a poor degree of difficulty that would be too easy to implement. Explanation/ justification All elements are present and well integrated. Components present with good cohesion Components present and mostly well integrated Most components present Lacks structure. Reference style Clear styles with excellent source of references. Clear referencing/ style Generally good referencing/st yle Unclear referencing/style Lacks consistency with many errors Presentation Proper writing. Professionally presented Properly spoken, with some minor deficiencies Mostly good, but some structure or presentation problems Acceptable presentation Poor structure, careless presentation Page 3 of 3