Assignment title: Information
Plan your approach to data storage and data transfer within the Your Events network. Make sure you include a detailed discussion of any data protection issues that relate to the storage and transmission of personal data and credit card details. In addition, you should plan all of the methods that will be used to ensure that sensitive data is protected on the network. Your plan should include the requirements for the secure transmission of data over the Internet and between offices. (This should be delivered as part of Task 3.1). Task 2 – Create authentication methods, network security methods and ongoing network monitoring plans. Create a plan for user authentication for the network. It should include the types of users that will have legitimate access to the network and the data it holds. Your Events staff should have access to the data of events organisers, registered users, event data, and general administration access including, where appropriate, access to financial data. Registered users should only have access to their own account details, information of the events they have bought tickets, and recommendations for future events. Make detailed notes on how user types will be authenticated. Write a plan of how the transfer of data between offices and via the Internet will be achieved securely. Make detailed notes of the hardware, software, encryption and authentication mechanisms required. Describe how the network will be monitored to maintain security via checking for and removing vulnerabilities. (This should be delivered as part of Task 3.2). Task 3 – Report Prepare a report on data storage, data transfer, user authentication and network monitoring. The following subsections must be included in your report: a) Data storage and transfer. (35 marks overall). This should include: i. A discussion of the data protection issues raised by holding personal and payment data – 10 marks. ii. An explanation of the data protection plans that have been created, including plans for both secure storage and secure transmission of data – 15 marks. iii. A brief discussion of the best architecture for the system to simplify the secure payment for event tickets over the Internet and the storage and transmission of the associated data – 10 marks. This section of the report should be approximately 500 words. Tasks continue on next pagePage 4 of 5 Network Security and Cryptography March 2015 Final NCC Education 2015 b) Description of how network users will be authenticated, how data will be transmitted between offices, over the Internet, and how the network will be monitored for vulnerabilities and how vulnerabilities will be removed. (55 marks overall). This should include detail on the features given below including hardware and software involved, standards and protocols used, cryptographic methods used, network services allowed/denied, policies and examples of how these would be applied. Marks will be awarded for the following: i. An explanation of the user authentication methods planned – 10 marks ii. A brief discussion of other user authentication methods considered including reasons why they were discarded in favour of the planned methods – 5 marks iii. A description of the methods planned to ensure the privacy and security of data transmitted between offices – 10 marks iv. A description of the methods planned to ensure privacy and security of data transmitted over the Internet when users are paying for tickets including relevant protocols and the purchase of digital certificates – 10 marks v. A brief discussion of other security methods considered for data transmission including reasons why they were discarded in favour of the planned methods – 10 marks vi. A description of how the network will be monitored for security vulnerabilities and how such vulnerabilities will be removed – 10 marks This section of the report should be approximately 850 words c) Reflective commentary (10 marks) You should assess the feasibility of implementing the measures you have designed, the success of your methods and problem-solving techniques, and also use this section to reflect on what you learned from completing the assignment. This section of the report should be approximately 150 words. d) The report should be professionally presented, checked and proofed, and in a format and style appropriate for your intended audience. You must also include a list of references, and throughout your work you must always use correct Harvard referencing and avoid plagiarism.