Subject Code :- VU21992
Title :- Develop A Cyber Security Industry Project
Assessment Type :- Assignment 2 Written Response
Instructions :-
This assessment must be completed in teams as approved by the Instructor.
This assessment is self-paced but recommended to be completed as detailed in the Unit Guide.
Plagiarism is not tolerated. You must acknowledge sources of information you use in your writing.
You must reference when ever you quote paraphrase or summarise someone else’s ideas
VU21992 Develop A Cyber Security Industry Project Assignment 2
You must include the following information on all items submitted for assessment:
1. The names of your team members
2. The Student IDs of your team members
3. The date submitted
4. The Cluster Name and the Competencies listed above
5. The Assessment Title.
Resources required
i. Suitable PC workstation with Internet access.
ii. Online library & class resources are to be used when preparing reports for this assessment.
iii. Appropriate virtualised environment supporting the target (simulated) network.
Instructions for the Students :-
You should create a single document containing your responses to all of the tasks listed below.
The information listed above (names, Student IDs, etc) should appear on a title page at the start of the document. You should submit your work as a single PDF file via VU Collaborate.
VU21992 Develop A Cyber Security Industry Project Assignment 2
Overview :-
You must manage and execute the implementation of cyber protections for the OZCazual network in line with the plans you developed in Assessment 1.
You must produce appropriate configuration management records for ALL physical and virtualised equipment in the revised network including:
a. Virtualised hardware manifests for virtualised equipment
b. Configuration files/scripts and build documentation for any additional equipment/software
c. It is not necessary to record serial number etc for components of equipment – a simple of constituent items and their descriptions such as capacity speed etc is adequate.
Task 2.1 ReConfigure Network Infrastructure
You must reconfigure the existing network infrastructure to better protect the OZCazual ICT operations. This may include any or all of:
i. Redesigning the network topology including topology diagrams with per-port addressing
ii. Installation/removal of new/existing network equipment
iii. Reconfiguration of existing equipment
iv. Introduction of new security procedures/practices/facilities such as 2FA, secure connection etc.
This reconfiguration should be arranged so as to minimise interruption to business operations.
You should also execute your test plans for each piece of routing/switching/firewalling infrastructure.
Remember to produce appropriate configuration management records for your new network infrastructure.
VU21992 Develop A Cyber Security Industry Project Assignment 2
Task 2.2 Install/Upgrade Application Systems
You must install or upgrade all current OZCazual application systems to the revised network infrastructure.
This may include any or all of:
a. Upgrading existing systems in the new infrastructure
b. Installing new systems to replace the existing application systems.
c. Installing additional systems to further enhance the security of the infrastructure.
This migration should be arranged so as to minimise interruption to business operations unless otherwise stated in the project planning stage for assessment 1
You should also execute your unit test plans for each application system.
Remember to produce appropriate configuration management records for the application systems.
Task 2.3 Install & Configure Security Systems
You must implement Cyber Security tools such as:
1. Server Traffic Monitors
2. Log analysis systems
3. Anti-Virus/Malware systems
4. Internal Firewalls
5. Suitable resources for remediation of compromised systems in the event of a cyber incident.
You should also execute unit test plans for all components of your Security systems. Remember to produce appropriate configuration management records for the Security systems.
VU21992 Develop A Cyber Security Industry Project Assignment 2
Install & configure Kali Linux in the Cloud environment this will be used for penetration testing in Task 3.3
Task 2.4 Develop Formal End-to-End Test Plans
You must develop end-to-end test plans for each supported application system obtaining agreement from
line-of-business managers that the test plans are adequate. These plans must include explicit statements of the
processes and procedures to be followed to test each application system.
Task 2.5 Execute End-to-End Testing & Remedy Deficiencies
You must execute end-to-end testing as developed in task 2.4, obtaining sign-off from line-of-business managers.
If modifications to your plans are required ensure that you update the appropriate configuration management records.
Task 2.6 Finalise New System Operational/Support Processes & Documentation
You must prepare revised Operational & Support processes and documentation to allow the continued
management of the revised infrastructure.
This should include as a minimum:
i. Start-up & shutdown procedures
ii. Backup & recovery from backup procedures
iii. Regular maintenance activities with a schedule of execution.
In addition you must produce a final report for the system designed documenting:
1.Which elements were delivered as designed
2. Which components were not delivered
3. Which components were modified from the original design and the nature of the modifications
Excellent Assignment Help
We Aim At:
- Lowest Price.
- 100% Uniqueness.
- Assignment Fastest Delivery.