Ask Computer Network & Security Expert

Assignment: Case Study

Scenario

You are working as a Systems Security Engineer at Peterson Security Solutions. You have been given a project to design a System security for a new customer called The Great Northern Hotel Pty Ltd.

The Great Northern Hotel Pty Ltd is a 4-star luxury hotel and restaurant in Melbourne. They are running this business from last 7 years and has seen a rapid client growth in last 7 years. The hotel has an overall policy goal for the enterprise is to provide the customers with a high quality experience in staying at the hotel, and protecting the hotel's good reputation. The CEO is concerned that system security breaches could undermine those enterprise objectives.

Currently they are having 10 admin computers, 2 reception computers and 4 computers for management. They also provide Wi-fi access to their customers. Their Wi-Fi is running on Wired

Equivalent privacy (WEP) protocol and they haven't implemented any strong encryption for Wi-Fi security.

They have experienced a lot of attacks on their network in last few months and credit card details for some of their customers has also been hacked. Clients are also complaining about identity theft and login credentials being hacked. An information systems auditor engaged by the company has said that threats to the hotel's system can come from both hackers outside the organization, and disgruntled employees within the organization, and that both threats need to be defended. The CEO is also concerned that tech-savvy customers could be spying on other customer connections to the network, as the hotel has many VIPs using their services.

The main users of the network are customers (WIFI access on a guest network), and employees (both WIFI and bounded media access to a corporate network). The CEO would like to secure all these interactions with the network if possible. Based on discussions with the information systems auditor, the CEO rates the probability of employees violating security as low, the probability of eavesdropping as medium, and the probability of hackers attempting to steal credit cards as high. The CEO also believes that risks are higher when there are more conference goers attending meetings in the hotel, as they are unfamiliar with the hotel systems.

Currently all the financial information and customer records are saved on server machine which is running Windows Server 2003. Windows server 2003 has already passed end of life and there is no support provided by Microsoft for this server operating system.

Management of the hotel is worried as they haven't implemented any security system to protect their IT assets and data. Being a reputed hotel in Melbourne they don't want their client's personal details and credit card details to be lost. Management also wants to ensure that the threat identification and risk management process has ongoing relevance as business conditions change

You as a Systems Security Engineer needs to prepare a detailed report on the current situation of the organization including threats & potential risks to the present IT system.

In your security report, you need to identify the potential threats and risks. You are supposed to document the human interaction with the system. You should identify appropriate controls and procedures that needs to be implemented to make system more secure and less vulnerable to attacks.

General information

The report should be concise and well-structured e.g. using the provided report template. Excessive verbiage should result in the students resubmitting the report No handwritten assessments will be accepted.

Maximum of three students listed as authors of the report.

1. Evaluate the current system as per enterprise guidelines and procedures.

2. Conduct a risk analysis on the system and document the results.

3. Identify threats to the system and document your findings.

4. Identify and analyse human interactions with the system.

5. Conduct risk assessment on the current system to categorize risks.

6. Conduct risk assessment on human operations and interactions with the system.

7. Categorize risks based on risk assessments performed.

8. Match risk plans with risk categories.

9. Use risk categories to identify and plan resources.

10. Identify and describe effective controls to manage and monitor risk.

11. Create policies and procedures to manage user access of the system.

12. Identify and document training requirements for effective use of system policies and procedures. You should also be prepared to conduct training e.g. a five minute oral presentation to the trainer about one of these policies and procedures, e.g. the need to have strong passwords for user authentication.

13. Identify high risk categories and times (e.g. is there any time in the business when risks are greater than normal? ) and create a plan to monitor those identified categories.

14. Design a template to record system and network breakdown.

15. Create a security plan and procedures for the system security.

16. Design and document security recovery plan.

17. Identify and document controls to minimise risks in human interaction with the system.

18. Identify security benchmarks from vendors, security specialists and organisational reviews.

19. Review risk analysis process based on identified security benchmarks.

20. Create a plan for system re-evaluation to uncover new threats and risks.

21. Describe how you would implement and manage security functions, such as a password policy and audit log reviews, on a Windows Server 2012 system. You should provide what specific features of Windows Server 2012 would be needed to implement these security functions.

Attachment:- Assignment-Case-Study.rar

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M92759003

Have any Question?


Related Questions in Computer Network & Security

Security challenges in emerging networksassignment

Security Challenges in Emerging Networks Assignment Description The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowle ...

Security challenges in emerging networksassignment

Security Challenges in Emerging Networks Assignment Description The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowle ...

Security challenges in emerging networksassignment

Security Challenges in Emerging Networks Assignment Description The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowle ...

Security challenges in emerging networksassignment

Security Challenges in Emerging Networks Assignment Description The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowle ...

Advanced network design assessment - human factors in

Advanced Network Design Assessment - Human factors in network analysis and design Purpose of the assessment - This assignment is designed to assess students' knowledge and skills related to the following learning outcome ...

Advanced network design assessment - human factors in

Advanced Network Design Assessment - Human factors in network analysis and design Purpose of the assessment - This assignment is designed to assess students' knowledge and skills related to the following learning outcome ...

Assignment descriptionproject scope a typical network

Assignment Description Project Scope: A typical network layout diagram of a firm is given below for illustrative purposes only. The service requirements are enclosed. Figure. Network layout of a firm Service requirements ...

Assignment descriptionproject scope a typical network

Assignment Description Project Scope: A typical network layout diagram of a firm is given below for illustrative purposes only. The service requirements are enclosed. Figure. Network layout of a firm Service requirements ...

After reading this weeks materials please respond to two 2

After reading this week's materials, please respond to TWO (2) of the following questions. AND PROVIDE CITATION IN APA 1. Describe the differences between bus, ring, star and mesh topologies. 2. Explain the TCP/IP Model ...

The abstract should not be more than 250 words describe

The abstract should not be more than 250 words. Describe your project, focusing on research questions and research method for next stage of the project. 1. Introduction [The introduction should describe what the project ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As