Short answer questions

4 different folders and topics

ICTNWK602– Plan, Configure and Test Advanced Server Based Security

Student Assessment Pack

Don't use plagiarized sources. Get Your Custom Essay on
Short answer questions
Just from $13/Page
Order Essay

Student and Trainer/Assessor Details

Student ID

Student name

Contact number

Email address

Trainer/Assessor name

.

Course and Unit Details

Course code

ICT60215

Course name

Advanced Diploma of Network Security

Unit code

ICTNWK602

Unit name

Plan, configure and test advanced server-based security

Assessment Submission Method

☐ By hand to trainer/assessor

☐ By email to trainer/assessor

☐ Online submission via Learning Management System (LMS)

☐ By Australia Post to RTO

☐ Any other method _________________________________________________

(Please mention here)

Student Declaration

· I certify that the work submitted for this assessment pack is my own. I have clearly referenced any sources used in my submission. I understand that a false declaration is a form of malpractice;
· I have kept a copy of this assessment pack and all relevant notes, attachments, and reference material that I used in the production of the assessment pack;
· For the purposes of assessment, I give the trainer/assessor of this assessment the permission to:
· Reproduce this assessment and provide a copy to another member of staff; and
· Take steps to authenticate the assessment, including communicating a copy of this assessment to a checking service (which may retain a copy of the assessment on its database for future plagiarism checking).
Student signature: ________________________________
Date: ____/_____/______________

Assessment Plan

To demonstrate competence in this unit, you must be assessed as satisfactory in each of the following assessment tasks.

Evidence recorded

Evidence Type/ Method of assessment

Sufficient evidence recorded/Outcome

Unit Assessment Task 1

Unit Knowledge Test (UKT)

S / NS (First Attempt)
S / NS (Second Attempt)

Unit Assessment Task 2

Unit Project (UP)

S / NS (First Attempt)
S / NS (Second Attempt)

Unit Assessment Task 3

Unit Project (UP)

S / NS (First Attempt)
S / NS (Second Attempt)

Final result

C/NYC

Date assessed

Trainer/Assessor Signature

Assessment Conditions

Unit purpose/application

This unit describes the skills and knowledge required to implement advanced server security using secure authentication and network services on a network server.

It applies to individuals working as information and communications technology (ICT) network specialists, ICT network engineers, network security specialists, network security planners and network security designers.

What the student can expect to learn by studying this unit of competency

· Plan advanced network server security according to business needs

· Prepare for Network server security implementation

· Configure the advanced network server security according to design

· Monitor and test network server security

Training and assessment resources required for this unit of competency

The student will have access to the following:

·

Learner guide

·

PowerPoint presentation

·

Unit Assessment Pack (UAP)

·

Access to other learning materials such as textbooks

The resources required for these assessment tasks also included:

· A site where server installation may be conducted

· Relevant server specifications

· Cabling

· Networked (LAN) computers

· Server diagnostic software

· Switch

· Client requirements

· WAN service point of presence

· Workstations

· Relevant regulatory documentation that impacts on installation activities.

Your trainer/assessor will confirm assessment submission details for each assessment task.

Academic integrity, plagiarism and collusion

Academic Integrity

Academic Integrity is about the honest presentation of your academic work. It means acknowledging the work of others while developing your own insights, knowledge and ideas.

As a student, you are required to:

· undertake studies and research responsibly and with honesty and integrity

· ensure that academic work is in no way falsified

· seek permission to use the work of others, where required

· acknowledge the work of others appropriately

· take reasonable steps to ensure other students cannot copy or misuse your work.

Plagiarism

Plagiarism means to take and use another person’s ideas and or manner of expressing them and to pass them off as your own by failing to give appropriate acknowledgement. This includes material sourced from the internet, RTO staff, other students, and from published and unpublished work.

Plagiarism occurs when you fail to acknowledge that the ideas or work of others are being used, which includes:

· Paraphrasing and presenting work or ideas without a reference

· Copying work either in whole or in part

· Presenting designs, codes or images as your own work

· Using phrases and passages verbatim without quotation marks or referencing the author or web page

· Reproducing lecture notes without proper acknowledgement.

Collusion

Collusion means unauthorised collaboration on assessable work (written, oral or practical) with other people. This occurs when a student presents group work as their own or as the work of someone else.

Collusion may be with another RTO student or with individuals or students external to the RTO. This applies to work assessed by any educational and training body in Australia or overseas.

Collusion occurs when you work without the authorisation of the teaching staff to:

· Work with one or more people to prepare and produce work

· Allow others to copy your work or share your answer to an assessment task

· Allow someone else to write or edit your work (without rto approval)

· Write or edit work for another student

· Offer to complete work or seek payment for completing academic work for other students.

Both collusion and plagiarism can occur in group work. For examples of plagiarism, collusion and academic misconduct in group work please refer to the RTO’s policy on Academic integrity, plagiarism and collusion.

Plagiarism and collusion constitute cheating. Disciplinary action will be taken against students who engage in plagiarism and collusion as outlined in RTO’s policy.

Proven involvement in plagiarism or collusion may be recorded on students’ academic file and could lead to disciplinary action.

Other Important unit specific Information

N/A

Unit outcome

· This unit is not graded and the student must complete and submit all requirements for the assessment task for this cluster or unit of competency to be deemed competent.

· Students will receive a ‘satisfactorily completed’ (S) or ‘not yet satisfactorily completed (NS) result for each individual unit assessment task (UAT).

· Final unit result will be recorded as competency achieved/competent (C) or competency not yet achieved/not yet competent (NYC).

· Written Questions

Unit Assessment Task (UAT) – 1

Assessment Task 1 – Unit Knowledge Test (UKT)

Instructions:

· This is an individual assessment.

The purpose of this assessment task is to assess the students’ knowledge required to ensure secure file encryption is selected, implemented and monitored on a computer network or local environment.

· To make full and satisfactory responses you should consult a range of learning resources, other information such as handouts and textbooks, learners’ resources and slides.

· All questions must be answered in order to gain competency for this assessment.

You may attach a separate sheet if required.

You must include the following particulars in the footer section of each page of the attached sheets:

· Student ID or Student Name

· Unit ID or Unit Code

· Course ID or Course Code

· Trainer and assessor name

· Page numbers

You must staple the loose sheets together along with the cover page.

You must attach the loose sheets chronologically as per the page numbers.

· Correction fluid and tape are not permitted. Please do any corrections by striking through the incorrect words with one or two lines and rewriting the correct words.

Resources required to complete the assessment task:

Learner guide
PowerPoint presentation
Unit Assessment Pack (UAP)
Access to other learning materials such as textbooks

Access to a computer, the Internet and word-processing system such as MS Word.

Question 1: Summarise the following?

A. What is network Auditing and what is the importance of performing the regular network auditing? Write your response in 100-150 words.

B. What do you understand from network penetration testing and at least explain three (3) of its techniques?

Write 30-70 words for each.

Question 2: What are the best practices to implement backup and restore procedures? Write 150-200 words for your answer.

Question 3: What are the four (4) most secured encryption techniques? Write 50-100 words for each technique?

Question 4: Summarise the Windows Error and Event Viewer tool and its use for logging reporting. Write your response in 100-150 words.

Question 5: What do you understand from network intrusion detection and recovery procedures? Write your answer in 100-150 words.

Question 6: Summarise the following network service configurations:

A. Domain name system (DNS)

B. Dynamic host configuration protocol (DHCP)

C. File transfer protocol (FTP)

D. Mail

E. Network time protocol (NTP)

F. Proxy

G. Server messages block (SMB)

H. Web

Write 50 to 100 words for each of the configuration.

Question 7: What are the different features, options and benefits of network security services? Write your answer in 100-150 words for each.

Question 8: What are the three (3) types of network service vulnerabilities? Write 100-150 words for each vulnerability.

Question 9: Explain the operating system help and support utilities. Write your response in 100-150 words.

Question 10: Answer the following questions:

A. What are the five (5) network security attacks and their protection mechanism?

Write 50-100 words for each.

B. List and explain three (3) network security threats and risks? Write 50-100 words for each.

Question 11: Summarise the following:

A. What are the eight (8) famously used network monitoring and troubleshooting techniques tools? Write your response in 100-150 words.

B. Explain Network Configuration and Network planning techniques each in 100-150 words.

Question 12: What are the steps involved in the configuration of Firewall on Windows Server 2012? Include screenshots.

Question 13: Answer the following questions:

A. What is meant by user authentication? Write your response in 100-150 words.

B. Explain directory services in 100-150 words.

Question 14: Answer the following.

A. List and explain two (2) network troubleshooting tools and techniques. Write your response in 100-150 words.

B. What are the five (5) network diagnostic utilities? Write 30-50 words for each.

C. What are the five (5) different events and metrics to monitor and troubleshoot for a Windows Server? Write 40-70 words for each.

Question 15: Answer the following questions:

A: What is the importance of consultation with the key stakeholders and how does it help to effectively coordinate the task? Write your response in 100-150 words.

B: What is the importance of the Occupational Health and Safety (OHS) processes and procedures at a workplace? Write your response in 100-150 words.

Question 16: Answer the following questions:

A. What is the importance and functions of the Authentication, Authorisation and Accounting? Write your answer in 100-150 words.

B. What do you understand from authorisation and accounting (AAA) protocols? Write 100-150 words?

C. What are the different factors to consider while securing approval of an ICT project? Write your response in 50-100 words.

Question 17: Answer the following Questions:

A. What is meant by patching the operating system and applications to enable maximum security and reliability? Write your answer in 50-100 words.

B. Explain the different options involved in the configuration of automatic updates for Windows Server 2016. Write your answer in 200-150 words.

Question 18: Answer the following questions:

A. What do you understand from Access Control Lists? Write your response in 50-100 words.

B. What are the steps involved in the configuration of the Access Control Lists. Use Screenshots in your answer.

Question 19: Answer the following questions:

A. What are the steps included in testing server for the effectiveness of network service security? Write 100-150 words.

B. Explain the importance of server testing? Write your answer in 30-50 words.

Question 20: Summarise the following:

A. Server Monitoring

B. Importance of Server Monitoring

C. Reports and Results generated by Server Monitoring.

Write 50-100 words for each.

D. Explain the working of Server Monitoring to ensure data Security to avoid data breaches. Write your response in 150-200 words.

Unit Assessment Task (UAT) -2

Assessment Task 2 – Unit Project (UP)

Assessment type:

Unit Project (UP)

Instructions to complete this assessment task:

· Please write your responses in the template provided.

· You may attach a separate sheet if required.

· You must include the following particulars in the footer section of each page of the attached sheets:

· Student ID or Student Name
· Unit ID or Unit Code
· Course ID or Course Code
· Trainer and assessor name
· Page numbers

· You must staple the loose sheets together along with the cover page.

· You must attach the loose sheets chronologically as per the page numbers.

· Correction fluid and tape are not permitted. Please do any corrections by striking through the incorrect words with one or two lines and rewriting the correct words.

· The premise of the project must be closely related to the previous assessment task.

· This submission must be well presented and follow the guidelines and instructions provided.

· Please follow the format as indicated in the template section below.

· One of the most important steps that you can take: proofread your project.

· Project must be of 500-800 words in length, using 11-point font, double-spaced, and must include a cover page, table of contents, introduction, body, summary or conclusion, and works cited.

· Appropriate citations are required.

· All RTO policies are in effect, including the plagiarism policy.

Resources required to complete the assessment task:

· Computer

· Internet

· MS Word

Scenario: –

With the technological advancements and vulnerabilities across the network of different organisations, Security is one of the important feature that needs to be implemented on the organisational network ICT infrastructure. Now a days Small and Medium enterprises thoroughly rely on the centralised storage for their data along with the implementation of a secured setup of ICT resources. Same is the case with ANIGMA Pvt. Limited. ANIGMA is a renowned graphic designing company of Melbourne. The company is famous for its intellectual, modernise and innovative ideas when it comes to designing different graphical projects for its clients. The company is well known due to its aesthetical sense of innovation.

The company is situated in CBD and is one of a good example of technological usage in the premised of the office. The company’s IT department has implemented a very sophisticated and efficient ICT network to fulfil the needs of the employees, so that they can concentrate only towards their designing projects. All, the computers are connected in a LAN along with a centralised Server and even the printers, scanners, plotters and WIFI access points are connected in the LAN. The Server does not only provides a centralised repository for the data but also an Active Directory has been implemented on the system to control the access of the network and to set privileges and permissions on different files and folders. Thus, any one from the employees can sit anywhere in the office and on any system and can start doing their projects from where they have left the previous time.

The IT department is not only responsible for the implementation of an efficient ICT system but to also secure this ICT infrastructure. ROY- the ICT Manager is responsible for the management and the administration of the ICT network and Systems. While, Lygon-Network Engineer who assist the ICT Manager is responsible for the management of the networks and to ensure the efficient working of the whole setup.

The job description of both the ICT Manager and the Network Engineer along with the network diagram of the company are as follow to illustrate better understanding of the company’s ICT setup.

Job Description of ICT Manager:

· Analysing information needs and specifying technology to meet those needs

· Formulating and directing information and communication technology (ICT) strategies, policies and plans

· Directing the selection and installation of ICT resources and the provision of user training

· Directing ICT operations and setting priorities between system developments, maintenance and operations

· Overseeing the security of ICT systems

· Running regular checks on network and data security

· Identifying and acting on opportunities to improve and update software and systems

· Developing and implementing IT policy and best practice guides for the organisation

· Designing training programs and workshops for staff

· Conducting regular system audits

· Running and sharing regular operation system reports with senior staff

· Overseeing and determining timeframes for major IT projects including system updates, upgrades, migrations and outages

· Managing and reporting on allocation of IT budget

· Providing direction for IT team members

· Identifying opportunities for team training and skills advancement

Job Description of Network Engineer:

· Maintaining and administering computer networks and related computing environments including systems software, applications software, hardware, and configurations.

· Performing disaster recovery operations and data backups when required.

· Protecting data, software, and hardware by coordinating, planning and implementing network security measures.

· Troubleshooting, diagnosing and resolving hardware, software, and other network and system problems.

· Replacing faulty network hardware components when required.

· Maintaining, configuring, and monitoring virus protection software and email applications.

· Monitoring network performance to determine if adjustments need to be made.

· Conferring with network users about solving existing system problems.

· Operating master consoles to monitor the performance of networks and computer systems.

· Coordinating computer network access and use.

· Designing, configuring and testing networking software, computer hardware, and operating system software.

· Configure and install various network devices and services (e.g., routers, switches, firewalls, load balancers, VPN, QoS)

· Perform network maintenance and system upgrades including service packs, patches, hot fixes and security configurations

· Monitor performance and ensure system availability and reliability

· Monitor system resource utilization, trending, and capacity planning

Network Diagram of ANIGMA to give illustration of all the all the computers, printers, scanners, servers, WiFi access points, switches, routers

Activity 1:

Task 1: (Role Play on planning of the Network Server Security)

The IT department needs to not only managed the ICT infrastructure but is also responsible for the security of the ICT setup and for that Server Security Comes as the most important and vital as far as the company’s data and intellect ideas are concerned. Therefore, the IT department under the supervision of the ICT Manager will implement the security of the Network Server. So at the initial stage of planning and preparation the Network Engineer needs to discuss and elaborate on the importance of the security of the network server along with its preparation and planning. The Network Engineer needs to discuss the planning phase with the General Manager, Manager Operations, Finance Manager and the ICT Manager. For this you need to play the role of the Network Engineer while the trainer/assessor will act as the ICT Manager and will contribute in the planning and the preparation phase. Three of the students will act as the General Manager, Operations Manager and Finance Manager and will put their input in the discussion as these personal are the major stakeholders of the organisation.

In the role play you need to discuss and explain the following points:

· Coordinate with the stakeholders and discuss the requirements of the security and implementation of the security on the network server environment

· Also, discuss the different hazards and safety risks included in the implementation especially with the ICT Manager and the Operations Manager

· Discuss and gain confidence of the General Manager to ensure that the task is coordinated properly and everyone in the organisation play their part in the implementation as per the requirement

· Also, complete the minutes of meetings and get them signed from the General Manager and the ICT Manager to initiate the implementation of the security on the network server.

You are required to complete the following meeting minute’s template and submit to your trainer/assessor.

Minutes of Meeting

Meeting Objective:

Attendees:

Venue:

Date:

No

Points Discussed

Actions Suggested

Target Date

Signature of attendee 1: Signature of attendee 2:

Signature of attendee 3: Signature of attendee 4:

TASK 2: (Report on the preparation of the implementation of the Network Server Security)

Once the discussion and the elaboration of the implementation of the network server is done, you need to prepare a report that will help during the implementation of the network server. The report will later work as the official document for the network server security as it will explain and highlight the security threats to the network. You need to prepare the report under the supervision of the trainer/assessor and also need to complete the template of the report given below:

The report must include the following:

· Explain the network vulnerabilities associated with the network of the organisation

· Highlight network authentication and different network service configurations for the implementation of the network security solution

· Explain the different features of the network service security as per the requirement of the organisation

· Document the update server security design

· Explain the Occupational Health and Safety processes and procedures, according to which the implementation needs to be conducted

Template for Report on the preparation of the implementation of the Network Server Security

Purpose:

Department:

Stakeholders:

Supervised by:

Network vulnerabilities

Network authentication

Network service configurations

Features of the network service security

Occupational Health and Safety processes and procedures

Performance criteria checklist for unit assessment task:

Trainer/ Assessor to complete

Does the candidate meet the following criteria

Yes

No

Trainer/Assessor Comments

Coordinated with the stakeholders

discuss the different hazards and safety risks

Discussed how to ensure that the task is coordinated properly

Completed minutes of Meetings

Signed Off the minutes of meetings

Explained the network vulnerabilities

Highlighted network authentication

Explained the different features of the network service security

Documented the update server security design

Explained the Occupational Health and Safety processes and procedures

Completed the template of report

Unit Assessment Task (UAT)

Assessment Task 3 – Unit Project (UP)

Assessment type:
Unit Project (UP)

Instructions to complete this assessment task:
· Please write your responses in the template provided.
· You may attach a separate sheet if required.
· You must include the following particulars in the footer section of each page of the attached sheets:
· Student ID or Student Name
· Unit ID or Unit Code
· Course ID or Course Code
· Trainer and assessor name
· Page numbers
· You must staple the loose sheets together along with the cover page.
· You must attach the loose sheets chronologically as per the page numbers.
· Correction fluid and tape are not permitted. Please do any corrections by striking through the incorrect words with one or two lines and rewriting the correct words.
· The premise of the project must be closely related to the previous assessment task.
· This submission must be well presented and follow the guidelines and instructions provided.
· Please follow the format as indicated in the template section below.
· One of the most important steps that you can take: proofread your project.
· Project must be of 500-800 words in length, using 11-point font, double-spaced, and must include a cover page, table of contents, introduction, body, summary or conclusion, and works cited.
· Appropriate citations are required.
· All RTO policies are in effect, including the plagiarism policy.
Resources required to complete the assessment task:
· Computer
· Internet
· MS Word

Activity 1 – (Implementation of Network Server Security)

This activity is a continuing from the previous assessment task.

Once the discussion of the planning and preparation of the implementation of the security of the network server. The implementation needs to be done as per the report prepared in the previous task and according to the Occupational Health and Safety (OHS) processes and procedures. You need to act as the Network Engineer and needs to implement the network server security under the supervision of the ICT Manger which will be acted by the trainer/assessor. The implementation will involve the configuration of the network authentication services along with the security of the wide range of network services to ensure the server and the data security. You are also required to implement different cryptographic techniques as per the requirement.

The trainer/assessor will act as a supervisor and will guide you through the initial process of implementation the network server security on the network infrastructure.

Note: For This activity RTO/Assessor will provide you the following:

· A site where server installation may be conducted

· Relevant server specifications

· Cabling

· Networked (LAN) computers

· Server diagnostic software

· Switch

· Client requirements

· WAN service point of presence

· Workstations

· Relevant regulatory documentation that impacts on installation activities.

You need to implement the network security solution as per the given points:

· Before the implementation of the network server security, you need to back up the server to ensure that data is protected

· Configure updates and patches to ensure maximum security. Turn on the automatic updates for the server

· Configure the authentication, authorisation and the accounting services to control the unauthorized access to the server

· Configure the encryption techniques as per the requirements

· Configure remote access and advanced security services options including the following:

· Dynamic name system (DNS)

· Web and proxy

· Mail

· File transfer protocol (FTP)

· Configure the firewall for the security

· Maintain logs and implement log on server

· Configure the backup and recovery mechanism to ensure data safety in case of disaster

Performance criteria checklist for unit assessment task:

Trainer/ Assessor to complete

Assessment activities to be completed

· Implementation of Network Server Security
· For a full project outline, please refer to the student assessment instructions

Resources required for the unit assessment task

· Unit assessment guide template
· Access to live or simulated working environment
· Interaction with others

Does the candidate meet the following criteria

Yes

No

Trainer/Assessor Comments

Back up the server

Configured updates and patches

Configured the authentication, authorisation and the accounting

Configured the encryption techniques

Configured remote access and advanced security services options including the following:

Dynamic name system (DNS)
Web and Proxy
Mail
File Transfer Protocol FTP

Configured the firewall

Maintained log

Configured backup and restore mechanism

Activity 2: (Monitoring of the Network Server Security)

Continuation to the previous tasks, you need to test and monitor the network server to ensure that the security parameters are achieved. You will perform the testing and monitoring of the network server under the supervision of your trainer/assessor.

Note: For This activity RTO/Assessor will provide you the following:
· A site where server installation may be conducted
· Relevant server specifications
· Cabling
· Networked (LAN) computers
· Server diagnostic software
· Switch
· Client requirements
· WAN service point of presence
· Workstations
· Relevant regulatory documentation that impacts on installation activities.

You need to monitor and test the network server security as per the following:

· Test the server to ensure that the security is according to the planned design

· Monitor the server logs and manage the traffic of the network by opening and closing the ports

· Monitor the important files in order to detect the unauthorised access

· Ensure that there are no data breaches on the server and the server and data is protected

· Evaluate the results obtained from the monitoring and test improvements in order to achieve the desired level of network security

Performance criteria checklist for unit assessment task:

Trainer/ Assessor to complete

Assessment activities to be completed

· Monitoring of the Network Server Security
· For a full project outline, please refer to the student assessment instructions

Resources required for the unit assessment task

· Unit assessment guide template
· Access to live or simulated working environment
· Interaction with others

Does the candidate meet the following criteria

Yes

No

Trainer/Assessor Comments

Tested the server

Monitored the server logs

Monitored the important files

Ensured that there are no data breaches

Evaluated the results

ICTNWK602- Student Assessment Pack V1.0 March 2019

ICTNWK607– Design and Implement Wireless Network Security

Student Assessment Pack

Student and Trainer/Assessor Details

Student ID

Student name

Contact number

Email address

Trainer/Assessor name

.

Course and Unit Details

Course code

ICT60215

Course name

Advanced Diploma of Network Security

Unit code

ICTNWK607

Unit name

Design and implement wireless network security

Assessment Submission Method

☐ By hand to trainer/assessor

☐ By email to trainer/assessor

☐ Online submission via Learning Management System (LMS)

Student Declaration

· I certify that the work submitted for this assessment pack is my own. I have clearly referenced any sources used in my submission. I understand that a false declaration is a form of malpractice;
· I have kept a copy of this assessment pack and all relevant notes, attachments, and reference material that I used in the production of the assessment pack;
· For the purposes of assessment, I give the trainer/assessor of this assessment the permission to:
· Reproduce this assessment and provide a copy to another member of staff; and
· Take steps to authenticate the assessment, including communicating a copy of this assessment to a checking service (which may retain a copy of the assessment on its database for future plagiarism checking).

Student signature: ________________________________
Date: ____/_____/______________

Assessment Plan

To demonstrate competence in this unit, you must be assessed as satisfactory in each of the following assessment tasks.

Evidence recorded

Evidence Type/ Method of assessment

Sufficient evidence recorded/Outcome

Unit Assessment Task 1

Unit Knowledge Test (UKT)

S / NS (First Attempt)
S / NS (Second Attempt)

Unit Assessment Task 2

Unit Project (UP)

S / NS (First Attempt)
S / NS (Second Attempt)

Unit Assessment Task 3

Unit Project (UP)

S / NS (First Attempt)
S / NS (Second Attempt)

Final result

C/NYC

Date assessed

Trainer/Assessor Signature

Assessment Conditions

Unit purpose/application

This unit describes the skills and knowledge required to mitigate security threats to a wireless local area network (WLAN) by implementing security standards and policies.

It applies to individuals with advanced information and communications technology (ICT) skills who are working as wireless help desk support technicians, wireless network support specialists and wireless network engineers.

No licensing, legislative or certification requirements apply to this unit at the time of publication.

What the student can expect to learn by studying this unit of competency

· Plan to implement wireless network security

· Design, implement and test guest access services

· Design, implement and test the security of wireless client devices

· Design, implement and test the integration of wireless network with organisational network admission control systems

· Evaluate and plan secure wireless connectivity services

· Manage the requirements to integrate the WLAN with advanced security platforms

Training and assessment resources required for this unit of competency

The student will have access to the following:

·

Learner guide

·

PowerPoint presentation

·

Unit Assessment Pack (UAP)

·

Access to other learning materials such as textbooks

The resources required for these assessment tasks also included:

· A site or prototype where network installation may be conducted

· Hardware and software

· Organisational guidelines

· Live network

· Stand-alone and lightweight WLAN controllers and access points (AP)

· Hardware and software WLAN site survey tools

· Hardware and software IDS and IPS.

Your trainer/assessor will confirm assessment submission details for each assessment task.

Academic integrity, plagiarism and collusion

Academic Integrity

Academic Integrity is about the honest presentation of your academic work. It means acknowledging the work of others while developing your own insights, knowledge and ideas.

As a student, you are required to:

· undertake studies and research responsibly and with honesty and integrity

· ensure that academic work is in no way falsified

· seek permission to use the work of others, where required

· acknowledge the work of others appropriately

· take reasonable steps to ensure other students cannot copy or misuse your work.

Plagiarism

Plagiarism means to take and use another person’s ideas and or manner of expressing them and to pass them off as your own by failing to give appropriate acknowledgement. This includes material sourced from the internet, RTO staff, other students, and from published and unpublished work.

Plagiarism occurs when you fail to acknowledge that the ideas or work of others are being used, which includes:

· Paraphrasing and presenting work or ideas without a reference

· Copying work either in whole or in part

· Presenting designs, codes or images as your own work

· Using phrases and passages verbatim without quotation marks or referencing the author or web page

· Reproducing lecture notes without proper acknowledgement.

Collusion

Collusion means unauthorised collaboration on assessable work (written, oral or practical) with other people. This occurs when a student presents group work as their own or as the work of someone else.

Collusion may be with another RTO student or with individuals or students external to the RTO. This applies to work assessed by any educational and training body in Australia or overseas.

Collusion occurs when you work without the authorisation of the teaching staff to:

· Work with one or more people to prepare and produce work

· Allow others to copy your work or share your answer to an assessment task

· Allow someone else to write or edit your work (without rto approval)

· Write or edit work for another student

· Offer to complete work or seek payment for completing academic work for other students.

Both collusion and plagiarism can occur in group work. For examples of plagiarism, collusion and academic misconduct in group work please refer to the RTO’s policy on Academic integrity, plagiarism and collusion.

Plagiarism and collusion constitute cheating. Disciplinary action will be taken against students who engage in plagiarism and collusion as outlined in RTO’s policy.

Proven involvement in plagiarism or collusion may be recorded on students’ academic file and could lead to disciplinary action.

Other Important unit specific Information

N/A

Unit outcome

· This unit is not graded and the student must complete and submit all requirements for the assessment task for this cluster or unit of competency to be deemed competent.

· Students will receive a ‘satisfactorily completed’ (S) or ‘not yet satisfactorily completed (NS) result for each individual unit assessment task (UAT).

· Final unit result will be recorded as competency achieved/competent (C) or competency not yet achieved/not yet competent (NYC).

Unit Assessment Task (UAT) -1

Assessment Task 1 – Unit Knowledge Test (UKT)

Assessment type:

· Written Questions

Instructions:

· This is an individual assessment.

The purpose of this assessment task is to assess the students’ knowledge required to ensure secure file encryption is selected, implemented and monitored on a computer network or local environment.

· To make full and satisfactory responses you should consult a range of learning resources, other information such as handouts and textbooks, learners’ resources and slides.

· All questions must be answered in order to gain competency for this assessment.

You may attach a separate sheet if required.

You must include the following particulars in the footer section of each page of the attached sheets:

· Student ID or Student Name

· Unit ID or Unit Code

· Course ID or Course Code

· Trainer and assessor name

· Page numbers

You must staple the loose sheets together along with the cover page.

You must attach the loose sheets chronologically as per the page numbers.

· Correction fluid and tape are not permitted. Please do any corrections by striking through the incorrect words with one or two lines and rewriting the correct words.

Resources required to complete the assessment task:

Learner guide
PowerPoint presentation
Unit Assessment Pack (UAP)
Access to other learning materials such as textbooks

Access to a computer, the Internet and word-processing system such as MS Word.

Question 1: Answer the following questions:

A. What do you understand VLAN is and also relate its advantages? Write your answer in 100-150 words.

B. What are the steps involved in the configuration, verification and troubleshooting for virtual local area (VLAN) switching?

Question 2: Answer the following questions.

A) What is VLAN Trunk and what protocol is used in VLAN Trunk? Answer in 70-100 Words.

B) Briefly explain the basic commands to configure, verify and troubleshoot VLAN Trunk.

Question 3: Answer the following questions:

A) What is routing and list three types of routing?

B) Briefly explain the basic router configuration procedure. Answer in 30-50 words.

C) Briefly explain the router troubleshooting and verification procedure. Answer in 50-100 words.

Question 4: Summarise the following each in 150-200 words.

A. iDevice operating system (iOS)

B. Internet Protocol (IP) Networking Model

Question 5: Summarise the following security protection mechanisms:

A. Intrusion Prevention System (IPS)

B. Intrusion Detection System (IDS)

Write 100-150 words for each.

Question 6: What are four (4) network threat mitigation strategies? Write 30-70 words for each.

Question 7: Answer the following questions:

A. Briefly explain two regulations you need to follow in Australia related to ICT sector? Write your response in 150-200 words.

B. What are the three (3) mostly used Wireless Standards? Write your answer in 100-150 words.

C. Explain CCNA and CCNP wireless certifications each in 50-80 words.

Question 8: What are the six (6) wireless network deployment schemes? Write your response in 150-200 words.

Question 9: Explain the following wireless network security technologies each in 100-150 words:

A. WEP – Wired Equivalent Privacy

B. Wi-Fi Protected Access (WPA)

Question 10: What are the two (2) wireless network topologies? Write 50 -100 words for each.

Question 11: Answer the following questions:

A. Explain two (2) Wireless Network Architectures and its characteristics? Write your response in 100-150 words for each.

B. Summarise six (6) Wireless Network Elements each in 40-80 words.

Question 12: Briefly explain the following wireless network technologies? Answer in 30-60 words each.

a. Wireless Personal Area Network (WPAN)

b. Wireless Local Area Network (WLAN)

c. Wireless Metropolitan Area Network (WMAN)

d. Wireless Wide Area Network (WWAN)

Question 13: What are the three (3) wireless network protocols? Write 30-70 words for each.

Question 14: Answer the following questions:

A. Explain how can firewalls provide advanced security platform for WLAN? Write your response in 50-100 words.

B. What are the ten (10) features to consider in a firewall as an advanced security platform for WLAN? Write your answer in 100-150 words.

C. Explain how antivirus (Security platform) can help to improve wireless network? Answer in 30-50 words.

Question 15: List three (3) WLAN devices along with their specifications and uses? Write 50-100 words for each device.

Question 16: Summarise the following:

A. What are the WLAN Radio frequency characteristics? Write your response in 150-200 words.

B. Explain the two (2) measuring techniques of WLAN Radio frequency each in 80-120 words.

Question 17: Answer the following questions:

A. What are the three (3) types of security policies to ensure organisational and regulatory standards? Write 100-150 words for your response.

B. What are the two (2) benefits of Network Security Compliance Regulations? Write 50-100 words for each benefit.

Question 18: Answer the following questions:

A. What are the benefits of Wireless Network Access Services? Write your answer in 150-200 words.

B. What is a Wireless LAN Controller and what are its features? Write 150-200 words for your response?

C. Explain Auto Anchor Mobility Mode in 100-150 words.

D. List the ten (10) steps involved in troubleshooting guest access issues.

Question 19: Answer the following.

A. What is management frame protection and how does it help to secure the wireless infrastructure? Write your response in 100-150 words.

B. Explain integration of Network Access Control with network security tools in 100-150 words.

C. Explain Client Certificates and Server Certificates each in 80-120 words.

Question 20: Answer the following questions:

A: Summarise two (2) causes and their solutions for slow wireless connections? Write your response in 150-200 words

B: What are the seven (7) factors to consider for Work Health and Safety in network installation operations? Write 30-70 words for each in your answer.

Question 21: Answer the following questions:

A. What are the features of Cisco Network Admission Control Solution? Write your answer in 100-150 words.

B. Explain four-factor authentication in 50-100 words.

Question 22: Answer the following Questions:

A. What are the features of WLAN Controllers? List any five.

B. What are the capabilities of Network Access Control? Write your response in 50-100 words.

Question 23: Answer the following questions:

A. What are the five (5) elements of wireless network security solution? Write 30-50 words for each solution.

B. What are the factors to consider while configuring firewall for wireless network? Write your answer in 100-150 words.

Unit Assessment Task (UAT)-2

Assessment Task 2 – Unit Project (UP)

Assessment type:
Unit Project (UP)

Instructions to complete this assessment task:

· Please write your responses in the template provided.

· You may attach a separate sheet if required.

· You must include the following particulars in the footer section of each page of the attached sheets:

· Student ID or Student Name
· Unit ID or Unit Code
· Course ID or Course Code
· Trainer and assessor name
· Page numbers

· You must staple the loose sheets together along with the cover page.

· You must attach the loose sheets chronologically as per the page numbers.

· Correction fluid and tape are not permitted. Please do any corrections by striking through the incorrect words with one or two lines and rewriting the correct words.

· The premise of the project must be closely related to the previous assessment task.

· This submission must be well presented and follow the guidelines and instructions provided.

· Please follow the format as indicated in the template section below.

· One of the most important steps that you can take: proofread your project.

· Project must be of 500-800 words in length, using 11-point font, double-spaced, and must include a cover page, table of contents, introduction, body, summary or conclusion, and works cited.

· Appropriate citations are required.

· All RTO policies are in effect, including the plagiarism policy.

Scenario: –

Devon Technical College is a private Registered Training Organisation (RTO) with a campus based in Western Melbourne. It offers over 40 certificate and diploma level qualifications in the Vocational Education and Training (VET) sector for a large number of subject areas including business, community services, education, information technology, health, hospitality, and many others.

Students select from one of two study shifts (morning or afternoons) to undertake study which is self-directed in nature or trainer led, and to undertake assessments. With the self-directed courses, trainers/assessors are on hand to handle student’s queries, while other courses are trainer led.

There are currently 450 students that attend the institute across a wide range of classrooms.

The RTO has basic Wi-Fi for the students, staff and visitors. Stakeholders use different devices like phones, tablets and laptops. The current Wi-Fi has the following issues:

· No security for Wi-Fi

· Some areas do have Wi-Fi access

· Access point is not setup properly

· Slow or no internet

Organisational and regulatory policies

The wireless network for the RTO must meet the following needs:
1. Complete network coverage with wired and wireless network, providing constant stable network access for students, staff and visitors.
2. Network isolation between students, staff and visitors, ensuring network safety.
3. Access authentication, access permission management, and advertising promotion.
4. Simple network maintenance and management, low cost for devices maintenance.
5. All the data must be store in a safe location and make sure data is backed up every three hours
6. All the students information including Id’s must be safe and secure
7. Data system must compile with Australian privacy policy
Also, the Work Health and Safety Policies for installation of Wireless Network for the RTO states the following:
Ensuring safety in the network installation sector
· Working with power tools: It is not unusual that a network installation team must drill through walls and even modify buildings to install a network and cables. Does your team have the correct equipment? Is it calibrated and maintained, and does your team have the correct training and protective equipment to use it safely?
· Knowledge of dangerous areas and substances in buildings: It is possible that your network team may be working in areas of danger within a building. Whether that is down to hazardous gases or substances that may be released if a drilling operation goes wrong, does your team have the knowledge and expertise to respond to that situation and mitigate the risk of accident by taking the correct action?
· Correct product and electrical knowledge: Working with networks and electrical circuits has an inherent level of danger. Is your team properly qualified, trained, and instructed? Has the correct information been shared with the team, and any anomalies pointed out to allow the risk of an accident to be reduced?
· Working at height: This is common for network installation teams. Does your team have the correct equipment and training, and have the risks been correctly quantified before the project has begun?
· General health and safety training: Network installation sites are often buildings that are not fully complete, so the normal hazards of “slips and trips” will usually exist. Training your staff to recognize these situations can remove much of the danger that these hazards bring.
· Risk assessment: A critical part of the identification of hazards is risk assessment. Does your organization have a process whereby sites are assessed for risks to prevent hazards from becoming reasons for incidents or accidents? Risk assessment is at the core of any WHS policies and procedures, and it should be for any organisation operating in the network installation sector. Effective risk assessment can play a central part in reducing hazards and lowering risk in most predicted workplace circumstances.
· First aid training: Has your team had the necessary training to ensure that they can deal with an accident or emergency at what might be a remote site? Does your team carry a basic first aid kit to deal with such situations? Does your team have good methods of communication, such as mobile phones to allow them to communicate in a situation where hazards are present? First aid training can also help in a preventive sense – extra knowledge of how to treat accidents can help to formulate ideas on how to identify hazards and prevent accidents.

The wireless network setup including the Access Points-AP are all handled and managed by the IT department of the RTO. The IT department is responsible for not only providing the Wireless Access to the customers and the staff members but also responsible for the management of the whole IT and the Network infrastructure of the RTO.

The IT network itself is comprised of the Servers, Computers, Printers, Scanners, Online CCTV camera setup along with the wireless access point. This IT infrastructure is all connected with an efficient and sophisticated Local Area Network. As highlighted earlier while establishing the Access Point the IT department has already segmented into multiple access control parameters ensuring the segregation of customers, staff of different shops and the IT staff of the account.

IT department needs to design and implement a wireless network security solution of the RTO. The IT department is headed by the ICT Manager Steve who is responsible for the management and the administration of the whole IT setup of the RTO while Smith the Network Security Engineer works in coordination with the ICT Manager to manage and setup the network infrastructure of the RTO. The job responsibilities of both the key IT personal along with the Network Diagram of the RTO to illustrate the network infrastructure and Wireless access points are given below:

Job description of the ICT Manager:

· Analysing information needs and specifying technology to meet those needs

· Formulating and directing information and communication technology (ICT) strategies, policies and plans

· Directing the selection and installation of ICT resources and the provision of user training

· Directing ICT operations and setting priorities between system developments, maintenance and operations

· Overseeing the security of ICT systems

· Running regular checks on network and data security

· Identifying and acting on opportunities to improve and update software and systems

· Developing and implementing IT policy and best practice guides for the organisation

· Designing training programs and workshops for staff

· Conducting regular system audits

· Running and sharing regular operation system reports with senior staff

· Overseeing and determining timeframes for major IT projects including system updates, upgrades, migrations and outages

· Managing and reporting on allocation of IT budget

· Providing direction for IT team members

· Identifying opportunities for team training and skills advancement

Job description of the Network Engineer:

· Planning, engineering, and monitoring the security arrangements for the protection of the network systems.

· Identifying, monitoring, and defining the requirements of the overall security of the system.
Creating different ways to solve the existing threats and security issues.

· Configuring and implementing intrusion detection systems and firewalls.

· Testing and checking the system for weaknesses in software and hardware.

· Maintaining firewalls, virtual private networks, web protocols, and email security.

· Creating virus and threat detection systems.

· Configuring and installing security infrastructure devices.

· Investigating intrusion and hacking incidents, collecting incident responses, and carrying out forensic investigations.

· Determining latest technologies and processes that improve the overall security of the system.

· Using industry-standard analysis criteria to test the security level of the firm.

· Developing tracking documents to note system vulnerabilities.

· Reporting the security analysis and monitoring findings.

· Supervising the configuration and installation of new software and hardware.

· Implementing regulatory systems in accordance with IT security.

· Informing the company about the security incidents as soon as possible.

· Modifying the technical, legal, and regulatory aspects of the system security.

· Defining and maintaining security policies.

· Occasionally replacing the security system protocol and architecture.

· Maintaining switches and servers.

Network diagram of the RTO to give illustration of all the all the computers, printers, scanners, servers, Wi-Fi access points, switches, routers

Activity 1:

Task 1: Wireless Network Security Plan

The IT department is keen to design and implement wireless network security for Devon Technical College to ensure efficient and more secured usage of network resources for the students, staff members and visitors. For the design and the implementation of the wireless network security the IT department needs to draft and document a wireless network security plan. This security plan will help to understand both the requirements of the security parameters and the implementation mechanism to be followed for the wireless network security.

The student will act as the Network Security Engineer and will prepare the wireless network security plan as per the requirements specified by the ICT Manager and the management of Devon Technical College. The Network Security Engineer will prepare the security plan under the assistance of the ICT Manager and as per the network infrastructure of the RTO. Also, the Network Security Manager needs to ensure that the plan is according to continuous growth of the IT setup and as per the security needs and that can also be used for the future correspondence.

The Wireless Network Security Plan must include the following and also the student needs to complete the template for the security plan given below:

· Review given organisational and regulatory policies to identify security standards

· Review RTO stakeholders issues and requirements against WHS and security compliance requirements

· Develop a wireless network security plan including the following

· Purpose of the plan

· Define stakeholder

· Issues with the current wireless system

· Hardware and software required

· Wi-Fi protection (Security)

· Security threats and risks

· Firewall requirements of wireless security

Template for Wireless Network Security Plan

Wireless Network Security Plan

Purpose:

Stakeholders:

Issues with the current wireless system

Hardware and software

Wi-Fi protection (Security)

Security threats and risks

Firewall requirements of wireless security

Task 2: Analysis of Guest Access Services

For the design and implementation of the guest access services, you need to discuss with the ICT Manager about different architectures of guest access services and need to elaborate each and select one in consultation with the ICT Manager as per your requirements.

The trainer/assessor will act as the ICT Manager and will discuss and sort out all the queries relating the guest access service. The guest access service will help to define the mechanisms of granting access to the different users including the permanent and the guest users. Also, complete the minutes of meetings given below for the analysis of the guest access services.

You need to complete this task in 10-15 minutes and your trainer may provide you additional time if required.

You are required to complete the following meeting minute’s template and submit to your trainer/assessor.

Minutes of Meeting

Meeting Objective:

Attendees:

Venue:

Date:

No

Points Discussed

Actions Suggested

Target Date

Signature of attendee 1: Signature of attendee 2:

Signature of attendee 3: Signature of attendee 4:

Performance criteria checklist for unit assessment task:

Trainer/ Assessor to complete

Does the candidate meet the following criteria

Yes

No

Trainer/Assessor Comments

Review given organisational and regulatory policies to identify security standards

Review RTO stakeholders issues and requirements against WHS and security compliance requirements

Develop a wireless network security plan including the following:
· Purpose of the plan
· Define stakeholder
· Issues with the current wireless system
· Hardware and software required
· Wi-Fi protection (Security)
· Security threats and risks
· Firewall requirements

Discuss the different guest access services with the ICT manager

Activity 2: Design, implement and test a wireless local area network (WLAN) site security plan

Task 1: Design a wireless local area network (WLAN) site security plan

In this task you need to produce a map for wireless network for the RTO. In the map you need to include:

· Access points

· Devices

· Guest access

· Switch

· Router

You are required to prepare a map in a packet tracer software and provide IP address to the relevant devices.

You need to submit you network map to your trainer and assessor. You need to complete this task in 1-2 hours. Trainer may provide you additional time if required.

Task 2: Implement and test a wireless local area network (WLAN) site security plan

Note: This activity is continuing of a previous activity.

Reference to the wireless network security plan developed in the previous activity, you are being the Network Security Engineer needs to implement the WLAN security plan. You need to implement the plan in coordination with the ICT Manager which will be acted by the trainer/assessor. For the implementation of the network security, you need to perform the tasks in the environment of a Live Network environment provided by the trainer/assessor.

The trainer/assessor will act as a supervisor and will guide you through the initial process of implementation the network security plan on the network infrastructure.

You need to complete this task in 6-8 hours. Your trainer may provide you additional time if required.

Note: For This activity RTO/Assessor will provide you the following:

· A site or prototype where network installation may be conducted

· Hardware and software (Included in the security plan)

· Organisational guidelines (Scenario)

· Live network
· Stand-alone and lightweight WLAN controllers and access points (AP)
· Hardware and software WLAN site survey tools
· Hardware and software IDS and IPS.

The student needs to perform the WLAN security implementation including the following:

· Setup and configure guest access accounts

· Set the Guest Username Policy

· Set the Employee Name Policy

· Create a self-registered portal

· Manage guests account

· Manage Employee Accounts

· Configure WLAN controller authorisation

· Configure DHCP

· Configure Virtual Gateway IP

· Use Broadcast SSID

· Enable Local Client Profiling

· Configure the anchor and internal controllers

· Configuration of the authentication of clients and management frame protection on clients and controllers

· Restrictions for Management Frame Protection

· Viewing the Management Frame Protection Settings (GUI)

· Debugging Management Frame Protection Issues

· Configure access control servers for integration with wireless network

· Configure client- and server-side digital certificate services

· Test, verify and troubleshoot the following:

· Guest Access Issues

· Wireless Connectivity Services

· IP Connectivity Failure

Performance criteria checklist for unit assessment task:

Trainer/ Assessor to complete

Does the candidate meet the following criteria

Yes

No

Trainer/Assessor Comments

Created a network plan in packet tracer including:
· Access points
· Devices
· Guest access
· Switch
· Router

Setup and configure guest access accounts
· Set the Guest Username Policy
· Set the Employee Name Policy
· Create a self-registered portal
· Manage guests account
· Manage Employee Accounts

Configure WLAN controller authorisation
· Configure DHCP
· Configure Virtual Gateway IP
· Use Broadcast SSID
· Enable Local Client Profiling

Configure the anchor and internal controllers

Configuration of the authentication of clients and management frame protection on clients and controllers
· Restrictions for Management Frame Protection
· Viewing the Management Frame Protection Settings (GUI)
· Debugging Management Frame Protection Issues

Configure access control servers for integration with wireless network

Configure client- and server-side digital certificate services

Test, verify and troubleshoot the following:
· Guest Access Issues
· Wireless Connectivity Services
· IP Connectivity Failure

Unit Assessment Task (UAT)-3

Assessment Task 3 – Unit Project (UP)

Assessment type:
Unit Project (UP)

Instructions to complete this assessment task:
· Please write your responses in the template provided.
· You may attach a separate sheet if required.
· You must include the following particulars in the footer section of each page of the attached sheets:
· Student ID or Student Name
· Unit ID or Unit Code
· Course ID or Course Code
· Trainer and assessor name
· Page numbers
· You must staple the loose sheets together along with the cover page.
· You must attach the loose sheets chronologically as per the page numbers.
· Correction fluid and tape are not permitted. Please do any corrections by striking through the incorrect words with one or two lines and rewriting the correct words.
· The premise of the project must be closely related to the previous assessment task.
· This submission must be well presented and follow the guidelines and instructions provided.
· Please follow the format as indicated in the template section below.
· One of the most important steps that you can take: proofread your project.
· Project must be of 500-800 words in length, using 11-point font, double-spaced, and must include a cover page, table of contents, introduction, body, summary or conclusion, and works cited.
· Appropriate citations are required.
· All RTO policies are in effect, including the plagiarism policy.

Activity 1 – Analysis of the END to END wireless security solution

This activity is continuing from the previous assessment task.

Once the planning of the wireless network security solution is done along with the implementation of the network security plan. You need to analyse the end to end wireless network security solution. For that you need to prepare a report on the evaluation of the network security.

You will prepare the report under the supervision of the trainer/assessor and needs to complete the template given below. The report will not only help to strengthen the wireless network security but will also help to update network security plan in order to mitigate wireless network vulnerabilities for the security and the integrity of the network:

The report must include the following and you are also required to complete the template of the report given below:

· Purpose of the report

· Stakeholders

· Analyse end to end Wireless network Security solution

· Research end to end security solutions (Internet)

· Write security procedures or steps you will follow to implement end to end security

· Analyses given network architecture and identify the feasibility of the network

· Overview of network admission control

· Identify additional servers and/or services required

· Evaluate high level authentication process to ensure integration of the network

· Check different authentication levels and security of current network

Template for Report on Analysis of the END to END wireless security solution

Analysis of the END to END wireless security solution

Purpose:

Stakeholders:

End to end Wireless network Security solution

Network Admission Control Architecture

Overview

Identify additional servers and/or services required

High level authentication process

Performance criteria checklist for unit assessment task:

Trainer/ Assessor to complete

Does the candidate meet the following criteria

Yes

No

Trainer/Assessor Comments

Prepared a report including:
· Purpose of the report
· Stakeholders
· Analyse end to end Wireless network Security solution
· Research end to end security solutions (Internet)
· Write security procedures or steps you will follow to implement end to end security
· Analyses given network architecture and identify the feasibility of the network
· Overview of network admission control
· Identify additional servers and/or services required
· Evaluate high level authentication process to ensure integration of the network
· Check different authentication levels and security of current network

Activity 2: Testing of Wireless Controllers and IDPS Solutions

Continuing from the previous tasks, you need to test wireless controllers using the network tools along with the IPDS solution. This will help to manage the requirements of WLAN as per the advanced security requirements. You will perform the testing under the supervision of the trainer/assessor.

You need to complete this activity in 6-8 hours. Your trainer may provide you additional time if required.

Note: For This activity RTO/Assessor will provide you the following:
· A site or prototype where network installation may be conducted
· Hardware and software

· Organisational guidelines (Given in the scenario)

· Live network
· Stand-alone and lightweight WLAN controllers and access points (AP)
· Hardware and software WLAN site survey tools
· Hardware and software IDS and IPS.

You need to perform the testing of wireless controllers and the IPDS solution as per the following:

· Wireless controllers

· Configure wireless controllers

· Test the functionality of wireless controller

· Configure the IDS to prevent malicious activities

· Configuring Rogue Detection (GUI)

· Configuring Rogue Detection (CLI)

· Classifying Rogue Devices

· Configuring Rogue Classification Rules (GUI)

· Configuring Rogue Classification Rules (CLI)

· Viewing and Classifying Rogue Devices (GUI)

· Troubleshoot the integration issues with access control

· Configure and test the WLAN controllers for wired and wireless IPDS network security

· Configuring IDS Signatures

· Viewing IDS Signature Events

· Configuring SNMP

· Changing the SNMP Community String Default Values

· Configuring Real Time Statistics

· Configuring SNMP Trap Receiver

· Check firewall configuration

· Review the inbound and outbound security

· Check the firewall setting is aligned with the organisational firewall requirements

· Use network tools (at least two tools)

· Test wireless controllers

· Test IPDS solutions at least two tools

· Review report produced by IDS related to network threats

· Update the security plan based on IDS, firewall and SNMP configuration to reduce wireless vulnerabilities

Performance criteria checklist for unit assessment task:

Trainer/ Assessor to complete

Does the candidate meet the following criteria

Yes

No

Trainer/Assessor Comments

· Wireless controllers
· Configure wireless controllers
· Test the functionality of wireless controller

· Configure the IDS to prevent malicious activities
· Configuring Rogue Detection (GUI)
· Configuring Rogue Detection (CLI)
· Classifying Rogue Devices
· Configuring Rogue Classification Rules (GUI)
· Configuring Rogue Classification Rules (CLI)
· Viewing and Classifying Rogue Devices (GUI)

Review report produced by IDS related to network threats

Troubleshoot the integration issues with access control

· Configure and test the WLAN controllers for wired and wireless IPDS network security
· Configuring IDS Signatures
· Viewing IDS Signature Events
· Configuring SNMP
· Changing the SNMP Community String Default Values
· Configuring Real Time Statistics
· Configuring SNMP Trap Receiver

· Check firewall configuration
· Review the inbound and outbound security
· Check the firewall setting is aligned with the organisational firewall requirements

· Update the security plan based on IDS, firewall and SNMP configuration to reduce wireless vulnerabilities

· Use network tools (at least two tools)
· Test wireless controllers
· Test IPDS solutions at least two tools

End of the Assessment

ICTNWK607- Student Assessment Pack V1.0 March 2019

ICTNWK609– Configure and Manage Intrusion Prevention System on Network Sensors

Student Assessment Pack

Student and Trainer/Assessor Details

Student ID

Student name

Contact number

Email address

Trainer/Assessor name

.

Course and Unit Details

Course code

ICT60215

Course name

Advanced Diploma of Network Security

Unit code

ICTNWK609

Unit name

Configure and manage intrusion prevention system on network sensors

Assessment Submission Method

☐ By hand to trainer/assessor

☐ By email to trainer/assessor

☐ Online submission via Learning Management System (LMS)

Student Declaration

· I certify that the work submitted for this assessment pack is my own. I have clearly referenced any sources used in my submission. I understand that a false declaration is a form of malpractice;
· I have kept a copy of this assessment pack and all relevant notes, attachments, and reference material that I used in the production of the assessment pack;
· For the purposes of assessment, I give the trainer/assessor of this assessment the permission to:
· Reproduce this assessment and provide a copy to another member of staff; and
· Take steps to authenticate the assessment, including communicating a copy of this assessment to a checking service (which may retain a copy of the assessment on its database for future plagiarism checking).
Student signature: ________________________________
Date: ____/_____/______________

Assessment Plan

To demonstrate competence in this unit, you must be assessed as satisfactory in each of the following assessment tasks.

Evidence recorded

Evidence Type/ Method of assessment

Sufficient evidence recorded/Outcome

Unit Assessment Task 1

Unit Knowledge Test (UKT)

S / NS (First Attempt)
S / NS (Second Attempt)

Unit Assessment Task 2

Unit Project (UP)

S / NS (First Attempt)
S / NS (Second Attempt)

Unit Assessment Task 3

Unit Project (UP)

S / NS (First Attempt)
S / NS (Second Attempt)

Final result

C/NYC

Date assessed

Trainer/Assessor Signature

Assessment Conditions

Unit purpose/application

This unit describes the skills and knowledge required to use appropriate tools, equipment and software to implement an intrusion prevention system (IPS) on IPS sensors to mitigate network attacks.

It applies to individuals with advanced information and communications technology (ICT) skills who are working as certified IPS specialists, network security specialists and network security managers.

No licensing, legislative or certification requirements apply to this unit at the time of publication.

What the student can expect to learn by studying this unit of competency

· Evaluate the ways IPS sensors are used to mitigate network attacks

· Select and install IPS sensors and configure essential system parameters

· Tune IPS sensor advanced system parameters to optimise attack mitigation performance

· Manage security and response of the IPS to network attacks

Training and assessment resources required for this unit of competency

The student will have access to the following:

·

Student guide

·

PowerPoint presentation

·

Unit Assessment Pack (UAP)

·

Access to other learning materials such as textbooks

The resources required for these assessment tasks also included:

·

Access to a computer, the Internet and word-processing system such as MS Word.

· A site or prototype where network installation may be conducted

· Relevant hardware and software

· Organisational guidelines

· Live network

· An IPS system and its sensors.

Simulated assessment environments must simulate the real-life working environment where these skills and knowledge would be performed, with all the relevant equipment and resources of that working environment.

Submission instructions

Your trainer/assessor will confirm assessment submission details for each assessment task.

Academic integrity, plagiarism and collusion

Academic Integrity

Academic Integrity is about the honest presentation of your academic work. It means acknowledging the work of others while developing your own insights, knowledge and ideas.

As a student, you are required to:

· undertake studies and research responsibly and with honesty and integrity

· ensure that academic work is in no way falsified

· seek permission to use the work of others, where required

· acknowledge the work of others appropriately

· take reasonable steps to ensure other students cannot copy or misuse your work.

Plagiarism

Plagiarism means to take and use another person’s ideas and or manner of expressing them and to pass them off as your own by failing to give appropriate acknowledgement. This includes material sourced from the internet, RTO staff, other students, and from published and unpublished work.

Plagiarism occurs when you fail to acknowledge that the ideas or work of others are being used, which includes:

· Paraphrasing and presenting work or ideas without a reference

· Copying work either in whole or in part

· Presenting designs, codes or images as your own work

· Using phrases and passages verbatim without quotation marks or referencing the author or web page

· Reproducing lecture notes without proper acknowledgement.

Collusion

Collusion means unauthorised collaboration on assessable work (written, oral or practical) with other people. This occurs when a student presents group work as their own or as the work of someone else.

Collusion may be with another RTO student or with individuals or students external to the RTO. This applies to work assessed by any educational and training body in Australia or overseas.

Collusion occurs when you work without the authorisation of the teaching staff to:

· Work with one or more people to prepare and produce work

· Allow others to copy your work or share your answer to an assessment task

· Allow someone else to write or edit your work (without rto approval)

· Write or edit work for another student

· Offer to complete work or seek payment for completing academic work for other students.

Both collusion and plagiarism can occur in group work. For examples of plagiarism, collusion and academic misconduct in group work please refer to the RTO’s policy on Academic integrity, plagiarism and collusion.

Plagiarism and collusion constitute cheating. Disciplinary action will be taken against students who engage in plagiarism and collusion as outlined in RTO’s policy.

Proven involvement in plagiarism or collusion may be recorded on students’ academic file and could lead to disciplinary action.

Other Important unit specific Information

N/A

Unit outcome

· This unit is not graded and the student must complete and submit all requirements for the assessment task for this cluster or unit of competency to be deemed competent.

· Students will receive a ‘satisfactorily completed’ (S) or ‘not yet satisfactorily completed (NS) result for each individual unit assessment task (UAT).

· Final unit result will be recorded as competency achieved/competent (C) or competency not yet achieved/not yet competent (NYC).

Unit Assessment Task (UAT)-1

Assessment Task 1 – Unit Knowledge Test (UKT)

Assessment type:

· Written Questions

Instructions:

· This is an individual assessment.

The purpose of this assessment task is to assess the students’ knowledge required to ensure secure file encryption is selected, implemented and monitored on a computer network or local environment.

· To make full and satisfactory responses you should consult a range of learning resources, other information such as handouts and textbooks, students’ resources and slides.

· All questions must be answered in order to gain competency for this assessment.

You may attach a separate sheet if required.

You must include the following particulars in the footer section of each page of the attached sheets:

· Student ID or Student Name

· Unit ID or Unit Code

· Course ID or Course Code

· Trainer and assessor name

· Page numbers

You must staple the loose sheets together along with the cover page.

You must attach the loose sheets chronologically as per the page numbers.

· Correction fluid and tape are not permitted. Please do any corrections by striking through the incorrect words with one or two lines and rewriting the correct words.

Resources required to complete the assessment task:

Student guide
PowerPoint presentation
Unit Assessment Pack (UAP)
Access to other learning materials such as textbooks
Access to a computer, the Internet and word-processing system such as MS Word.

Question 1: Answer the following questions:

A) Explain the steps to setting up a Cisco Router including configuration and verification/testing.

B) Explain the troubleshooting process for the following issues:

· Console is not responsive

· Traffic does not pass through

Question 2: What are the five (5) key features of deployment schemes? Write your answer in 200-250 words.

Question 3: In order to setup network security to the enterprise level network, firewalls are implemented to mitigate with network attacks. Summarise are the ten (10) steps involved in setting and securing firewall.

Question 4: Explain the following terms each in 150-200 words.

1. Internetwork operating system (iOS)

2. Internet Protocol (IP) Networking Model

Question 5: What are the steps involved in design and implementation of the following?

· Local Area Network (LAN)

· Wide Area Network (WAN)

Question 6: Summarise the following terms each in 130-180 words.

A. IP Addressing

B. Transmission Control Protocol

C. IP stack

Question 7: Summarise the five (5) IPS and IDS deployment strategies to mitigate network attacks. Write your response in 250-300 words

Question 8: Setting up a network for a Network Administrator requires the basic knowledge of network fundamentals, these include the topology, architecture and elements of the network which need to be designed as per the requirements of the enterprise.

A) What do you understand from the term Network Topology? Also, summaries five (5) models of network topology. Write your response in 240-270 words.

B) Explain the following terms, each in 100-150 words.

1. Network Architectures

2. Network Elements

Question 9: While studying computer networks, the student must know the basic terms of network standards and network protocols. Explain these two terms and write 100-150 words for each in your response.

Question 10: What are the six (6) threat mitigation strategies required for network security? Write 30-60 words for each strategy in your response.

Question 11: Summarise the two (2) Intrusion Prevention System sensor technologies. Write 100-150 words for each.

Question 12: What is the network function of Transmission Control Protocol? Write your response in 150-200 words.

Question 13: Summarise virtual private network technologies. Write your response in 150-200 words.

Question 14: Explain the following terms each in 150-200 words.

a) IPS Signatures

b) Meta Signatures

Question 15: Describe two legislation, regulations, standards and codes of practice relevant to the network security? Write your response in 250-350 words.

Question 16: What are the steps involved for the following?

a) Configuration of a Cisco Switch

b) Verify a Switch

c) Troubleshooting of Switch

Question 17: What are the three (3) benefits to deploy an access management on IPS sensor? Write your answer in 150-200 words

Question 18: A) Summarise anomaly detection and its modes. Write your response in 50-100 words.

A) What are the four (4) approaches to monitor the IPS sensor? Write your response in 150-200 words

B) Explain two (2) basic types of IPS signatures, each in 50-80 words.

Question 19: Explain Passive operating system fingerprinting and list the OS fingerprinting tools. Write your response in 200-250 words

Question 20: Summarise the following terms:

A) External Product interfaces

B) Promiscuous vs. Inline Mode

C) VLAN

D) VLAN functionality

E) VLAN group

Unit Assessment Task (UAT)-2

Assessment Task 2 – Unit Project (UP)

Assessment type:
Unit Project (UP)

Instructions to complete this assessment task:

· Please write your responses in the template provided.

· You may attach a separate sheet if required.

· You must include the following particulars in the footer section of each page of the attached sheets:

· Student ID or Student Name
· Unit ID or Unit Code
· Course ID or Course Code
· Trainer and assessor name
· Page numbers

· You must staple the loose sheets together along with the cover page.

· You must attach the loose sheets chronologically as per the page numbers.

· Correction fluid and tape are not permitted. Please do any corrections by striking through the incorrect words with one or two lines and rewriting the correct words.

· The premise of the project must be closely related to the previous assessment task.

· This submission must be well presented and follow the guidelines and instructions provided.

· Please follow the format as indicated in the template section below.

· One of the most important steps that you can take: proofread your project.

· Project must be of 500-800 words in length, using 11-point font, double-spaced, and must include a cover page, table of contents, introduction, body, summary or conclusion, and works cited.

· Appropriate citations are required.

· All RTO policies are in effect, including the plagiarism policy.

Resources required to complete the assessment task:

· Computer

· Internet

· MS Word

· A site where IPS sensor installation may be conducted

· A live network

· Servers

Scenario: –

HTK Bank is one of the emerging banks and provide one of the best banking services to its customers. The bank works in a paperless environment and all the branches are connected to the head office using secured VPNs and thus network security is of immense importance for the bank. In the recent years, the bank has been able to provide latest and updated technology oriented online services. The bank aims to facilitate the customers to their satisfaction. Also, all HTK Bank employees are responsible for the information security. The bank has clearly defined its policy for its information security which includes the following:

· Identify and manage information security risks, while taking into account their impact on banking business.

· Define information security policies, strategies and standards.

· Assist and advise owners of information in evaluating risks and required levels of protection, and in choosing appropriate security measures.

· Make all employees aware of information security and the importance of their involvement.

· To determine the responsibilities and duties towards information security concerning employees, managers, and contractors.

· Classification of the assets of the bank and determine the required levels of protection using international standards. Item No.

· Upgrade security access to bank facilities: Implement additional security protocols of entry and access to bank facilities, including sensitive equipment, information systems and databases.

· Password Management: The establishment of the passwords and other security related responsibilities.

· Physical and environmental security: Identifying facilities to protect and prevent unauthorised access, information theft, equipment theft and disruption of work or eavesdropping. Also, protecting infrastructure equipment such as fire equipment and air conditioners.

· E-Mail Security: The establishment of protocols to protect E-mails and databases. Email is the largest distributor of viruses and spam which needs mechanisms and procedures to make sure data is not corrupted or stolen. Item No.

· Personal security: Introduction of mechanisms to reduce human error, theft, embezzlement and corruption.

· Upgrade Encryption: To upgrade and maintain the confidentiality, creditability, and integrity of the information using the latest encryption software.

· Remote Access: Establishment of security precautions and mechanisms to be taken to prevent access to the bank’s internal network using remote access.

· Systems development and maintenance: Analyse, maintain and upgrade the current system in place to ensure building security. The mechanisms focus on       peacekeeping, security, encryption, data and configuration.

· Antivirus: Analyse the procedures and software for anti-virus and anti-spam software.

· Backup: Establish procedures to backup copies of data, storage media and information security.

· Incident Response: Procedure to learn, monitor and reduce time of security breaches and breakdowns in the system operations to reduce direct or indirect damage to the CBL and the public.

· Security of networks and facilities: Protect networks from eavesdropping, spying, theft, disruption, and unwanted modification.

· Continuity of workflow management: Protection of sensitive business tasks and information in the event of a crisis or disaster such as fires or earthquakes.

· Security of wireless communications: Emphasis on proper mobile network encryption.

· Network Security Monitoring: Allow limited access to the information network through the development of a separate network to the public. This network is separated from the internal network to help protect it from malicious attacks.

In order to ensure the privacy, confidentiality and integrity of the Information which are exchanged, disclosed, shared, stored or otherwise used on our system and the Transactions, whether or not the same belongs or originates from you or otherwise, we have engaged the use of a combination of authentication, encryption and auditing mechanisms which serve as a powerful barrier against all forms of system penetration and abuse.Also, to ensure the information security across the network infrastructure of the bank, Jack-IT Manager has implemented following mechanisms:

· Secure Sockets Layer (SSL) channel;

· 128-bit encryption;

· Username and password protection and authentication;

· Firewalls; and

· Account-locking,

all of which have been thoroughly tested in a series of independent security audits and have been determined, whether used separately or together, to effectively protect and safeguard against known security issues and prevent any form of tampering or theft of Information or Transactions, where applicable.

Even then it has been observed that several attacks are made on regular basis by the hackers to access the transactional and financial information. Therefore, the bank utilise services of the NALES Pvt Ltd.

NALES is a global leader in cyber and network security products and services. Over 1500 highly qualified cyber security experts, handle national security in 50 countries, and critical information systems for over 100 clients. 80% of the largest banks, energy and aerospace organisations around the world rely on security delivered by NALES.
With over 40 years of experience in Information Assurance and Security, NALES has an unrivalled understanding of the range of threats that Australian businesses and organisations face. At the heart of what NALES does is the belief that securing people, property and information ensures business continuity and reputation.

George- IT Project Manager has been assigned the task by NALES to implement the IPS sensors on the network of HKT bank. The IT project manager will perform the implementation in coordination and in assistance of the IT Manager of the Bank. The job description of the IT Project Manager is as under:

· Directs, plans and controls all activities and staff of an Information Security area and has full management responsibility for the performance and development of subordinate staff in accordance with corporate strategic direction. May include matrix reporting relationships.

· Directs the design, development, testing and implementation of appropriate information security plans, technologies, capabilities and other detection & response activities.

· Identifies emerging vulnerabilities, evaluates associated risks and threats and provides countermeasures where necessary.

· Manages the reporting, investigation and resolution of data security incidents.

· Maintains contact with industry security standard setting groups, and an awareness of State and Federal legislation and regulations pertaining to data privacy and information security.

· Proposes changes in firm-wide security policy when necessary.

· Directs the Information Security staff in the evaluation of risks and threats, development, implementation, communication, operation, monitoring and maintenance of the IT security policies and procedures which promote a secure and uninterrupted operation of all IT systems.

The job description of the IT Manager at HTK bank is as under:

· Manage information technology and computer systems

· Plan, organize, control and evaluate IT and electronic data operations

· Manage IT staff by recruiting, training and coaching employees, communicating job expectations and appraising their performance

· Design, develop, implement and coordinate systems, policies and procedures

· Ensure security of data, network access and backup systems

· Act in alignment with user needs and system functionality to contribute to organizational policy

· Identify problematic areas and implement strategic solutions in time

· Audit systems and assess their outcomes

· Preserve assets, information security and control structures

· Handle annual budget and ensure cost effectiveness

Activity 1: (Analysing IPS sensor requirements for the mitigation of network attacks)

With reference to the scenario given, and as per the requirements of the bank you need to implement and configure the IPS sensors for optimal network security. Initially you need to analyse the requirements for the IPS Sensor usage, so you need to analyse the following:

· System requirements for along with the requirements to implement IPS sensors for optimal secured performance of the network

· The difference of inline to promiscuous mode sensor operations

· Different evasive techniques used by hackers

· The factors to consider for the selection, placement and deployment of IPS sensors using the feature of IPS signature.

The analysis of the requirements for IPS sensors will not only help in the ways of using the IPS sensors to mitigate network attacks but will also specify how IPS can defeat the attacks on network.

You need to research on internet to find relevant information related to the scenario to complete the given template.

Also, fill the following template for the requirements:

Sr. No.

Analysis Required

Details

1

System Requirements for IPS Sensor

2

Evasion techniques used by Hackers

3

Difference between Inline to Promiscuous mode sensor operations

4

Selection, placement and deployment of IPS sensors

Performance criteria checklist for unit assessment task:

Trainer/ Assessor to complete

Assessment activities to be completed

· Analysing IPS sensor requirements for the mitigation of network attacks
· For a full project outline, please refer to the student assessment instructions

Does the candidate meet the following criteria

Yes

No

Trainer/Assessor Comments

Defined system requirements for network IPS sensors

Analysed the different evasion techniques used by hackers

Analysed the difference between the inline to promiscuous mode sensor operation

Analysed the selection, placement and deployment of the IPS sensor

Completed the template

Activity 2: (Installation and configuration of the IPS sensor)

Note: This activity is in continuation of activity 1.

Now, once the analysis of the requirements has been done, considering the above network diagram you need to install and configure the IPS sensor to the network so that the security parameters can be achieved. You will act as George and the trainer will act as Jack and will provide you the following for the successful completion of the project:

· A site where deployment of IPS sensors may be conducted

· A live network (LAN)

· Servers and computers

· Switches and routers

· Hardware and software security technologies

· Security policies (as per scenario)

Now, once the analysis of the requirements has been done, considering the above network diagram you need to install and configure the IPS sensor to the network so that the security parameters can be achieved. You will act as George and the trainer will act as Jack. Your trainer will provide you the following for the successful completion of the project:

· Install the IPS Sensor and initialise the sensor by configuring the sensor interface, interface pairs, VLAN pairs and VLAN groups. The IPS sensor set up will be done on the router connected to the network

· Configuration of the access management system on the IPS sensor to authenticate and authorise the users

· Implementing the IPS sensor for the external communication and manage it using built it tools of the router

· IPS Monitoring provides an overview of the activity identified by the Intrusion Prevention Systems (IPS) on your network. Monitor the IPS sensor, upgrade and maintain the license of the IPS sensor to maintain the security of the network

· Plan the mitigation in correspondence of the trainer for the relevant network vulnerabilities and exploits. Also, fill the given template to plan the mitigation of the network vulnerabilities.

Student must follow vendor instruction for configuration, management and maintenance of the IPS sensor.

You need to complete this activity in 4-6 hours and additional time may be given on request.

Your trainer and assessor will observe you during the activity and complete the performance checklist.

Template to PLAN the mitigation of network vulnerabilities

Components

Details

Purpose Of The mitigation Plan

Process

Threat/Vulnerability Identification

Risk Response Planning

Bulnerability Monitoring, Controlling, And Reporting

Tools And Practices

Mitigation plan approval

[List the individuals whose signatures are desired. Examples of such individuals are Business Steward, Project Manager or Project Sponsor. Add additional lines for signature as necessary. Although signatures are desired, they are not always required to move forward with the practices outlined within this document.]

Signature:

Date:

Print Name:

Title:

Role:

Signature:

Date:

Print Name:

Title:

Role:

Signature:

Date:

Print Name:

Title:

Role:

Performance criteria checklist for unit assessment task:

Trainer/ Assessor to complete

Assessment activities to be completed

· Installation and configuration of the IPS sensor
· For a full project outline, please refer to the student assessment instructions

Does the candidate meet the following criteria

Yes

No

Trainer/Assessor Comments

Installed the IPS Sensor

Initialised the interface, interface pairs, VLAN pairs and VLAN group

Configured the IPS Sensor

Implemented the access management system

Monitored and maintained the IPS sensor

Planned the mitigation for network security and completed given template

Discussed IPS Sensor requirements according to the organisation requirements

Unit Assessment Task (UAT)-3

Assessment Task 3 – Unit Project (UP)

Assessment type:
Unit Project (UP)

Instructions to complete this assessment task:
· Please write your responses in the template provided.
· You may attach a separate sheet if required.
· You must include the following particulars in the footer section of each page of the attached sheets:
· Student ID or Student Name
· Unit ID or Unit Code
· Course ID or Course Code
· Trainer and assessor name
· Page numbers
· You must staple the loose sheets together along with the cover page.
· You must attach the loose sheets chronologically as per the page numbers.
· Correction fluid and tape are not permitted. Please do any corrections by striking through the incorrect words with one or two lines and rewriting the correct words.
· The premise of the project must be closely related to the previous assessment task.
· This submission must be well presented and follow the guidelines and instructions provided.
· Please follow the format as indicated in the template section below.
· One of the most important steps that you can take: proofread your project.
· Project must be of 500-800 words in length, using 11-point font, double-spaced, and must include a cover page, table of contents, introduction, body, summary or conclusion, and works cited.
· Appropriate citations are required.
· All RTO policies are in effect, including the plagiarism policy.

Activity 1 (Tunning and Monitoring of IPS Sensors)

This activity is continuation of assessment task 2. You are required to participate in a practical demonstration task. You need to complete this activity in 3 to 5 hours. Additional time will be provided for analysis and preparing documentation.

Note: For This activity RTO/Assessor will provide you the following:

· A site where deployment of IPS system and sensor may be conducted

· A live network (LAN)
· Servers and computers
· Switches and routers
· Hardware and software security technologies
· Security policies (as per scenario)

After the configuration of the IPS sensor and managing it using the built-in tools. You need to tune up the IPS sensors for optimising its performance against the mitigation of the attacks. You will act as George- the IT Project Manager from NALES and work with IT manager – Jack (Trainer/assessor) as per the requirements specified by the HKT Bank. You need to discuss the tunning process with the trainer as IPS tuning helps ensure that the alerts you are seeing are real, actionable information.

Without tuning, you will potentially have thousands of benign events, making it difficult for you to conduct any security research or forensics on your network. Benign events, also known as false positives, exist in all IPS devices, but they happen much less in devices such as Cisco IPS devices, which are stateful and normalised, and use vulnerability signatures for attack evaluation.

Additional Cisco IPS features include risk rating, which identifies high-risk events, and policy-based management, which easily lets you deploy rules that enforce an IPS signature action based on risk rating

Also, you need to perform following tasks:

· Tunning of IPS sensors as per the requirement of the security parameters of the network

· Create IPS signatures and Meta Signatures and test scenarios

· Configure gateway for passive operating system (OS) fingerprinting

· Configure the external products interface for management of external security features and to enhance the sensor configuration information as the external product interface is designed to receive and process information from external security and management products. These external security and management products collect information that can be used to automatically enhance the sensor configuration information. For example, the types of information that can be received from external products include host profiles (the host OS configuration, application configuration, and security posture) and IP addresses that have been identified as causing malicious network activity.

· Configuration of virtual sensor for remote sites of network and anomaly detection

· Monitoring of the IPS events and advanced features. Also complete the template for IPS events summary

· Use of network management tools for the management of IPS sensors.

· Also, fill the template given below for network monitoring and management of IPS sensors.

Template for IPS Monitoring and management

Logical Infrastructure

Wide Area Network

Local Area Network

Management

Services

Policies

Personnel

IPS EVENT SUMMARY TEMPLATE

Widget

Description

IPS Severities

Top Sources

Top Destinations

Top Reporting/Attacked Devices

Top IPS attacks

Top Source Countries

Top Destination Countries

Severity

Event Name

Event Category

Source IP

Source Country

Source Port

Destination IP

Destination Port

Log Source

Application

User Name

Host Name

Protocol ID

Source Zone

Destination Zone

Nested Application

NAT Source Port

NAT Destination Port

NAT Source Rule Name

NAT Destination Rule Name

NAT Source IP

NAT Destination IP

Traffic Session ID

Time

.

Performance criteria checklist for unit assessment task:

Trainer/ Assessor to complete

Assessment activities to be completed

· Tunning and Monitoring of IPS Sensors
· For a full project outline, please refer to the student assessment instructions

Does the candidate meet the following criteria

Yes

No

Trainer/Assessor Comments

Tuned the IPS Sensor

Created IPS Signature

Configured Passive OS fingerprinting

Configured external interface

Configured Virtual sensors

Monitored the IPS Events

Completed the IPS event template

Used Network management tools for management of IPS sensors

End of the Assessment

ICTNWK609 Student Assessment Pack V1.0 September 2019

ICTNWK608 – Configure Network Devices for a Secure Network Infrastructure

Student Assessment Pack

Student and Trainer/Assessor Details

Student ID

Student name

Contact number

Email address

Trainer/Assessor name

.

Course and Unit Details

Course code

ICT60215

Course name

Advanced Diploma of Network Security

Unit code

ICTNWK608

Unit name

Configure network devices for a secure network infrastructure

Assessment Submission Method

☐ By hand to trainer/assessor

☐ By email to trainer/assessor

☐ Online submission via Learning Management System (LMS)

Student Declaration

·

I certify that the work submitted for this assessment pack is my own. I have clearly referenced any sources used in my submission. I understand that a false declaration is a form of malpractice;
· I have kept a copy of this assessment pack and all relevant notes, attachments, and reference material that I used in the production of the assessment pack;
· For the purposes of assessment, I give the trainer/assessor of this assessment the permission to:
· Reproduce this assessment and provide a copy to another member of staff; and
· Take steps to authenticate the assessment, including communicating a copy of this assessment to a checking service (which may retain a copy of the assessment on its database for future plagiarism checking).
Student signature: ________________________________
Date: ____/_____/______________

Assessment Plan

To demonstrate competence in this unit, you must be assessed as satisfactory in each of the following assessment tasks.

Evidence recorded

Evidence Type/ Method of assessment

Sufficient evidence recorded/Outcome

Unit Assessment Task 1

Unit Knowledge Test (UKT)

S / NS (First Attempt)
S / NS (Second Attempt)

Unit Assessment Task 2

Unit Project (UP)

S / NS (First Attempt)
S / NS (Second Attempt)

Unit Assessment Task 3

Unit Project (UP)

S / NS (First Attempt)
S / NS (Second Attempt)

Final result

C/NYC

Date assessed

Trainer/Assessor Signature

Assessment Conditions

Unit purpose/application

This unit describes the skills and knowledge required to use software tools, equipment and protocols to configure network devices in the design of the infrastructure of a secure network.

It applies to individuals with advanced information and communications technology (ICT) skills who adapt router and switch operating system capabilities to mitigate attacks.

No licensing, legislative or certification requirements apply to this unit at the time of publication

What the student can expect to learn by studying this unit of competency

· Implement layer 2 security

· Configure router OS intrusion prevention system (OS-IPS) to mitigate threats to network resources

· Configure virtual private networks (VPNs) to provide secure connectivity for site-to-site and remote access communications

· Implement network foundation protection (NFP)

Training and assessment resources required for this unit of competency

The student will have access to the following:

·

Learner guide

·

PowerPoint presentation

·

Unit Assessment Pack (UAP)

·

Access to other learning materials such as textbooks

The resources required for these assessment tasks also included:

·

Access to a computer, the Internet and word-processing system such as MS Word.

·

A site where deployment of network security solution may be conducted

· A live network (LAN)

· Servers and computers

· Switches and routers

· Hardware and software security technologies

· Security policies and guidelines (as per scenario)

Simulated assessment environments must simulate the real-life working environment where these skills and knowledge would be performed, with all the relevant equipment and resources of that working environment.

Submission instructions

Your trainer/assessor will confirm assessment submission details for each assessment task.

Academic integrity, plagiarism and collusion

Academic Integrity

Academic Integrity is about the honest presentation of your academic work. It means acknowledging the work of others while developing your own insights, knowledge and ideas.

As a student, you are required to:

· undertake studies and research responsibly and with honesty and integrity

· ensure that academic work is in no way falsified

· seek permission to use the work of others, where required

· acknowledge the work of others appropriately

· take reasonable steps to ensure other students cannot copy or misuse your work.

Plagiarism

Plagiarism means to take and use another person’s ideas and or manner of expressing them and to pass them off as your own by failing to give appropriate acknowledgement. This includes material sourced from the internet, RTO staff, other students, and from published and unpublished work.

Plagiarism occurs when you fail to acknowledge that the ideas or work of others are being used, which includes:

· Paraphrasing and presenting work or ideas without a reference

· Copying work either in whole or in part

· Presenting designs, codes or images as your own work

· Using phrases and passages verbatim without quotation marks or referencing the author or web page

· Reproducing lecture notes without proper acknowledgement.

Collusion

Collusion means unauthorised collaboration on assessable work (written, oral or practical) with other people. This occurs when a student presents group work as their own or as the work of someone else.

Collusion may be with another RTO student or with individuals or students external to the RTO. This applies to work assessed by any educational and training body in Australia or overseas.

Collusion occurs when you work without the authorisation of the teaching staff to:

· Work with one or more people to prepare and produce work

· Allow others to copy your work or share your answer to an assessment task

· Allow someone else to write or edit your work (without rto approval)

· Write or edit work for another student

· Offer to complete work or seek payment for completing academic work for other students.

Both collusion and plagiarism can occur in group work. For examples of plagiarism, collusion and academic misconduct in group work please refer to the RTO’s policy on Academic integrity, plagiarism and collusion.

Plagiarism and collusion constitute cheating. Disciplinary action will be taken against students who engage in plagiarism and collusion as outlined in RTO’s policy.

Proven involvement in plagiarism or collusion may be recorded on students’ academic file and could lead to disciplinary action.

Other Important unit specific Information

N/A

Unit outcome

· This unit is not graded and the student must complete and submit all requirements for the assessment task for this cluster or unit of competency to be deemed competent.

· Students will receive a ‘satisfactorily completed’ (S) or ‘not yet satisfactorily completed (NS) result for each individual unit assessment task (UAT).

· Final unit result will be recorded as competency achieved/competent (C) or competency not yet achieved/not yet competent (NYC).

Unit Assessment Task (UAT) -1

Assessment Task 1 – Unit Knowledge Test (UKT)

Assessment type:

· Written Questions

Instructions:

· This is an individual assessment.

The purpose of this assessment task is to assess the students’ knowledge required to ensure secure file encryption is selected, implemented and monitored on a computer network or local environment.

· To make full and satisfactory responses you should consult a range of learning resources, other information such as handouts and textbooks, learners’ resources and slides.

· All questions must be answered in order to gain competency for this assessment.

You may attach a separate sheet if required.

You must include the following particulars in the footer section of each page of the attached sheets:

· Student ID or Student Name

· Unit ID or Unit Code

· Course ID or Course Code

· Trainer and assessor name

· Page numbers

You must staple the loose sheets together along with the cover page.

You must attach the loose sheets chronologically as per the page numbers.

· Correction fluid and tape are not permitted. Please do any corrections by striking through the incorrect words with one or two lines and rewriting the correct words.

Resources required to complete the assessment task:

Learner guide
PowerPoint presentation
Unit Assessment Pack (UAP)
Access to other learning materials such as textbooks
Access to a computer, the Internet and word-processing system such as MS Word.

1.

Answer the following questions.

(A). What is VLAN and how will you configure VLAN? Write basic commands to configure the VLAN.

(B). What are the steps involved in the verification and troubleshooting for the virtual local area (VLAN) switching? Use screenshots if required to explain the steps.

Question 1: What are the steps involved in the configuration, verification and troubleshooting for inter-switching communications? Use screenshots if required to explain the steps.

1. Explain the five (5) key features of deployment schemes. Write your answer in 200-250 words.

1. What are the ten (10) steps involved in setting and securing a firewall?

1. Summarise the following each in 150-200 words.

1. iDevice operating system (iOS)

1. Internet Protocol (IP) Networking Model

1. Explain the steps involved in implementation of the following.

1. Local Area Network (LAN)

1. Wide Area Network (WAN)

1. A)

What is your understanding of Network Address Translation (NAT)? Write your response in 140-170 words.

B) Based on the following figure, write configuration commends for NAT.

1. Answer the following questions.

A) What is Network Topology? Also, summaries five (5) models of network topology. Write your response in 240-270 words.

B) Explain the following terms, each in 100-150 words.

1. Network Architectures

2. Network Elements

1. Summarise the following terms use 100-150 words for each.

1. Network Standards

1. Network protocols

1. Explain the following terms using 100-150 words for each.

1. Secure Connectivity

1. Remote Access Communication

1. Answer the following questions.

A) Explain Security Protocol in 130-160 words

B) Summarise Secure Socket Layer (SSL) in detail. Write your response in 100-150 words.

1. Summarise the threat mitigation strategies in 50-100 words.

1.

What is a tunneling protocol? Explain the different types of tunneling protocols. Write your response in 250-300 words.

1. Summarise the following:

1. VPN

1. EasyVPN

1. Dynamic Multipoint VPN (DMVPN)

1. Virtual Private Network technologies.

1. Answer the following questions.

A) Summarise the process of configuration, verification and troubleshooting of a Cisco router operation.

B) What are the steps involved in configuring, verifying and troubleshoot routing.

1. Explain Identity-based networking services (IBNS) in terms of network security and write down the advantages of IBNS as well. Write your response in 100-150 words.

1. What are the three (3) benefits of deploying an identity and access management solution? Write your answer in 150-200 words

1. Answer the following questions.

A) Summarise the term Router’s operating system and its two (2) types. Write your response in 100-150 words

B) What are the four (4) types of approaches used by IPS for securing the network from intrusions? Write your response in 150-200 words

C) Summarise two (2) basic types of IPS signatures, each in 50-80 words.

1. Answer the following questions.

A) What is your understanding of Context-Based Access Control (CBAC)? Write your response in 100-150 words.

(B) What is the importance of Network Address Translation to mitigate the threats to the network? Write your response in 100-150 words.

(C) Summarise the benefits of implementing a Zone Based Firewall in 50-100 words.

1. Answer the following questions.

A) Summarise Network Foundation Protection (NFP) and its features. Write your response in 100-150 words.

(B)What are the benefits of management plane, data plane and control plane in terms of network security? Write your answer in 180-220 words.

Unit Assessment Task (UAT) -2

Assessment Task 2 – Unit Project (UP)

Assessment type:
Unit Project (UP)

Instructions to complete this assessment task:

· Please write your responses in the template provided.

· You may attach a separate sheet if required.

· You must include the following particulars in the footer section of each page of the attached sheets:

· Student ID or Student Name
· Unit ID or Unit Code
· Course ID or Course Code
· Trainer and assessor name
· Page numbers

· You must staple the loose sheets together along with the cover page.

· You must attach the loose sheets chronologically as per the page numbers.

· Correction fluid and tape are not permitted. Please do any corrections by striking through the incorrect words with one or two lines and rewriting the correct words.

· The premise of the project must be closely related to the previous assessment task.

· This submission must be well presented and follow the guidelines and instructions provided.

· Please follow the format as indicated in the template section below.

· One of the most important steps that you can take: proofread your project.

· Project must be of 500-800 words in length, using 11-point font, double-spaced, and must include a cover page, table of contents, introduction, body, summary or conclusion, and works cited.

· Appropriate citations are required.

· All RTO policies are in effect, including the plagiarism policy.

Scenario: –

HELMA Finance Company is one of the leading finance companies in Australia and provides its services to a number of corporate clients. The information relating to the financial activities of all the clients is of immense importance for the company and the business relies on the trust developed for customers in regard of the integrity of the information. HELMA has always tried to provide best possible solutions to protect its information. The company’s head office is situated in the CBD while it has regional offices in Geelong and Ballarat. All the employees know the importance of the information on which they are working, along with the integrity and the security implemented on the information system and the network. All the employees and users accessing the information work on the following principles:

· Consider the sensitivity of the information they handle

· Protect information in proportion to its sensitivity by ensuring that information, whatever its format, is secured by physical or approved electronic means

· Ensure that they take appropriate action within the appropriate procedures when there is a breach of policy

For the security and integrity of the information substantial information security measures have been implemented. The company also have well defined Information Security policies and procedures and all the employees are obliged to follow these policies and procedures. Information security is of great importance to the company to ensure compliance with legislation and demonstrate that the Company understands and applies proportionate guidance and process to recording, storing, processing, exchanging and deleting information. Should this not be achieved the Company can risk, at worst, the safety of individuals, loss of financial information, breach of commercial confidentiality and subsequent financial penalties from the clients.

There are three main principles to the information security policy:

All staff must consider the sensitivity of the information they handle.

All staff must protect information in proportion to its sensitivity by ensuring that information, whatever its format, is secured by physical means (such as locking paperwork away or appropriately archiving it when no longer current) or by using approved electronic means (such as only using Company IT equipment).

Managers must ensure this policy is applied within their areas of work and should also lead by example. This policy is mandatory.

Any breach of the policy may result in disciplinary action being taken under the Company’s Disciplinary Procedure. Any breaches of security (non-compliance with this Policy) must be reported to the Information Technology Department.

The mandatory requirements of this core policy is based on the three elements of information security as per the Australian Information Security legislation:

· Confidentiality: ensuring that information is only accessible to those authorised to access it

· Integrity: safeguarding the accuracy and integrity of information and processing methods

· Availability: ensuring that authorised users have access to information and associated assets when required.

It is the policy of the company to ensure:

· Information is protected against unauthorised access.

· Confidentiality of information is maintained.

· Information is not disclosed to unauthorised persons through deliberate or negligent action.

· The integrity of information is maintained by protection from unauthorised modification

· Information is available to authorised users when needed.

· Regulatory and legislative requirements are met.

· Contingency plans are produced and tested as far as is practicable to ensure business continuity is maintained.

· Information Security training is provided for all staff.

· All breaches of information security and suspected weaknesses are reported, investigated and appropriate action taken.

· Sharing of information with other organisations/agencies is permitted providing it is done within the remit of a formally agreed information sharing protocol.

· That there is a fair and consistent approach to the enforcement of standards of conduct expected from employees when using social media sites.

· Security incidents must be reported within two business days

· Incident report must be completed if you lose or damage any ICT equipments

The IT infrastructure is updated according to the requirements of the information security. But the main threat is to the network of the information system. The information system comprises of Data Servers, Server for Financial ERP suite, desktops, Laptops, Cisco Routers and Switches all connected in LAN at head office and also a WAN is established for the connectivity across the head office and regional office. The IT department is responsible for managing the whole network and Allen-Network Engineer specialises in the implementation of the IT resources across the network.

The Information Security Officer along with the Network Engineer ensures that all the users follow the policies and procedures related to network security. The Users/Employers are supposed to oblige by the personal device policy especially those who use their personal hand-held devices or laptops should not bypass the network security policies.

Personal device policy includes:

· Home worker strictly use home network or pocket

Wi-Fi

provided by the organisation

· Do not download unauthorised software’s and files

· Do antivirus check for all the external data storage devices

· Do not write your password in the computer

· Do not share your password with anyone

· Change computer and other devices password within 60 days

Also, no such personal email IDs to be used, social network sites have already been blocked also downloads to any personal drives or torrents are strictly prohibited. System policies to prevent these personal downloads and uploads have already been implemented on the networked resources using the authentication server. Failure to oblige information security policy will result in strict actions. Also, if any user/employee comes to know about any information leakage or breach, he/she needs to inform the IT department or by filling the online form of security incident reporting.

For better security across the network and information system along with the mitigation of the attacks at Layer 2 and 3, the services of Mcgrath have been acquired. He is the new Information Security Officer-ISO. Mcgrath will be responsible for implementing information security and maintaining the secure network environment.

The job description of Mcgrath includes the following:

· Actively ensure appropriate administrative, physical and technical safeguards are in place to protect network from internal and external threats

· Meticulously identify, introduce and implement appropriate procedures, including checks and balances, are in place to test these safeguards on a regular basis

· Make it a priority to see that disaster recovery and emergency operating procedures are in place on network and tested on a regular basis

· Act as the committed owner of the network security incident and vulnerability management processes from design to implementation and beyond

· Define and implement secure network configuration baseline standards

· Support and administer firewall environments in line with Network security policy

While the Job description of Allen the Network Engineer includes:

· Establish the networking environment by designing system configuration, directing system installation and defining, documenting and enforcing system standards

· Design and implement new solutions and improve resilience of the current environment

· Maximise network performance by monitoring performance, troubleshooting network problems and outages, scheduling upgrades and collaborating with network architects on network optimisation

· Undertake data network fault investigations in local and wide area environments using information from multiple sources

Activity 1: (Analysing Network Security System Requirements)

After having the detail look at the scenario given above, you need to analyse the requirements for the Network Security System requirements for the company including the following:

· Purpose

· Network security requirements

· Physical security requirements

· Computer security requirements

· Mobile workers and home Workers

· Use of the internet

· Security Incident Reporting

You may need to research related to network security requirements on the internet. You must complete the network security requirements template given below for the company as a part of the activity.

HELMA Network Security Requirements

Purpose

Network Security Requirements

Physical Security Requirements

Computer Security Requirements

Mobile workers and home Workers

Use of the internet

Security Incident Reporting

Performance criteria checklist for unit assessment task:

Trainer/ Assessor to complete

Assessment activities to be completed

· Analysing Network Security System Requirements

· For a full project outline, please refer to the student assessment instructions

Does the candidate meet the following criteria

Yes

No

Trainer/Assessor Comments

Understood the give scenario and company requirements for network security

Defined Requirements for security relevant to network security including the following:
· Purpose
· Network Security
· Physical Security
· Computer Security
· Mobile workers and home Workers
· Use of the internet

Defined the security incident reporting

Activity 2: (Implementation of the Layer 2 and 3 Security)

Note: This activity is in continuation of activity 1.

After the analysis of the requirements for the network security in activity 1, now, you are required to implement the Layer 2 and 3 security on the network to mitigate against the expected security attacks. This implementation will not only help to protect the data but will also define the security parameters while configuring the routers and switches. You will act as Mcgrath, the Information Security Officer and are required to perform the following tasks:

· Configuration of the router operating system

· Configure the interface of the router along with the serial interface

· Configure the hostname and password of the router

· Verify the connectivity

· Configure the router using the Access Control List

· Implementation of the Identity-based Management System on the network switches using Access control System as the authentication server

· At the end, you need to ping from host to router and switches to check the connectivity

· Troubleshoot connectivity issues if any

For configuration and implementing security parameters on the network along with the mitigation of threats to the network, consider the following Network diagram to understand the network topology and components of the network being implemented at HELMA.

This activity is continuation of activity 1. You are required to participate in a practical demonstration task. You need to complete this activity in 3 to 5 hours. Additional time will be given to you for the preparation.

Note: For This activity RTO/Assessor will provide you the following:

· A site where deployment of network security solution may be conducted

· A live network (LAN)
· Servers and computers
· Switches and routers
· Hardware and software security technologies
· Security policies and guidelines (as per scenario)

You will work in coordination with the Network Engineer, Allen which will be performed by the Trainer/assessor, and he will provide you all the required network infrastructure, router and switches.

Student must follow vendor instruction for configuration of Router and implementation of IBMS using ACS.

Your trainer and assessor will observe you during the activity and complete the performance checklist.

RTO may use only two network computers to check the connectivity and other performance criteria.

Performance criteria checklist for unit assessment task:

Trainer/ Assessor to complete

Assessment activities to be completed

· Implementation of the Layer 2 and 3 Security
· For a full project outline, please refer to the student assessment instructions

Does the candidate meet the following criteria

Yes

No

Trainer/Assessor Comments

Configured the router operating system of the given network diagram

Configured:
· Switches
· Allocated IP address to host and other devices
· Router
· Connect all the devices appropriately
· Interface of the router

Implementation of the Identity-based Management System on the network switches using Access control System as the authentication server

Ping from host to router and switches to check the connectivity

Troubleshoot connectivity issues if any

Activity 3: (Configuration of the Intrusion Prevention System)

Note: This activity is in continuation of activity 1 and 2.

Now, you are the Information Security Officer-Mcgrath, and you need to configure the intrusion prevention system to the network to mitigate against the network attacks. It is required to implement the firewall on the router that will act as the intrusion prevention system for the traffic coming from the internet to the LAN. The firewall is of immense importance and will help to mitigate attacks by identifying the threats. Therefore, you need to implement the firewalls for the better protection of the networked resources and complete the following tasks for the successful completion of this activity:

· Configure and verify IPS firewall after its analysis to identify the threats and best way to block them.

· Create, update and tune IPS signature to avoid attacks

· To mitigate against the threats and probable attacks on the network, configure and verify CBAC and NAT.

· Also configure and verify Zone Based firewall using Uniform Resource Locator (URL) filtering for better network security.

This activity is continuation of activity 1 and 2. You are required to participate in a practical demonstration task. You need to complete this activity in 3 to 4 hours.

Note: For This activity RTO/Assessor will provide you the following:
· A site where deployment of network security solution may be conducted
· A live network (LAN)
· Servers and computers
· Switches and routers
· Hardware and software security technologies
· Security policies and guidelines (as per scenario)
You will work in coordination with the Network Engineer, Allen which will be performed by the Trainer/assessor, and he will provide you all the required network infrastructure, router and switches.
Your trainer and assessor will observe you during the activity and complete the performance checklist.

Performance criteria checklist for unit assessment task:

Trainer/ Assessor to complete

Assessment activities to be completed

· Configuration of the Intrusion Prevention System
· For a full project outline, please refer to the student assessment instructions

Resources required for the unit assessment task

· Unit assessment guide template

Does the candidate meet the following criteria

Yes

No

Trainer/Assessor Comments

Configured and verify IPS firewall after its analysis to identify the threats and best way to block them.

Created, updated and tuned IPS signature to avoid attacks

configured and verified CBAC and NAT.

configured and verified Zone Based firewall using Uniform Resource Locator (URL) filtering for better network security.

Unit Assessment Task (UAT) -3

Assessment Task 3 – Unit Project (UP)

Assessment type:
Unit Project (UP)

Instructions to complete this assessment task:
· Please write your responses in the template provided.
· You may attach a separate sheet if required.
· You must include the following particulars in the footer section of each page of the attached sheets:
· Student ID or Student Name
· Unit ID or Unit Code
· Course ID or Course Code
· Trainer and assessor name
· Page numbers
· You must staple the loose sheets together along with the cover page.
· You must attach the loose sheets chronologically as per the page numbers.
· Correction fluid and tape are not permitted. Please do any corrections by striking through the incorrect words with one or two lines and rewriting the correct words.
· The premise of the project must be closely related to the previous assessment task.
· This submission must be well presented and follow the guidelines and instructions provided.
· Please follow the format as indicated in the template section below.
· One of the most important steps that you can take: proofread your project.
· Project must be of 500-800 words in length, using 11-point font, double-spaced, and must include a cover page, table of contents, introduction, body, summary or conclusion, and works cited.
· Appropriate citations are required.
· All RTO policies are in effect, including the plagiarism policy.

Activity 1 (Configuration of VPN)

This activity is continuation of assessment task 2. You are required to participate in a practical demonstration task. You need to complete this activity in 3 to 4 hours. Additional time will be provided for analysis and preparing documentation.

Note: For This activity your RTO/Assessor will provide you with the following:

· A site where deployment of network security solution may be conducted
· A live network (LAN)
· Servers and computers
· Switches and routers
· Hardware and software security technologies
· Security policies and guidelines (as per scenario)

Once Layer 2 and Layer 3 have been secured, as you are Information Security Officer, you are required to implement Virtual Private Network for remote access of the network resources and information system. The implementation of the VPN will provide:

· Enhanced security

· Remote Control

· Sharing Files anytime easily

· Online Anonymity

· Unblock websites and bypass filters

· Better performance

Also, A VPN can save a company money in several situations:

· eliminating the need for expensive long-distance leased lines

· reducing long-distance telephone charges

· offloading support cost

Using VPN, each employee must possess the appropriate networking software or hardware support on their 

local network

 and computers. When set up properly, VPN solutions are easy to use and sometimes can be made to work automatically as part of network sign on.

VPN technology also works well with Wi-Fi local area networking. For HELMA, the use of VPNs will secure wireless connections to their local access points when working inside the office. These solutions provide strong protection without affecting performance excessively.

You are required to implement VPN across the network to ensure secure connectivity for site to site (head office and regional offices) and remote access communication. You need to perform the following tasks:

· Analyse and evaluate the features and functions of Internet security protocol-IPSec and Generic routing encapsulation-GRE along with Dynamic Multipoint VPN (DMVPN)

· Configure VPN for site to site secured communication and also verify its operations

· Implement Secure network access using Secure Socket Layer (SSL) VPN to deliver remote access

· Analyse, configure and verify Easy VPN on the router

·

Implement group encrypted transport (GET) for management of VPN

Complete the template below for analysis of features and functions of IPSec, GRE and DMVPN

Template for features and Functions

Features

Functions

IPSec

Generic Routing Encapsulation GRE

Dynamic Multipoint VPN (DMVPN)

Performance criteria checklist for unit assessment task:

Trainer/ Assessor to complete

Assessment activities to be completed

Does the candidate meet the following criteria

Yes

No

Trainer/Assessor Comments

· Configuration of VPN

· For a full project outline, please refer to the student assessment instructions

Evaluated the features and functions of IPSec, GRE and DMVPN

Completed the given Template

Configured site to site VPN and verified its operations

Implemented SSL VPN

Analysed, configured and verified Easy VPN

Implement group encrypted transport (GET) for management of VPN

Activity 2: (Implementing Network Foundation Protection)

This activity is continuation of activity 1, you need to implement Network foundation protection of the company’s network resources to provide the secured network as per the requirements and the security policies defined in the scenario. So, under the supervision of the trainer/assessor complete the following tasks:

· Analyse the network foundation protection features and functions

· Use Router OS features for securing management plane, data plane and control plane

· Ensure the integrity of the control plane such that only legitimate control plane traffic is processed by the network element

· Ensure that other IP traffic plane packets are properly used in network

· Ensure that one service type does not impact any other service type

· Ensure that other IP traffic planes do not impact services plane traffic

Also, fill the template given below for the analysis of NFP.

You need to complete this activity in 2 to 3 hours. Additional time will be provided for analysis and preparing documentation.

Note: For This activity RTO/Assessor will provide you the following:
· A site where deployment of network security solution may be conducted
· A live network (LAN)
· Servers and computers
· Switches and routers
· Hardware and software security technologies
· Security policies and guidelines (as per scenario)

Template for Features and Functions of NFP

Features

Functions

Network Foundation Protection

Performance criteria checklist for unit assessment task:

Trainer/ Assessor to complete

Assessment activities to be completed

· Implementing Network Foundation Protection
· For a full project outline, please refer to the student assessment instructions

Does the candidate meet the following criteria

Yes

No

Trainer/Assessor Comments

Implemented NFP

Analysed features and functions of NFP

Secured Management plane, data plane and control plane using Router OS

Completed the given template

End of the Assessment

ICTNWK608-Student Assessment Pack V1.0 September 2019

What Will You Get?

We provide professional writing services to help you score straight A’s by submitting custom written assignments that mirror your guidelines.

Premium Quality

Get result-oriented writing and never worry about grades anymore. We follow the highest quality standards to make sure that you get perfect assignments.

Experienced Writers

Our writers have experience in dealing with papers of every educational level. You can surely rely on the expertise of our qualified professionals.

On-Time Delivery

Your deadline is our threshold for success and we take it very seriously. We make sure you receive your papers before your predefined time.

24/7 Customer Support

Someone from our customer support team is always here to respond to your questions. So, hit us up if you have got any ambiguity or concern.

Complete Confidentiality

Sit back and relax while we help you out with writing your papers. We have an ultimate policy for keeping your personal and order-related details a secret.

Authentic Sources

We assure you that your document will be thoroughly checked for plagiarism and grammatical errors as we use highly authentic and licit sources.

Moneyback Guarantee

Still reluctant about placing an order? Our 100% Moneyback Guarantee backs you up on rare occasions where you aren’t satisfied with the writing.

Order Tracking

You don’t have to wait for an update for hours; you can track the progress of your order any time you want. We share the status after each step.

image

Areas of Expertise

Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.

Areas of Expertise

Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.

image

Trusted Partner of 9650+ Students for Writing

From brainstorming your paper's outline to perfecting its grammar, we perform every step carefully to make your paper worthy of A grade.

Preferred Writer

Hire your preferred writer anytime. Simply specify if you want your preferred expert to write your paper and we’ll make that happen.

Grammar Check Report

Get an elaborate and authentic grammar check report with your work to have the grammar goodness sealed in your document.

One Page Summary

You can purchase this feature if you want our writers to sum up your paper in the form of a concise and well-articulated summary.

Plagiarism Report

You don’t have to worry about plagiarism anymore. Get a plagiarism report to certify the uniqueness of your work.

Free Features $66FREE

  • Most Qualified Writer $10FREE
  • Plagiarism Scan Report $10FREE
  • Unlimited Revisions $08FREE
  • Paper Formatting $05FREE
  • Cover Page $05FREE
  • Referencing & Bibliography $10FREE
  • Dedicated User Area $08FREE
  • 24/7 Order Tracking $05FREE
  • Periodic Email Alerts $05FREE
image

Our Services

Join us for the best experience while seeking writing assistance in your college life. A good grade is all you need to boost up your academic excellence and we are all about it.

  • On-time Delivery
  • 24/7 Order Tracking
  • Access to Authentic Sources
Academic Writing

We create perfect papers according to the guidelines.

Professional Editing

We seamlessly edit out errors from your papers.

Thorough Proofreading

We thoroughly read your final draft to identify errors.

image

Delegate Your Challenging Writing Tasks to Experienced Professionals

Work with ultimate peace of mind because we ensure that your academic work is our responsibility and your grades are a top concern for us!

Check Out Our Sample Work

Dedication. Quality. Commitment. Punctuality

Categories
All samples
Essay (any type)
Essay (any type)
The Value of a Nursing Degree
Undergrad. (yrs 3-4)
Nursing
2
View this sample

It May Not Be Much, but It’s Honest Work!

Here is what we have achieved so far. These numbers are evidence that we go the extra mile to make your college journey successful.

0+

Happy Clients

0+

Words Written This Week

0+

Ongoing Orders

0%

Customer Satisfaction Rate
image

Process as Fine as Brewed Coffee

We have the most intuitive and minimalistic process so that you can easily place an order. Just follow a few steps to unlock success.

See How We Helped 9000+ Students Achieve Success

image

We Analyze Your Problem and Offer Customized Writing

We understand your guidelines first before delivering any writing service. You can discuss your writing needs and we will have them evaluated by our dedicated team.

  • Clear elicitation of your requirements.
  • Customized writing as per your needs.

We Mirror Your Guidelines to Deliver Quality Services

We write your papers in a standardized way. We complete your work in such a way that it turns out to be a perfect description of your guidelines.

  • Proactive analysis of your writing.
  • Active communication to understand requirements.
image
image

We Handle Your Writing Tasks to Ensure Excellent Grades

We promise you excellent grades and academic excellence that you always longed for. Our writers stay in touch with you via email.

  • Thorough research and analysis for every order.
  • Deliverance of reliable writing service to improve your grades.
Place an Order Start Chat Now
image

Order your essay today and save 30% with the discount code Happy