Information Systems homework help

Information Systems homework help.

ICTNWK602 – Plan, Configure and Test Advanced Server Based Security

Student Assessment Pack

Student and Trainer/Assessor Details

Student ID  
Student name  
Contact number  
Email address  
Trainer/Assessor name .

Course and Unit Details

Course code ICT60215
Course name Advanced Diploma of Network Security
Unit code ICTNWK602
Unit name Plan, configure and test advanced server-based security

 

Assessment Submission Method

☐      By hand to trainer/assessor
 
 
☐      By email to trainer/assessor
 
☐      Online submission via Learning Management System (LMS)
 
☐      By Australia Post to RTO ☐      Any other method _________________________________________________
(Please mention here)
 

 
Student Declaration

·         I certify that the work submitted for this assessment pack is my own. I have clearly referenced any sources used in my submission. I understand that a false declaration is a form of malpractice;
·         I have kept a copy of this assessment pack and all relevant notes, attachments, and reference material that I used in the production of the assessment pack;
·         For the purposes of assessment, I give the trainer/assessor of this assessment the permission to:
o   Reproduce this assessment and provide a copy to another member of staff; and
o   Take steps to authenticate the assessment, including communicating a copy of this assessment to a checking service (which may retain a copy of the assessment on its database for future plagiarism checking).
 
Student signature:   ________________________________
Date:  ____/_____/______________
 

Assessment Plan

To demonstrate competence in this unit, you must be assessed as satisfactory in each of the following assessment tasks.
 

Evidence recorded Evidence Type/ Method of assessment Sufficient evidence recorded/Outcome
Unit Assessment Task 1 Unit Knowledge Test (UKT) S / NS (First Attempt)
S / NS (Second Attempt)
Unit Assessment Task 2 Unit Project (UP) S / NS (First Attempt)
S / NS (Second Attempt)
Unit Assessment Task 3 Unit Project (UP) S / NS (First Attempt)
S / NS (Second Attempt)
Final result C/NYC Date assessed  
 
Trainer/Assessor Signature  
 


Assessment Conditions

Unit purpose/application

This unit describes the skills and knowledge required to implement advanced server security using secure authentication and network services on a network server.
It applies to individuals working as information and communications technology (ICT) network specialists, ICT network engineers, network security specialists, network security planners and network security designers.

What the student can expect to learn by studying this unit of competency
  • Plan advanced network server security according to business needs
  • Prepare for Network server security implementation
  • Configure the advanced network server security according to design
  • Monitor and test network server security

 

Training and assessment resources required for this unit of competency
  • The student will have access to the following:
  • Learner guide
  • PowerPoint presentation
  • Unit Assessment Pack (UAP)
  • Access to other learning materials such as textbooks

The resources required for these assessment tasks also included:

  • A site where server installation may be conducted
  • Relevant server specifications
  • Cabling
  • Networked (LAN) computers
  • Server diagnostic software
  • Switch
  • Client requirements
  • WAN service point of presence
  • Workstations
  • Relevant regulatory documentation that impacts on installation activities.

Your trainer/assessor will confirm assessment submission details for each assessment task.

Academic integrity, plagiarism and collusion

Academic Integrity
Academic Integrity is about the honest presentation of your academic work. It means acknowledging the work of others while developing your own insights, knowledge and ideas.
As a student, you are required to:

  • undertake studies and research responsibly and with honesty and integrity
  • ensure that academic work is in no way falsified
  • seek permission to use the work of others, where required
  • acknowledge the work of others appropriately
  • take reasonable steps to ensure other students cannot copy or misuse your work.

 
Plagiarism
Plagiarism means to take and use another person’s ideas and or manner of expressing them and to pass them off as your own by failing to give appropriate acknowledgement. This includes material sourced from the internet, RTO staff, other students, and from published and unpublished work.
Plagiarism occurs when you fail to acknowledge that the ideas or work of others are being used, which includes:

  • Paraphrasing and presenting work or ideas without a reference
  • Copying work either in whole or in part
  • Presenting designs, codes or images as your own work
  • Using phrases and passages verbatim without quotation marks or referencing the author or web page
  • Reproducing lecture notes without proper acknowledgement.

 
Collusion
Collusion means unauthorised collaboration on assessable work (written, oral or practical) with other people. This occurs when a student presents group work as their own or as the work of someone else.
Collusion may be with another RTO student or with individuals or students external to the RTO. This applies to work assessed by any educational and training body in Australia or overseas.
Collusion occurs when you work without the authorisation of the teaching staff to:

  • Work with one or more people to prepare and produce work
  • Allow others to copy your work or share your answer to an assessment task
  • Allow someone else to write or edit your work (without rto approval)
  • Write or edit work for another student
  • Offer to complete work or seek payment for completing academic work for other students.

Both collusion and plagiarism can occur in group work. For examples of plagiarism, collusion and academic misconduct in group work please refer to the RTO’s policy on Academic integrity, plagiarism and collusion.
Plagiarism and collusion constitute cheating. Disciplinary action will be taken against students who engage in plagiarism and collusion as outlined in RTO’s policy.
Proven involvement in plagiarism or collusion may be recorded on students’ academic file and could lead to disciplinary action.
 

Other Important unit specific Information

N/A

Unit outcome
  • This unit is not graded and the student must complete and submit all requirements for the assessment task for this cluster or unit of competency to be deemed competent.
  • Students will receive a ‘satisfactorily completed’ (S) or ‘not yet satisfactorily completed (NS) result for each individual unit assessment task (UAT).
  • Final unit result will be recorded as competency achieved/competent (C) or competency not yet achieved/not yet competent (NYC).
  • Written Questions

 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Unit Assessment Task (UAT) – 1

Assessment Task 1 – Unit Knowledge Test (UKT)

Instructions:

  • This is an individual assessment.

The purpose of this assessment task is to assess the students’ knowledge required to ensure secure file encryption is selected, implemented and monitored on a computer network or local environment.

  • To make full and satisfactory responses you should consult a range of learning resources, other information such as handouts and textbooks, learners’ resources and slides.
  • All questions must be answered in order to gain competency for this assessment.
  • You may attach a separate sheet if required.
  • You must include the following particulars in the footer section of each page of the attached sheets:
    • Student ID or Student Name
    • Unit ID or Unit Code
    • Course ID or Course Code
    • Trainer and assessor name
    • Page numbers
  • You must staple the loose sheets together along with the cover page.
  • You must attach the loose sheets chronologically as per the page numbers.
  • Correction fluid and tape are not permitted. Please do any corrections by striking through the incorrect words with one or two lines and rewriting the correct words.

 
Resources required to complete the assessment task:

  • Learner guide
  • PowerPoint presentation
  • Unit Assessment Pack (UAP)
  • Access to other learning materials such as textbooks
  • Access to a computer, the Internet and word-processing system such as MS Word.

 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

  • Summarise the following?
  1. What is network Auditing and what is the importance of performing the regular network auditing? Write your response in 100-150 words.
  2. What do you understand from network penetration testing and at least explain three (3) of its techniques?

Write 30-70 words for each.

 
 
 
 
 
 
 
 
 
 

 

  • What are the best practices to implement backup and restore procedures? Write 150-200 words for your answer.

 

 
 
 
 
 
 
 
 
 
 
 

 

  • What are the four (4) most secured encryption techniques? Write 50-100 words for each technique?

 

 
 
 
 
 
 
 
 
 
 
 
 

 

  • Summarise the Windows Error and Event Viewer tool and its use for logging reporting. Write your response in 100-150 words.

 

 
 
 
 
 
 
 
 
 
 
 
 
  • What do you understand from network intrusion detection and recovery procedures? Write your answer in 100-150 words.

 

 
 
 
 
 
 
 
 
 
 
 
 

 

  • Summarise the following network service configurations:
  1. Domain name system (DNS)
  2. Dynamic host configuration protocol (DHCP)
  3. File transfer protocol (FTP)
  4. Mail
  5. Network time protocol (NTP)
  6. Proxy
  7. Server messages block (SMB)
  8. Web

Write 50 to 100 words for each of the configuration.

 
 
 
 
 
 
 
 
 
 
 
 
 

 
 

  • What are the different features, options and benefits of network security services? Write your answer in 100-150 words for each.
 
 
 
 
 
 
 
 
 
 
 
 

 

  • What are the three (3) types of network service vulnerabilities? Write 100-150 words for each vulnerability.
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

 
 

  • Explain the operating system help and support utilities. Write your response in 100-150 words.
 
 
 
 
 
 
 
 
 
 
 

 

  • Answer the following questions:
  1. What are the five (5) network security attacks and their protection mechanism? Write 50-100 words for each.
  2. List and explain three (3) network security threats and risks? Write 50-100 words for each.
 
 
 
 
 
 
 
 
 

 

  • Summarise the following:
  1. What are the eight (8) famously used network monitoring and troubleshooting techniques tools? Write your response in 100-150 words.
  2. Explain Network Configuration and Network planning techniques each in 100-150 words.

 

 
 
 
 
 
 
 
 
 
 
 

 

  • What are the steps involved in the configuration of Firewall on Windows Server 2012? Include screenshots.
 
 
 
 
 
 
 
 
 

 
 

  • Answer the following questions:
  1. What is meant by user authentication? Write your response in 100-150 words.
  2. Explain directory services in 100-150 words.

 

 
 
 
 
 
 
 
 
 
 
 
 
 

 

  • Answer the following.
  1. List and explain two (2) network troubleshooting tools and techniques. Write your response in 100-150 words.
  2. What are the five (5) network diagnostic utilities? Write 30-50 words for each.
  3. What are the five (5) different events and metrics to monitor and troubleshoot for a Windows Server? Write 40-70 words for each.
 
 
 
 
 
 
 
 
 
 
 
 

 

  • Answer the following questions:

A:  What is the importance of consultation with the key stakeholders and how does it help to effectively coordinate the task? Write your response in 100-150 words.
B: What is the importance of the Occupational Health and Safety (OHS) processes and procedures at a workplace? Write your response in 100-150 words.

 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

 

  • Answer the following questions:
  1. What is the importance and functions of the Authentication, Authorisation and Accounting? Write your answer in 100-150 words.
  2. What do you understand from authorisation and accounting (AAA) protocols? Write 100-150 words?
  3. What are the different factors to consider while securing approval of an ICT project? Write your response in 50-100 words.
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

 

  • Answer the following Questions:

 

  1. What is meant by patching the operating system and applications to enable maximum security and reliability? Write your answer in 50-100 words.
  2. Explain the different options involved in the configuration of automatic updates for Windows Server 2016. Write your answer in 200-150 words.

 

 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

 

  • Answer the following questions:
  1. What do you understand from Access Control Lists? Write your response in 50-100 words.
  2. What are the steps involved in the configuration of the Access Control Lists. Use Screenshots in your answer.
 
 
 
 
 
 
 
 
 
 

 

 

  • Answer the following questions:
  1. What are the steps included in testing server for the effectiveness of network service security? Write 100-150 words.
  2. Explain the importance of server testing? Write your answer in 30-50 words.
 
 
 
 
 
 
 
 
 
 
 
 
 

 

  • Summarise the following:
    1. Server Monitoring
    2. Importance of Server Monitoring
    3. Reports and Results generated by Server Monitoring.

Write 50-100 words for each.

  1. Explain the working of Server Monitoring to ensure data Security to avoid data breaches. Write your response in 150-200 words.

 

 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

 
 
 

Unit Assessment Task (UAT) -2

Assessment Task 2 – Unit Project (UP)

Assessment type:
Unit Project (UP)
 
Instructions to complete this assessment task:

  • Please write your responses in the template provided.
  • You may attach a separate sheet if required.
  • You must include the following particulars in the footer section of each page of the attached sheets:
    • Student ID or Student Name
    • Unit ID or Unit Code
    • Course ID or Course Code
    • Trainer and assessor name
    • Page numbers
  • You must staple the loose sheets together along with the cover page.
  • You must attach the loose sheets chronologically as per the page numbers.
  • Correction fluid and tape are not permitted. Please do any corrections by striking through the incorrect words with one or two lines and rewriting the correct
  • The premise of the project must be closely related to the previous assessment task.
  • This submission must be well presented and follow the guidelines and instructions provided.
  • Please follow the format as indicated in the template section below.
  • One of the most important steps that you can take: proofread your
  • Project must be of 500-800 words in length, using 11-point font, double-spaced, and must include a cover page, table of contents, introduction, body, summary or conclusion, and works cited.
  • Appropriate citations are required.
  • All RTO policies are in effect, including the plagiarism policy.

 
Resources required to complete the assessment task:

  • Computer
  • Internet
  • MS Word

 
 
Scenario: –
 
With the technological advancements and vulnerabilities across the network of different organisations, Security is one of the important feature that needs to be implemented on the organisational network ICT infrastructure. Now a days Small and Medium enterprises thoroughly rely on the centralised storage for their data along with the implementation of a secured setup of ICT resources. Same is the case with ANIGMA Pvt. Limited. ANIGMA is a renowned graphic designing company of Melbourne. The company is famous for its intellectual, modernise and innovative ideas when it comes to designing different graphical projects for its clients. The company is well known due to its aesthetical sense of innovation.
The company is situated in CBD and is one of a good example of technological usage in the premised of the office. The company’s IT department has implemented a very sophisticated and efficient ICT network to fulfil the needs of the employees, so that they can concentrate only towards their designing projects. All, the computers are connected in a LAN along with a centralised Server and even the printers, scanners, plotters and WIFI access points are connected in the LAN. The Server does not only provides a centralised repository for the data but also an Active Directory has been implemented on the system to control the access of the network and to set privileges and permissions on different files and folders. Thus, any one from the employees can sit anywhere in the office and on any system and can start doing their projects from where they have left the previous time.
The IT department is not only responsible for the implementation of an efficient ICT system but to also secure this ICT infrastructure. ROY- the ICT Manager is responsible for the management and the administration of the ICT network and Systems. While, Lygon-Network Engineer who assist the ICT Manager is responsible for the management of the networks and to ensure the efficient working of the whole setup.
The job description of both the ICT Manager and the Network Engineer along with the network diagram of the company are as follow to illustrate better understanding of the company’s ICT setup.
Job Description of ICT Manager:

  • Analysing information needs and specifying technology to meet those needs
  • Formulating and directing information and communication technology (ICT) strategies, policies and plans
  • Directing the selection and installation of ICT resources and the provision of user training
  • Directing ICT operations and setting priorities between system developments, maintenance and operations
  • Overseeing the security of ICT systems
  • Running regular checks on network and data security
  • Identifying and acting on opportunities to improve and update software and systems
  • Developing and implementing IT policy and best practice guides for the organisation
  • Designing training programs and workshops for staff
  • Conducting regular system audits
  • Running and sharing regular operation system reports with senior staff
  • Overseeing and determining timeframes for major IT projects including system updates, upgrades, migrations and outages
  • Managing and reporting on allocation of IT budget
  • Providing direction for IT team members
  • Identifying opportunities for team training and skills advancement

 
Job Description of Network Engineer:

  • Maintaining and administering computer networks and related computing environments including systems software, applications software, hardware, and configurations.
  • Performing disaster recovery operations and data backups when required.
  • Protecting data, software, and hardware by coordinating, planning and implementing network security measures.
  • Troubleshooting, diagnosing and resolving hardware, software, and other network and system problems.
  • Replacing faulty network hardware components when required.
  • Maintaining, configuring, and monitoring virus protection software and email applications.
  • Monitoring network performance to determine if adjustments need to be made.
  • Conferring with network users about solving existing system problems.
  • Operating master consoles to monitor the performance of networks and computer systems.
  • Coordinating computer network access and use.
  • Designing, configuring and testing networking software, computer hardware, and operating system software.
  • Configure and install various network devices and services (e.g., routers, switches, firewalls, load balancers, VPN, QoS)
  • Perform network maintenance and system upgrades including service packs, patches, hot fixes and security configurations
  • Monitor performance and ensure system availability and reliability
  • Monitor system resource utilization, trending, and capacity planning

 
Network Diagram of ANIGMA to give illustration of all the all the computers, printers, scanners, servers, WiFi access points, switches, routers
Activity 1:
Task 1: (Role Play on planning of the Network Server Security)
The IT department needs to not only managed the ICT infrastructure but is also responsible for the security of the ICT setup and for that Server Security Comes as the most important and vital as far as the company’s data and intellect ideas are concerned. Therefore, the IT department under the supervision of the ICT Manager will implement the security of the Network Server. So at the initial stage of planning and preparation the Network Engineer needs to discuss and elaborate on the importance of the security of the network server along with its preparation and planning. The Network Engineer needs to discuss the planning phase with the General Manager, Manager Operations, Finance Manager and the ICT Manager. For this you need to play the role of the Network Engineer while the trainer/assessor will act as the ICT Manager and will contribute in the planning and the preparation phase. Three of the students will act as the General Manager, Operations Manager and Finance Manager and will put their input in the discussion as these personal are the major stakeholders of the organisation.
In the role play you need to discuss and explain the following points:

  • Coordinate with the stakeholders and discuss the requirements of the security and implementation of the security on the network server environment
  • Also, discuss the different hazards and safety risks included in the implementation especially with the ICT Manager and the Operations Manager
  • Discuss and gain confidence of the General Manager to ensure that the task is coordinated properly and everyone in the organisation play their part in the implementation as per the requirement
  • Also, complete the minutes of meetings and get them signed from the General Manager and the ICT Manager to initiate the implementation of the security on the network server.

 
You are required to complete the following meeting minute’s template and submit to your trainer/assessor.

 
Minutes of Meeting
 
Meeting Objective:
 
Attendees:
 
Venue:
 
Date:
 
No Points Discussed Actions Suggested Target Date
       
       
       
       
 
Signature of attendee 1:                                                Signature of attendee 2:
 
Signature of attendee 3:                                                Signature of attendee 4:
 

 
TASK 2: (Report on the preparation of the implementation of the Network Server Security)
Once the discussion and the elaboration of the implementation of the network server is done, you need to prepare a report that will help during the implementation of the network server. The report will later work as the official document for the network server security as it will explain and highlight the security threats to the network. You need to prepare the report under the supervision of the trainer/assessor and also need to complete the template of the report given below:
The report must include the following:

  • Explain the network vulnerabilities associated with the network of the organisation
  • Highlight network authentication and different network service configurations for the implementation of the network security solution
  • Explain the different features of the network service security as per the requirement of the organisation
  • Document the update server security design
  • Explain the Occupational Health and Safety processes and procedures, according to which the implementation needs to be conducted

 
Template for Report on the preparation of the implementation of the Network Server Security

 
Purpose:
 
 
Department:
 
Stakeholders:
 
 
Supervised by:
 
 
 
Network vulnerabilities
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
Network authentication
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
Network service configurations
 
 
 
 
 
 
 
 
 
 
 
 
 
 
Features of the network service security
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
Occupational Health and Safety processes and procedures
 
 
 
 
 
 
 
 
 

 

Performance criteria checklist for unit assessment task:

 

Trainer/ Assessor to complete
Does the candidate meet the following criteria Yes No Trainer/Assessor Comments
Coordinated with the stakeholders
 
     
discuss the different hazards and safety risks
 
 
     
Discussed how to ensure that the task is coordinated properly
 
 
     
Completed minutes of Meetings
 
 
 
 
     
Signed Off the minutes of meetings
 
 
     
Explained the network vulnerabilities
 
 
 
     
Highlighted network authentication
 
 
     
 
 
 
 
Explained the different features of the network service security
 
 
     
 
 
 
 
Documented the update server security design
 
 
 
     
Explained the Occupational Health and Safety processes and procedures
 
 
Completed the template of report
 
 
 
     
 
 
 
 
 
 
 

 
 
 

Unit Assessment Task (UAT)

Assessment Task 3 – Unit Project (UP)

Assessment type:
Unit Project (UP)
 
Instructions to complete this assessment task:

  • Please write your responses in the template provided.
  • You may attach a separate sheet if required.
  • You must include the following particulars in the footer section of each page of the attached sheets:
    • Student ID or Student Name
    • Unit ID or Unit Code
    • Course ID or Course Code
    • Trainer and assessor name
    • Page numbers
  • You must staple the loose sheets together along with the cover page.
  • You must attach the loose sheets chronologically as per the page numbers.
  • Correction fluid and tape are not permitted. Please do any corrections by striking through the incorrect words with one or two lines and rewriting the correct
  • The premise of the project must be closely related to the previous assessment task.
  • This submission must be well presented and follow the guidelines and instructions provided.
  • Please follow the format as indicated in the template section below.
  • One of the most important steps that you can take: proofread your
  • Project must be of 500-800 words in length, using 11-point font, double-spaced, and must include a cover page, table of contents, introduction, body, summary or conclusion, and works cited.
  • Appropriate citations are required.
  • All RTO policies are in effect, including the plagiarism policy.

 
Resources required to complete the assessment task:

  • Computer
  • Internet
  • MS Word

 
 
 
 
 
 
 
 
 
 
 
Activity 1 – (Implementation of Network Server Security)
This activity is a continuing from the previous assessment task.
Once the discussion of the planning and preparation of the implementation of the security of the network server. The implementation needs to be done as per the report prepared in the previous task and according to the Occupational Health and Safety (OHS) processes and procedures. You need to act as the Network Engineer and needs to implement the network server security under the supervision of the ICT Manger which will be acted by the trainer/assessor. The implementation will involve the configuration of the network authentication services along with the security of the wide range of network services to ensure the server and the data security. You are also required to implement different cryptographic techniques as per the requirement.
The trainer/assessor will act as a supervisor and will guide you through the initial process of implementation the network server security on the network infrastructure.
Note: For This activity RTO/Assessor will provide you the following:

  • A site where server installation may be conducted
  • Relevant server specifications
  • Cabling
  • Networked (LAN) computers
  • Server diagnostic software
  • Switch
  • Client requirements
  • WAN service point of presence
  • Workstations
  • Relevant regulatory documentation that impacts on installation activities.

 
You need to implement the network security solution as per the given points:
 
 

  • Before the implementation of the network server security, you need to back up the server to ensure that data is protected
  • Configure updates and patches to ensure maximum security. Turn on the automatic updates for the server
  • Configure the authentication, authorisation and the accounting services to control the unauthorized access to the server
  • Configure the encryption techniques as per the requirements
  • Configure remote access and advanced security services options including the following:
  • Dynamic name system (DNS)
  • Web and proxy
  • Mail
  • File transfer protocol (FTP)
  • Configure the firewall for the security
  • Maintain logs and implement log on server
  • Configure the backup and recovery mechanism to ensure data safety in case of disaster

 
 
 

Performance criteria checklist for unit assessment task:

 

Trainer/ Assessor to complete
Assessment activities to be completed ·         Implementation of Network Server Security
·         For a full project outline, please refer to the student assessment instructions
Resources required for the unit assessment task ·         Unit assessment guide template
·         Access to live or simulated working environment
·         Interaction with others
Does the candidate meet the following criteria Yes No Trainer/Assessor Comments
Back up the server      
 
 
Configured updates and patches      
 
 
 
Configured the authentication, authorisation and the accounting      
 
 
 
Configured the encryption techniques      
Configured remote access and advanced security services options including the following:      
Dynamic name system (DNS)
Web and Proxy
Mail
File Transfer Protocol FTP
     
 
 
 
Configured the firewall
 
     
 
 
 
Maintained log      
 
 
Configured backup and restore mechanism      

 
 
Activity 2: (Monitoring of the Network Server Security)
Continuation to the previous tasks, you need to test and monitor the network server to ensure that the security parameters are achieved. You will perform the testing and monitoring of the network server under the supervision of your trainer/assessor.
Note: For This activity RTO/Assessor will provide you the following:

  • A site where server installation may be conducted
  • Relevant server specifications
  • Cabling
  • Networked (LAN) computers
  • Server diagnostic software
  • Switch
  • Client requirements
  • WAN service point of presence
  • Workstations
  • Relevant regulatory documentation that impacts on installation activities.

 
You need to monitor and test the network server security as per the following:

  • Test the server to ensure that the security is according to the planned design
  • Monitor the server logs and manage the traffic of the network by opening and closing the ports
  • Monitor the important files in order to detect the unauthorised access
  • Ensure that there are no data breaches on the server and the server and data is protected
  • Evaluate the results obtained from the monitoring and test improvements in order to achieve the desired level of network security

 
 
 
 
 
 
 
 

Performance criteria checklist for unit assessment task:

 

Trainer/ Assessor to complete
Assessment activities to be completed ·         Monitoring of the Network Server Security
·         For a full project outline, please refer to the student assessment instructions
Resources required for the unit assessment task ·         Unit assessment guide template
·         Access to live or simulated working environment
·         Interaction with others
Does the candidate meet the following criteria Yes No Trainer/Assessor Comments
Tested the server      
 
 
Monitored the server logs      
 
 
 
Monitored the important files      
 
 
 
 
Ensured that there are no data breaches      
 
 
 
 
Evaluated the results      
 
 
 
 
 
 
 

 

Information Systems homework help

Solution:

15% off for this assignment.

Our Prices Start at $11.99. As Our First Client, Use Coupon Code GET15 to claim 15% Discount This Month!!

Why US?

100% Confidentiality

Information about customers is confidential and never disclosed to third parties.

Timely Delivery

No missed deadlines – 97% of assignments are completed in time.

Original Writing

We complete all papers from scratch. You can get a plagiarism report.

Money Back

If you are convinced that our writer has not followed your requirements, feel free to ask for a refund.