ICTNWK511 Assessment 4 Case Study Project v2
ICTNWK511 Assessment 4 Case Study Project v2
Scenario:
TeraTax Australia Pty. Ltd. is a privately owned tax agency that has 4 offices spread out around
Victoria. Their central office is located in the Melbourne CBD and they have 3 branches located in
Geelong (West), Dandenong (East) and Echuca (North).
2
The company uses legacy tax software that has been used by the company for the past 12 years. The
software has reached end-of-life and there are no available support and upgrade options. Their
branches are currently using a cumbersome file sharing system that is linked with the central office
via a third-party cloud-based file services provider.
The owner of the company has decided to consolidate and interconnect all the offices, and upgrade
security to maintain compliance under Australian law and legislation. They are looking to purchase a
complete customer relationship management and tax accounting solution that will be used by the
branches and central office, as well as updating current network infrastructure and security policies.
TeraTax has hired your organization to work in creating a complete ICT network security solution.
Your manager (ie. your Melbourne Polytechnic class instructor) has asked you to lead your ICT team
to investigate, research and propose a solution to the Board of Directors of TeraTax Australia.
• They currently have 30 employees in the central office and 5 employees in each branch.
• The company is expected to double the number of clients by the end of the year.
Organization Culture:
TeraTax is a very family-oriented company. Their founder, Mr William Jobs, despite the success of the
company, he is still working as head of the Board of Directors. His CEO Mr Steven Gates and the
Management Team maintain the company culture and involvement in employee’s development.
Their management style is based on traditions they have inherited from their founder – a rather
conservative style with some reluctance to deviate from what has held them in good stead up till
now.
2. To ensure that the clients are given a very high quality of service.
TeraTax forecast that the demand of their client base will increase in the months to come. One of
their ideas is to have a web-system for their tax software that can match their client growth and can
3
be an essential tool which can then support information technology needs of their staff and clients
into the future.
Organisational Chart:
TeraTax’s network and computer systems are all out-dated. All the offices use first generation Intel
Celeron computers that are not capable of running a currently supported operating system and
cannot accommodate new tax software.
Legacy proprietary software is still used to manage the client database and tax records. The current
computer systems will need to be upgraded and the existing data will need to be migrated into the
new computer and network system.
The head office located in the CBD contains server hardware and network infrastructure that is all
out-dated. The servers are running unsupported operating systems and are using 10Mpbs and
100Mbps hubs on their network infrastructure. Workstations are running on first generation Intel
Celeron processors and Windows 7 operating systems. The current systems are not capable of
upgrades and not compatible with installing a central solution of data storage and management.
The CBD office hosts the data exchange of the entire company through third party cloud services, as
well as storage of client data, tax records, and billing information. These are all the primary concern
to the board members due to the lack of security and privacy implementations required under
current Australian laws. As well as all that, if the Internet goes down, the running of the organisation
is also ground to a halt. This actually does happen for at least a couple of days every year.
4
The head office and three branches are all connected through consumer level DSL connections. If a
large data transfer is being performed the connection slows almost to a stop for others on the
network. The employees and clients are becoming more and more impatient due to the slow
connectivity and high latency of the network.
Requirements:
Based on above scenario, your task is to write a report for TeraTax. You are to address following items
in your report on the provided templates below.
(NOTE: Your report writing should be within the provided template in this Assessment, which can
be found after the Requirement section.)
5
5. Design and implement responses to security incidents.
NOTE:
As TeraTax equipments are imaginary only, you do not have access to them. Hence when you
answer for the case study, you may use various approaches such as creating your own VMs or
various types of websites / web servers to relate your answer with TeraTax.
ANSWER
1.1 Define planning phase for a network security design. S NS
· TeraTax needs a complete ICT and network security solution.
· Legacy tax software is 12 years old and no longer supported
· There are 4 offices, 30 employees in Melbourne CBD, 5 in
Geelong, 5 in Dandenong and 5 in Echuca
· All offices need to be interconnected and security needs to be 1. ☐ 2. ☐
upgraded to comply with legislation.
· Current network infrastructure needs upgrading, including all
PCs, cabling and a whole network security solution for the 4 offices.
6
access privileges they require.
Step 2: Plan – In Planning phase we prioritize which options to include
and outline strategies that end user typically use to mitigate the
vulnerabilities of the network.
Equipment replacement plan, by removing all out-dated
components that cannot be secured
Replacement plan for firmware, software, and OS upgrades or
reconfigurations.
Network segmentation plan (internal firewalls, secure
architecture such as Virtual Local Area Networks and Virtual
Routing and Forwarding to segment the network).
Workplace system security procedures (Computer password,
use layered security, email filter, web browsing
Encryption of transmissions
Monitoring remote accesses
Authentication plan for end user, including multi-factor
authentication, strict access control
Response and recovery plan which describes responses to
specific threats and how to recover from them include staff
training
Test and Auditing Plan (Penetration testing)
Physical security plan for securing equipment and premises.
Create a Code of Ethics standards and guidelines of
organisation.
Step 3: Deploy - Securing a network system certainly involves
disrupting its 24/7 operations.
All levels of internal management must buy into the
deployment project and compromise on policies and
penalties that will cause any disruption. It is a matter of cost
versus risk.
Ensure that you have included trials of all your security
procedures and your training plan before going live.
Must be compliance with security standards and certification.
Step 4: Monitor and Log
Collect, store and regularly report data on all unexpected
traffic or unusual accesses across the network.
Keep histories so you can spot trends in security breaches and
careful examination of the audit logs can be useful to
establish what happened.
Cyber security policy
Cyber Security Policy Outlines:
Assets need to protect
What are the threats to those assets
Rules and controls protecting the business
7
Handling and storage of sensitive materials - The Privacy Act
1988 (Privacy Act) regulates how personal information is
handled, including how it is collected, used, secured and
disclosed.
2. Identify threats to network security . (NOTE: During this phase, you will be
2 focusing on following five areas. )
2.1 Determine why attacks occur.
2.2 Determine who the attack may come from.
2.3 Analyse common types of network vulnerabilities.
2.4 Determine how attacks occur.
2.5 Design a threat model to categorise treats.
ANSWER
2.1 Determine why attacks occur S NS
A Cyber Attack on Teratax Australia may occur in order to obtain sensitive and
personal data from customers and from the employees of the company.
This Data breach could enable the attackers to have access to financial
instruments such as credit card information, tax file numbers and pay details 7. 8.
like bank account numbers. ☐ ☐
This Data can be used for the purpose of stealing money, identity theft and
extortion to individuals or to the company.
8
2.2 Determine who the attack may come from S NS
A Cyber Attack on TeraTax Australia may come from:
1) Internal source such as an employee or ex-employee-
An employee may seek financial gain by exploiting known vulnerabilities due
to him/her having knowledge of the security implemented.
An ex-employee may wish to do the same as noted above or they may be
wishing for payback for some issue that made them unhappy in the workplace.
2) Unknown attackers – these attackers may be after financial gain via
access to sensitive data or extortion.
3) Terrorists – these actors would be after maximum damage to the
☐ ☐
company, denial of service, possibly extortion to finance other terrorist
activities, access to a particular customer’s data.
4) Hacktivists – these actors would seek to damage or infiltrate the
company’s cyber security infrastructure in order to make a political point.
5) Foreign Government Agency- these are sophisticated and well resourced
actors with motives that are political and financial in order to gain influence,
demonstrate capabilities and cause disruption.
9
A flow of real-time exchange of network data/packets will be displayed and
information such as source and destination IP address, port numbers, telnet,
ftp and some other essential packets or information can be gathered and
examined. The advanced option menu and other features are also available for
configuration according to setting preferences or protocols to capture.
Another wireshark feature that can be useful in filtering packets is the color-
coding.
10
· Black—packets with errors
· Light blue—UDP traffic
· Light purple—TCP traffic
· Gray—TCP handshake packets
Some common usage of wireshark are capturing real-time network data,
importing data packets from text files, examining data packets and their
protocol details, displaying, filtering, and searching data packets, colorizing
data packets, troubleshooting network problems, generating statistics.
Source: https://www.cybrary.it/blog/0p3n/how-to-use-the-wireshark-cyber-
security-tool/
11
inflict reputational damage or harm to a business or person, or theft of
valuable data. It may be personal information of staff and customers,
or even the business' infrastructure. The attackers can use packet
sniffing tools such as wireshark to monitor traffic to the TeraTax
servers, gain access to valuable data and cover their tracks.
Example is if a certain website is using old cryptographic protocols SSL
(Secure Sockets Layers) and TLS (Transport Layer Security) that provide
authentication and data encryption between servers, machines and
applications operating over a network. There is a weakness in the
network or network server. Updated protocols like TLS 1.2 and TLS 1.3
are more secured protocols for server support.
Steps how attacks occur:
Reconnaissance - Before launching an attack, hackers first identify a
vulnerable target and explore the best ways to exploit it. The attackers
simply need a single point of entrance to start. Targeted phishing
emails are common in this step as an effective method of distributing
malware.
Scanning and Enumeration – When target is identified, then attacker
will identify weak points to gain access. This step of the process
normally goes slowly, they gather more detailed information and
search for vulnerabilities
Gaining Access – After weakness of target network are identified,
attackers gain access and then move through the network undetected.
Escalation of Privilege - Escalating privileges to admin, and then get
into any system on the network that’s accessible via the administrator
account. Privileged access is needed because it allows the attackers to
move freely within the environment.
Maintaining Access – The attackers maintain access to the network by
staying in place quietly. The hackers may secretly install malicious
programs. With the elevated privileges acquired earlier, need to a
single access point is no longer necessary. The attackers can come and
go as they please.
Covering Tracks and Placing Backdoors - Attackers want to hide their
tracks and removed all evidence of activities. Sometimes they confuse,
disorientate and divert the forensic examination process.
12
application. We can use the identified vulnerabilities to help shape the design.
It will direct and scope your security testing.
13
Information disclosure – An attack to expose or distribute confidential
information. The threats involve the exposure of information to individuals
who are not supposed to have access to it. It has the ability of users to
read a file that they were not granted access to, or the ability of an
intruder to read data in transit between two computers.
3. Analyse security risks (NOTE: During this phase, you will be focusing on following
3 four areas. )
ANSWER
3.1 Determine elements of risk management. (NOTE: you can list the elements in S NS
14
tabulated format in an order from High Risk to the Low Risk elements .)
☐ ☐
< NOTE: The elements of an effective risk management steps should be discussed here >
The elements of effective risk management for the TeraTax network environment are as
follows:
· Identify the risks
Risks can include fire, natural disasters, building maintenance issues, internals threats,
external threats, cyber attacks.
· Calculate/Potential Damage
Assessment of the consequences of each of the risks above and quantify into loss in
terms of time, cost and business damage.
· Develop a strategy for risk mitigation
Assign tasks to specific teams, allocate resources and time and develop and actionable
plan
· Implement the risk mitigation strategies
Begin to put the plan into action, assign responsibility and follow up
· Assess the effectiveness of the mitigation strategies
Review the mitigation strategy implementation plan, make adjustments as required,
increase/reduce/re-direct resources as needed
· Monitor phase
Periodic review and testing of the risk mitigation strategy and
adjustments/recommendations due to added or reduced factors.
< NOTE: After discussing the risk management steps above, then following template
should be used according to the risk category >
Risk Category Description Elements
High Fire Overheating or bad wiring
can cause a fire, sprinkler
Water Damage systems can cause water
damage.
Natural Disaster Natural disasters such as
earthquakes can total loss.
Cyber attacks and be very
Cyber Attack
serious and halt business
operations
Medium Internals Threat actors Internals threat actors
such as employees can
cause damage to the
business operations.
System Failure System failure can halt
operations and make the
business unable to
function until repair.
Low Property Theft Property theft such as
15
laptops or PCs can slow
the ability of the business
to function and can also
lead to sensitive data
being compromised.
3.2 Determine assets that require protection. (NOTE: provide your answer in
S NS
tabulated format.)
3.3 Categorise assets and calculate their value to the organisation. (NOTE: provide S NS
16
your answer in tabulated format.)
3.4 Create a risk management plan. [NOTE: Template has been provided to you.] S NS
17
<Discuss your Risk management plan here and then use the template below> ☐ ☐
Guideline for occurring the events and Risk calculation. (NOTE: This will help to find out RISK)
Probability of occurring the event
Note:
Provide your answer in the template below and calculate the Risk accordingly.
Threat Vulnerability Assets and RISK Solution
consequences
Probability of Probability of
<Example> <Example> <Example>
occurring the occurring the
event event All Services
HIGH HIGH (Website, email, Buy a new Air
Conditioner and
<Example> <Example> etc.) will be
also add a spare
Overheating in System failure unavailable until
Air Conditioner
Server Room desired HIGH so that it can be
(Air conditioning temperature is used in the
system is 10 years maintained in the event of High
old ) Server Room. Temperature.
Probability of Probability of
occurring the occurring the
event event
HIGH HIGH Disruption of Strict schedule of
operations and maintenance and
HIGH
services until the 24/7 Technical
Network system Network become network run and support
down vulnerable to maintained
attack, unreliable properly.
and system failure
Probability of Probability of
occurring the occurring the Vulnerable in
event event cyber-attacks,
HIGH HIGH disruption of
HIGH Replace faulty
operations and
router
services. Required
Network Faulty Router
to replace faulty
interruption Risk in network no Router
redundancy
Probability of Probability of
occurring the occurring the Vulnerable to
event event
cyber attack,
HIGH HIGH
disruption of
Replace or
operations,
HIGH reconfigure
Network Faulty firewall or network security
firewall
interruption misconfiguration issue. Required to
unauthorised Risk in network replace or
access reconfigure
security
firewall.
Probability of Probability of
occurring the occurring the Disruption of
event event operations and
Replace faulty
HIGH HIGH services. Required HIGH
switch
Network to replace Switch
interruption Faulty switch
Probability of Probability of Disruption of HIGH Update software
occurring the occurring the operations and
18
event event
HIGH HIGH
Loss of data, network security
issue
network Outdated software
interruption issue
Probability of Probability of Disruption of
occurring the occurring the operations and
event event services. Required
HIGH HIGH HIGH Replace server
to install backup
Network system System downtime, server
down no redundancy
Probability of Probability of Disruption of
occurring the occurring the operations and
event event services. Network
HIGH HIGH security issue. HIGH Update Anti virus
Loss of data, virus Required to
on system Outdated Antivirus update antivirus
19
outgoing call not IP phone faulty replace.
working Otherwise use
other line for
voice service or
calls diverted to
company mobile
phone
Probability of Probability of
occurring the occurring the
event event
Ensuring
LOW LOW
Outdated IT documentation is
Obsolete details or Documentation of LOW
documentation updated for every
information IT Security policy is policy changes..
not up to date
NOTE: You may add more rows according to your RISK Management within the case
study. Create at least of 10 of the Risks.
4. Create a security design (NOTE: During this phase, you will be focusing on
4 following four areas. )
20
is, malware disguised as a legitimate file.
Threat: Malware attack
5. Attack scenarios:
The attacker takes a position on a network and trying to hack the communication
between the sender and receiver. In this spot, the attacker relays all communication,
can listen to it, and even modify it.
Threat: Man-in-the Middle
4.2 Design security measures for network components. [NOTE: You should provide
your proposed network topology with proper security measures on it. This
topology should portrait all the branches and head office. You should include all
N
types security measures on it. After showing the necessary security measures in S
S
the topology, you have to explain other security measures such as Physical,
Logical, OS, Malware, Hacking, Fire, Natural disaster and so on. ]
☐ ☐
21
Security Measures
1. Always stay updated of latest version of software installed on OS and programs of all
devices that the TERA TAX use. This procedure usually corrects all vulnerabilities and
properly patched and updated. Recent updates allow your Data to be more secured.
2. Schedule backups weekly or can-do incremental backups for every few days, to
external hard drives or in the cloud in order to keep the data stored safely.
3. Antivirus and anti-malware are essential, they are indispensable to protecting the
Data. They are designed to prevent, search for, detect and remove viruses but also
adware, worms, trojans, and others.
4. Secured connectivity must be established for protection of information transmission.
The information transmitted must be in encrypted form. Digital signatures can be used
to encrypt the information. Using VPN can establish private secure communication
across public network such as internet. Other example to secure connection is Secure
Sockets Layer (SSL) protocol for secure transactions.
5. Security monitoring is also essential. Continuous monitoring of network for safeguard
against attacks test security infrastructure. The logfiles of the users accessing the host
containing information about their IP addresses, duration and time stamp must be
recorded. The weak areas must be identified through intrusion detection systems and
the network security holes must be fixed before hackers find them.
6. Securing company system access by establishing strong and unique password. Must
put together a combination of capitals, lower-case letters, numbers, and symbols, the
more unique and characters the better.
7. Risks of a potential physical security breach must be anticipated. A complete identity
of the person accessing the system is essential. FDD locks or electronics lock on all ICT
or server room, set up surveillance camera, identity cards and bio traits must be
implemented. Advance fire protection system must be set up to protect life and
property.
8. Creating a strong security policy must be implemented to all employee, clients and
visitors.
9. Disaster recovery plan, proper incident handling and training must be taught to
Network engineer and technician and other employees. In case of any network attacks,
natural disaster and fire.
10. Training must provide to educate employee about company security policy.
Prevention is the best way to keep TeraTax network, data safe.
4.3 Obtain feedback and adjust if required. [NOTE: You can send email to your assessor N
S
regarding your security design and corresponding feedback.] S
Security design (Topology) reviewed, and feedback done by Frank Trcka Instructor at
Melbourne Polytechnic. Adjustment made upon advice by Frank Trcka.
☐ ☐
4.4 Develop security policies. (NOTE: Template has been provided below.) N
S
S
☐ ☐
This Network Security Policy for TeraTax Australia PTY LTD is the “go to” document and
the benchmark of the key stakeholder’s expectation for IT Security and all that it entails.
It outlines the rules, guidelines, enforcements and actionable security methodology
afforded to TeraTax Australia PTY LTD.
22
Approved 23/10/2020
Date
Effective 23/10/2020
Date
I. Overview
TeraTax Australia PTY LTD Network Security Policy compiled and implemented as
of 23/10/2020 for the purpose of protecting all data and network traffic and
infrastructure for TeraTax Australia PTY LTD
II. Purpose
The Purpose of this policy is to allow for the implementation of an actionable plan with
instructions, technical guidelines, and procedural requirements for the protection of
TeraTax Australia PTY LTD network systems.
This policy will also allow for the identification, investigation and prosecution of
unwarranted and unsolicited network usage.
III. Scope
This policy applies to all staff, visitors, guests and contractors who access the Teratax
Australia computer networks.
This Policy also applies to all network associated hardware owned and used by TeraTax
Australia PTY LTD
IV. Policy
GENERAL
All data exchanged, stored and accessed over TeraTax Australia PTY LTD computer
networks in the central office and regional sites that is not clearly marked as owned by
other parties will be treated as the property of TeraTax Australia PTY LTD.
This policy reflects the fact that it is the policy of TeraTax PTY LTD to prohibit the
unauthorized access, sharing of, copying, altering or the theft of this data. The same
policy applies to data belonging to third parties who have assigned TeraTax PTY LTD access
to their data in business transactions.
GUIDELINES
The following is a list of various agencies and organizations whose guidelines were
23
incorporated into the completing of this document.
AS/NZS ISO/IEC 27000 series – Information Security Management, which
includes:
o ISO/ IEC 27000:2018 – Information technology – Security techniques –
Information security management systems – Overview and vocabulary
o ISO/IEC 27001:2015 – Information technology – Security techniques –
Information security management systems – Requirements
o ISO/IEC 27002:2015 – Information technology – Security techniques –
Code of practice for information security controls
o ISO/IEC 27003:2017 – Information technology – Security techniques –
Information security management system – Guidance
o AS ISO/IEC 27004:2018 – Information technology – Security techniques –
information security management – Monitoring, measurement, analysis
and evaluation
o ISO/IEC 27005:2018 – Information technology – Security techniques –
Information security risk management
AS ISO 55001:2014 – Asset management – Management systems – Requirements
User Passwords:
All passwords used to access data mainained by TeraTax PTY LTD must be at least 8
characters long, contain 1 upper case letter and a special character.
Passwords must not be written down and left in a place where others can access.
Any password that is stored electronically must not be stored in format that is readable
and in a location where it can be seen by others.
Passwords must be changed annually and when updated, the change must be of at least
3 characters.
All new computers installed and added to the TerTax network must have default password
settings updated.
All computers that are permanently or temporarily connected to the TeraTax local area
networks must have password access controls.
Routers must have secured administrative access; restricted device accessibility and
authentication access, passwords of 10 characters with a mixture of lower and upper case
letters and characters.
V. Enforcement
24
TeraTax Australia PTY LTD acknowledges that in certain circumstances there may be a
requirement for certain users to undertake actions that are not in line with this policy. In
this case, all instances must have pre-approval in writing from the Information Security
officer. Failure to do so will constitute a breach.
TeraTax Australia PTY LTD users who deliberately violate the terms and conditions
outlined in this policy will be found to be in breach of company policy and will be subject to
disciplinary action which may include termination of employment and legal action.
VI. Distribution
This policy document is to be distributed to all staff and stored in a Share point folder
which can be accessed. All amendments to this document are to be disseminated to all
staff at the time of completion.
Policy History
Version Date Description Approved By
25
5. Design and implement responses to security incidents (NOTE: During this phase, you will be focusi
5 following four areas. )
ANSWER
5.1 Design auditing and incident response procedure. S
☐
< SysLog Server collection gives reports about incidents in detail. This type of SysLog report can be used for auditing and
incident response e.g. Syslog products like Solarwinds, Kiwi Syslog, PRTG etc. can generate detailed information
about indicents.>
26
Incident Response Procedures is a set of instructions designed to help companies prepare for, detect, respond to, and
recover from network security incidents. An incident response plan is the best chance at defending Tera Tax
organization from suffering the effects of any incident. The plan encompasses areas of organization such as IT, HR,
finance, customer service, employee communications, legal, insurance, public relations, regulators, suppliers, partners,
local authorities and other outside entities.
27
endpoint by validating what is running in memory at a given point in time.
Conduct compromise assessments to verify whether a network has been breached and
quickly identify the presence of known or zero day malware and persistent threats active
or dormant and that have evaded your existing cybersecurity defenses.
Response incident response actions may include triaging alerts from your endpoint security
tools to determine which threats are real or the priority in which to address security incidents.
Incident response activities can also include containing and neutralizing the threat(s), isolating,
shutting down, or otherwise disconnecting infected systems from your network to prevent the
spread of the cyber attack. Additionally, incident response operations include eliminating the
threat (malicious files, hidden backdoors, and artifacts) which led to the security incident.
Immediately contain systems, networks, data stores and devices to minimize the breadth
of the incident and isolate it from causing wide-spread damage.
Determine if any sensitive data has been stolen or corrupted and, if so, what the potential
risk might be to your business.
Eradicate infected files and, if necessary, replace hardware.
Keep a comprehensive log of the incident and response, including the time, data, location
and extent of damage from the attack.
Preserve all the artifacts and details of the breach for further analysis of origin, impact,
and intentions.
Prepare and release public statements as soon as possible, describe as accurately as
possible the nature of the breach, root causes, the extent of the attack, steps toward
remediation, and an outline of future updates.
Update any firewalls and network security to capture evidence that can be used later for
forensics.
Engage the legal team and examine compliance and risks to see if the incident impacts any
regulations.
Contact law enforcement if applicable since the incident may also impact other
organizations. Additional intelligence on the incident may help eradicate, identify the
scope, or assist with attribution.
Recovery include eradication of the security risk, reviewing and reporting on what happened.
Certifying then re-certifying your environment for a clear of the threat(s) via a post-incident
cybersecurity compromise assessment or security and IT risk assessment.
Eradicate the security risk to ensure the attacker cannot regain access. This includes
patching systems, closing network access and resetting passwords of compromised
accounts.
Create a root cause identification to help determine the attack path used so that security
controls can be improved to prevent similar attacks in the future.
Perform an organization wide vulnerability analysis to determine whether any other
vulnerabilities may exist.
Restore the systems to pre-incident state. Check for data loss and verify that systems
integrity, availability and confidentiality has been regained and that the business is back to
normal operations.
Continue to gather logs, memory dumps, audits, network traffic statistics and disk images.
Without proper evidence gathering, digital forensics is limited so a follow-up investigation
will not occur.
Follow-up activities including updating your threat intelligence with new information about
what’s good and what’s bad, updating your IR plan with lessons learned from the security incident.
Complete an incident response report and include all areas of the business that were
affected by the incident.
Determine whether management was satisfied with the response and whether the
organization needs to invest further in people, training or technology to help improve its
28
security posture.
Share lessons learned. What went well, what didn’t and how can procedures be improved
in the future?
Review, test and update the cybersecurity incident response plan on a regular basis,
perhaps annually if possible.
Conduct a compromise assessment or other security scans on a regular basis to ensure
the health of systems, networks and devices.
Update incident response plans after a department restructure or other major transition.
Keep all stakeholders informed about the latest trends and new types of data breaches
that are happening. Promote the message that “security is everyone’s job.”
5.2 Document security incidents. S
We begin by developing a formal security incident logging plan. ☐
All log records are to be stored in a single location and are organised by date and source.
Network devices are configured in order to enable event logging, generate the type of event with attributes such as:
IP address time and date
Protocol used
Port accessed
Method of connection
Traffic allowed on firewall
Traffic blocked on firewall
Administrator access
User account changes
Bytes transferred
These settings should cover the network perimeter, endpoints and core internal devices.
Event logging should be enabled at all times, and protected from unauthorised access.
They should be analysed on a regular basis to identify abnormalities.
The responsibility for reviewing the logs for the network is assigned to more than one staff in the IT team and
scheduled to be carried out regularly.
Once events are recorded for a particular time period of interest, a report is created from a pre determined template
capturing the data mentioned above including time and date, type of incident etc. This report should describe how the
incident has affected or could have affected the network system.
What are the steps that need to be or have already been implemented to avoid recurrence.
The process of reviewing the logs consists of comparing new logs with the pre-documented baseline logs. In this
process the aim is to determine if a new event is normal or abnormal and can be done against the logging accounts of
specific users in order to try to establish the context of the event. This is then compared to other users to see of their
logs have generated the same even and if this has also occurred on another system at the same time or a different time
and date.
During this analysis, it may be required to discuss with other users to see if there are anything information that can be
useful to the investigation of this event.
29
Use of a spreadsheet assists with creating the event analysis:
5.3 Implement configurations aligned with incident response procedure design [NOTE: You should provide
S
Router/Switch/ASA Firewall configuration details to protect and combat the incidents.]
☐
30
:
31
spanning-tree mode pvst ! interface GigabitEthernet0/0
32
! ! !
! !
! username admin
password
end .vMR4ts6hGyvBErZ
encrypted
class-map
inspection_default
match default-inspection-
traffic
policy-map global_policy
33
class inspection_default
inspect icmp
service-policy global_policy
global
telnet timeout 5
ssh 192.168.1.0
255.255.255.0 inside
ssh 172.16.3.3
255.255.255.255 outside
ssh timeout 10
dhcpd address
192.168.1.5-192.168.1.36
inside
34
5.4 Test and sign off. (NOTE: Template has been provided below.) S
SUBMISSION GUIDELINES
35
Save your assessment file as: “Student ID_Student Name_Assessment 4_Case Study
Student Declaration
PLEASE READ, TICK AND SIGN BELOW
☐ I declare that the attached assessment I have submitted is my own original work and any
contributions from and references to other authors are clearly acknowledged and noted.
☐ This document has been created for the purpose of this assessment only and has not been
submitted as another form of assessment at Melbourne Polytechnic or any other tertiary
institute.
☐ I have retained a copy of this work for my reference in the event that, this application is lost
or damaged.
☐ I give permission for Melbourne Polytechnic to keep, make copies of and communicate my
work for the purpose of investigating plagiarism and/or review by internal and external
assessors.
☐ I understand that plagiarism is the act of using another person’s idea or work and presenting
it as my own. This is a serious offence and I will accept that penalties will be imposed on me
should I breach Melbourne Polytechnic’s plagiarism policy.
Marking Guide
TRAINER/ASSESSOR TO COMPLETE THE FOLLOWING:
TASK Yes No
1.1 The learner has correctly defined planning phase for network security
☐ ☐
design.
1.2 The learner has correctly defined building phase for network security
☐ ☐
design.
1.3 The learner has correctly defined managing phase for network
☐ ☐
security design.
36
2.1
The learner has correctly determined why attacks do occur. ☐ ☐
2.2 The learner has correctly determined who the attack may come
☐ ☐
from.
2.3 The learner has correctly analysed common types of network
☐ ☐
vulnerabilities.
2.4 The learner has correctly determined how attacks do occur.
☐ ☐
2.5 The learner has correctly designed a threat model to categorise
☐ ☐
treats.
3.1 The learner has correctly determined elements of risk management.
☐ ☐
3.2 The learner has correctly determined assets that require protection.
☐ ☐
3.3 The learner has correctly categorised assets and calculate their value
☐ ☐
to the organisation.
3.4 The learner has correctly created a risk management plan.
☐ ☐
4.1 The learner has correctly determined attacker scenarios and threats.
☐ ☐
4.2 The learner has correctly designed security measures for network
☐ ☐
components.
4.3 The learner has correctly obtained feedback and adjust if required.
☐ ☐
4.4 The learner has correctly developed security policies.
☐ ☐
5.1 The learner has correctly designed auditing and incident response
☐ ☐
procedure.
5.2 The learner has correctly documented security incidents.
☐ ☐
5.3 The learner has correctly Implemented configurations aligned with
☐ ☐
incident response procedure design.
5.4 The learner has correctly presented test and sign off form.
☐ ☐
COMMENTS AND FEEDBACK
RESULT
☐ Satisfactory
☐ Not Satisfactory (resubmission required) – Due date: ____________________________
37
DATE ASSESSMENT RETURNED
TRAINER/ASSESSOR NAME
TRAINER/ASSESSOR SIGNATURE
38