Submit Your Question

Answering Assignment Homework Questions

High Quality, Fast Delivery, Plagiarism Free - Just in 3 Steps

Upload Questions Details and Instructions:


Select Assignment Files

Get Assignment Help by Experts


Plagiarism-Free, Every Time

All of our assignment solution delivers with a dedicated plagiarism report

Excellent Subject Matter Expert

Get Supreme Assignment Help by highly Skilled Writers

100% Satisfaction Guaranteed

Score Higher or Your Money Back

Case Study Help reviews

ICT301 Network Management and Security Assignment Answers

Assignment Solutions on ICT301 Network Management and Security

Casestudyhelp.com offers unmatched assignment services for ICT301 Network Management and Security Assignment. We make sure that we select only experienced and well-qualified assignment writers. Take Management Assignment Help from our assignment experts, and we guarantee that you will get A+ grades. Our writers provide assistance in case study solution, PhD dissertation writing, online assignment answers at an affordable price. We never compromise when it comes to deadlines.

order-now

1 Background of Multi service Network Security Metric

1.1 Project Background

The Classic Avanti car parts and the full car reconstruction are traditional and retro Italian. Often they also buy vehicles to uninstall parts or complete a refurbishment to demonstrate their skills. They’re 20 years old and have been developing their company on the digital side steadily. The digital side began as a commercial but it expanded to the point where it has an online marketplace and continues to raise money from the influence of social media with ex-car proprietor Bruce Allison rising celebrity status. The public is now increasingly recognised for workers shown in Instragram and Facebook messages. They have been marketing branded products, and businesses continue to see their tools and supplies in Classic Avanti ‘s posts used. It has reached the point that about 40% of the company profit is created online or by their social networks.

At present, Brisbane and Melbourne have two sites each with about 15 workers. Brisbane was the first site and was headquarters, but they have greater access to secondary goods in Melbourne and higher local revenue. They currently rely on people calling from nearby firms to complete the required work for a part-time IT help. In recent years, they have hired an accomplished social networking boss who within the last two months has doubled their revenue and improved 20 percent.

No IT technology planning plan has been made on the acquisitions, as salespeople arrived at the sites at the expected time, or new technologies have been announced to industry. Duello Rossi, the Melbourne boss, comes from a bigger company and said that he is not pleased with the current IT facilities and that better services will improve business efficiency. A streaming service has contacted them, and has been shooting a series based on cars and people through their social media messages. There’s also an idea to start filming YouTube videos about fitting spare parts or caring for the Italian vintage vehicles. The streaming service and the director of social media are excited about these proposals and plan to launch as quickly as possible. However, Bruce Allison worries that he will not be able to compete with Classic Avanti’s daily business and needs funding from these thoughts. Phil Daily is recruited to run the company by a new boss who worries that he depends all of his concepts on solid IT structures that he does not believe are in operation. He needs to ensure his social media comments represent the honesty of his communications with the group. He is worried that Classic Avanti would not profit from the curiosity and sympathy in bad procedures, stock management and order fulfillment if it attempts these concepts without strong structures and processes. He is also worried that the management of social media is only aware of their social media operations and progress.

1.2 Project Scope

The scope of the project is limited to address of issues and considerations of Classic Avanti.

1.3 Project Goal

The owner Bruce Allison needs a business model which makes better use of customer and sales data and where all locations are combined. Actually they operate almost as separate businesses. He still wants to expand where there is interest in other areas. When he steps away from administration, he needs to ensure that the records are satisfactory and prompt to maintain a successful company monitoring. He recognizes the need and is willing to contribute, but must be reassured that any costs are appropriate because he would rather spend money on the current competition squad. With wireless internet access in Brisbane and Melbourne, they have a relatively decent internet connection, with the personnel free to BYOD and to connect to the network. Classic Avanti, however, continues to use home networking services. Classic Avanti ‘s main office is situated in an independent industrial facility. During the times they are closed, they hire a safety corporation and the vehicles they operate are typically high risk. They are often responsible for their protection.

1.4 Strategic Alignment of Project

This report will assist the owner to make strategic decisions. One of the key management practices is the decision-making. At the upper tiers of organizations, strategic assessments are more complex, more challenging and long-term, as compared to practical and organizational decision-making. The managers need to realize too, that employees constitute the most precious commodity of the organization and this is why it is important to ensure that the cultural orientation and confidence of individual workers are closely directed towards employee training and growth. The organization should set up for its workers a pleasant opportunity atmosphere that would be ready to establish them. They have an exciting work and must be inspired in the right direction. A device that functions is a guarantee of management of information.

2 Network Management

Network management architecture not only facilitates collaboration between NMS programmers, but eliminates the number of alerts that support personnel with network operations get. At the lowest layer, the activities of each network element of the NMS architecture are almost difficult to keep up. It is not necessary, for example, for someone to watch every syslog case on the network. You rely on Network Management Layer (NML) systems to filter through all events and show only the most important events. Meanwhile, the Service Management Layer (SML) is used to describe events from the NML further and to connect various network management systems. A successful NMS framework would also allow duplication of these network events so that redundant communications from administrative staff can be further minimized (Mohave et al., 2017, July).

Figure 1 describes the key components of a complex NMS framework and includes a strong integration scenario. Cisco Advanced Networks promotes the implementation of a hierarchical structure of distributed network administration. The data flow and convergence of many NMS instruments are part of this form of architecture. The method and data relationships are illustrated in Figure 1.

The fundamental concept is the centralized network operation of the enterprise. Based on a telecommunications network model, this design is the first. ‘In order to do this, TMN describes a collection of access point’s elements that conduct the basic handling of messages to be implemented by devices, such as management workstations, for tracking and control. The standard access requires devices to operate from differently from the others’ interface. ‘TMN includes a basis for the accomplishment.

The first step, the Layer operational aspects, determines each aspect of the network used for the implementation. When defining this layer, multiple machines may be impacted by the occurrence for each incident happening in the network and can alert network management systems to multiple instances of the same problem individually.

The Network Control Layer is in the core of the diagram. This feature uses several elements (which can, in practise, be different applications) to compare the information obtained from different sources (also known as root cause analysis) and to classify the incident. The NML offers an abstraction level over the layer of entity control, in which the staff of the project does not “weave” by theoretically hundreds of unreachable or node down alerts.

The Service Control Framework is at the end of the range. Knowledge and automation for filtered incidents, event analysis, and collaboration between databases and emergency response systems is applied to this layer. The aim is to shift conventional network management system and operations workers from entity management to network management (network incident management) and service management (problem management).

3 Scalability

Business networks are dynamic and continue to expand on need and managers must provide for future growth. Using several tests to spread load over servers and get a better picture of your network results. Effectively predict bottlenecks and reduce downtime. Manage multiple interfaces per sensor either for scalability on the same site or at distant locations for geographically dispersed control of the network. Manage all equipment from either a local console or a single NOC console.

4 Physical and Digital Security

This becomes tougher just as digital technology advances and trickles into the realm of physical security. For example, organizations that rely on the Internet of Things (IoT) are expected to be 75.4 billion by 2025 for a higher proportion of their physical protection – the number of IoT-connected devices – physical and IT security leaders need to protect a broader threat surface than ever before. This knowledge provides new possibilities for CSOs and CIOs, as well as elevated risks. Digital infrastructure contributes to sophisticated physical protection technologies, but beyond these networked devices, physical security and safety must be handled with an understanding of the partnership. For example, a violation of data in an intelligent building will bypass remotely protection by weak actors or track network video surveillance streams. In either side, a physical infringement of the same intellectual framework might allow bad actors to seize digital objects for cyber crime purposes. In both instances, one-space weakness bleeds into the other. Cyber security effects public protection specifically and vice versa.

The increasingly global society also points to a new wave of cyber-physical challenges. Indeed, the 2018 Data Breach Study from Verizon showed 11% of data abuses include physical acts. The intersection between physical security and cyber security requires a modern approach and investment in technologies that will provide results for private security and public security practitioners.

In order to ensure their public protection, companies engage in new technologies and need to consider how cyber-attacks are a danger for both IT and the physical properties. Cyber offenders are introduced with new access points for smart gadgets such as cameras, alarms and wireless door locks. If all of these properties are breached, businesses will face a cyber-security risk that would affect all networked computers. As IT technology integration and public protection are relatively recent, cyber criminals expect to catch off-guard organizations. For instance, in 2014, hackers violated the German steel mill network to access the control system of the plant. The phishing attack caused critical plant issues, including damage to a risky blowing oven that could not usually be shut down.

CSOs and CIOs should search for ways to utilize emerging technology for advanced physical security initiatives, considering related cyber security risk. Bio metrics, for example, has become an integral aspect of corporate protection. Spice works data reveals that nearly 62 percent of companies still use bio-authentication devices, with business facilities and utilities employing fingerprint and facial scanners as the most frequently used technologies. Bio metric authentication enhances conventional ways of authentication, such as passwords, PIN codes, and personal protection problems. Some bio metric methods of identification include manual mapping, iris scanning, and speech recognition. Spice works estimates that almost 90 per cent of companies will use bio metric technology by 2020 with the increase in the use of these new technologies and the improved use of fingerprint and facial scanners.

In the current threat environment, data-driven architecture is also crucial to maintaining overall protection. In order to respond to the emerging challenges, security officials at all levels of an enterprise can use digital tools for accessing real-time information. Computer systems can respond to physical challenges in a coordinated and orderly fashion by supplying stakeholders with relevant knowledge in the incidents that occur. When cyber protection and physical protection intersect, CSOs and CIOs need to understand how to build a wider digital defense policy. Leaders must also think in a cohesive manner about cyber-physical protection. The first move is to engage in new technologies which can enhance the reliability of networks and systems while fixing the vulnerabilities of linked physical objects (Ramos et al., 2017).

This ensures that organizations must make the required adjustments in order to tie cyber security along with physical security preparations. In order to effectively tackle cyber-physical challenges, leaders must encourage cooperation between facilities personnel and IT professionals. In conclusion, private sector and public security decision-makers must collaborate with cyber security and physical security stakeholders in order to find the right direction forward. Although this is distinct from one company to another, it is important for security experts to collaborate together to ensure that physical and technical infrastructure, from private security departments to government agencies, encompasses all public organizations.

For organizations physical security has been harder and difficult in recent decades. Increased vulnerabilities now cause technologies and computing systems to contribute to further compromising. The portability and mobile connectivity of USB hard drives, notebooks, tablets and smartphones will lead to information being lost or stolen. In the dawn of computing, massive mainframe machines were used by just a couple of individuals and were guarded in locked rooms. Desks today are packed with personal computers and handheld notebooks for enterprise-wide access to business info. With mobile users who are willing to carry their machines out of the building, security of records, networks and systems has become difficult to enforce. Fraud, theft, fraud, injuries and thefts, when societies are getting “unique and diverse,” are growing costs for organizations. As the complexity grows and more bugs become more difficult, physical security becomes harder to control. The physical protection factor is frequently overlooked. During function with managerial and technological supervision, hardware or vandalism may be theft. Organizations also rely on operational and institutional monitoring and deviations cannot be observed automatically in effect. Knowledge and countermeasures are distinct from public protection vulnerabilities, threats and measures. When looking at information security, people conspire how a person can access the network by cellular, open software operations and open ports using unauthorized methods. Physical protection experts are worried with the actual entry of a building or the environment and the harm that may be incurred by the attacker (Shin et al., 2016, August).

5 Data Protection Including Video Files

Data that will offer the highest bidder are obtained indefinitely by hackers targeting servers, networks and mobile devices. In the dark web, the sensory intelligence is freely transmitted, and the market is complex underground. The McAfee analysis reveals that, depending on the amount of details given, payment card accounts numbers are issued at $5 to $30. Records for health insurance amount to up to $50. High-sadden credentials retail for $200 or more online banking accounts (Kang & Kang, 2016).

Data security and encryption tools can include system encryption, email, and data encryption themselves. These security functions are also often associated with system access, email and data protection. Companies and organizations face the task of securing and avoiding data loss as their everyday business activities require more individuals accessing mobile computers, portable media and web-based apps. When workers copy or transfer data to the cloud on disposable computers, confidential data can no longer be managed or secured by the organization. This avoids data manipulation and ransom ware from removable and mobile computers as well as Network and cloud software from being implemented by the latest data loss protection solutions. To do this, they must ensure proper use of computers and software and that auto-encryption of data is guaranteed, even after the company leaves (Lu et al., 2018).

Imagine the future threat posed by hiking data or breaking into IP video control systems to Internet access devices, so that alarms and open doors can be disabled. When companies are more aware of the importance of their knowledge and privacy they need more protection to provide consumers with protected physical and logical security solutions alongside or inside their goods. The first protection line to achieve this is the implementation of IP devices and system modules with encryption solutions, including the existing Advanced Encryption Standard (AES) 256-bit. This end-to – end encryption algorithm secures server and client communications and promotes the Hypertext Transmission Protocol (HTTP) as a base for internet data exchange. Essentially, AES 256 is a block of algorithms which, when reconnected to the receiving point, “scrambles” data in unreadable transport code, then scrambles with the same algorithm when the required permissions are supplied (Zhang et al., 2018).

The easiest way to reduce the possibility of missing, damaged or hacked data is by encrypting networked networks and computers. For example, an IP video surveillance system has several points in the network infrastructure that combine multiple devices and related systems. There are IP cameras and peripheries such as heaters, infrared lights, modems, routers and remote switches, all to the bottom where video management (VMS) systems, NVRs and other embedded applications, including access controls, handle their devices on a single board.

These fully integrated video control, access and security solutions are the best technologies provided by the security sector, but can be aimed at the same persons, facilities and equipment intended to protect them in the hands of the wrong person. There is no question that the Electronic Attack Networks must be secured. Aside from growing physical protection, encryption aims to mitigate the legal exposure of confidential information on lost or abandoned computers and the possibility of widespread infestations of viruses. IP devices and AES256 encrypted servers massively allow intruders to avoid re-setting devices or unwanted access to storage data with the approval of the National Institute for Standards and Technology (NIST) (Lin et al., 2018).

6 Conclusions

This report reviews and analyzes various security and network considerations that must be taken into account by Avanti. This report concludes that security management is one of the most significant strategic decisions in any business. This report contains in depth illustration of multiple solutions and their implications regarding the given case.

7 Recommendations

If managed efficiently, the network management system will show client all the major attacks and vulnerabilities. With these standalone devices, which control the entire network system, the expertise of network engineers cannot be appreciated. The performance of the network management system thus offers unparalleled automated tasks, which serve various platforms efficiently and provide user-friendly interface for uninterrupted services. It is highly recommended to use a layered architecture in the network and include a merge of physical and cyber security measures. It is also recommended to consider encryption and cryptography for video files.

8 References

Fawcett, L., Scott-Hayward, S., Broadbent, M., Wright, A., & Race, N. (2018). Tennison: a distributed SDN framework for scalable network security. IEEE Journal on Selected Areas in Communications36(12), 2805-2818.

Kang, M. J., & Kang, J. W. (2016). Intrusion detection system using deep neural network for in-vehicle network security. PLoS one11(6), e0155781.

Lin, H., Yan, Z., Chen, Y., & Zhang, L. (2018). A survey on network security-related data collection technologies. IEEE Access6, 18345-18365.

Lu, Z., Qu, G., & Liu, Z. (2018). A survey on recent advances in vehicular network security, trust, and privacy. IEEE Transactions on Intelligent Transportation Systems20(2), 760-776.

Mohave, O., Kuchuk, H., Kuchuk, N., Mozhaev, M., & Lohvynenko, M. (2017). Multiservice network security metric. In 2017 2nd International Conference on Advanced Information and Communication Technologies (AICT) (pp. 133-136). IEEE.

Ramos, A., Lazar, M., Holanda Filho, R., & Rodrigues, J. J. (2017). Model-based quantitative network security metrics: A survey. IEEE Communications Surveys & Tutorials19(4), 2704-2734.

Sharafaldin, I., Lashkari, A. H., & Ghorbani, A. A. (2019). An evaluation framework for network security visualizations. Computers & Security84, 70-92.

Shin, S., Xu, L., Hong, S., & Gu, G. (2016, August). Enhancing network security through software defined networking (SDN). In 2016 25th international conference on computer communication and networks (ICCCN) (pp. 1-9). IEEE.

Zhang, H., Yi, Y., Wang, J., Cao, N., & Duan, Q. (2018). Network security situation awareness framework based on threat intelligence. Computers, Materials and Continua56(3), 381-399.

Get This Answer with Case Study Help-24/7 Q&A Help

We're here to instantly help! Get best assignment questions and answers help 24/7 and Earn better grades with homework

PLACE YOUR ORDER HERE

Top