Design a network that meets the provided scenario requirements. Then conduct a cyber security risk assessment for
Fantastic news! We've Found the answer you've been seeking!
Question:
2 Scenario
The tutorial asked you to consider just the wired network for the security cameras. In this project you need to extend the security camera network, considering the following:
- The multi-storey house is now being used as a mix of short-term and long-term rental accommodation. The owner does not live in the house, but rather rents the 6 bedrooms to up to 12 people. The renters do not necessarily know each other, and rental contracts start/end at different times.
- The house includes multiple shared indoor spaces (e.g., kitchen, living area, home cinema), as well as large outdoor spaces (e.g., patio, BBQ area, pool, tennis court).
- A mixed wired/wireless network for the occupants is required (e.g., connecting PCs, laptops, phones, media devices). This needs to be connected with the existing security camera network.
- Security video must be recorded and stored locally in the house, however a cloud-based network management application is also needed. This application may be used by the owner, rental agencies and the occupants.
4 Tasks
4.1 Task 1: List assumptions and requirements
The scenario is quite open-ended; many details are not specified. You need to list any assumptions you made and all requirements that you are considering (including the requirements from the scenario and the requirements arising from your assumptions).
4.2 Task 2: Design the network
Design the entire network. Your design should include: COIT20246 Networking and Cyber Security
- One or more network diagrams (using diagrams.net);
- Explanation of key design decisions, e.g., why you chose to design as you did;
- Address allocations, e.g., IPv4 address ranges to be used;
- Table of recommended hardware, e.g., recommended minimum specifications for equipment;
4.3 Task 3: Conduct cyber security risk assessment
You are to conduct a mini cyber security risk assessment of your network. By “mini” we mean you only conduct a subset of steps of a typical full risk assessment (due to lack of time and information available to you).
Identify the important assets for your network and the key threats, and then assign a risk level to the assets (relative to the threats).
4.4 Task 4: Recommend security controls
Based on the highest risks identified in the previous task, as well as any relevant standards or industry best practices, recommend a set of security controls for your network. Where relevant, update your network design to include security controls. For each security control, explain which asset/threat it protects and how. Refer to specific recommendations or controls from standards or industry best practice, such as NIST Cybersecurity framework or the ACSC Essential Eight.
4.5 Task 5: Evaluate ethical/social issues
Identify ethical/social issues that should be considered when designing, building and operating the network, and give recommendations to the owner as to strategies with addressing those issues. Issues not related to the network and its usage are outside of the scope (e.g., the social issue of housing affordability, while important, is not within the scope of your evaluation).
4.6 Task 6: Reflect on Teamwork
In this project you worked in a group. Consider what worked well in a group, and what issues you encountered. Recommended techniques you (or others) should use in future group projects (e.g. in units next term) to ensure successful team work. For each technique, explain what problem the technique is likely to solve or how it will help teamwork.
Related Book For
Auditing Cases An Interactive Learning Approach
ISBN: 9780134421827
7th Edition
Authors: Mark S Beasley, Frank A. Buckless, Steven M. Glover, Douglas F Prawitt
Posted Date: