ICTCYS612 Project Portfolio
ICTCYS612 Project Portfolio
Student Version
ICTCYS612
Design and implement virtualised cyber
security infrastructure for organisations
CONTENTS
Section 1: Virtualised cyber security infrastructure 5
Section 2: Implementation and testing 11
Assessor: Harika
Date: 24/05/2023
Last but not least, given that the sole user in the company is the
owner of the business, it is essential to ensure that the account
of this user is secured using strong passwords and two-factor
authentication to prevent unauthorized access to the system.
Also, ordinary security preparing and mindfulness ought to be
given to the client to guarantee they know about normal digital
Network security options and Virtual private network (VPN): A VPN can be used to connect
technologies the company's virtual machines to the internet in a safe and
encrypted way. This makes it safe for remote access and keeps
Based on the organisation’s cyber
people from getting into the network without permission.
security needs, identify and
describe network security options,
as well as suitable security
Firewall - A firewall can be carried out to screen and control
technologies. Remember that these
network traffic to and from the virtual machines. This can assist
must relate to virtualised cyber
in preventing unauthorized access, malicious traffic, and
security infrastructures.
cyberattacks.
Include at least two options for
Antivirus programming - Antivirus programming can be utilized
network security and two security
to identify and eliminate malware from the virtual machines.
technologies.
This may entail identifying and removing infected files, blocking
harmful websites, and scanning files for viruses.
Two-factor authentication: Two-factor authentication requires
users to provide a second form of identification, such as a code
or fingerprint, in addition to their password in order to add an
additional layer of security to user accounts. This can assist
with forestalling unapproved admittance to the virtual machines.
2. Hypervisor:
- On the host machine, install a hypervisor software
that is dependable and secure, such as Microsoft
Hyper-V or VMware ESXi.
- Set the hypervisor up so that the virtual machines
can effectively divide up the resources.
3. Hardware replicas:
- Make two virtual machines, one running Macintosh
operating system and the other running Windows
operating system, to meet the prerequisite of running
both working frameworks all the while.
- Designate suitable assets to each virtual machine in
view of their framework prerequisites.
4. Networking:
Implementation plan
Provide your implementation plan 1. Define the phases of implementation:
for your design. Make sure you
- Phase 1: Foundation Arrangement and Setup
plan includes:
- Stage 2:
Actions for implementation
including network boundaries and Phase 3 of the configuration of the network and security:
technologies that will be used. Phase 4: Configuration and creation of virtual machines
responsibilities and timelines. Phase 5: Data Protection and Backup Setup: Configuration of
User Access and Authentication –
Phase 6: 2. Continuous Maintenance and Control
Responsibilities:
- IT Staff: The virtualized infrastructure's configuration and
overall implementation
- Network Chairman: VPN setup, VLAN configuration, firewall
configuration, and network configuration.
- Framework Manager: Installation of the hypervisor, creation
of virtual machines, and configuration of endpoint security
- Analyst in Security: Configuration for IDPS deployment,
logging, and monitoring.
- Administrator of Backup: Reinforcement arrangement,
encryption, and information maintenance strategy execution.
- Security Manager/IT Manager: Security audits,
authentication configuration, and user access management
Tools
Outline the tools that you will use to 1. Virtualization Stage:
implement the infrastructure.
- Hyper-V from Microsoft or VMware ESXi: Virtual machines
Explain how you will obtain access
that run both Windows and Mac OS X simultaneously can be
to the network and data you need.
created and managed using these hypervisor platforms.
4. Weakness Examining:
- OpenVAS, Nessus, or Qualys: These apparatuses are
ordinarily utilized for weakness checking and distinguishing
potential security shortcomings in network gadgets, servers,
and virtual machines.
Presentation Attached.
Include the title of your
presentation here and attach it to
your Portfolio.
Feedback
Document the feedback you
received from the presentation
regarding your design.
Attach: Screenshots ☐
Presentation ☐
Organisation operations
Provide an analysis of your chosen 1. System for Student Management (RTO Manager):
organisation’s operations.
The college's student management system is managed by an
Describe the cyber security needs RTO (Registered Training Organization) Manager. This
the organisation has based on their framework contains individual data, scholarly records, and
operations. enlistment documentation of understudies. This system requires
the following for cyber security:
Network security options and Two network security options and two security technologies that
technologies are appropriate for virtualized cyber security infrastructures are
as follows:
Based on the organisation’s cyber
security needs, identify and
describe network security options,
Options for Network Security:
as well as suitable security
technologies. Remember that these
must relate to virtualised cyber 1. Private Virtual Network (VPN):
security infrastructures.
A VPN makes a protected and encoded association between
Include at least two options for the association's organization and distant clients or outer
network security and two security specialist co-ops. By establishing a secure tunnel, it ensures the
technologies. confidentiality and integrity of data transmitted over the network.
By utilizing a VPN, RGIT School can protect its correspondence
with outer specialist co-ops like RTO Supervisor, Xero, and
OneDrive. This helps shield sensitive data from unauthorized
access and interceptions.
Security Innovations:
1. Firewall:
The incoming and outgoing network traffic is controlled by a
firewall, which acts as a barrier between the internal network
and external networks based on security rules. Based on
parameters like the source IP, destination IP, ports, and
protocols, it filters traffic. By sending a firewall, RGIT School
can uphold network security strategies, confine unapproved
admittance to its organization, and keep pernicious traffic from
arriving at its inside frameworks.
3. Staff Documents:
This information type incorporates touchy worker data, including
individual subtleties, business contracts, execution records, and
other staff related information.
4. Data security:
- Information Grouping: Characterize information in light of its
responsiveness level and execute suitable security controls and
access privileges.
- Reinforcement and Fiasco Recuperation: Lay out a hearty
reinforcement framework to consistently reinforcement basic
information and guarantee its accessibility if there should be an
occurrence of framework disappointments or information
misfortune episodes.
- Security: Secure sensitive data from unauthorized access by
encrypting it while in transit and at rest.
5. Secure Limit:
- Safe Means of Communication: When transmitting data
between RGIT College's systems and external service
providers, secure communication protocols like HTTPS, VPN,
or encrypted connections are used.
- Seller Security Evaluations: Routinely evaluate the safety
efforts and conventions of outside specialist co-ops,
guaranteeing that they stick to essential security principles and
safeguard the information they handle.
4. Data security:
- Information Grouping: Characterize information in light of its
responsiveness level and execute suitable security controls and
access privileges.
- Reinforcement and Fiasco Recuperation: Lay out a hearty
reinforcement framework to consistently reinforcement basic
information and guarantee its accessibility if there should be an
occurrence of framework disappointments or information
misfortune episodes.
- Security: Secure sensitive data from unauthorized access by
encrypting it while in transit and at rest.
5. Secure Limit:
- Safe Means of Communication: When transmitting data
between RGIT College's systems and external service
providers, secure communication protocols like HTTPS, VPN,
or encrypted connections are used.
- Seller Security Evaluations: Routinely evaluate the safety
efforts and conventions of outside specialist co-ops,
guaranteeing that they stick to essential security principles and
safeguard the information they handle.
Presentation Attached.
Include the title of your
presentation here and attach it to
your Portfolio.
Attach: Screenshots ☐
Presentation ☐
Implementatio
n
You are to
provide
evidence of
the
implementatio
n of your
design. This
should include
screenshots
that show:
Network
boundari
es
created
Relevant
technolo
gies
impleme
nted
Security
levels set
User
access
set
5. security tests: To find holes in your applications and network infrastructure, you should
conduct penetration tests and security assessments regularly. Nessus, Nmap, and Wireshark
are some of the tools that can help with these assessments.
6. Log Checking: Utilize a log monitoring system to examine application, server, and network
device logs. This aids in the investigation of security incidents, errors, and anomalies.
7. Analysing Network Traffic: To capture and analyze network packets, use tools like Wireshark
or PRTG for network traffic analysis. Analysis of traffic patterns, performance bottlenecks, and
other network issues can all benefit from this.
User feedback Hi Chalana, For the infrastructure task please create a diagram or pictorial
Document the representation of the infrastructure you propose.
user feedback
from your
assessor.
Screenshots ☐
Attach:
Implementatio
n
You are to
provide
evidence of
the
implementatio
n of your
design. This
should include
screenshots
that show:
Network
boundari
es
created
Relevant
technolo
gies
impleme
nted
Security
levels set
User
access
set
Testing 1. Test of Ping: Utilize the ping order to test availability and measure reaction times between
gadgets on an organization. This helps find problems with packet loss and network latency.
Run tests on
your network
which will also
2. Traceroute: Traceroute assists in determining the network packets' route from a source to a
demonstrate
destination. It shows the hops and response times of the network, assisting in identifying
how you
potential bottlenecks or routing issues.
monitor the
network.
Describe the 3. Tests of Bandwidth: The available network bandwidth between two endpoints can be
tests you measured using tools like iPerf and Speedtest. This evaluates network execution and
undertook and recognizes any restrictions.
the results.
Provide
screenshots 4. Tools for Network Monitoring: To continuously monitor network devices, traffic, and
of the test performance metrics, use network monitoring tools like Nagios, Zabbix, or SolarWinds. These
results devices give constant alarms, execution reports, and verifiable information for the investigation.
including logs.
6. Log Checking: Utilize a log monitoring system to examine application, server, and network
device logs. This aids in the investigation of security incidents, errors, and anomalies.
7. Analyzing Network Traffic: To capture and analyze network packets, use tools like Wireshark
or PRTG for network traffic analysis. Analysis of traffic patterns, performance bottlenecks, and
other network issues can all benefit from this.
User feedback Hi Chalana, For the infrastructure task please create a diagram or pictorial
Document the representation of the infrastructure you propose.
user feedback
from your
assessor.
Adjustments 1. Enhanced Performance: If observing demonstrates execution issues like high dormancy,
bundle misfortune, or transfer speed limitations, changes might incorporate advancing
Based on the
organization arrangements, overhauling equipment or framework, carrying out Nature of
tests you ran,
Administration (QoS) approaches, or burden adjusting procedures.
monitoring
and user
feedback
2. Improvements to security: Security measures like updating firewall rules, patching software
describe the
vulnerabilities, implementing intrusion detection systems (IDS), or enhancing access controls
adjustments
can be strengthened if monitoring or user feedback reveals security flaws or incidents.
you need to
make.
3. Planning for Capacity: Assuming checking distinguishes network blockage or limit limits,
changes might incorporate updating the network foundation, adding extra organization assets,
or reconfiguring network traffic, directing to advance limit and adaptability.
Screenshots ☐
Attach:
Reference: