Unit 5 Security HND in Computing Final Assignment
Unit 5 Security HND in Computing Final Assignment
Higher Nationals
Internal verification of assessment decisions – BTEC (RQF)
INTERNAL VERIFICATION – ASSESSMENT DECISIONS
Programme title BTEC Higher National Diploma in Computing
• Constructive?
Y/N
• Linked to relevant assessment
criteria? Y/N
Internal Verifier
Date
signature
Programme Leader
Date
signature (if required)
Resubmission Feedback:
Pearson
Higher Nationals in
Computing
Unit 5 : Security
General Guidelines
1. A Cover page or title page – You should always attach a title page to your assignment. Use previous page as
your cover sheet and be sure to fill the details correctly.
2. This entire brief should be attached in first before you start answering.
3. All the assignments should prepare using word processing software.
4. All the assignments should print in A4 sized paper, and make sure to only use one side printing.
5. Allow 1” margin on each side of the paper. But on the left side you will need to leave room for binging.
Important Points:
1. Check carefully the hand in date and the instructions given with the assignment. Late submissions will not be
accepted.
2. Ensure that you give yourself enough time to complete the assignment by the due date.
3. Don’t leave things such as printing to the last minute – excuses of this nature will not be accepted for failure
to hand in the work on time.
4. You must take responsibility for managing your own time effectively.
5. If you are unable to hand in your assignment on time and have valid reasons such as illness, you may apply (in
writing) for an extension.
6. Failure to achieve at least a PASS grade will result in a REFERRAL grade being given.
7. Non-submission of work without valid reasons will lead to an automatic REFERRAL. You will then be asked
to complete an alternative assignment.
8. Take great care that if you use other people’s work or ideas in your assignment, you properly reference them,
using the HARVARD referencing system, in you text and any bibliography, otherwise you may be guilty of
plagiarism.
9. If you are caught plagiarising you could have your grade reduced to A REFERRAL or at worst you could be
excluded from the course.
Student Declaration
I hereby, declare that I know what plagiarism entails, namely to use another’s work and to present it as my own
without attributing the sources in the correct way. I further understand what it means to copy another’s work.
02/11/2018
inshaf404@gmail.com
Assignment Brief
Student Name /ID Number M.M.M.Inshaf / KAN/A-008235
Unit Tutor
Issue Date
Submission Date
Submission Format:
The submission is in the form of an individual written report. This should be written in a concise, formal business
style using single spacing and font size 12. You are required to make use of headings, paragraphs and subsections
as appropriate, and all work must be supported with research and referenced using the Harvard referencing system.
Please also provide an end list of references using the Harvard referencing system.
EMC Cloud Solutions is reputed as the nation’s most reliable Cloud solution provider in Sri Lanka. A
number of high profile businesses in Sri Lanka including Esoft Metro Camps network, SME Bank Sri Lanka and
WEEFM are facilitated by EMC Cloud Solutions. EMC Cloud provides nearly 500 of its customers with SaaS,
PaaS & IaaS solutions with high capacity compute and storage options. Also EMC is a selected contractor for Sri
Lanka, The Ministry of Defense for hosting government and defense systems.
EMC’s central data center facility is located at Colombo Sri Lanka along with its corporate head-office in
Bambalapitiya. Their premises at Bambalapitiya is a six story building with the 1 st floor dedicated to sales and
customer services equipped with public wifi facility. Second-floor hosts HR, Finance and Training & Development
departments and the third-floor hosts boardroom and offices for senior executives along with the IT and Data center
department. Floor 4,5,6 hosts computer servers which make up the data center.
With the rapid growth of information technology in Kandy area in recent years, EMC seeks opportunity to extend
its services to Kandy, Sri Lanka. As of yet, the organization still considers the nature of such extension with what to
implement, where is the suitable location and other essential options such as security are actually being discussed.
You are hired by the management of EMC Solutions as a Security Expert to evaluate the security-related specifics
of its present system and provide recommendations on security and reliability related improvements of its present
system as well as to plan the establishment of the extension on a solid security foundation.
Activity 01
Assuming the role of External Security Consultant, you need to compile a report focusing on following elements to
the board of EMC Cloud Solutions;
1.1 Identify types of security risks EMC Cloud is subject to, in its present setup and the impact, such issues would
create on the business itself.
1.2 Develop and describe security procedures for EMC Cloud to minimize the impact of issues discussed in section
(1.1) by assessing and treating the risks.
Activity 02
2.1 Discuss how EMC Cloud and its clients will be impacted by improper/ incorrect configurations which are
applicable to firewalls and VPN solutions.
2.2 Explain how following technologies would benefit EMC Cloud and its Clients by facilitating a ‘trusted
network’. (Support your answer with suitable illustrations).
i) DMZ
ii) Static IP
iii)NAT
2.3 Discuss the benefits of implementing network monitoring systems.
Activity 03
3.1 Formulate a suitable risk assessment procedure for EMC Cloud solutions to safeguard itself and its clients.
3.2 Explain the mandatory data protection laws and procedures which will be applied to data storage solutions
provided by EMC Cloud. You may also highlight on ISO 3100 risk management methodology.
Activity 04
4.1 Develop a security policy for EMC Cloud to minimize exploitations and misuses while evaluating the
suitability of the tools used in an organizational policy.
4.2 Develop and present a disaster recovery plan for EMC Cloud for its all venues to ensure maximum uptime for
its customers (Student should produce a PowerPoint-based presentation which illustrates the recovery plan within
15 minutes of time including justifications and reasons for decisions and options used).
4.3 ‘Creditors, directors, employees, government and its agencies, owners / shareholders, suppliers, unions, and
the other parties the business draws its resources’ are the main branches of any organization. Discuss the role of
these groups to implement security audit recommendations for the organization.
Table of Contents
Table of Figures ............................................................................................................ 13
Interaction ..................................................................................................................... 14
Task 1: Assuming the role of External Security Consultant, you need to compile a report
focusing on following elements to the board of EMC Cloud Solutions; ......................... 15
Task 1.1: Identify types of security risks EMC Cloud is subject to, in its present setup
and the impact, such issues would create on the business itself. ................................. 15
Task 1.2: Develop and describe security procedures for EMC Cloud to minimize the
impact of issues discussed in section (1.1) by assessing and treating the risks. ........... 17
Task 2: .......................................................................................................................... 20
Task 2.1: Discuss how EMC Cloud and its clients will be impacted by improper/
incorrect configurations which are applicable to firewalls and VPN solutions. ........... 20
Task 2.2: Explain how following technologies would benefit EMC Cloud and its
Clients by facilitating a ‘trusted network’. (Support your answer with suitable
illustrations). ............................................................................................................. 23
Task 2.3: Discuss the benefits of implementing network monitoring systems. ............ 27
Task 3: .......................................................................................................................... 29
Task 3.1: Formulate a suitable risk assessment procedure for EMC Cloud solutions to
safeguard itself and its clients. ................................................................................... 29
Task 3.2: Explain the mandatory data protection laws and procedures which will be
applied to data storage solutions provided by EMC Cloud. You may also highlight on
ISO 3100 risk management methodology. ................................................................. 31
Page 11 of 37
M.M.M.INSHAF KAN/A-008235
Task 4: .......................................................................................................................... 33
Task 4.1: Develop a security policy for EMC Cloud to minimize exploitations and
misuses while evaluating the suitability of the tools used in an organizational policy. 33
Bibliography.................................................................................................................. 35
Page 12 of 37
M.M.M.INSHAF KAN/A-008235
Table of Figures
Figure 1 ......................................................................................................................... 24
Figure 2 ......................................................................................................................... 25
Figure 3 ......................................................................................................................... 26
Figure 4 ......................................................................................................................... 32
Page 13 of 37
M.M.M.INSHAF KAN/A-008235
Interaction
EMC Cloud Solutions is reputed as the nation’s most reliable Cloud solution provider in
Sri Lanka. A number of high profile businesses in Sri Lanka including Esoft Metro
Camps network, SME Bank Sri Lanka and WEEFM are facilitated by EMC Cloud
Solutions. EMC Cloud provides nearly 500 of its customers with SaaS, PaaS & IaaS
solutions with high capacity compute and storage options. Also EMC is a selected
contractor for Sri Lanka, The Ministry of Defense for hosting government and defense
systems.
EMC’s central data center facility is located at Colombo Sri Lanka along with its
corporate head-office in Bambalapitiya. Their premises at Bambalapitiya is a six story
building with the 1st floor dedicated to sales and customer services equipped with public
wifi facility. Second-floor hosts HR, Finance and Training & Development departments
and the third-floor hosts boardroom and offices for senior executives along with the IT
and Data center department. Floor 4,5,6 hosts computer servers which make up the data
center.
With the rapid growth of information technology in Kandy area in recent years, EMC
seeks opportunity to extend its services to Kandy, Sri Lanka. As of yet, the organization
still considers the nature of such extension with what to implement, where is the suitable
location and other essential options such as security are actually being discussed.
You are hired by the management of EMC Solutions as a Security Expert to evaluate the
security-related specifics of its present system and provide recommendations on security
and reliability related improvements of its present system as well as to plan the
establishment of the extension on a solid security foundation.
Page 14 of 37
M.M.M.INSHAF KAN/A-008235
Task 1.1: Identify types of security risks EMC Cloud is subject to, in its
present setup and the impact, such issues would create on the business
itself.
What is EMC?
EMC storage refers back to the diverse storage products, systems and services being
supplied by means of EMC organization, which encompass disk, flash and hybrid
storage structures and arrays. These systems are offered to corporations of all sizes so
that you can fulfill their storage wishes, and blended with EMC's data management
approach services, enable organizations to arrange unstructured information as well as
to recognition on reducing storage value and increasing security or safety.
EMC offers an extensive variety of storage alternatives. Starting from the flagship
product EMC to ultra-modern offerings inside the all flash section. Also it gives a
spread of alternatives based totally available on the market and necessities inside the
SAN and NAS segments.
Above scenario EMC Cloud provides nearly 500 of its customers with SaaS, PaaS &
IaaS solutions with high capacity compute and storage options. In their all the cloud
system will storing in EMC cloud. Bamabalapitya branch is logical and physical
security control. There are so many impact, such issues are held on bambalabiya branch.
First we want to clearly understand why this type of impact, such issues is held on EMC
center.
The Weakness
There to type of security weakness included
1. Physical security weakness
2. Logical security weakness
What is physical security?
Physical security is the protection of personnel, hardware, software, networks and data
from Physical actions and occasions that could cause critical loss or harm to an
Page 15 of 37
M.M.M.INSHAF KAN/A-008235
Page 16 of 37
M.M.M.INSHAF KAN/A-008235
Task 1.2: Develop and describe security procedures for EMC Cloud to
minimize the impact of issues discussed in section (1.1) by assessing and
treating the risks.
What we want to do?
physical security prevents and discourages attackers from getting into a building by
using putting in fences, alarms, cameras, protection guards and puppies, digital get
admission to manage, intrusion detection and administration get right of entry to
controls. the distinction among logical protection and physical protection is logical
protection protects get
Page 17 of 37
M.M.M.INSHAF KAN/A-008235
Implement Firewall
Let’s assume that you work at a business enterprise with 500 employees. the
organization will therefore have hundreds of computer systems that each one have
network cards connecting them together..
Without a firewall in place, all of those hundred of computers are at once handy to
everybody on the internet. Someone who is aware of what she or he is doing can probe
those computers, attempt to make FTP connections to them, try to make telnet
connections to them and so on. If one employee makes a mistake and leaves a security
hollow, hackers can get to the machine and make the most the hole.
With a firewall in area, the landscape is tons exclusive. a organization will location a
firewall at every connection to the net the firewall can implement safety regulations
Page 18 of 37
M.M.M.INSHAF KAN/A-008235
Data encrypted
In other words, data encryption is one of the mechanisms which are used to protect
confidential information of users like personal documents, pictures, online transaction or
any other important things which user would not like to share with anyone, unless they
are permitted.
Encryption works through mathematical formula which is known as cipher and a key to
convert readable data (Plain Text) into a form that no one can understand (Cipher Text).
The cipher is the general way for encryption, & the associated key makes that encrypted
data unique. In order to achieve Encryption, there are 3 widely used methods, Hashing,
Symmetric & Asymmetric methods. These are 3 of the methods which are used widely.
Page 19 of 37
M.M.M.INSHAF KAN/A-008235
Task 2:
Task 2.1: Discuss how EMC Cloud and its clients will be impacted by
improper/ incorrect configurations which are applicable to firewalls
and VPN solutions.
What is VPN?
A virtual private network (VPN) is a network that uses a public telecommunication
infrastructure, such as the Internet, to provide remote offices or individual users with
secure access to their organization's network. In a VPN, the computers at each end of the
tunnel encrypt the data entering the tunnel and decrypt it at the other end.
Here are some important uses of VPN:
1) Use Public wi-fi securely: Public Wi-Fi offers no encryption security to its users,
and your signals are broadcast for anyone savvy enough to eavesdrop, therefore some
people use VPNs at Wi-Fi hotspots to prevent snoopers from collecting private
information. Generally, the most effective way to keep your data from entering the
wrong hands is by using a VPN service which makes all Internet use totally private and
secure.
2) Secure Communication between Sites: Many businesses today have branch offices,
and connect these branches to the main office over the Internet using a site-to-site VPN
connection. For example, businesses can enable workers with laptops on the road or at
home to connect to the company network as if they were sat at a desk in the office. A
company that has offices in two locations can connect them using a VPN across the
internet so there appears to be one network. Linking remote sites with a main office lets
users send and receive information via a secure connection. Employees can use file
servers and printers which are not physically in the same office.
Page 20 of 37
M.M.M.INSHAF KAN/A-008235
3) Bypass the Web Censorship and Content Surveillance: Some countries put up
firewalls to restrict what their residents see, hear, and share with other people within and
beyond their borders. Connecting to a VPN server will enable you to 'tunnel out' of the
censorship restrictions and access the full World Wide Web.
In our EMC center
Regarding your last question, simply using a VPN service doesn't hide your true identity
or your location. If you don't secure your browser and PC there are many ways to be
identified and tracked.
Firewall
Let’s assume that you work at a business enterprise with 500 employees. the
organization will therefore have hundreds of computer systems that each one have
network cards connecting them together..
Without a firewall in place, all of those hundred of computers are at once handy to
everybody on the internet. Someone who is aware of what she or he is doing can probe
those computers, attempt to make FTP connections to them, try to make telnet
connections to them and so on. If one employee makes a mistake and leaves a security
hollow, hackers can get to the machine and make the most the hole.
With a firewall in area, the landscape is tons exclusive. a organization will location a
firewall at every connection to the net the firewall can implement safety regulations
Encryption
Encryption is the process to switch statistics securely in a secretive way. It protects your
information over the net. It enables to guard your privateness or anonymity and
conversations, whether video, voice, or textual content.
Encryption is wanted when you don't need everybody else to have get entry to.
Allow me explain how it's implementing:
When you switch your data or information over the net, the information first
dispatched on your local network.
Then your statistics sent for your net service issuer who can view this
information.
And then in the end, the information gets the supposed person.
Page 21 of 37
M.M.M.INSHAF KAN/A-008235
So, throughout this complete process several man or woman can get entry to your
information. Subsequently, the encryption is needed to preserve your information secure
& unreadable.
The pleasant way to encrypt your data over the net is using SSL (Secure Socket Layer)
that encrypt your statistics and make customers assured to technique.
Page 22 of 37
M.M.M.INSHAF KAN/A-008235
What is DMZ?
De-Militarized Zone refers to a subset of network which is directly accessible from
Internet/external networks. DMZ or Dematerialized Zone is like another layer of
Security (firewall) in your network. Demilitarized zone. It means only one device will
be connected to public network while other devices will be safe and connected to private
network.
DMZ is a physical or logical subnet that separates your inner compter network from
public network, i.e. internet
Things to know about DMZ network:
It shields internal network or intranet from direct external/Internet access
DMZ network may screen network traffic and allow only a subset of traffic
towards internal network.
DMZ network may provision network security features like access control, rate
limiting.
Page 23 of 37
M.M.M.INSHAF KAN/A-008235
(Obodoeze, 2016)
Figure 1
Static IP
Static IP is an IP address assigned permanently to a computer and cannot be changed
dynamically from time to time and you must have to configure address manually by
going into network options. But Dynamic IP address is a kind of IP address offered by
the ISP (Internet Service Providers) and changes from time to time, since Dynamic IP
address is assigned by a Protocol named DHCP I.E. Dynamic Host Configuration
Protocol, which assigns the IP addresses temporarily.
Now this public IP is of two types.
1) Dynamic
2) Static
Advantages of Static IP:
Remote access – with a static IP address you can get entry to your computer
irrespective of where you're in the world. The usage of applications consisting
of remote administrator and computer anywhere you may log into your work or
home computer no matter where you're. Even though you could set the
connection up no matter what sort of IP address with you have, you want a set
address with to hold it in any other case the program will not be capable of
discovering your pc whilst your pc refreshes its dynamic address.
Page 24 of 37
M.M.M.INSHAF KAN/A-008235
Anonymous FTP – it approaches that anyone the usage of the FTP software
can get entry to documents in a unique listing of your website online. it’s
known as nameless FTP due to the fact the username used to get entry to is
“anonymous.” many net hosting providers require a static IP for the anonymous
FTP function to paintings well.
You want to access your internet site by way of FTP or internet browser even if
the area call is inaccessible, which include domain name propagation periods.
Less downtime – on each time your IP address with refreshes you run the
threat of downtime from the server. At the same time as that is typically best for
a very quick time.
(hotcomm)
Figure 2
Page 25 of 37
M.M.M.INSHAF KAN/A-008235
(Vader, 2012)
Figure 3
Page 26 of 37
M.M.M.INSHAF KAN/A-008235
1. Application performance
Application Discovery and Dependency Mapping (ADDM)
Anomaly Detection
Fault Management with Root Cause Analysis
2. Network performance
Health, availability and performance of network and its devices
Fault detection, alerts and troubleshooting
Network visualisation and usage trends
Capacity-planning
Bandwidth usage analysis
Network traffic analysis (Based on speed, usage, packets and volume)
QoS policy performance monitoring
Traffic shaping
WLC controller monitoring (Usage by SSID, access points, clients and apps)
Page 27 of 37
M.M.M.INSHAF KAN/A-008235
4. IP Address management
Switch Port Mapping
MIB Browser
5. Network security analysis
Firewall policy management
Log analysis
Anomaly alerts
Firewall compliance and device management
To understand and troubleshoot network issues effectively, it is imperative that all the
elements of a network are monitored centrally and the alerts are in correlation.
Page 28 of 37
M.M.M.INSHAF KAN/A-008235
Task 3:
Penetrate testing
What is Penetrate testing?
Penetration testing is done to determine if there is a way to break into your network.
Penetration testing’s is usually done by someone outside of your company who is trying
to determine the easiest way into your network.
First, they test your firewall looking for open ports on the firewall itself. If they
find SSH, HTTP, HTTPS open on the firewall they will try to determine the
type of firewall and use the default logins for that make and manufacturer.
Sometimes it’s that easy. If the default password doesn't work they use the
default user and hit the firewall with a password cracker. If the default user is
still in place most firewalls will fall in 4 hours.
Next,your firewall has survived. Same process on the the name servers, web
servers, mail servers, VPN and any other servers they find on the Internet side
of your network. Most Linux installs default to root SSH on any interface.
Penetration testers know this and will use the root user name and hit the box
with a password cracker. Again probably in, in under 4 hours.
Email servers make wonderful targets. Every known Send mail exploit is tried.
Is the server an open relay? Will it forward spam?
The VPN is tested to see if traffic can be intercepted and read.
The web server gets attacked to see if they can determine the server type,
Apache, Tomcat, IIS, and the underlying applications, PHP, PERL, Java, .NET.
All known vulnerabilities are tested.
Windows Servers are hit with every known method of attack, basically there is
an encyclopedia of vulnerabilities and unless you have been religious in your
patching they will find the holes. Remember root on Linux, Administrator
works well on Windows.
And to make matters just a little more fun; you have to turn off programs such
as fail to ban or port sentry which will catch and disconnect the attempts to
Page 29 of 37
M.M.M.INSHAF KAN/A-008235
hack you. However, they will allow you to keep programs such Snort (intrusion
detection) running. You will learn the meaning of Snot, from that test.
Some companies will stop at this point and issue a report; telling you every
vulnerability they have found. Others will do social testing.
Page 30 of 37
M.M.M.INSHAF KAN/A-008235
Task 3.2: Explain the mandatory data protection laws and procedures
which will be applied to data storage solutions provided by EMC
Cloud. You may also highlight on ISO 3100 risk management
methodology.
For entrepreneurs, it's more greater than probably that you'll want to establish consent
out of your subscribers to market to them. To market to a contact, they need to be
obtained with a double choose-in subscription system. This confirms that the contact
wants to hear from you. it blessings the marketer as the contact has additionally
confirmed that they are interested about the content they're going to be dispatched
If you are but to prepare for GDPR, it's far nicely worth considering how the regulations
will impact your business now. You’ll want to be organized for the implementation of
the new regulations on the 25th may 2018. This will mean changing the way that touch
records is treated on your enterprise.
You can also need to trade the way that statistics is processed as soon as you have got
gathered it.
Page 31 of 37
M.M.M.INSHAF KAN/A-008235
(onelogin)
Figure 4
(iso)
Page 32 of 37
M.M.M.INSHAF KAN/A-008235
Task 4:
Page 33 of 37
M.M.M.INSHAF KAN/A-008235
This pattern net utilization coverage applies to all employees of company who have get
entry to computers and the net to be used within the performance of their work. Use of
the net by using employees of company is authorized and endorsed in which such use
helps the desires and objectives of the enterprise. But, access to the internet thru
company is a privilege and all personnel ought to adhere to the policies regarding
computer laptop, e-mail and internet usage. Violation of those regulations ought to
result in disciplinary and/or prison motion leading as much as such as termination of
employment. Employees may also be held individually liable for damages resulting
from any violations of this policy. All employees are required to renowned receipt and
affirm that they have understood and conform to abide by the regulations hereunder.
Page 34 of 37
M.M.M.INSHAF KAN/A-008235
Bibliography
hotcomm. (n.d.). Retrieved 11 01, 2018, from www.hotcomm.com:
https://hotcomm.com/FAQ/FAQ_staticIPXP.asp
iso. (n.d.). Retrieved 11 02, 2018, from www.iso.org: https://www.iso.org/iso-31000-
risk-management.html
Obodoeze, f. c. (2016, October ). researchgate. Retrieved 11 01, 2018, from
www.researchgate.net: https://www.researchgate.net/figure/An-organizations-the-
Application-and-database-servers-protected-by-a-Demilitarized-Zone_fig8_322465819
onelogin. (n.d.). Retrieved 11 02, 2018, from www.onelogin.com:
https://www.onelogin.com/compliance/gdpr
Vader, D. (2012, May 05). tomicki. Retrieved 11 01, 2018, from www.tomicki.net:
https://www.tomicki.net/naptd.php
https://searchsecurity.techtarget.com/definition/physical-security [Accessed 31 October
2018]
https://www.careerride.com/Networking-trusted-and-untrusted-networks.aspx[Accessed
31 October 2018]
https://www.greennet.org.uk/support/what-are-benefits-having-dedicated-ip-address
[Accessed 02 November 2018]
https://www.techopedia.com/definition/4099/security-policy[Accessed 01 November
2018]
https://searchsecurity.techtarget.com/definition/security-policy[Accessed 29 October
2018]
https://en.wikipedia.org/wiki/User_account_policy[Accessed 02 November 2018]
Page 35 of 37
M.M.M.INSHAF KAN/A-008235
Grading Rubric
Grading Criteria Achieved Feedback
Page 36 of 37
M.M.M.INSHAF KAN/A-008235
Page 37 of 37
M.M.M.INSHAF KAN/A-008235