Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
0% found this document useful (0 votes)
3 views

ICT Class Assignment 2

ict assignment for comsats university

Uploaded by

muhimakhtar4
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views

ICT Class Assignment 2

ict assignment for comsats university

Uploaded by

muhimakhtar4
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 6

CLASS ASSIGNMENT

#02
Applications of ICT
(Information and Communication Technologies)
Instructor: Mr. Mohsin Ahmed

Student Names: Muhim Akhtar


Syed Muhamad Izhan
Shah
Tayyab Tanveer
Registration No.’s: FA24-BSE-080
FA24-BSE-095
FA24-BSE-071
Department: Software Engineering
Submission Date: 8th
November 2024
COMSATS University Islamabad

Class Assignment - 2
CLO - 3

Assignment Type: Class Assignment

Submission Date: 09th Nov 2024 (06:00 PM)

__________________________________________________________________
___________________________

Task: Design and Implement a Network Security Plan for a Small


Business.

Description: In this assignment, discuss how you will design and


implement a network security plan for a small business of your
choice. You will need to think about the types of threats that the
business faces, how to secure the network against those threats,
and what countermeasures to put in place.

Instructions:
 Choose a small business: Choose a small business that you
are familiar with or interested in. This could be a local retail
store, a small manufacturing plant, or a tech startup.

 Identify the network security threats: Think about the


different types of threats that the business faces. This might
include unauthorized access to the network, malware
infections, hardware failure, and natural disasters.

 Determine the network security plan: Identify how to secure


the network against the different types of threats. For
example, securing access control, implementing firewalls,
and creating data backup and disaster recovery plans.

Ans:

Network Security Plan for TechHub Electronics


Business Overview:
TechHub Electronics is a small local business specializing in
electronic gadgets and accessories. As the business scales, it
increasingly relies on its network to manage operations,
inventory, and customer data. Ensuring data protection and
business continuity is vital, making a robust network security plan
essential.

Network Security Threats


Several network security threats could impact the operations of
TechHub Electronics, including:
1. Unauthorized Access: Cybercriminals may attempt to gain
unauthorized entry into the network to obtain sensitive data
such as customer payment information and employee
records.
2. Malware Infections: Threats like viruses, ransomware, and
spyware can compromise data integrity and confidentiality,
potentially leading to data breaches and operational
disruption.
3. Hardware Failure: Malfunctions in critical devices, such as
servers and network hardware, can result in unexpected
downtime and potential data loss.
4. Natural Disasters: Events such as floods, earthquakes, and
fires could damage network infrastructure and lead to
prolonged operational disruptions.

Network Security Plan


To mitigate these threats, TechHub Electronics will implement
the following network security measures:
1. Access Control:
o User Authentication: Implement strong password
policies and multi-factor authentication (MFA) for
employees accessing the network. Each employee will
have unique credentials to maintain accountability and
restrict unauthorized access.
o Role-Based Access Control (RBAC): Limit access to
sensitive data based on employee roles. For instance,
only the finance department will have access to
payment information.
2. Firewalls and Intrusion Detection Systems (IDS):
o Firewall Configuration: Configure firewalls to monitor
and control inbound and outbound traffic, blocking
unauthorized access attempts as a primary layer of
defense.
o Intrusion Detection System: Deploy an IDS to detect
and alert administrators of suspicious network activity,
enabling timely response to potential threats.
3. Data Backup and Disaster Recovery Plan:
o Regular Data Backups: Schedule automated daily
backups of critical data to an offsite or cloud storage
location to ensure data availability in case of hardware
failure or cyberattack.
o Disaster Recovery Plan: Develop a recovery strategy
that includes alternate communication channels,
backup systems, and an offsite recovery location to
maintain operations during and after a natural disaster.
4. Endpoint Protection with Antivirus and Anti-Malware:
o Install and update antivirus and anti-malware software
on all network-connected devices. This software will
detect and prevent malicious software from
compromising the network.
5. Employee Security Training and Awareness:
o Provide regular training on best practices for
cybersecurity, including how to recognize phishing
attempts and avoid downloading suspicious files. This
approach fosters a culture of security awareness within
the business.
6. Regular Security Audits and System Updates:
o Conduct frequent security audits to identify and
address network vulnerabilities. Update network
security protocols and software regularly to adapt to
emerging threats.
Conclusion
The implementation of these security measures will help
safeguard TechHub Electronics’ network environment, reducing
the risk of data breaches, system disruptions, and other security
incidents. This network security plan is designed to protect
sensitive business information, maintain trust with customers,
and support the long-term growth of TechHub Electronics.

You might also like