Briefly define the purpose of penetration testing as it


Assignment

1. Identify the purpose and describe at least one activity performed in each of the following three phases in implementing a network security design: (i) the planning phase; (ii) building phase (iii) managing phase.

2. Describe the purpose of the main elements of risk management, such as (i) risk identification and (ii) risk treatment. Identify at least one activity that is performed in each element.

3. Identify two types of network attacks that could be made on an e-commerce site selling books, and storing credit card information about customers. For each attack, describe the vulnerabilities/weaknesses of network infrastructure that attackers seek to exploit.

4. Give two examples of emerging security threats that have emerged as a result of the popularity of mobile phones. List one example of a countermeasure that can be used to mitigate the threats.

5. Briefly define the purpose of auditing, as it applies to network security.

6. Briefly define the purpose of penetration testing, as it applies to network security.

7. Briefly define how logging analysis can be used to enhance network security

8. List two security measures that can be applied to protect an organisation's infrastructure of servers and switches.

9. List two capabilities of (i) a hardware firewall and (ii) a software intrusion detection system (IDS)

10. Define what is meant by "defence in depth" in security planning. Describe how could the defence in depth principle be applied to the deployment of hardware and software firewalls in a corporate network a Page 5 of 21 Assessment Resources ICTNWK511

11. Give two examples of network management and security process controls that could be applied to manage the risk represented by BYOD (Bring Your Own Device) to corporate networks.

12. Risk management plans and procedures need to be applied to all stages of network security, including security planning, implementation and budgeting. Give one example of how an understanding of risk can be applied to each of the following phases of a network security implementation (i) the planning phase (ii) the implementation or building phase (iii) the managing or budgeting phase

13. Identify three types of ICT networks (or zones) typically considered in network security planning. Briefly define each of these network zones, and, for each of the three types of network zone, give one example of a configuration I would expect to see in that type of network zone.

Request for Solution File

Ask an Expert for Answer!!
Computer Engineering: Briefly define the purpose of penetration testing as it
Reference No:- TGS02680179

Expected delivery within 24 Hours