Data Loading...

ICTNWK546 - Self study guide Flipbook PDF

ICTNWK546 - Self study guide


113 Views
8 Downloads
FLIP PDF 415.99KB

DOWNLOAD FLIP

REPORT DMCA

Self-study guide ICTNWK546 Manage network security

Chapter 1: Plan security design process 1.1 Define planning phase for network security design according to organisational requirements

Website Title - Planning for network security Website Linkhttps://www.ibm.com/support/knowledgecenter/cs/POWER5/iphae_p5/networksecurity.htm Website Title – The ultimate guide to cybersecurity planning for businesses Website Link - https://searchsecurity.techtarget.com/The-ultimate-guide-to-cybersecurityplanning-for-businesses

1.2 Define building phase for network security design according to organisational requirements

Website Title - What is Network Security: An introduction to Network Security Website Link- https://www.edureka.co/blog/what-is-network-security/ Website Title – The Fundamentals of Network Security: Design and Deployment Website Link - https://www.colocationamerica.com/blog/network-security-fundamentals

1.3 Define managing phase for network security design according to organisational requirements

Website Title - What is network security management? Website Link- https://www.juniper.net/us/en/products-services/what-is/network-securitymanagement/#:~:text=Network%20security%20management%20provides%20complete,individual %20devices%20and%20is%20analyzed. Website Title – How does network security work? Website Link - https://www.forcepoint.com/cyber-edu/network-security

2|P ag e

Chapter 2: Identify threats to network security 2.1 Determine major threat themes to network security

Website Title - TOP 10 NETWORK SECURITY THREATS Website Link- https://blog.rsisecurity.com/top-10-network-security-threats/ Website Title – HOW TO IDENTIFY NETWORK SECURITY THREATS AND VULNERABILITIES? Website Link - https://blog.eccouncil.org/how-to-identify-network-security-threats-andvulnerabilities/

2.2 Determine the potential origin of major threats according to network security design specifications

Website Title - Top Cybersecurity Threats in 2020 Website Link- https://onlinedegrees.sandiego.edu/top-cyber-security-threats/ Website Title – Network Attacks and Network Security Threats Website Link - https://www.cynet.com/network-attacks/network-attacks-and-networksecurity-threats/

2.3 Identify industry standard common network vulnerability types

Website Title - 8 Top Cyber Security Threats in 2020 Website Link- https://www.netcov.com/what-are-the-top-cyber-security-threats-in-2020/ Website Title – 21 Top Cyber Security Threats and How Threat Intelligence Can Help Website Link - https://www.exabeam.com/information-security/cyber-security-threat/

2.4 Design and document threat model according to network security design specifications

Website Title - Threat Modeling Website Link- https://www.synopsys.com/glossary/what-is-threat-modeling.html 3|P ag e

Website Title – What Is Threat Modeling? (+Top Threat Model Examples) Website Link - https://learn.g2.com/threat-modeling

4|P ag e

Chapter 3: Analyse security risks 3.1 Determine required elements of risk management according to network security design specifications

Website Title - Managing Risks: A New Framework Website Link- https://hbr.org/2012/06/managing-risks-a-new-framework Website Title – Risk management Website Link - https://www.smallbusiness.wa.gov.au/business-advice/insurance-and-riskmanagement/risk-management

3.2 Identify organisational assets requiring protection

Website Title - 7 Type of Assets in an Organization Website Link- https://www.marketing91.com/types-ofassets/#:~:text=They%20include%20cash%2C%20bank%20balance,organization%20cannot%20pro duce%20the%20output. Website Title – How to Protect your Personal Assets as a Business Owner Website Link - https://www.findlaw.com.au/articles/6402/how-to-protect-your-personal-assetsas-a-business-.aspx

3.3 Categorise and document assets and determine their value according to organisational requirements

Website Title - Asset Valuation Website Link- https://corporatefinanceinstitute.com/resources/knowledge/finance/assetvaluation/ Website Title – How to Calculate Assets: A Step-By-Step Guide for Small Businesses Website Link - https://www.freshbooks.com/hub/accounting/how-to-calculate-assets-a-stepby-step-guide-for-small-businesses

5|P ag e

3.4 Determine and document risk management plan according to organisational requirements

Website Title - Risk Management Planning Website Link- https://opentextbc.ca/projectmanagement/chapter/chapter-16-risk-managementplanning-project-management/ Website Title – 6 Basic Steps to Develop a Project Risk Management Plan Website Link - https://www.educba.com/project-risk-management-plan/

6|P ag e

Chapter 4: Create a security design 4.1 Determine attacker scenarios and threats according to network security design specifications

Website Title - What is a cyber-attack? Recent examples show disturbing trends Website Link- https://www.csoonline.com/article/3237324/what-is-a-cyber-attack-recentexamples-show-disturbing-trends.html Website Title – Attack Scenarios Website Link - https://www.trendmicro.com/vinfo/us/security/threat-intelligencecenter/internet-of-things/attack-scenarios

4.2 Design and document network components security measures

Website Title - 4 ESSENTIAL ELEMENTS OF NETWORK SECURITY Website Link- https://blog.eccouncil.org/4-essential-elements-of-network-security/ Website Title – Securing Network Infrastructure Devices Website Link - https://us-cert.cisa.gov/ncas/tips/ST18-001

4.3 Develop and document security policies

Website Title - 9 policies and procedures you need to know about if you’re starting a new security program Website Link- https://www.csoonline.com/article/3263738/9-policies-and-procedures-youneed-to-know-about-if-youre-starting-a-new-security-program.html Website Title – Security Policy Templates Website Link - https://www.sans.org/information-security-policy/

4.4 Submit document to required personnel and seek and respond to feedback

Website Title – Art of feedback

7|P ag e

Website Linkhttps://www.cmtedd.act.gov.au/__data/assets/pdf_file/0003/463728/art_feedback.pdf Website Title – The Right Way to Respond to Negative Feedback Website Link - https://hbr.org/2018/05/the-right-way-to-respond-to-negative-feedback

8|P ag e

Chapter 5: Design security incidents response 5.1 Design and document auditing and incidents response procedure

Website Title - How Audit Can Support the Incident Response Plan Website Link- https://misti.com/internal-audit-insights/how-audit-can-support-the-incidentresponse-plan Website Title – 6 Phases in the Incident Response Plan Website Link - https://www.securitymetrics.com/blog/6-phases-incident-response-plan

5.2 Submit to required personnel, seek and respond to feedback

Website Title - 6 Ways To Seek Feedback To Improve Your Performance In The Workplace Website Link- https://ericjacobsononmanagement.blogspot.com/2014/12/6-ways-to-seekfeedback-to-improve-your.html Website Title – Taking Constructive Criticism Like a Champ Website Link - https://www.themuse.com/advice/taking-constructive-criticism-like-a-champ

9|P ag e