Posted: June 10th, 2022

Implement secure encryption technologies

ATTACHED FILE(S)
TASK 1
Question 1: Explain each of the following symmetric key algorithms in 50-100 and list at least two (2) usages for each of symmetric key algorithms.*
Your answer
Question 2: Explain each of the below mention encryption types in 80-150 words*
Your answer
Question 3: Explain the functioning of “Digital signatures” in 100-150 words.*
Your answer
Question 4: Explain two (2) features of digital signatures. Write 100-150 for each function.*
Your answer
Question 5: Answer the below questions related to timestamp.
5A) Explain two (2) functions of timestamp. Explain each in 50-100 words.*
Your answer
5B) Summarise two features of timestamp.*
Your answer
Question 6: What do you understand by the term “Encryption strength”? Explain in 50-100 words.*
Your answer
Question 7: Explain each of following terms in 50-150 words.*
Your answer
Question 8: Explain the importance of reviewing helpdesk records to troubleshoot encryption issues. Explain in 40-80 words.*
Your answer
Question 9: What important information will you collect by reviewing system logs for encryption issues and compromises. Write your response in 50-100 words*
Your answer
Question 10: Explain each the following security threats in 50-100 words.*
Your answer
Question 11: Explain the term “Transmission Control Protocol” and its application in 150-200 words.*
Your answer
Question 12: Explain the following terms. (Each in 50-150 words).*
Your answer
Question 13: Explain each of the following certificate related infrastructure in 50-150 words?*
Your answer
Question 14: List three (3) most common asymmetric key algorithms and summarise their usages in 40-80 words*
Your answer
Question 15: What do you understand by reply attacks? Write your response in 100-150 words.*
Your answer
Question 16: List and explain five (5) security problems and challenges arise due to organisational issues?*
Your answer
Question 17: Summarise the features and functions of access control permission in 100-200 words.*
Your answer
Question 18: Explain the functioning and features of the following in 100-200 words for each.*
Your answer
Question 19: Summarise the features and functions of “One-way encryption”?*
Your answer
Question 20: List two techniques to analyse data security requirements.*
Your answer
Question 21: What are the essential information should include in a security plan. List any three (3).*
Your answer

Version Number: 1(Review date: 01/10/2021) Unit Code: ICTNWK502
Name of the RTO: Harward International College RTO No: 22332 | CRICOS No: 03234B
Unit Assessment Task (UAT)
Assessment Task 2 – Unit Project (UP)
Assessment type:
Unit Project (UP)

Assessment task description:
 This is the second (2) assessment task you have to successfully complete to be deemed
competent in this unit of competency.
 This assessment task requires you to complete a project.
 You will receive your feedback within two weeks – you will be notified by your trainer/assessor
when results are available.
 You must attempt all activities of the project for your trainer/assessor to assess your
competency in this assessment task.

Applicable conditions:
 This project is untimed and are conducted as open book tests (this means you are able to refer
to your textbook).
 You must read and respond to all criteria of the project.
 You may handwrite/use computers to answer the criteria of the project.
 You must complete the task independently.
 No marks or grades are allocated for this assessment task. The outcome of the task will be
Satisfactory or Not Satisfactory.
 As you complete this assessment task you are predominately demonstrating your practical skills,
techniques and knowledge to your trainer/assessor.
 The trainer/assessor may ask you relevant questions on this assessment task to ensure that this
is your own work.

Resubmissions and reattempts:
 Where a student’s answers are deemed not satisfactory after the first attempt, a resubmission
attempt will be allowed.
 You must speak to your Trainer/Assessor if you have any difficulty in completing this task and
require reasonable adjustments (e.g. can be given as an oral assessment).
 For more information, please refer to your RTO Student Handbook.

Location:
 This assessment task may be completed in an independent learning environment or learning
management system.
 Your trainer/assessor will provide you further information regarding the location of completing
this assessment task.

General Instructions for attempting the project:

Version Number: 1(Review date: 01/10/2021) Unit Code: ICTNWK502
Name of the RTO: Harward International College RTO No: 22332 | CRICOS No: 03234B
 You will be analyse enterprise data security requirements create new plan, review encryption
technologies and their respective costs in this assessment task.
 Instructions analyse the existing security plan, create new plan, encrypt the data, and check the
system log to check for data compromises are provided within the assessment task.
 You will be required to correctly attempt all activities of this assessment task.

How your trainer/assessor will assess your work?
 This assessment task requires the student to successfully complete and submit a project.
 Answers must demonstrate the student’s understanding and skills of the unit.
 You will be assessed according to the provided performance checklist/ performance criteria.
 Assessment objectives/ measurable learning outcome(s) are attached as performance checklist/
performance criteria with this assessment task to ensure that you have successfully completed
and submitted the assessment task.
 If all assessment tasks are deemed Satisfactory (S), then the unit outcome is Competent (C).
 If at least one of the assessment task is deemed Not Satisfactory (NS), then the unit outcome is
Not Yet Competent (NYC).
 Once all assessment tasks allocated to this Unit of Competency have been undertaken,
trainer/assessor will complete an Assessment plan to record the unit outcome. The outcome will
be either Competent (C) or Not Yet Competent (NYC).
 The “Assessment Plan” is available with the Unit Assessment Pack (UAP) – Cover Sheet.

Purpose of the assessment task:

This assessment task is designed to evaluate your following skills and abilities:
 Skill to analyse enterprise data security requirements
 Ability create or review existing security plan to determine the appropriate encryption methods
 Skill to rank and document appropriate encryption methods
 Skill to summarise various encryption types, including public key, secret key, hash key

Version Number: 1(Review date: 01/10/2021) Unit Code: ICTNWK502
Name of the RTO: Harward International College RTO No: 22332 | CRICOS No: 03234B
Assessment Task 2 – Unit Project (UP)
Instructions to complete this assessment task:
 Please write your responses in the template provided.
 You may attach a separate sheet if required.
 You must include the following particulars in the footer section of each page of the attached
sheets:
o Student ID or Student Name
o Unit ID or Unit Code
o Course ID or Course Code
o Trainer and assessor name
o Page numbers
 You must staple the loose sheets together along with the cover page.
 You must attach the loose sheets chronologically as per the page numbers.
 Correction fluid and tape are not permitted. Please do any corrections by striking through the
incorrect words with one or two lines and rewriting the correct words.
 The premise of the project must be closely related to the previous assessment task.
 This submission must be well presented and follow the guidelines and instructions provided.
 Please follow the format as indicated in the template section below.
 One of the most important steps that you can take: proofread your project.
 Project must be of 500-800 words in length, using 11-point font, double-spaced, and must
include a cover page, table of contents, introduction, body, summary or conclusion, and works
cited.
 Appropriate citations are required.
 All RTO policies are in effect, including the plagiarism policy.

Resources required to complete the assessment task:
 Computer
 Internet
 MS Word

Version Number: 1(Review date: 01/10/2021) Unit Code: ICTNWK502
Name of the RTO: Harward International College RTO No: 22332 | CRICOS No: 03234B
Scenario: –

“Southern Star” company is providing public, private, hybrid and community cloud services to many
companies across the world and offering following services:
 IaaS (Infrastructure-as-a-Service)
 PaaS (Platform-as-a-Service)
 SaaS (Software-as-a-Service)
 Storage, Database, Information, Process, Application, Integration, Security, Management,
Testing-as-a-service
To provide above mentioned cloud services, “Southern Star” company has following infrastructure in
their data centre.
 Eight (8) Servers out of these Six (6) are connected to network and Two (2) are kept as backup
 Twelve (12) Network switches with 24 port support (Nine (9) Switches are connected to network
are three (3) are kept as back up)
 Six (6) Routers (4 Routers are hosing NBN connection and two (2) of them are kept as back up)
 Five (5) wireless access point connected to network to provide Wi-Fi connectivity throughout
data centre.
 Twenty (20) SAN (Storage area network) storage area devices to store client’s data
 Fifty (50) desktop computers
“Shan Publications” is a premium client of “Southern Star”. “Shan publication” use cloud services
offered by “Southern Star” to store the drafts of unpublished poems, books and blueprints of printed
books. One day as they were downloading the drafts of some books to publish, they found that some
of their data is missing from the server and raised the complaint about missing data to “Southern
Star”. As per the agreement “Southern Star” is liable for client data security and company do not want
to lose their client base.
Southern Star is now investigating the problem, and one of the senior consultant (Lee) is allocated to
this project. Lee is working in the company from last 10 years and has an extensive amount of
experience in network, cloud and data security.
David is a general manager of the Southern star and looking after all the operation of the organisation.
http://www.wikinvest.com/concept/Cloud_Computing
http://en.wikipedia.org/wiki/Platform_as_a_service
http://www.wikinvest.com/concept/Software_as_a_Service

Version Number: 1(Review date: 01/10/2021) Unit Code: ICTNWK502
Name of the RTO: Harward International College RTO No: 22332 | CRICOS No: 03234B
Roles and responsibilities of Lee:
 Planning, implementing and upgrading security measures and controls
 Establishing plans and protocols to protect digital files and information systems against
unauthorized access, modification and/or destruction
 Maintaining data and monitor security access
 Performing vulnerability testing, risk analyses and security assessments
 Conducting internal and external security audits
 Anticipating security alerts, incidents and disasters and reduce their likelihood
 Managing network, intrusion detection and prevention systems
 Analysing security breaches to determine their root cause
 Recommending and install appropriate tools and countermeasures
 Defining, implementing and maintaining corporate security policies
 Training fellow employees in security awareness and procedures
 Coordinating security plans with outside vendors
After an initial investigation of the data loss problem, Lee has found below concerns in the southern
star network infrastructure:
 No data encryption service
 Data security concerns
 Data permission not planned
 Additional hardware to manage the data

Activity 1: (Analysing and documenting data security requirement)
After reviewing the scenario, you need to analyse the data loss problem and need to prepare a security
plan including
 Background of the security plan
 Issues identified in the network
 How to resolve each issue
 What hardware and software required
 How identified software and hardware aligned with the solutions
 How and when data backup will be prepared
 Transmission security
 Network database security
You may need to research related to security plan on the internet. You must complete below security
plan as a part of the activity.

Version Number: 1(Review date: 01/10/2021) Unit Code: ICTNWK502
Name of the RTO: Harward International College RTO No: 22332 | CRICOS No: 03234B
Security Plan Template
Background-

Issues identified in the network

How to resolve each issue

What hardware and software required

Version Number: 1(Review date: 01/10/2021) Unit Code: ICTNWK502
Name of the RTO: Harward International College RTO No: 22332 | CRICOS No: 03234B
How identified software and hardware aligned with the solutions

Transmission Security
File Transfer:

Name

Version

Vendor

 Encryption Software Used:

 Network Monitoring tools

 Virus Scanning software

 Data Transfer authentication
method

 Network Based DLP

Email:
 Service Provider

 Password Strength Criteria


 Domain reputation

Network Database Security
Access Control
Authentication
Encryption method

Backups

Version Number: 1(Review date: 01/10/2021) Unit Code: ICTNWK502
Name of the RTO: Harward International College RTO No: 22332 | CRICOS No: 03234B
Activity 2: (Review encryption technologies and costs)
Note: This activity is in continuation of activity 1.
After completing the security plan, you are required to review a range of encryption software on the
internet and complete below Technology cost template.
After completing the template, you are required to send email to David(Trainer/assessor) including
technology cost document for approval. Email must include:
 Subject
 Body
 Explain that which option is the best and why we should use it.

Technology Cost Template
S. No
Encryption
Software

Vendor Encryption
Applicability
(Network/
Database)

Price
Rank (from 1
-5)

Remarks

1.
2.

3.

4.

5.

Version Number: 1(Review date: 01/10/2021) Unit Code: ICTNWK502
Name of the RTO: Harward International College RTO No: 22332 | CRICOS No: 03234B

Unit Assessment Task (UAT)
Assessment Task 3 – Unit Project (UP)
Assessment type:
Unit Project (UP)

Assessment task description:
 This is the third (3) assessment task you have to successfully complete to be deemed
competent in this unit of competency.
 This assessment task requires you to complete a project.
 You will receive your feedback within two weeks – you will be notified by your
trainer/assessor when results are available.
 You must attempt all activities of the project for your trainer/assessor to assess your
competency in this assessment task.

Applicable conditions:
 This project is timed except activity 2.
 You must read and respond to all criteria of the project.
 You may handwrite/use computers to answer the criteria of the project.
 You must complete the task independently.
 No marks or grades are allocated for this assessment task. The outcome of the task will be
Satisfactory or Not Satisfactory.
 As you complete this assessment task you are predominately demonstrating your practical
skills, techniques and knowledge to your trainer/assessor.
 The trainer/assessor may ask you relevant questions on this assessment task to ensure that
this is your own work.

Resubmissions and reattempts:
 Where a student’s answers are deemed not satisfactory after the first attempt, a
resubmission attempt will be allowed.
 You must speak to your Trainer/Assessor if you have any difficulty in completing this task
and require reasonable adjustments (e.g. can be given as an oral assessment).
 For more information, please refer to your RTO Student Handbook.

Location:
 This assessment task may be completed in a simulated learning environment.
 Your trainer/assessor will provide you further information regarding the location of
completing this assessment task.

General Instructions for attempting the project:
 This assessment task is in continuation to the previous task.
 You will be analyse the existing security plan, create new plan, encrypt the data, and check
the system log to check for data compromises in this assessment task.
 You will be expanding the knowledge and skills acquired during the previous assessment
task.
 Instructions analyse the existing security plan, create new plan, encrypt the data, and check
the system log to check for data compromises are provided within the assessment task.
 You will be required to correctly attempt all activities of this assessment task.

Version Number: 1(Review date: 01/10/2021) Unit Code: ICTNWK502
Name of the RTO: Harward International College RTO No: 22332 | CRICOS No: 03234B

How your trainer/assessor will assess your work?
 This assessment task requires the student to successfully complete and submit a project.
 Answers must demonstrate the student’s understanding and skills of the unit.
 You will be assessed according to the provided performance checklist/ performance criteria.
 Assessment objectives/ measurable learning outcome(s) are attached as performance
checklist/ performance criteria with this assessment task to ensure that you have
successfully completed and submitted the assessment task.
 If all assessment tasks are deemed Satisfactory (S), then the unit outcome is Competent (C).
 If at least one of the assessment task is deemed Not Satisfactory (NS), then the unit outcome
is Not Yet Competent (NYC).
 Once all assessment tasks allocated to this Unit of Competency have been undertaken,
trainer/assessor will complete an Assessment plan to record the unit outcome. The outcome
will be either Competent (C) or Not Yet Competent (NYC).
 The “Assessment Plan” is available with the Unit Assessment Pack (UAP) – Cover Sheet.

Purpose of the assessment task:

This assessment task is designed to evaluate your following skills and abilities:
 Ability implement encryption systems and inform users of any impacts
 Skill to monitor and document encryption issues and compromises, and notify appropriate
person.

Version Number: 1(Review date: 01/10/2021) Unit Code: ICTNWK502
Name of the RTO: Harward International College RTO No: 22332 | CRICOS No: 03234B

Assessment Task 3 – Unit Project (UP)
Instructions to complete this assessment task:
 Please write your responses in the template provided.
 You may attach a separate sheet if required.
 You must include the following particulars in the footer section of each page of the attached
sheets:
o Student ID or Student Name
o Unit ID or Unit Code
o Course ID or Course Code
o Trainer and assessor name
o Page numbers
 You must staple the loose sheets together along with the cover page.
 You must attach the loose sheets chronologically as per the page numbers.
 Correction fluid and tape are not permitted. Please do any corrections by striking through
the incorrect words with one or two lines and rewriting the correct words.
 The premise of the project must be closely related to the previous assessment task.
 This submission must be well presented and follow the guidelines and instructions provided.
 Please follow the format as indicated in the template section below.
 One of the most important steps that you can take: proofread your project.
 Project must be of 500-800 words in length, using 11-point font, double-spaced, and must
include a cover page, table of contents, introduction, body, summary or conclusion, and
works cited.
 Appropriate citations are required.
 All RTO policies are in effect, including the plagiarism policy.

Resources required to complete the assessment task:
 Computer
 Internet
 MS Word
 A site where encryption installation may be conducted
 A live network
 Servers
 Encryption software
 Encryption tools

Assessment task Instructions
 Student must install the “Encryption” Software
 You must assess the performance as per the performance criteria and checklist provided

Version Number: 1(Review date: 01/10/2021) Unit Code: ICTNWK502
Name of the RTO: Harward International College RTO No: 22332 | CRICOS No: 03234B

Activity 1(Installing encryption software)
This activity is continuation of assessment task 2. You are required to participate in a practical
demonstration task. You need to complete this activity in 1 to 2 hours.
Note: For This activity RTO/Assessor will provide you the following:
 A site where encryption installation may be conducted
 A live network
 Servers
 Encryption software
 Encryption tools.

You have received a final approval from David to start the encryption project, so you must perform
the installation of encryption software and tools on the live network.
Assume yourself as “Lee” and install database encryption software and tools.
You need to install encryption software on IT Server. You need to Perform installation of database
“Encryption” software by adhering below mention conditions.
a. Use secure protocol for data transfer
b. Create a digital key certificate for client and server
c. Use secure network protocols
d. Set admin password
Student must follow vendor instruction to install the software.
Your trainer and assessor will observe you during the activity and complete the performance checklist.

Version Number: 1(Review date: 01/10/2021) Unit Code: ICTNWK502
Name of the RTO: Harward International College RTO No: 22332 | CRICOS No: 03234B

Activity 2: (Analysing effect of encryption on user roles)
Note: This activity is in continuation of activity 1.
Assume that Lee has implemented the encryption software successfully. As a part of his
responsibilities, he needs to analyse the effect of user roles and responsibilities.
Assume yourself as Lee and you are required to analyse the effect of user roles and responsibilities
in encryption and complete the following template.
Role Description
Enterprise Administrator

Group or Policy Administrator

Enterprise Authenticator

Group or Policy Authenticator

User

Version Number: 1(Review date: 01/10/2021) Unit Code: ICTNWK502
Name of the RTO: Harward International College RTO No: 22332 | CRICOS No: 03234B

Activity 3: (Role Play – Informing users about their roles)
Note: This activity is in continuation of activity 2.
o Time allowed for this activity is 10-15 minutes.
Assume that you are still playing the role of Lee and participate in the following role play.
The purpose of the role play is to inform users about new encryption technology and how it works.
Explain the effects of new encryption technology on user responsibilities. You need to use the
template that you have developed in the assessment activity 2 (Assessment task 3) to explain the
effects of new encryption technology on user responsibilities for the following users:
o Policy administrator
o Enterprise Authenticator
o Policy authenticator
o User
Your trainer/assessor will act as enterprise administrator and will ask you the following questions:
1. Security limitations of all the roles
2. Explanation of the features included in the “Enterprise administrator” role
Following the role play, complete minutes of meeting template with details of what was discussed.

Minutes of Meeting

Meeting Objective:

Attendees:

Venue:

Date:

No. Points Discussed Actions Suggested Target Date

Version Number: 1(Review date: 01/10/2021) Unit Code: ICTNWK502
Name of the RTO: Harward International College RTO No: 22332 | CRICOS No: 03234B

Signature of attendee 1:Signature of attendee 2:

Signature of attendee 3:Signature of attendee 4:

Version Number: 1(Review date: 01/10/2021) Unit Code: ICTNWK502
Name of the RTO: Harward International College RTO No: 22332 | CRICOS No: 03234B

Activity 4: (Analysing functioning of “Encryption software”)
Assuming that you have implemented the encryption technology and tools in a live server in the
previous assessment activities, you are required to monitor the encryption in this activity. You need
to complete this task in 1 to 2 hours.
In this activity you need to monitor the functioning of “Encryption software” by perform following
tasks in a live server.
1. Analyse the implementation of encryption technology to confirm its functioning by:
o Monitoring digital signature
o Monitoring Data Encryption Compromising Network Performance
o Monitoring network performance
2. Analyse helpdesk records for errors occurred and security compromises in encryption and
print these records as a part of this activity.
3. Check local computer security logs for encryption issues and print it as a part of this activity.
4. You need write a note on encryption issue and security compromises included error logs and
network performance issues identified in the task and submit to your trainer/assessor.
Your trainer will observe you during the activity and complete the performance checklist.

Expert paper writers are just a few clicks away

Place an order in 3 easy steps. Takes less than 5 mins.

Calculate the price of your order

You will get a personal manager and a discount.
We'll send you the first draft for approval by at
Total price:
$0.00