COMP1608 Managing IT Security and Risk Coursework Brief | UoG

Published: 31 Jan, 2025
Category Coursework Subject Management
University University of Greenwich Module Title COMP1608 Managing IT Security and Risk

Assignment Brief

The scenario

  • Following quite a few IT security incidents resulting in data loss, GDPR breaches and penalties the decision was made by MegaCorp to invest more in improving their IT security posture. Their first task was to hire you to help them improve the way they do things. In terms of IT infrastructure, their IT estate includes approximately 50 servers Centos 6.x and 50 servers Windows 2012 standard, around 900 laptops Windows 7 and 600 laptops MacOS Mojave, 600 desktops Windows 10 2H22 and MacOS Mojave and a number of core infrastructure devices including Cisco 7200 series routers, rv340 VPN devices and 6800 & SX550X-52 series switches, Fortigate firewalls FortiGate-5001A-SW-G and FortiGate-620B-G load balancers. Virtualisation is used with cloud solutions based on Azure and AWS. 
  • The company also uses VoIP and Cisco phones are used and the network is converged.
  • The corporate network is mostly flat and the use of a shared network drive for all staff is in place. This is used as a common share to store various client data, potentially confidential (the company has no data classification system in place).
  • There are also separate network drives that are used for temporary files (application temp storage) by all staff and some contractors when onsite.
  • Employees work often onsite on client projects. Some of their devices are encrypted but there is no policy based encryption control. Employees are allowed to install software on an as needed basis and they do have local admin rights. The use of USB drives is company wide and staff carry files they need to install and data with them. This is a measure that helps the organisation to reduce IT support involvement and workload.
  • Email is used widely. There have been instances that email is used to transfer various files as needed including quotes and client information. There is not policy against that although there were incidents of data exfiltration. The network administrator has started an investigation on this matter but this was put on hold as well as other key tasks as he is currently on sick leave and nobody else has access to his system.
  • The joiner’s onboarding process is not standardised as different teams follow their own plan. Joiners learn on the job sometimes shadowing, sometimes through trial and error.
  • Yearly training is not provided but members of staff are advised to find someone to shadow or to use an online resource such as YouTube to obtain the required software and related skills.
  • Hierarchy and job title not aways map to access rights as some staff have multiple roles not always matching their job role. Limiting their access to data will add to the workload of the IT support.
  • Management of the devices has become an issue as it is manual and takes too much time as the there is no MDM in place.
  • Vulnerability management is not implemented currently.
  • Security monitoring is not implemented yet because the systems are not configured for monitoring and there is no SOC support in place.
  • System patching is performed manually by users – users will receive an email and they will be asked to apply an update - there is not centralised solution in place.
  • Logging is very basic if not existent and account segregation is not enforced.
  • There is a team of developers that develop code for the organisation but they do not follow a standardised approach.
  • Testing and evaluation of new code sometimes takes place on production systems.
  • The test, development and production environments are not segregated appropriately and there have been instances that the test data made it to the production environment.
  • Logging is not implemented and there were instances that incident response was needed but there was no logging at all available.
  • Backups are not performed due to lack of HD space. The organisation plans to invest on a backup solution sometime in the future
  • Databases do not have roll back functions enabled and there is no logging enabled due to HD space.
  • Account sharing is used to reduce IT workload.
  • The IT estate infrastructure is not monitored and a SIEM is not in place. IBM’s QRadar Security is in place for the Web and database server with a retention of 30 days.
  • Physical security lacks and on a number of occasions unauthorised employees and guests accessed restricted areas.
  • There is a test environment, a development environment and a production environment. Remote working is allowed and users often work remotely. A Web based interface is used that can be accessed across the world instead of a VPN. There is also network core equipment that has been incorporated within MegaCorp’s network following a recent merger with Initech. This was added and extended MegaCorp’s network. Also some Initech admin staff accounts were moved to MegaCorp’s domain to allow maintenance of the newly acquired hardware. Some of the devices can be seen next but this is not to be considered a complete list (a complete list is not available – the merger happened too fast) - additional equipment might be connected and not listed.

Task 1

Based on the key information provided, identify and critically discuss two key recommendations for improving the security posture on this company. You might find there are a lot more opportunities for improvement of the overall security posture of this company, however you should select the two that you consider will make the greatest impact. You might want to consider in terms of Change control, Compliance, Cost, Continuity, and Coverage mission Critical Assets (e.g. Data Security, Endpoint Security, Application Security, Network Security, Perimeter Security and the Human Layer).

Task 2

Following from Task 1, create a realistic* plan, with five recommendations for improving the security posture on this company. This can be a list with recommendations in the order that will make it easier to implement and tasks for each of these. E.g. Recommendation 1. To improve WiFi coverage. Responsible team: IT Networks. Tasks: Buy drones, fit routers on the drones, have drones flying over the premises to provide good WiFi coverage.

Provide a brief explanation for each of your recommendations and make sure that you include:

  • Why each of these have been selected,
  • Why you have placed these in this order and
  • Which is the team** that the task(s) relating to your recommendations for improvement should be allocated to.

Any assumptions made must be stated.


The plan must be realistic in terms of delivery (hint: sometimes things have to happen in a certain order, over certain timeframe, cannot happen all at once).

**You have not been told what teams the organisation have - You can make assumptions about the teams they have (e.g. IT security team, Management team, Software development team), based on the scenario information provided and common industry practices.

Task 3

Conduct your own research and identify ten security threats that are on the rise in 2024 that are relevant to this organisation based on what it was covered in class about common threats. Perform basic risk analysis (how each of these risks might affect the business operations?) and order based on their criticality. Do not just list! Each of these threats must be briefly explained in plain English (in general what is it, how does it usually work, what can be affected within a business unit or system etc.).

  • A brief scenario (non generic) must be provided for each of these threats that is specific to this organisation.
  • A brief countermeasure recommendation must be provided for each of the scenarios provided in a) - please note this must be specific to the organisation and targeted rather than a “blanket” solution (e.g. “install better firewall” or “improve the security policy” are not acceptable answers).
  • What is the risk rating that you would assign and why (refer to what we discussed in class about risk)

Task 4

The company recently set as their immediate target to become PCI DSS compliant. Review the latest PCI DSS standard requirements (available to download from https://www.pcisecuritystandards.org/document_library/). Based on the key information provided about this organisation, critically discuss applicable five changes that they would have the highest impact in aligning with the PCI DSS standard.

Hint: Often before any changes towards a compliance goal can be achieved, foundational changes might be required to allow for these changes (e.g. the creation of teams, change of processes, departments or a new or additional IT infrastructure). Please make sure you mention any such foundational changes.

Task 5

Reporting

You are required to present a report with the following structure:

  • Summary
  • Task 1
  • Task 2
  • Task 3
  • Task 4
  • Conclusion
  • References

Present your coursework as a report of no-more than 3,000 words.

This should be typed and you may use graphics and tables. We expect that you will demonstrate a systematic understanding of the discussed and analysed information security concepts.

We expect that you will use an extensive range of current and appropriate literature to support your arguments and different perspectives into the discussed and analysed information security concepts. References should be in the Harvard referencing system.

Marks are awarded for clear, coherent writing, proofread work and written English that is of an extremely high standard and observes all academic conventions in style and content. We expect to see an appropriate command of the rules of report layout, spelling, punctuation, grammar, syntax with due regard to the use if figures, diagrams and references.

Looking for someone who can write your COMP1608 Managing IT Security and Risk assignment. Workingment assignment help is here to ease your academic burden. We have a team of academic experts who have a deep knowledge of complex topics of management. Our writers serve more than 5,000 students with their academic needs. Our writers provide 100% plagiarism-free and unique documents to you. If you want management assignment help and a free assignment sample for us. 

If you want to see the related solution to this brief, then click here:- COMP1608 Managing IT Security and Risk
 
Workingment Unique Features

Hire Assignment Helper Today!


M30029 Advanced Thermodynamics and Fluid Mechanics Coursework Brief 2024-25 | UoP

The numerical values in this coursework are based on your student number. Your student number is a six- or seven-digit code UP QWERTYZ. In the assignment below, you should replace letters Q, W, E, R, T, Y, Z with digits from your student number.

MANG6046 Optimisation and Decision Modelling Individual Coursework Brief Sem 01 | UoS

This piece of work will count for 80% of the overall mark for MANG6046. You need to submit a report of your comment on a project and an Excel file (not multiple Excel files) in two separate folders (one is called Individual Coursework_Reports Only; the other is called Individual Coursework_Excel Files.

CTEC3754D Malware Analysis Coursework Brief 2024-25 | DMU

Evaluate malware evasive techniques, e.g., packing, obfuscation, and anti-disassembly. antis and pro-boxing, etc. and how to circumvent them. Investigate, select, and apply real malware through static and dynamic analyses using standard tools and techniques.

CMP7205 Applied Statistics—PG CWK Assignment Brief 2024-25 | BCU

CMP7205 Task: Report your statistical analysis on a reasonably complex dataset(s) in a professional manner, using appropriate probabilistic and/or statistical techniques implemented with modern statistical software.

Managing Customer Experience CW1 Summative Assessment Brief | BPP University

You are required to write a 2500-word report on the customer experience (referred to as CX from now on in this brief) strategy.

Leading Through Digital Change CWK Assessment Brief | BPP

In recent decades, businesses around the world have faced challenges by the persistent stream of disruptive digital innovations (DDI). T

Leading Through Digital Change Formative CW3 Brief - BPP

LTDC CW3 : A digital transformation strategy outlines how a company will utilise digital technology to continually develop novel products, services, processes, and channels of engagement (Pratt, 2023).

FY028 Inquiry Based Learning CW1 Assignment Brief June 2025 | BNU

FY028 Assignment task: For this assignment you will need to investigate the impact of technological trends on customer satisfaction at a small or medium-sized restaurant of your choice.

6020SSL: International Logistics CW1 Assignment Brief | CU

6020SSL: Analyse  and  critically  evaluate  a  range  of  logistics  practices  applied  across  different  industries  and geographical situations.  Examine  the  implications  of  inventory  holding  and replenishment  policy  when  considering  other  logistics functions and business constraints.

CC5067NI Smart Data Discovery Coursework 01 Question Paper Spring 2025 | LMU

Contract cheating (also known as assessment outsourcing, commissioning or ghost writing) is when someone seeks out another party, or an AI generator service, to produce work or buy an essay or assignment.

Online Assignment Help in UK