Professional Documents
Culture Documents
ICT60215
ICT60215
Assessment Details
Qualification Code/Title ICT60215 : Advance Diploma of Network Security
Assessment Type Assessment 2- Project Time allowed 2 weeks
Due Date 26th may 2019 Location AHIC Term / Year 4/2018
Unit of Competency
National ICTNWK613 – Develop plans to manage structured troubleshooting process of
Code/Title enterprise networks.
Student Details
Student Name Biswas rijal Student ID AHI00001A9
Assessor Details
Assessor’s
Faisal
Name
RESULTS
SATISFACTORY NOT SATISFACTORY
(Please Circle)
Feedback to student:
...............................................................................................................................................................................................
...............................................................................................................................................................................................
...............................................................................................................................................................................................
...............................................................................................................................................................................................
Student Declaration: I declare that I have been Assessor Declaration: I declare that I have conducted a fair,
assessed in this unit, and I have been advised of my valid, reliable and flexible assessment with this student, and I
result. I am also aware of my appeal rights. have provided appropriate feedback.
Signature: rijalkarma Signature: ________________________________________
Date: 22nd may 2019 Date: ______/_______/___________
This assessment is to be completed according to the instructions given below in this document.
Should you not answer the tasks correctly, you will be given feedback on the results and gaps in knowledge.
You will be entitled to one (1) resubmit in showing your competence with this unit.
If you are not sure about any aspect of this assessment, please ask for clarification from your assessor.
Please refer to the College re-submission and re-sit policy for more information.
If you have questions and other concerns that may affect your performance in the Assessment, please
inform the assessor immediately.
Please read the Tasks carefully then complete all Tasks.
To be deemed competent for this unit you must achieve a satisfactory result with tasks of this Assessment
along with a satisfactory result for another Assessment.
This is an Open book assessment which you will do in your own time but complete in the time designated by
your assessor. Remember, that it must be your own work and if you use other sources then you must
reference these appropriately.
Resources required completing the assessment tasks are Learner guide, PowerPoint presentation, Unit
Assessment Pack (UAP), Access to other learning materials such as textbooks, Access to a computer, the
Internet and word-processing system such as MS Word.
Submitted document must follow the given criteria. Font must be Times New Roman, Font size need to be
12 and line spacing has to be Single line.
This is Individual Assessments. Once you have completed the assessment, please upload the softcopy of the
Applicable conditions:
This project is untimed except activity 2 and are conducted as open book tests (this means you
are able to refer to your textbook).
You must read and respond to all criteria of the project.
You may handwrite/use computers to answer the criteria of the project.
You must complete the task independently.
No marks or grades are allocated for this assessment task. The outcome of the task will be
Satisfactory or Not Satisfactory.
As you complete this assessment task you are predominately demonstrating your practical skills,
techniques and knowledge to your trainer/assessor.
The trainer/assessor may ask you relevant questions on this assessment task to ensure that this
is your own work.
Location:
This assessment task may be completed in an independent learning environment or learning
management system.
Your trainer/assessor will provide you further information regarding the location of completing
this assessment task.
Scenario: -
ALEXO Enterprises is one of the famous architectural and urban designing company. Established in 1993,
ALEXO Enterprises consists of highly qualified architecture, urban and interior design consultants. In a
very short span of time the firm has comprised of an impressive Listing of some very prestigious
projects. In order to meet with the challenges of a rapidly changing and competitive market, an architect
today has to be more than just a designer and should be fully conversant with market strategies and
economics, prevailing design trends construction technologies, practice and project management. The
firm strives to set new standards of design.
ALEXO is a paperless environment with all the designing and graphics related work is being done on the
systems connected in LAN and also a WAN has been established for networking between the regional
offices with the head office of ALEXO. All the systems, Servers, printers and scanners are connected with
the network using the routers and Layer 2 and Layer 3 switches. All the data is managed by the
centralised server being set at the head office and all the employees access the data and network
resources as per their professional privileges. Also, the network is designed keeping the following
policies for the organisation:
Application Mobility
Network Services and Unified Communication
Server Virtualisation
Data Storage
Data Protection
And for the Firewall management, the organisation has set the following policy:
The data is of immense value to the company due to the copyright and its unique ideas. Peter is the IT
Manager and is responsible for all the IT infrastructure along with the management of the servers and
the active directory. While Nathan is the Network Administrator and works under the supervision of the
IT Manager.
Completes projects by coordinating resources and timetables with user departments and data
center.
Verifies application results by conducting system audits of technologies implemented.
Preserves assets by implementing disaster recovery and back-up procedures and information
security and control structures.
Recommends information technology strategies, policies, and procedures by evaluating
organization outcomes; identifying problems; evaluating trends; anticipating requirements.
Accomplishes financial objectives by forecasting requirements; preparing an annual budget;
scheduling expenditures; analysing variances; initiating corrective action.
Maintains quality service by establishing and enforcing organization standards.
Maintains professional and technical knowledge by attending educational workshops; reviewing
professional publications; establishing personal networks; benchmarking state-of-the-art
practices; participating in professional societies.
Contributes to team effort by accomplishing related results as needed.
The computers, printers, servers, scanners and IP phones are connected according to the following
network diagram:
It has been observed that in the recent times, the network performance is not optimal and as per the
requirements. Due to the extensive nature of the work, the Network performance needs to be even
better than the baseline set so that all the employees/users can access the maximum resources of the
network without any problem. Consider yourself as Nathan-Network Administrator and analyse and plan
the troubleshooting of the enterprise network for the optimal performance of the network. This will
help to minimise the network threats and will increase the network performance. So, under the
supervision of the IT Manager which will be acted by the Trainer/Assessor.
So, for the planning the troubleshooting process, do the following things:
Design and develop the strategy for managing and monitoring of the network. As Network
monitoring and managing is far more strategic than its name implies. It involves watching for
problems 24/7, but it's also about optimising data flow and access in a complex and changing
environment. Complete template 1.
Perform Network Device Audit and skills audit of the network. Your trainer/assessor will provide
you live network with relevant testing tools, so you can perform the audit.
o Audit outcome will be stored in a template 1.
Design and analyses a Service Level Agreement that can be used as a best practice for network
and maintenance plan. Complete the template 2 for designing the SLA.
Design network maintenance and monitoring plan. Complete template 3.
INTRODUCTION
DEPLOYMENT PLAN
MILESTONES
The table below lists the milestones for this plan, along with their estimated completion timeframe.
Milestones Estimated Completion Timeframe
Network This was set to be completed within 2 days of the estimated time frame and then all
monitoring and the tasks are also due to be monitored as the necessary project and it is also agreed to
finding out the monitor network every single week. PRTG is a monitoring tool
errors in the
networks and
the hinges and
trouble site
DEFINE STAKEHOLDERS
STAKE HOLDERS CAN BE DEFINES AS THE KEY PEOPLE WHO ARE INVOLVED IN THE SYSTEM DIRECTLY OR
INDICRECTLY EXCEPT THE OWNERS OF THE COMPANIES. THEY MAY BE
CLEINTS
STAFFS
SHARE HOLDERS
CUSTOMERS
STAKEHOLDERS RESPONSIBILITIES
ASKING FOR THE TRANSPARENCY IN BUDGET AND ACTIVITY OR THE PERFROMANCE OF THE
ORGANIZATIONS
STAKE HOLDERS HAVE THE KEY ROLE TO COME UP WITH THE SOLUTION WHENERVER IS ASKED FOR
STAKE HOLDERS SUCH AS STAFFS KEY ROLE ARE TO PERFROM FOR THE WELFARE OF THE ORGANIZATION
STAFFS HELPS TO SET UP THE VLAUE FOR THE ORGANIZATIONS SETTING UP ITS STANDARD THROUGH
QUALITY TASKS
STAKE HOLDERS HAVE THE KEY ROLE TO CARRY THE NAME OF THE ORGANIZATION WITH PRIDE
COMMUNICATIONS MANAGEMENT
PINGING TEST IS DONE INORDER TO VERIFY THE CONNECTIVITY BETWEEN THE SERVERS AND THE
COMPUTERS
COMMUNICATIONS SHOULD BE BOTH WAYS FROM THE AUTHORITY TO CLEINT AND ALSO FORM THE
CLEINT TO AUTHORITY AS WELL
DEMANDS AND THE NEEDS OF THE CUSTOMERS SHOULD BE ACCESSIBLE BY THE AUTHORITY SO THAT
THEY WILL BE CLEAR FOR ASSIGNING THE VALUES
COMMUNICATION MANANGEMENT IS ALSO THE SYSTEMATIC WAY OF ADRESSING THE VLAUES AND
THE INFORMATIONS IN THE NETWORK BETWEEN THE STAKE HOLDERS AND ALSO THE AUTHORITY, IT
ALSO DEALS WITH NETWORK CONNECTIVITY, FAULTS IN THE NETWORK AND AUTHORITY TOUCH WITH
THE STAFFS.
THERE ARE DIFFERENT AUDITITNG SOFTWARES SUCH AS Solar winds, Open-audit, NetformX among this
software we are using solar winds
All these tests were set up in order to find out the key performances ability.
1. Agreement Overview
This was the agreement between ALEXO Enterprise and NUBEX.pty over the project of network management.
This project was carried out after the agreement was decided
3. Stakeholders:
4. Periodic Review
5. Service Agreement
Network management to manage the LAN and WAN and sort out all the network trouble.
Customer are agreed to allow the access to the authorized service providers regarding any devices
and then pay the dues on time
Network monitoring
Network auditing
Trouble shooting
Trainings
6. Service Management
It is the process through which we can consult with the customers and then service provider and then gain
the necessary insides of the project.
Services are available in all the working hours and 99% of the time of the official activity of the network
and in closed in case of public holidays
Email addresses
It deals with the customer’s satisfaction and if they are not satisfied they can ask for the further
request.
In activity 1, you have defined the stakeholder and their responsibilities now you need to arrange a
meeting with stakeholders and assign the functional responsibilities according to the network
maintenance plan (Template 3).
Your trainer will provide you feedback after the role play. Role play duration is 5-10 minutes and trainer
will provide you additional time if required.
You will act as a Nathan (Network Administrator) and your trainer/assessor will act as an IT manager. If
you need more participants, then you may involve your classmates according to the prepared document
(Template 1).
required
Body language,
communication skills
and eye contact were
according to the
industry requirements
Now, after the analysis and planning of the maintenance and monitoring of the network, you need to
implement the network maintenance and management processes under the supervision of the
trainer/assessor who will act as the IT Manager while you will act as the Network Administrator-Nathan.
The trainer/assessor will provide you the following:
For the implementation of network maintenance process, you need to perform the following activities:
Consult with IT Manager and use network fault management tools to monitor and improve the
network performance
Implement network maintenance and monitoring plan prepared in activity 1 in line with
prepared plan and policies (Activity 1 and appendix 1)
Perform risk assessment of the implementation and complete the template 4 including ranking
threats
Design and Implement Network disaster recovery strategy for improved and optimal
performance of the network and complete the given template.
Analyse and ensure by measuring the network performance according to the given baseline
information
1. Introduction
Purpose
A global operating companies have regular and common threats revolving around so the main purpose
of the network risk assessment is to minimize the risk of the network. By ensuring the `1
Main scope of the risk assessment is to manage all the risks in the system and then maintain a risk free
secured environment to implement and make it well manageable.
Software It may create Happens every If updated regularly this 2 as this is not
regularly a threat of month= likely issues can be resolved that high risk
updating software’s able
policies getting intermediate
lapsed or
attacked
Loss of data There was Unlikely though it has Keeping strong back up and 5, severe it may
crisis of data happened one there encapsulations to prevent cause huge loss
loss once is still chance of its the data loss securing the of the money
appearing data in the vault
Hazard It may occur Not fixed Make all the devices and No one knows
natural anywhere the object the damage
anytime amount
Resources required for the unit assessment task Unit assessment guide
template
In the previous activity, you have completed a risk assessment and prepared risk management plan
(Template). Based on identified risk, you need to prepare and implement a disaster recovery plan for
one of the identified risk and measure the performance of the network according to the defined
baseline (Activity 1 and 3).
Your assessor will provide you all the hardware, software and equipment’s to implement the disaster
recovery plan.
Develop a disaster recovery plan for one of the identified risk in activity 3. Complete template 5.
Implement disaster recovery plan according to plan
Measure the performance of the network according to the defined baseline (Activity 1 and 3)
Risk identified