You are on page 1of 5

PROGRAM TITLE: ……………………………………………

UNIT TITLE: …………………………………………………….

ASSIGNMENT NUMBER: …………………………………

ASSIGNMENT NAME: …………………………………….

SUBMISSION DATE: ……………………………………….

DATE RECEIVED: …………………………………………….

TUTORIAL LECTURER: ……………………………………

WORD COUNT: ……………………………………………..

STUDENT NAME: ………………………………………………

STUDENT ID: …………………………………………………….

MOBILE NUMBER: ……………………………………………


Summative Feedback:

Internal verification:
Security Policies

Higher Nationals
Assignment Brief – BTEC (RQF)
Higher National Diploma in Computing

Student Name /ID Number

Unit Number and Title Unit 05: Security

Academic Year

Unit Assessor

Assignment Title Assignment 2 – EMC Cloud Solutions

Issue Date

Submission Date

IV Name

Date

Submission Format:

The submission is in the form of an individual written report. This should be written in a concise, formal
business style using single spacing and font size 12. You are required to make use of headings, paragraphs
and subsections as appropriate, and all work must be supported with research and referenced using the
Harvard referencing system. Please also provide an end list of references using the Harvard referencing
system.

Unit Learning Outcomes:

LO1. Assess risks to IT security.

LO2. Describe IT security solutions…

LO3. Review mechanisms to control organisational IT security…

LO4. Manage organisational security

Assignment Brief and Guidance:

EMC Cloud Solutions is reputed as the nation’s most reliable Cloud solution provider in VietNam.
A number of high profile businesses in VietNam including Esoft Metro Camps network, SME Bank
VietNam and WEEFM are facilitated by EMC Cloud Solutions. EMC Cloud provides nearly 500 of its
customers with SaaS, PaaS & IaaS solutions with high capacity compute and storage options. Also EMC
is a selected contractor for VietNam, The Ministry of Defense for hosting government and defense
systems.

EMC’s central data center facility is located at VietNam along with its corporate head-office in Hanoi.
Their premises at Hanoi is a six story building with the 1st floor dedicated to sales and customer services
equipped with public wifi facility. Second-floor hosts HR, Finance and Training & Development
departments and the third-floor hosts boardroom and offices for senior executives along with the IT and
Data center department. Floor 4,5,6 hosts computer servers which make up the data center.

With the rapid growth of information technology in Ho Chi Minh city (HCMC) in recent years, EMC
seeks opportunity to extend its services to HCMC. As of yet, the organization still considers the nature of
such extension with what to implement, where is the suitable location and other essential options such as
security are actually being discussed.

You are hired by the management of EMC Solutions as a Security Expert to evaluate the security-related
specifics of its present system and provide recommendations on security and reliability related
improvements of its present system as well as to plan the establishment of the extension on a solid security
foundation.

Activity 01
Assuming the role of External Security Consultant, you need to compile a report focusing on
following elements to the board of EMC Cloud Solutions;
1.1 Identify types of security risks EMC Cloud is subject to, in its present setup and the impact, such
issues would create on the business itself. Explain, vulnerabilities, assets, risk – risk for the
company with impact to EMC
1.2 Develop and describe security procedures for EMC Cloud to minimize the impact of issues
discussed in section (1.1) by assessing and treating the risks. – procedure for identified risks (name
the procedure and explain that)
*M - Risk management and treatment and explain risk management process.

Activity 02

2.1 Discuss how EMC Cloud and its clients will be impacted by improper/ incorrect configurations
which are applicable to firewalls and VPN solutions. – Discuss how improper or incorrect firewall
configurations, improper or incorrect VPN connections, improper firewall or VPN policies will affect
the security (client) of the EMC.
2.2 Explain how following technologies would benefit EMC Cloud and its Clients by
facilitating a ‘trusted network’. (Support your answer with suitable illustrations).
i) DMZ – explain with illustration and impact of this three technologies to EMC
ii) Static IP – explain with illustration and impact of this three technologies to EMC -Also DHCP
iii)NAT– explain with illustration and impact of this three technologies to EMC
How DMZ, NAT, Static IPs helps to a trusted network should be explained
2.3 Discuss the benefits of implementing network monitoring systems.
* Explain about SNMP/Syslog/ NetFlow/ CDP/ Explain about tools use to network monitor.
* Benefits of network monitoring (three or more than that)

Activity 03

3.1 Formulate a suitable risk assessment procedure for EMC Cloud solutions to safeguard
itself and its clients. (Risk Assessment procedure attach to this section)

3.2 Explain the mandatory data protection laws and procedures which will be applied to data storage
solutions provided by EMC Cloud. You may also highlight on ISO 31000 risk management methodology.

• Explain about data protection laws and regulations that can be related to EMC
• Explain about ISO 31000 standard
3.3 Comment on the topic, ‘IT Security & Organizational Policy’
Explain how IT security of the organization should be align to the organization policy. (Ex- password
policy/ email policy/ IT security policy etc.…)
Discuss the impact of any misalignment.

Activity 04

4.1 Develop a security policy for EMC Cloud to minimize exploitations and misuses while
evaluating the suitability of the tools used in an organizational policy.

4.2 Develop and present a disaster recovery plan for EMC Cloud for its all venues to ensure
maximum uptime for its customers (Student should produce a PowerPoint-based presentation
which illustrates the recovery plan within 15 minutes of time including justifications and
reasons for decisions and options used).

4.3 ‘Creditors, directors, employees, government and its agencies, owners /shareholders, suppliers, unions,
and the other parties the business draws its resources’ are the main branches of any organization. Discuss
the role of these groups to implement security audit recommendations for the organization.

You might also like