For Unit 2, Outcome 2, you are required to describe the functions and capabilities of different types of networks
An overview of networks, with an emphasis on network security in a global environment. An explanation of networks, key network hardware and software components and communication methods is given. A range of security threats to data and information are discussed, in addition to a range of security measures that can be used to protect data and information from these security threats. The interactions and impacts created by networks are also discussed, with a focus on legal and ethical considerations required by organisations that operate in a global environment. For this outcome you will be required to design a Local Area Network (LAN), describe its components and methods used to communicate data and information. A range of security threats and strategies to protect data and information from these threats also need investigation.
Skills required
You will be required to demonstrate the following skills:
1 Describe the applications and capabilities of a range of networks.
2 Examine the impact of common network vulnerabilities.
3 Design a network solution with wireless capability.
4 Identify and evaluate threats to the security of data and information.
5 Propose and justify strategies to protect the security of data and information within a network.
6 Identify and discuss possible legal and ethical issues arising from ineffective data and information security practices.
You will be required to submit your written responses to the case study provided to you.
• applications and capabilities of LANs, Wide Area Networks (WANs) and Wireless Personal Area Networks (WPANs)
• functions and characteristics of key hardware and software components of networks required for communicating and storing data and information
• strengths and limitations of wired, wireless and mobile communications technology, measured in terms of cost, data storage options, data transfer rate, reliability and security
• technical underpinnings of intranets, the internet and virtual private networks
• design tools for representing the appearance of networks
• security threats to data and information, such as improper credential management, malicious software, outdated versions of software and weak passwords
• technical underpinnings of malware that can intentionally threaten the security of networks, such as denial of service attacks on websites, spyware, viruses and worms
• data and network protection strategies, such as authentication techniques and symmetric and asymmetric encryption methods
• preventative practices to reduce risks to networks, such as application of firmware, disaster recovery plans, operating system updates, software malware updates and staff procedures
• technical underpinnings of intrusion detection systems (IDS) and intrusion prevention systems (IPS)
• the role of ethical hacking
• risks and benefits of using networks in a global environment
• key legislation that affects how organisations control the storage and communication of data and information: the Health Records Act 2001, the Privacy Act 1988 and the Privacy and Data Protection Act 2014
• ethical issues arising from data and information security practices