logo

Proactive Network Defence

   

Added on  2023-04-21

19 Pages5232 Words130 Views
Running head: PROACTIVE NETWORK DEFENCE
PROACTIVE NETWORK DEFENCE
Name of student:
Name of university:
Author’s note:

1
PROACTIVE NETWORK DEFENCE
Executive summary
The aim of this report is to discuss on the topic Proactive network defence. A data flow
decomposition diagram of the current infrastructure is provided in this report. A threat
modelling approach for identifying the threats and the vulnerabilities of the trust domains are
provided in this report. A detailed derivation of the threat mitigation plans for the identified
trust domains are provided in this report and appropriate actions and options are developed
for enhancing the resiliency of the examined systems is provided in this report. The controls
that are used in the threat mitigation plans is examined according to the policy and the
frameworks of the regulatory compliance is discussed in this report. Finally, the report settles
with a suitable conclusion for this report. The data flow decomposition diagram helps in the
identification of the threats and the probable vulnerabilities of the complete infrastructure and
implement appropriate controls for enhancing the security of the systems.

2
PROACTIVE NETWORK DEFENCE
Table of Contents
Data flow diagram..........................................................................................................3
Threat modelling approach............................................................................................3
Threat mitigation plans..................................................................................................9
Legal and ethical considerations..................................................................................12
Conclusion....................................................................................................................13
References....................................................................................................................14
Appendix......................................................................................................................18

3
PROACTIVE NETWORK DEFENCE
Data flow diagram
Threat modelling approach
The trust domains in the provided network are the corporate workstations, control
system workstations, and engineering workstations. These are connected to the servers from
where data is exchanged and information flows in the network. The trust domains and the
servers form the LAN.
The security of the network of an organisation is important to ensure the security of
the files and data on the network. The aspect of security of the network is an important
subject for the organisations. It is most commonly that the damage to the workstations would
not be internally nor would they perimeter the protection. There can be several kinds of
hardware, software, operating systems and various protocols with various levels of awareness
of computer systems among the users of the organisations (Guan-jun et al. 2014). This kind

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Risk Assessment Report- Docs
|11
|1091
|30

Risks, Threats, and Vulnerabilities in Bank IT Infrastructure
|3
|803
|366

Risk Assessment for Information Security and Risk Management
|7
|1064
|150

Security Assessment: Risk Assessment and Security Vulnerabilities in XYZ Organisation
|14
|2277
|186

Entity Management Service for Internet of Things-Based
|8
|2105
|22

Identification of Problems Security Threats : Report
|7
|1279
|62