Network Security Portfolio: Threats and Mitigation Strategies
VerifiedAdded on 2020/10/22
|7
|1646
|326
Portfolio
AI Summary
This portfolio presents an analysis of network security threats faced by Energy Australia, focusing on Advanced Persistent Threats (APTs). It includes a briefing for a business manager outlining the severity of the threats, an email to IT colleagues highlighting the need for action, and web content for network system users detailing the impact of APTs on network assets. The portfolio also reflects on the challenges encountered during the completion of the tasks, such as explaining complex technical terms to a non-technical audience and the difficulties in crafting effective communication. The analysis emphasizes the importance of regular updates, threat detection, and secure network connections to mitigate risks. This portfolio, contributed by a student, is available on Desklib, a platform offering AI-based study tools and resources.

PORTFOLIO
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Table of Contents
INTRODUCTION...........................................................................................................................1
MAIN BODY...................................................................................................................................1
1 Brief for Business manager......................................................................................................1
2 Email for IT colleagues............................................................................................................1
3 Web content for users of network system and their assets.......................................................2
4. Reflection on the challenges faced while completing this tasks.............................................3
CONCLUSION................................................................................................................................4
REFERENCES................................................................................................................................5
INTRODUCTION...........................................................................................................................1
MAIN BODY...................................................................................................................................1
1 Brief for Business manager......................................................................................................1
2 Email for IT colleagues............................................................................................................1
3 Web content for users of network system and their assets.......................................................2
4. Reflection on the challenges faced while completing this tasks.............................................3
CONCLUSION................................................................................................................................4
REFERENCES................................................................................................................................5

INTRODUCTION
Ensuring a business network security is a major challenge within the organisation that
will help in proper planning of the service measures which will help in improving the quality of
services. This is required to be effectively looked after by management of an organisation. The
present report emphasises the network risks and threats like Advance persistent threat that is
been carried out by power and electricity service provider, Energy Australia. The report covers
the details about the briefing a non IT business manager. Also, an Email is been composed for IT
manager to showcase the severity of threat faced. A web content for user is presented with as
reflection of the challenges which are faced while completing this task.
MAIN BODY
1 Brief for Business manager
This is to inform you sir that in the recent time, our organisation has faced out certain
severe data ad network attacks caused by Advanced persistent Threats or APT. It is a condition
of significant data loss that impact the preliminary and other vital information by affecting the
data sources within the organisation (Ramachandran, 2016.). The ATP actors are considerably
hard to detect and thus are required to control in an effective way.
The ATP conditions which are undertaken by the organisation will influence the overall
performance of them organisation and have affected the financial and infrastructural components
of an organisation (Bertino and Islam, 2017). The network architecture of our organisation is
been compromised and has been depleted by the attacks of ATP actors. Few of the essential and
considerable information and data sources are accessed in an unauthenticated manner, causing a
data security threat to the growth and development of organisation (Konstantinou and et.al.,
2015,).
In order to make you understand the relative gravity of this threatening situation,
simplification of the complex technological terms and explaining them in most effective way is
observed. Kindly look up to the risk factors and take significant growth measures.
2 Email for IT colleagues
From: op_manger@energyaustralia.com
To: IT_dpt@energyaustralia.com
Subject: Overview of situation of network threats that are undertaken by Energy Australia.
1
Ensuring a business network security is a major challenge within the organisation that
will help in proper planning of the service measures which will help in improving the quality of
services. This is required to be effectively looked after by management of an organisation. The
present report emphasises the network risks and threats like Advance persistent threat that is
been carried out by power and electricity service provider, Energy Australia. The report covers
the details about the briefing a non IT business manager. Also, an Email is been composed for IT
manager to showcase the severity of threat faced. A web content for user is presented with as
reflection of the challenges which are faced while completing this task.
MAIN BODY
1 Brief for Business manager
This is to inform you sir that in the recent time, our organisation has faced out certain
severe data ad network attacks caused by Advanced persistent Threats or APT. It is a condition
of significant data loss that impact the preliminary and other vital information by affecting the
data sources within the organisation (Ramachandran, 2016.). The ATP actors are considerably
hard to detect and thus are required to control in an effective way.
The ATP conditions which are undertaken by the organisation will influence the overall
performance of them organisation and have affected the financial and infrastructural components
of an organisation (Bertino and Islam, 2017). The network architecture of our organisation is
been compromised and has been depleted by the attacks of ATP actors. Few of the essential and
considerable information and data sources are accessed in an unauthenticated manner, causing a
data security threat to the growth and development of organisation (Konstantinou and et.al.,
2015,).
In order to make you understand the relative gravity of this threatening situation,
simplification of the complex technological terms and explaining them in most effective way is
observed. Kindly look up to the risk factors and take significant growth measures.
2 Email for IT colleagues
From: op_manger@energyaustralia.com
To: IT_dpt@energyaustralia.com
Subject: Overview of situation of network threats that are undertaken by Energy Australia.
1
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Dear IT department,
As per the recent analysis and evaluation that is been carried out by the organisation, this can be
said that the effective assessment of the operations and this will help in significant operations
which will lead to a suitable rise in operations. As in the recent time, the organisation has faced
some severe network attacks and threats, this will help in suitable assessment of the action plans
which influence the overall performance of the organisation.
The technical alerts that are taken in consideration by the organisation has influenced the
performance of MSP's of organisation. This has created a condition of distress within the
organisation. Hence, being IT supports department, you are required to handle this threat factor
caused by APT and mitigate the risk factors within the firm.
Looking forwards for positive response.
Operations manager
Energy Australia
3 Web content for users of network system and their assets
NETWORK system and their Assets affected by threats
2
As per the recent analysis and evaluation that is been carried out by the organisation, this can be
said that the effective assessment of the operations and this will help in significant operations
which will lead to a suitable rise in operations. As in the recent time, the organisation has faced
some severe network attacks and threats, this will help in suitable assessment of the action plans
which influence the overall performance of the organisation.
The technical alerts that are taken in consideration by the organisation has influenced the
performance of MSP's of organisation. This has created a condition of distress within the
organisation. Hence, being IT supports department, you are required to handle this threat factor
caused by APT and mitigate the risk factors within the firm.
Looking forwards for positive response.
Operations manager
Energy Australia
3 Web content for users of network system and their assets
NETWORK system and their Assets affected by threats
2
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

An network system like Managed Service providers is a group ODF multiple systems that
are interconnected to each other over internet. As the threat factors like Advance persistent threat
or APT is affecting the systems abruptly, the network assets are relatively affected by the
organisation (Gordon, Fairhall and Landman, 2017.). The various assets like database, services,
systems and their users will be significantly affected by any sort of network security issue faced
buy the organisation. Some major threat of APT on assets of network are:
Temporary or permanent data loss.
Obstructions in business operations of the organisation.
May causes the loss to financial and infrastructural components of the company.
May hampers the organisation's reputation (Sheffer, Holz and Saint-Andre, 2015).
Some effective measures which are undertaken by the organisation to handle the network
security threats are:
Regular updation of firewalls and security measures which are undertaken by the
organisation.
Detection of security threats in a significant manner.
Using virtual private network on MSP connectivity (Woods, Perl and Lindauer, 2015).
Setting up of effective connections and secure network connection.
4. Reflection on the challenges faced while completing this tasks
To maintain the quality of network system and its protection against advance persistent
threat (APT) is a major challenge that is undertaken and looked after by me. I faced a range of
issues and challenges while completing this task in a effective way. First of all, I faced the
challenge regarding the explanation of network based technological terms and factors to my
business manager, who is not from the technical background. Also, showcasing him the severity
of the threat associated to subnetwork security and potential danger from Advanced Persistent
Threat (APT) was a big state of affair that was effectively handled by me.
Other than this, proper identification of the resolution measure which is been carried out
by the organisation plays a very important and significant role in establishing the operations
which are undertaken by the organisation. As the APT is a significant threat condition for the
selected enterprise which uses the Cisco system and is notified by US CERT. The threat
resolution and improvement measures which are suggested by the organisation will help in
improving the quality and standard of data and network security measures which are undertaken
3
are interconnected to each other over internet. As the threat factors like Advance persistent threat
or APT is affecting the systems abruptly, the network assets are relatively affected by the
organisation (Gordon, Fairhall and Landman, 2017.). The various assets like database, services,
systems and their users will be significantly affected by any sort of network security issue faced
buy the organisation. Some major threat of APT on assets of network are:
Temporary or permanent data loss.
Obstructions in business operations of the organisation.
May causes the loss to financial and infrastructural components of the company.
May hampers the organisation's reputation (Sheffer, Holz and Saint-Andre, 2015).
Some effective measures which are undertaken by the organisation to handle the network
security threats are:
Regular updation of firewalls and security measures which are undertaken by the
organisation.
Detection of security threats in a significant manner.
Using virtual private network on MSP connectivity (Woods, Perl and Lindauer, 2015).
Setting up of effective connections and secure network connection.
4. Reflection on the challenges faced while completing this tasks
To maintain the quality of network system and its protection against advance persistent
threat (APT) is a major challenge that is undertaken and looked after by me. I faced a range of
issues and challenges while completing this task in a effective way. First of all, I faced the
challenge regarding the explanation of network based technological terms and factors to my
business manager, who is not from the technical background. Also, showcasing him the severity
of the threat associated to subnetwork security and potential danger from Advanced Persistent
Threat (APT) was a big state of affair that was effectively handled by me.
Other than this, proper identification of the resolution measure which is been carried out
by the organisation plays a very important and significant role in establishing the operations
which are undertaken by the organisation. As the APT is a significant threat condition for the
selected enterprise which uses the Cisco system and is notified by US CERT. The threat
resolution and improvement measures which are suggested by the organisation will help in
improving the quality and standard of data and network security measures which are undertaken
3

by the organisation. This will help in suitable planning of security and threat prevention
measures which are undertaken by the power and energy service provider organisation. The alert
that is generated or provided by US CERT assists Energy Australia to prevent any sort of data
and network vulnerabilities, threats and leakage that may lead to informational or data
exploitation.
Other than this, on the professional level, I faced a major challenge of generating and
sending out a E mail to IT support team in Energy Australia. As it was my first experience to
send an official E mail regarding the threat or issues related to network security that is been
faced by organisation in a significant manner, I was unaware about the proper format and
inclusion of details or data security measures which are required to be undertaken by the
organisation. Besides this, I was also unable to perform the proper assessment of the threats and
their types which are faced by organisations network. As I was unable to include all the details
about the APT risk factors, there is a susceptibility regarding the improper conveying of message
and proper rectification of the risk factors that are undertaken by IT managers or technical
support department of the organisation. All these measures which are undertaken by the
organisation will improve the quality of data security of organisation. Other than this, I was also
unaware about the process to write the web content for the staff that made me have an improper
communication with my staff members.
CONCLUSION
On the basis of the effective analysis that is been carried out by the organisation, this can
be said that effective planning of the service measures which are taken in consideration by the
organisation. The brief overview ODF the threats that are faced by organisation is presented with
the email to IT department of the selected business organisation in order to look after the risk
factors which are carried out by the organisation for the data security purpose. The effective
content for the evaluation of threat factors by the organisation. Other than this, a reflection
related to major challenges faced to carry out all these tasks is been effectively analysed.
4
measures which are undertaken by the power and energy service provider organisation. The alert
that is generated or provided by US CERT assists Energy Australia to prevent any sort of data
and network vulnerabilities, threats and leakage that may lead to informational or data
exploitation.
Other than this, on the professional level, I faced a major challenge of generating and
sending out a E mail to IT support team in Energy Australia. As it was my first experience to
send an official E mail regarding the threat or issues related to network security that is been
faced by organisation in a significant manner, I was unaware about the proper format and
inclusion of details or data security measures which are required to be undertaken by the
organisation. Besides this, I was also unable to perform the proper assessment of the threats and
their types which are faced by organisations network. As I was unable to include all the details
about the APT risk factors, there is a susceptibility regarding the improper conveying of message
and proper rectification of the risk factors that are undertaken by IT managers or technical
support department of the organisation. All these measures which are undertaken by the
organisation will improve the quality of data security of organisation. Other than this, I was also
unaware about the process to write the web content for the staff that made me have an improper
communication with my staff members.
CONCLUSION
On the basis of the effective analysis that is been carried out by the organisation, this can
be said that effective planning of the service measures which are taken in consideration by the
organisation. The brief overview ODF the threats that are faced by organisation is presented with
the email to IT department of the selected business organisation in order to look after the risk
factors which are carried out by the organisation for the data security purpose. The effective
content for the evaluation of threat factors by the organisation. Other than this, a reflection
related to major challenges faced to carry out all these tasks is been effectively analysed.
4
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

REFERENCES
Books and Journals
Bertino, E. and Islam, N., 2017. Botnets and internet of things security. Computer. (2). pp.76-79.
Gordon, W.J., Fairhall, A. and Landman, A., 2017. Threats to information security—public
health implications. N Engl J Med. 377(8). pp.707-709.
Konstantinou, C. and et.al., 2015, May. Cyber-physical systems: A security perspective. In 2015
20th IEEE European Test Symposium (ETS) (pp. 1-8). IEEE.
Ramachandran, M., 2016. Software security requirements management as an emerging cloud
computing service. International Journal of Information Management. 36(4). pp.580-
590.
Sheffer, Y., Holz, R. and Saint-Andre, P., 2015. Recommendations for Secure Use of Transport
Layer Security (TLS) and Datagram Transport Layer Security (DTLS) (No. RFC 7525).
Woods, B., Perl, S.J. and Lindauer, B., 2015, October. Data mining for efficient collaborative
information discovery. In Proceedings of the 2nd ACM Workshop on Information
Sharing and Collaborative Security (pp. 3-12). ACM.
5
Books and Journals
Bertino, E. and Islam, N., 2017. Botnets and internet of things security. Computer. (2). pp.76-79.
Gordon, W.J., Fairhall, A. and Landman, A., 2017. Threats to information security—public
health implications. N Engl J Med. 377(8). pp.707-709.
Konstantinou, C. and et.al., 2015, May. Cyber-physical systems: A security perspective. In 2015
20th IEEE European Test Symposium (ETS) (pp. 1-8). IEEE.
Ramachandran, M., 2016. Software security requirements management as an emerging cloud
computing service. International Journal of Information Management. 36(4). pp.580-
590.
Sheffer, Y., Holz, R. and Saint-Andre, P., 2015. Recommendations for Secure Use of Transport
Layer Security (TLS) and Datagram Transport Layer Security (DTLS) (No. RFC 7525).
Woods, B., Perl, S.J. and Lindauer, B., 2015, October. Data mining for efficient collaborative
information discovery. In Proceedings of the 2nd ACM Workshop on Information
Sharing and Collaborative Security (pp. 3-12). ACM.
5
1 out of 7
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2026 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.





