Angkatan Tentera Malaysia (ATM) is the armed forces of Malaysia,… Angkatan Tentera Malaysia (ATM) is the armed forces of Malaysia, consists of three branches, namely the Malaysian Army, Royal Malaysian Navy and the Royal Malaysian Air Force. ATM has more than 100,000 active personnel located nationwide and even worldwide. It is very critical for ATM to have a highly secure network connections for these locations. The network is not only used for country’s safety purposes system (weapons inventory system, assets mobilization system etc) but also for less-critical internal system such as payroll system, attendance system etc. As the Network Security Manager for ATM, your tasks are to: Provide ATM’s background in terms of network management including the business operations (eg. running 24/7, multiple data centres) and the security needs (eg. secure environment for its personnel) of the ATM’s network.Analyse THREE possible internal attacks that can be launched at ATM. In your analysis, provide the following for each of the internal attacks identified:Description of the internal attackExample scenario on how the attack is launchedSecurity measure to eliminate the attackAnalyse THREE possible external attacks that can be launched at ATM. In your analysis, provide the following for each of the external attacks identified:Description of the external attackExample scenario on how the attack is launchedSecurity measure to eliminate the attackProvide the importance of implementing controls against network attacks based onPreventive control to be implemented in ATM with appropriate exampleDetective control to be implemented in ATM with appropriate exampleCorrective control to be implemented in ATM with appropriate examplePropose and discuss THREE key aspects (security controls) of approaching towards a good cyber security for ATM to prevent ethical issues on network securityDescription of the key aspect (security control) Provide appropriate example in relation to ethical issues on network security Rubrics 1. IntroductionAngkatan Tentera Malaysia (ATM) background in terms of network management including the business operations (eg. running 24/7, multiple data centres). Description about the security needs of ATM (You may use your creative imagination here).2. Discussion on THREE types of internal network attacks that can be launched in ATM:Description of the internal attackExample scenario on how the attack is launchedSecurity measure to eliminate the attack3. Discussion on THREE types of external network attacks that can be launched in ATM :Description of the external attackExample scenario on how the attack is launchedSecurity measure to eliminate the attack4. Discussion about the importance of implementing controls against network attacks based on:Preventive control to be implemented in ATM with appropriate exampleDetective control to be implemented in ATM with appropriate exampleCorrective control to be implemented in ATM with appropriate example 5. Propose and discuss THREE key aspects (security controls) of approaching towards a good cyber security for ATM to prevent ethical issues on network securityDescription of the key aspect (security control) Provide appropriate example in relation to ethical issues on network security6. ConclusionSummarize the important points discussedComputer Science Engineering & Technology Networking IT CBSN4103
You will get a plagiarism-free paper and you can get an originality report upon request.
All the personal information is confidential and we have 100% safe payment methods. We also guarantee good grades
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.
Read moreEach paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.
Read moreThanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.
Read moreYour email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.
Read moreBy sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.
Read more