Unit: Network Security and Cryptography Assignment Title: Beautiful Bagels Spring 2019
Unit: Network Security and Cryptography Assignment Title: Beautiful Bagels Spring 2019
Important notes
• Please refer to the Assignment Presentation Requirements for advice on how
to set out your assignment. These can be found on the NCC Education
website. Click on ‘Policies & Advice’ on the main menu and then click on
‘Student Support’.
• You must read the NCC Education documents What is Academic
Misconduct? Guidance for Candidates and Avoiding Plagiarism and
Collusion: Guidance for Candidates and ensure that you acknowledge all the
sources that you use in your work. These documents are available on the
NCC Education website. Click on ‘Policies & Advice’ on the main menu and
then click on ‘Student Support’.
• You must complete the Statement and Confirmation of Own Work. The form
is available on the NCC Education website. Click on ‘Policies & Advice’ on
the main menu and then click on ‘Student Support’.
• Please make a note of the recommended word count. You could lose marks
if you write 10% more or less than this.
• You must submit a paper copy and digital copy (on disk or similarly
acceptable medium). Media containing viruses, or media that cannot be run
directly, will result in a fail grade being awarded for this assessment.
• All electronic media will be checked for plagiarism.
Scenario
Beautiful Bagels is a well-established chain of 20 shops throughout the South of England.
There is also a small head office which houses the management and administration team.
This team deals with back-office functions of HR, purchasing, finance, IT and marketing.
Each shop has a permanent full-time manager and the remaining staff are part time. The
chain is run from the central head office and the shop managers have little say over what
their shop sells or how it is run. However, they are responsible for stock management and
any variations to standard orders.
The company has a simple responsive web-site for marketing purposes, enabling
locations of cafes to be found. It is hosted by their ISP.
Current Technology
Beautiful Bagels has been trading for over 20 years, and whilst it has updated various
aspects of its IT systems, its IT architecture reflects a pre-cloud model.
Each shop has an EPOS system which connects to a PC and local printer, to provide
some basic reports. The PC is also connected to the Internet via Cat-5 cable and a router.
Card payments are processed via WorldPay through a Wi-Fi portable card reader. The Wi-
Fi uses 802.11n.
The head office has a 100BASE-TX LAN connected via a router to the Internet. This
contains a server which is configured as a domain controller running Windows Server
2008 R2 which hosts financial systems (Sage), order processing, email (Microsoft
Exchange) and human resources (employee) data. Office staff have PCs running
Windows 10 professional. All computers have individual host-based firewalls and anti-virus
software installed.
The company has a content management system (WordPress) website for marketing with
a contact form and blog, which is also hosted by their ISP. Marketing staff access the site
via a web portal and update the news and blog on a regular basis.
Like many other eateries, Beautiful Bagels offers free Internet access whilst you are
visiting. However, the CEO recently read an article about the security dangers for the
public in using open Wi-Fi hotspots. The article explained how a hacker could set up a
small black device with an antenna on it, called a Wi-Fi pineapple that connected to a
laptop PC.
The Wi-Fi pineapple can act as a "Hot-spot Honeypot" that attracts the tablets,
smartphones and laptops looking to connect to Wi-Fi, making users believe they are
actually connecting to the network of the place they’re visiting. Visitors’ internet
connections are therefore intercepted.
The article emphasized that digital identity fraud is an increasingly common problem. The
prevalence of open, unprotected Wi-Fi networks does make it extremely easy for
Cybercriminals. Furthermore, the device with a rechargeable lithium battery and magnets
on the back could be attached to many surfaces in public spaces. The box also could
easily be designed to plug into a hidden wall outlet under a hotel hallway bench, for
instance.
The final piece of advice in the article was simply “It is not advisable to use open WiFi
networks in public places”.
a) Analyse the scenario and identify FIVE (5) important electronically held information
assets relating to Beautiful Bagels.
b) Create a table (see below) which lists the assets. For each asset identify the main
security threats that you think could affect its confidentiality (C), integrity (I) or
availability (A). Remember, threats can be accidents as well as malicious. There are
likely to be multiple threats for each asset and the same threats are likely for several
assets.
Asset (a) Threat (b) CIA? (b) Likelihood (c) Impact (c) Risk (d)
c) Complete the columns of the table by assessing the likelihood of the threat being
successful and the impact that it would have on the company. In this scenario, you
should consider Low/Medium and High definitions as follows:
Likelihood Impact
Inconvenience may affect operation for
Low Less than once per year
a day or two
Once per year to once Operation may be impacted for over a
Medium
per week week, loss of customers.
Company may not survive – lost
High Several times a week
reputation and customers
d) Now complete the Risk column by using the following Risk matrix.
Impact
Low Medium High
Low Very Low Low Medium
Likelihood
Medium Low Medium High
High Medium High Very High
Submission requirements
• The report should be professionally presented, checked and proofed. In addition,
the report should be presented in a format and style appropriate for your intended
audience. You must also include a list of references and you must always use
correct Harvard referencing and avoid plagiarism throughout your work.
• Your answers to the tasks should be combined in a single word-processed report
with an appropriate introduction. The report should be 1750 words +/- 10% in
length (excluding tables).
• All references and citations must use the Harvard Style.
• You must submit a paper copy and digital copy (on disk or similarly acceptable
medium).
Candidate checklist
Please use the following checklist to ensure that your work is ready for submission.
Have you completed the Statement and Confirmation of Own Work form
and attached it to your assignment? You must do this.
Have you ensured that your work has not gone over or under the
recommended word count by more than 10%?