** it is technical report, please using report format!!
Part A ( 1300 words) ** 6 reference within 5 years google scholar) ** need intext reference
Scenario:
In your class, the teaching about Firewall and its working procedures. Now, assume that you have joined the
industry as a network security expert after completing this unit. You need to expand your knowledge by
upskilling and researching related content/materials from online and other relevant sources.
TaskA.1:(Critical Analysis) ** please draft or draw a diagram to answer part of your answer
In that role, your manager asked you to develop a plan for implementing and configuring "a
virtual firewall for the public cloud". As a part of this plan, you need to write a report where you will explore
the benefits of adopting virtual firewall for cloud computing, virtual firewall types, horizon scanning of this
technology considering industry standard tools and present a case study describing the merits and/or
weaknesses, other aspects (if you want to add any).
TaskA.2: (Knowledge Reflection)
In that role, you have also heard that your business is interested about implementing the
emerging "zero trust (ZTA) security architecture (https://www.microsoft.com/en-au/security/business/zero-
trust)". While you are giving a plan on virtual firewall implementation for your business, some people think
that ZTA and Firewalls cannot work together whereas others think that they are complementary! How you will
put your logic/argument and explanation from a security expert's point of view to provide "critical" insights
with proper reasoning and logics and address this issue.
Part B (1300 words)** 6 reference within 5 years(google scholar)** need intext reference
Scenario:
In your class, the teaching you about IDS and loT Networks, Protocols, etc., assume that you have joined a
consultancy firm as a security architect after completing this unit. You need to expand your knowledge by
upskilling and researching related content/materials from online and other relevant sources.
Task B.1: (Critical Analysis) **please draft or draw a diagram to answer part of your answer
In that role, your manager asked you to develop a white paper explaining the concept "Intrusion Detection
System for Industrial Internet of Things (IoT) within Smart Grid". The white paper will inform readers concisely
about your proposed concept and present your philosophy on the matter. The report will include:
A proposed architecture for IDS considering an IoT environment within smart grid. Illustrate the architecture
and its different component, how the data flow will occur, what features are used for IDS, How IDS will
safeguard the network, other security aspects.
Task B.2: (Knowledge Reflection)
Suppose as a security architect, you are heavily dealing with IDS for Internet networks. However, the concept
of the convergence of information technology (IT) and operation technology (OT) is new to you (and of course
to many of your colleagues). However, your manager wants you to cover why IDS for Smart Grid-IoT systems
is different compared to typical network/nand possible solu
Hints
Part A1
Section 1 (Introduction)
•
Explain the importance of cloud security and the need for virtual firewalls
• Briefly outline what the report will cover
Section 2 (Benefits of Adopting Virtual Firewall for Cloud Computing)
• Discuss the advantages of using virtual firewalls in a cloud computing environment
• Highlight how virtual firewalls enhance security, scalability, and flexibility
Section 3( Virtual Firewall Types)
• Describe different types of virtual firewalls available for cloud environments
Differentiate between host-based, network-based, and cloud-native virtual firewalls
Section 4(Industry Standard Tools)
• Discuss industry-standard tools and solutions for implementing virtual firewalls
• Provide insights into emerging technologies and best practices
Section 5 (Case Study)
• Present a real-world case study of an organization that implementing virtual firewalls in their public
cloud infrastructure
• Discuss any additional aspects that were considered during the implementation
Part A2
Section 1 (Introduction)
• Provide an overview of the report's purpose and scope
• Explain the relevance and importance of discussing the integration of ZTA and firewalls
Section 2( Understanding Zero Trust(ZTA) Security Architecture)
Define and explain the core principled and concepts of Zero Trust security
Discuss the objectives and benefits of implementing ZTA in your context
Section 3 (the role Firewalls in Security)
• Describe the traditional role of firewalls in network security in your case
• Highlight the strengths and limitations of firewalls in a dynamic threat environment relevant to
your case
Fig: 1
Fig: 2