CP2414 Assignment 1
Safety guidelines
WARNING: This isn’t a gaggle mission. Every pupil should individually full all components of their submission.
College students should begin with a brand new doc they usually should not have one other individual’s file of their possession at any time. College students could focus on the duty with one another, however every pupil should write their project independently and never present their work to different college students.
Introduction:
This project has been divided into two (2) components:
Half I – Establish and analyse threats to an organization. Additionally, analysis and supply applicable gadgets/software program justifying decisions (feasibility, effectivity, and so on.).
Half II – Design a secured community.
Half III – Quotation and Referencing.
Deliverables:
1. A single Phrase doc (.docx) – containing all components.
2. Font – Calibri 11, Line Spacing 1.5
three. Use IEEE referencing, see https://libguides.jcu.edu.au/IEEE
NOTE: The project template may be discovered on the finish of this project sheets.
State of affairs:
An Asian medical analysis firm, TheNEWMED, has grown involved by the worldwide rise in cybercrime and ransomware.
They’ve requested you to:
• For all branches – Establish and analyse software and networking-based threats to their firm; and
• For the Singapore department solely – advocate preventative and mitigative applied sciences and techniques for potential intrusion and assaults on the community.
In regards to the firm:
TheNEWMED is a rising medical analysis firm consisting of two branches: The Singapore (important) department and the Jakarta department. Every department has 5 departments and there are roughly 65 staff per division. The Singapore department has 2 mail servers, three net servers, and three database servers. The Indonesia department is a smaller department and so it has solely 1 mail server and 1 database server.
All branches have high-speed networks; nonetheless, the site visitors may be fairly heavy on weekdays. That is very true for the Singapore department.
Half I. Potential Threats
You’ve been supplied with a listing of complaints from staff in regards to the workstations at TheNEWMED:
• Grievance 1 (Sue Allen): My pc takes a very long time to begin up and shut down. It looks like there are different packages which I don’t use working once I begin my pc as nicely.
• Grievance 2 (Tom Cally): I believe my system is contaminated as a result of I’ve bought clients and colleagues informing me that I’ve been sending them emails, that is very bizarre as a result of my job doesn’t actually concern sending out emails to my colleagues, not to mention clients.
• Grievance three (Christina Sam): I usually get the blue display of demise; my workstation retains crashing. I discovered it to be so irritating.
• Grievance four (M Louise): It takes ceaselessly to obtain a file from the corporate servers. It doesn’t even matter what the dimensions or sort of the file are.
• Grievance 5 (Richard Lee): I get a number of pop-ups on my display; I’ve by no means visited any unhealthy (inappropriate) web sites.
• Grievance 6 (Joe Oliver): The fan in my pc is simply so loud. It appears to be spinning actually quick and on a regular basis. Even when I’m not utilizing it.
• Complain 7 (All staff): Problem accessing the web site, mail and database servers.
From the complaints above, you’re required to analyse and establish the menace/s (if there are any). It’s essential to additionally make a advice on methods and applied sciences (i.e. hardware and software program) to stop and mitigate the issues.
IMPORTANT NOTE: You’re wanted to investigate and establish the menace(s) primarily based on the complaints offered above (if there are any). A recommendation on strategies and applied sciences (i.e., pc hardware and software program) to stop and alleviate the difficulties should even be included.
NOTE OF IMPORTANCE:
The menace Assessment and identification ought to solely contain community safety, not hardware or software program, in keeping with the next rule: 1.
The complaints could also be associated to at least one one other, which is a risk.
Persevering with with Half II. Planning and design of community safety applied sciences corresponding to firewalls, honeypots, and different community safety applied sciences for the Singapore department
1. Your menace Assessment and identification ought to ONLY concern community safety and NOT hardware or software program.
2. It’s doable that the complaints are linked to at least one one other.
Half II. Firewall, Honeypot/s, and Different Community Safety Applied sciences Planning and Design for Singapore Department
Using firewalls, honeypots, and different community safety applied sciences may be an efficient technique of defending the corporate networks. As such, you’re required to design a community safety configuration for the Singapore department of the corporate. You may make assumptions, however clearly state your assumptions within the report. You will have to think about the prevailing gadgets (see “In regards to the firm” – Singapore department ONLY), the hardware/software program options you advisable in Half I, and extra honeypot/s.
You’re required to:
1. Draw your proposed safe community diagram, together with:
a. Firewall/s
b. Different Community Safety Applied sciences (hardware and/or software program)
c. Honeypot/s
d. Present gadgets (e.g. servers, workstations, router, switches)
2. Clarify and justify the configuration diagram with respect to:
a. The kind and placement of every firewall;
b. The honeypot location/s and amount;
c. The position and goal of every piece of hardware/software program.
Half III. Use appropriate IEEE referencing type, see https://libguides.jcu.edu.au/IEEE.
Recommended Report Construction/Template
For the very best marks doable, it’s best to READ THE RUBRIC and submit your report utilizing the next proposed construction:
Half I. Potential Threats For every worker grievance:
Grievance [number] – [name]:
• Establish the issue/s acknowledged by the worker/s.
• [Identified threat/s] – [Discussion and comprehensive explanation for the identified threat/s]
• Answer – [Recommended solution for threat] Overarching Menace:
[If an overarching threat exists you should discuss this here. See IMPORTANT NOTE]
Half II. Firewall/s, honeypot/s, and different community safety applied sciences Planning and Design
• Diagram
• Clarification and justification of the proposed configuration.
Finish of Assignment 1

Published by
Write
View all posts