Best代写-最专业靠谱代写IT | CS | 留学生作业 | 编程代写Java | Python |C/C++ | PHP | Matlab | Assignment Project Homework代写

IT网络任务代写|Assignment 1 – IT Forensics 2023

IT网络任务代写|Assignment 1 – IT Forensics 2023



The CEO of a consulting IT company has asked you to design the company’s network. She has asked you to be prepared as much as possible for the next 10 years in terms of IT equipments and being prepared for forensic investigations and cyber attacks. The company’s infrastructure is to stay like what you have designed for the next 10 years. The company has one headquarter and it has X-1 branch offices in different cities, some national and some international ones. The number X that is representing the total number of branches (including headquarters) depends on your student ID. The main office and each branch has exactly 40 employees. Each employee is exactly equipped with one single workstation. You may also have a working from home (WFH) option for employees in your diagram (based on your student ID).

How to choose X: Calculate your student ID modulo 6 plus 1, the result is X. Example student ID: 1234567 and

X = (1234567 mod 6) +1 = 1 + 1 = 2.

The student with ID 1234567 should work with a company network that consists of X=2 branches, that is one headquarter and X-1=1 branches1 . Each of these X branches can accommodate exactly 40 workstations each of which is allocated to exactly one employee.

How to see if the CEO has allowed WFH or not: If your student ID is an even number, the CEO would not allow WFH. If your student ID is an odd number, she has allowed WFH.

You have to use the empty layout given to you and add more branches to it and integrate by yourself. The following servers of the company are to be located in a proper place.

  1. Database server (inaccessible to public)
  2. Application/web server (public)
  3. File server (inaccessible to public)
  4. Email server (inaccessible to public)

Based on your specific X you have to design a network diagram by using only various options given in the legend of the empty diagram and answer questions 1-4 below.

1) Server Farm Location, WAN connections, and Internet connection (3 options)

You have to decide where to put the server farm. First, decide about the location of the company’s server farm. You have four different options: in the main office, on the cloud, in the data center, or a hybrid choice (data center + cloud). You can use the icons in the legend to put the servers in the desired location. Second, decide about the WAN connection and draw the connections in your diagram (including the routers) between the headquarter, branches, and the location of the server farm (based on the legend, you have two choices for WAN connections, MPLS or Internet). Finally,decide about the Internet connection to your company/server farm, which has been shown as a red cloud in the empty diagram. Justify your choices in all these steps according to your network size and forensic readiness.

Note: The difference between “Cloud” and “Data Center” for us is that a cloud is public but a data centre is owned by the company and can act as a private cloud. In fact, A public cloud for a company is a cloud that is not owned by the company itself.

It is owned by a third party. In contrast, a private cloud (a data centre) is something that the company can build for itself, own and manage forever. ((2+4)*2+1=13 marks)

2) AAA server location, SIEM server location, VPN, SSL Terminator, and Firewall (5 options)

Now, you have a complete diagram with all connections and the company’s servers’ location specified. First, decide about the location of AAA (authentication, authorization, and accounting) Server and SIEM (Security information and event management) Server. Second, use Firewall, VPN, and SSL terminator, if needed, to provide security. Justify all your 5 choices based on your network size and forensic readiness. For the tools that need a start and endpoint like VPN, use the tool for the start and endpoint, and determine these by numbers, e.g., one VPN connection has a start point of VPN1 and endpoint of VPN1’. ((2+4)*5=30 marks)

3) Enterprise Defence System (6 options)

Develop a more detailed cyber system defence mechanism for the enterprise considering all 6 tools: Web Application Firewall (WAF), Web filtering, Malware filtering, SSL inspection, IDS/IPS, and Email security.

Their icons have been given in the legend. Use the icons to complete your diagram,some of them can be enabled on the firewall, mention each of them you use by using the icon. Based on your design, you may not use all the tools listed in the legend of your network, though. If you decide to use any of these, specify its location and justify your choice according to the size of your network and forensic readiness. If you decide not to use any of these, explain why you have not used it. ((2+5)*6=42 marks)

4) Cost Estimation and Justification

Based on your design, estimate the cost to implement the defence system and maintain the system for 10 years. Break down the tasks and put references whenever necessary if you are referring to any specific product or service. Your cost estimates should be proportionate to the size of your network. (10 marks)

5) Structure, Look, and Referencing

5 marks are allocated to the report structure (2 marks), look (2 marks) and proper referencing (1 mark). Keep in mind you are preparing the report for your CEO not the teaching team. (5 marks)