{"id":907,"date":"2016-03-14T19:34:37","date_gmt":"2016-03-14T08:34:37","guid":{"rendered":"http:\/\/casestudyhelp.com\/sample-questions\/?p=907"},"modified":"2018-01-24T18:40:48","modified_gmt":"2018-01-24T07:40:48","slug":"iti-581-security-fundamentals-assignment-help","status":"publish","type":"post","link":"https:\/\/casestudyhelp.com\/sample-questions\/iti-581-security-fundamentals-assignment-help\/","title":{"rendered":"ITI 581 Security Fundamentals Assignment Help"},"content":{"rendered":"<h2 style=\"text-align: center;\"><span style=\"text-decoration: underline;\"><span style=\"color: #ff6600; text-decoration: underline;\">CCA Pty Ltd Case Study<\/span><\/span><\/h2>\n<div style=\"text-align: justify;\" data-canvas-width=\"662.1608000000002\">Your report should detail the following section and points below commensurate with the\u00a0marks\u00a0allocated\u00a0and be addressed primarily to the management of CCA Pty Ltd\u00a0who are not\u00a0security or IT\u00a0experts. Some issues<\/div>\n<div style=\"text-align: justify;\" data-canvas-width=\"31.703199999999995\">may\u00a0require the acquisition of new software and hardware; you\u00a0should identify\u00a0suitable products that could be used to resolve the issues. Your proposal\u00a0should\u00a0adhere to industry\u00a0security\u00a0best practise and produce a secure and functional\u00a0network installation\u00a0for CCA\u00a0Pty Ltd<\/div>\n<div data-canvas-width=\"31.703199999999995\">\n<div style=\"text-align: justify;\" data-canvas-width=\"209.06079999999997\">Addressing Identified Issues\u00a0(35\u00a0marks)<\/div>\n<div data-canvas-width=\"209.06079999999997\">\n<div style=\"text-align: justify;\">\uf0b7\u00a0Vulnerabilities should be ranked based on a simple risk assessment methodology<\/div>\n<div style=\"text-align: justify;\">\uf0b7\u00a0Consider any\u00a0necessary changes\u00a0you think appropriate\u00a0to\u00a0the\u00a0network design<\/div>\n<div style=\"text-align: justify;\">\uf0b7\u00a0Consider any\u00a0necessary changes\u00a0you think\u00a0to\u00a0the\u00a0server and client deployment<\/div>\n<div style=\"text-align: justify;\">\uf0b7\u00a0Identify appropriate remediation for each identified issue and explain fully in language\u00a0appropriate for the customer<\/div>\n<div>\n<div style=\"text-align: justify;\" data-canvas-width=\"205.93280000000001\">Implicit\/Unidentified Issues\u00a0(20marks)<\/div>\n<div style=\"text-align: justify;\">\uf0b7Vulnerabilities should be ranked based on a simple risk\u00a0assessment methodology<\/div>\n<div style=\"text-align: justify;\">\uf0b7Consider any\u00a0necessary changes\u00a0you think appropriate\u00a0to\u00a0the\u00a0network design<\/div>\n<div style=\"text-align: justify;\">\uf0b7Consider any\u00a0necessary changes\u00a0you think\u00a0to\u00a0the\u00a0server and client deployment<\/div>\n<div style=\"text-align: justify;\">\uf0b7Identify appropriate remediation for each identified issue and explain fully in language\u00a0appropriate for the customer<\/div>\n<div>\n<div style=\"text-align: justify;\" data-canvas-width=\"150.30960000000002\">Policy Development\u00a0(25marks)<\/div>\n<div style=\"text-align: justify;\" data-canvas-width=\"704.2967999999995\">Develop basic polices need to better secure the network; as a minimum the following should be<\/div>\n<div style=\"text-align: justify;\" data-canvas-width=\"84.6768\">considered:<\/div>\n<div style=\"text-align: justify;\" data-canvas-width=\"84.6768\">\uf0b7Password\u00a0Policy<\/div>\n<div style=\"text-align: justify;\">\uf0b7Acceptable Network Usage\u00a0Policy<\/div>\n<div style=\"text-align: justify;\">\uf0b7Acceptable Internet Usage\u00a0Policy<\/div>\n<div style=\"text-align: justify;\">\uf0b7Acceptable Email Usage\u00a0Policy<\/div>\n<div>\n<div style=\"text-align: justify;\" data-canvas-width=\"118.47759999999998\">Network Design\u00a0(10\u00a0marks)<\/div>\n<div style=\"text-align: justify;\">\uf0b7\u00a0Provide a detailed network diagram showing your proposal<\/div>\n<div style=\"text-align: justify;\">\uf0b7You\u00a0may\u00a0want to consider multiple diagrams to separate physical &amp; logical components<\/div>\n<div style=\"text-align: justify;\" data-canvas-width=\"94.81519999999999\">Presentation(10Marks)<\/div>\n<div style=\"text-align: justify;\">\uf0b7Grammar &amp; spelling<\/div>\n<div style=\"text-align: justify;\">\uf0b7Report format<\/div>\n<div style=\"text-align: justify;\">\uf0b7Overall presentation<\/div>\n<div style=\"text-align: justify;\">\uf0b7Appropriate referencing for a customer report\u00a0This assessment will be worth 40% of your final assessment<\/div>\n<div>\n<div style=\"text-align: justify;\" data-canvas-width=\"378.49499999999995\">CCA Pty Ltd Case Study Information<\/div>\n<div style=\"text-align: justify;\" data-canvas-width=\"85.96479999999998\">CCA Pty Ltd\u00a0are suppliers and publishers of printed media primarily for the enterprise IT training<\/div>\n<div style=\"text-align: justify;\" data-canvas-width=\"690.8095999999999\">industry. Products include course manuals, test booklets and IT technology reference books.<\/div>\n<div style=\"text-align: justify;\" data-canvas-width=\"299.8832000000001\">All of their sales are currently done via e-mail or direct contact with customers.\u00a0CCA Pty Ltd\u00a0has\u00a0recently upgraded<\/div>\n<div style=\"text-align: justify;\" data-canvas-width=\"164.31199999999998\">their Internet connect\u00a0ion to\u00a0ADSL2+on a 250GB pcm plan in\u00a0order to cater for the future possibility of having an online store.\u00a0You have been hired as a network security consultant to advise on security issues as a result<\/div>\n<div style=\"text-align: justify;\" data-canvas-width=\"48.502399999999994\">of the\u00a0recent re-structuring of the network.\u00a0The\u00a0customer\u00a0would\u00a0also\u00a0like to investigate the option of\u00a0publishing their product online and be able to receive orders via a web application. They don\u2019t need\u00a0specific recommendations with respect to products but they would like some generic ideas on how\u00a0to accomplish these goals.\u00a0The following is a set of notes that have been\u00a0gathered by the lead consultant and you, as a junior\u00a0consultant\u00a0,\u00a0must now analyse these and<\/div>\n<div style=\"text-align: justify;\" data-canvas-width=\"436.94479999999993\">complete a report to be presented by the Lead Consultant\u00a0to the customer:<\/div>\n<div style=\"text-align: justify;\" data-canvas-width=\"436.94479999999993\">Network Details :<\/div>\n<div data-canvas-width=\"436.94479999999993\">\n<div style=\"text-align: justify;\" data-canvas-width=\"543.2968\">The following are the network details as reported by the lead consultant.\u00a0Broadband Router<\/div>\n<div style=\"text-align: justify;\">\uf0b7Billion BiPAC 7700N R2<\/div>\n<div style=\"text-align: justify;\">\uf0b7Out of the box installation with only authentication details configured\u00a0Gateway Server\u00a0This machine has been deployed as\u00a0the egress point of the network to the Internet.\u00a0It was installed\u00a0by the CEOs 20 year old\u00a0son who is studying his third\u00a0year of a computer science degree.\u00a0The\u00a0server\u00a0is running\u00a0pfSense 2.0.3\u00a0as its operating system and has been installed using default options in the\u00a0main.\u00a0No\u00a0further hardening on the O\/S has been performed.<\/div>\n<div style=\"text-align: justify;\" data-canvas-width=\"219.2728\"><strong>Configuration Information<\/strong><\/div>\n<div data-canvas-width=\"219.2728\">\n<div style=\"text-align: justify;\" data-canvas-width=\"90.47279999999999\">ntel Core i5-4440 processor<\/div>\n<div data-canvas-width=\"90.47279999999999\">\n<div class=\"textLayer\">\n<div style=\"text-align: justify;\">\uf0b74GBRAM<\/div>\n<div style=\"text-align: justify;\">\uf0b7250GB Serial ATA HDD<\/div>\n<div style=\"text-align: justify;\">\uf0b72 x10\/100\/1000Intel Network CardoExternal IP Address: 244.100.100.22(ISP Provided)oInternal IP address:<\/div>\n<div style=\"text-align: justify;\" data-canvas-width=\"78.91759999999998\">10.10.40.1<\/div>\n<div style=\"text-align: justify;\">\uf0b7Services Installed<\/div>\n<div style=\"text-align: justify;\">oNAT Overload<\/div>\n<div style=\"text-align: justify;\">oDNS Forwarder<\/div>\n<div style=\"text-align: justify;\">oProxy Server<\/div>\n<div style=\"text-align: justify;\">oSPI Firewall<\/div>\n<div style=\"text-align: justify;\">oSupport for only IPv4<\/div>\n<div style=\"text-align: justify;\">oDHCP Server<\/div>\n<div style=\"text-align: justify;\">\uf0a7DHCP Scope range:<\/div>\n<div style=\"text-align: justify;\" data-canvas-width=\"104.45679999999996\">10.10.40.0\/24<\/div>\n<div data-canvas-width=\"104.45679999999996\">\n<div style=\"text-align: justify;\" data-canvas-width=\"126.29759999999999\">Windows 2012<\/div>\n<div style=\"text-align: justify;\" data-canvas-width=\"138.0552\">Database Server\u00a0This\u00a0server\u00a0is maintained currently by\u00a0an external database contractor<\/div>\n<div style=\"text-align: justify;\" data-canvas-width=\"8.758366666666666\">.\u00a0The contractor has asked for\u00a0remote access to manage the server remotely instead of attending site.<\/div>\n<div style=\"text-align: justify;\" data-canvas-width=\"219.2728\">Configuration Information<\/div>\n<div style=\"text-align: justify;\" data-canvas-width=\"219.2728\">\uf0b7Intel Core i7<\/div>\n<div style=\"text-align: justify;\">\uf0b78GB\u00a0RAM<\/div>\n<div style=\"text-align: justify;\">\uf0b72&#215;500\u00a0GB Serial ATA HDD<\/div>\n<div style=\"text-align: justify;\">oConfigured RAID 1<\/div>\n<div style=\"text-align: justify;\">\uf0b710\/100\/1000Intel Network Card<\/div>\n<div style=\"text-align: justify;\">oInternal IP address:\u00a010.10.40.20\/24<\/div>\n<div style=\"text-align: justify;\">\uf0b73TB External\u00a0drive used for backups<\/div>\n<div style=\"text-align: justify;\">\uf0b7Softwareo\u00a0Windows 2012 Server R2Standard 64-bit\u00a0(patch level unknown)<\/div>\n<div style=\"text-align: justify;\">oMicrosoft SQL Server Standard 2014(patch level unknown)<\/div>\n<div style=\"text-align: justify;\">oIIS Installed for internal intranet<\/div>\n<div>\n<div style=\"text-align: justify;\" data-canvas-width=\"126.29759999999999\">Windows 2012\u00a0File Server\u00a0The\u00a0file\u00a0server was installed\u00a0about 2\u00a0years ago and has never been rebooted. Its primary role is the\u00a0sharing\u00a0of internal\u00a0documents and printer sharing. The IT provider that installed the system has<\/div>\n<div style=\"text-align: justify;\" data-canvas-width=\"408.68240000000003\">since gone out of business and the server has not been\u00a0actively supported for nearly 12 months\u00a0.<\/div>\n<div style=\"text-align: justify;\" data-canvas-width=\"219.2728\">Configuration Information<\/div>\n<div style=\"text-align: justify;\">\uf0b7Intel Core i7<\/div>\n<div style=\"text-align: justify;\">\uf0b716GBRAM<\/div>\n<div style=\"text-align: justify;\">\uf0b74x250GB Serial ATA HDD<\/div>\n<div style=\"text-align: justify;\">oConfigured hardware RAID 5<\/div>\n<div style=\"text-align: justify;\">\uf0b710\/100\/1000Intel Network Cardo<\/div>\n<div style=\"text-align: justify;\">Internal IP address: 10.10.40.21\/24<\/div>\n<div style=\"text-align: justify;\">\uf0b72x3TB external drives used for backups<\/div>\n<div style=\"text-align: justify;\">\uf0b7Software\u00a0oWindows 2012ServerR2 Standard 64-bit(patch level unknown)<\/div>\n<div style=\"text-align: justify;\">\uf0b7Provides AD services through the domain \u201cCCA\u201dClient PC Details<\/div>\n<div>\n<div style=\"text-align: justify;\" data-canvas-width=\"62.81759999999999\">There are 25\u00a0computers\u00a0in the organisation that are relatively new<\/div>\n<div style=\"text-align: justify;\" data-canvas-width=\"207.71759999999998\">. They are all identical with\u00a0respect to hardware and\u00a0installed\u00a0software.<\/div>\n<div data-canvas-width=\"207.71759999999998\">\n<div style=\"text-align: justify;\" data-canvas-width=\"219.2728\">Configuration Information<\/div>\n<div style=\"text-align: justify;\">\uf0b7Intel Celeron J1800 2.58GHz<\/div>\n<div style=\"text-align: justify;\">\uf0b72GBRAM<\/div>\n<div style=\"text-align: justify;\">\uf0b7128Gb SSD<\/div>\n<div style=\"text-align: justify;\">\uf0b710\/100\/1000Intel Network Card<\/div>\n<div style=\"text-align: justify;\">\uf0b7Windows8.1 64-bit(patch level unknown)<\/div>\n<div style=\"text-align: justify;\">\uf0b7Office 2010\u00a0Professional<\/div>\n<div style=\"text-align: justify;\">\u2013standard installation<\/div>\n<div style=\"text-align: justify;\">\uf0b7All applications are run locally<\/div>\n<div style=\"text-align: justify;\">\uf0b7Various browsers are used for web access<\/div>\n<div style=\"text-align: justify;\">oIE<\/div>\n<div style=\"text-align: justify;\">oFirefox<\/div>\n<div style=\"text-align: justify;\">oOpera<\/div>\n<div style=\"text-align: justify;\">\uf0b7All PCs\u00a0can access the Internet unrestricted.<\/div>\n<div style=\"text-align: justify;\">\uf0b7The machines have varying desktop configurations.<\/div>\n<div style=\"text-align: justify;\">\uf0b7Level of maintenance\u00a0is poor<\/div>\n<div style=\"text-align: justify;\">.<\/div>\n<div style=\"text-align: justify;\">\uf0b7Patch levels unknown but likely never been patched.<\/div>\n<div style=\"text-align: justify;\">\uf0b7No AV software installed<\/div>\n<div>\n<div style=\"text-align: justify;\" data-canvas-width=\"73.26879999999998\">Network<\/div>\n<div style=\"text-align: justify;\">\uf0b7All of the Servers, PCs and the ADSL modem connect to a single<\/div>\n<div style=\"text-align: justify;\" data-canvas-width=\"18.528766666666662\">48portCisco 2960 switch.<\/div>\n<div style=\"text-align: justify;\" data-canvas-width=\"18.528766666666662\">oNo configuration done on the device out of the box.<\/div>\n<div style=\"text-align: justify;\">\uf0b7IP addresses are received from the pfSense server using the range detailed earlier under the<\/div>\n<div style=\"text-align: justify;\" data-canvas-width=\"163.024\">pfSense configuration.<\/div>\n<div style=\"text-align: justify;\">\uf0b7Cabling is UTP Cat5 withdual24 port patch panels\u00a0located in the server room<\/div>\n<div>\n<div id=\"pageContainer4\" class=\"page\" style=\"text-align: justify;\" data-loaded=\"true\" data-page-number=\"4\">\n<div class=\"textLayer\">\n<div data-canvas-width=\"52.86319999999999\">Other\u00a0Details<\/div>\n<div>\uf0b7Servers are all located in a small (3m x 3m) server room located in the back corner of the\u00a0open place office space.<\/div>\n<div>oThis room is generally locked. There are 5\u00a0known keys for the door but not all keys\u00a0are accounted for. Known key holders are the CEO, the CEOs son and the HR\u00a0Manager.<\/div>\n<div>oThere is a small A\/C unit that provides cooling to this room with temperatures<\/div>\n<div data-canvas-width=\"161.25759999999994\">generally between 26-27 degrees celcius.<\/div>\n<div>oThere is currently no working UPS power.<\/div>\n<div>oThe switch, patch panels and DSL router are also all in this room.<\/div>\n<div>oThere is a 10RU communications rack on the wall of the server room that houses the<\/div>\n<div data-canvas-width=\"271.38159999999993\">switch, patch panels and DSL router.<\/div>\n<div>oThe servers are located free standing\u00a0on a large cupboard on the opposite side of\u00a0the server room from the communications rack.<\/div>\n<div>oCables cross the carpet between the servers and the communications rack and are\u00a0taped using heavy tape to the floor.<\/div>\n<div>oA single monitor, keyboard and mouse is shared\u00a0between all of the servers but no\u00a0KVM is used.<\/div>\n<div>\uf0b7Backups are\u00a0performed\u00a0daily\u00a0on the file and SQL servers using an automated copy process\u00a0that copies everything to the external hard drives.<\/div>\n<div>oNo verification of backup is done.<\/div>\n<div>\uf0b7All users have administrator access to their PCs.<\/div>\n<div>\uf0b7Users have full admin rights to the database server.<\/div>\n<div>\uf0b7The admin credentials for the pfSense server are currently unknown.<\/div>\n<div>\uf0b7There is no administrator access to the file server as the password has been lost and the IT<\/div>\n<div data-canvas-width=\"190.56879999999998\">contractor who installed it is now out of business.<\/div>\n<\/div>\n<\/div>\n<div style=\"text-align: justify;\">\uf0b7All staff share a single domain account\u00a0to simplify access rights to files.<\/div>\n<div style=\"text-align: justify;\">o\u201cCCA_User\u201d<\/div>\n<div style=\"text-align: justify;\">oPassword: P@ssw0rd1<\/div>\n<div style=\"text-align: justify;\">\uf0b7The external domain cca.com.au is hosted by the ISP.<\/div>\n<div style=\"text-align: justify;\">\uf0b7Only reception staff have access to e-mail accounts which are hosted by the ISP.<\/div>\n<div style=\"text-align: justify;\">\uf0b7Since installing ADSL2+they have been receiving up to 150\u00a0spam messages a day\u00a0each.<\/div>\n<div style=\"text-align: justify;\">\uf0b7No documentation of systems or configurations available on demand.<\/div>\n<div style=\"text-align: justify;\">\uf0b7No visible policy documentation,upon query-none developed.<\/div>\n<div style=\"text-align: justify;\">\uf0b7Firewall rules are unknown and\u00a0should be created from scratch.<\/div>\n<div style=\"text-align: justify;\">\uf0b7No IDS or VPN capability installed.<\/div>\n<div style=\"text-align: justify;\">\uf0b7Database server access is performed across plaintext tunnels.<\/div>\n<div style=\"text-align: justify;\">\uf0b7Web Services do not provide SSL<\/div>\n<div style=\"text-align: justify;\">\uf0b7AV software on servers is\u00a0also\u00a0unknown.<\/div>\n<div style=\"text-align: justify;\">\uf0b7There 6 various laser printers dotted around the\u00a0office.<\/div>\n<div style=\"text-align: justify;\">oThey are all network capable.<\/div>\n<div style=\"text-align: justify;\">o2 are currently attached to the network, 4 are connected directly to PCs<\/div>\n<div style=\"text-align: justify;\">\uf0b7The customer would like to investigate deploying a web server on their own network in\u00a0order to service customer orders directly but would like so\u00a0me advice and suggestions on\u00a0how to do this.<\/div>\n<div style=\"text-align: justify;\">\uf0b7The customer would also like to implement wireless access to the network for\u00a0visitors and\u00a0staff alike but have no idea how to do this. You will need to provide some basic\u00a0recommendations on how to do this and include it in your overall design.<\/div>\n<div>\n<p><em><strong>Please CHAT WITH LIVE Assignment Advisor to\u00a0get assignment help at low price<\/strong><\/em><\/p>\n<p style=\"text-align: justify;\" align=\"center\"><a href=\"https:\/\/casestudyhelp.com\/MyOrder.php\"><img decoding=\"async\" src=\"https:\/\/casestudyhelp.com\/images\/hire-best-assignment-experts-online.gif\" alt=\"Hire Your Assignment Writing Expert for Collage\/University\" \/><\/a><\/p>\n<p style=\"text-align: center;\"><strong>Chat with our 24 x 7 Online Agents CLICK CHAT NOW<\/strong><\/p>\n<p style=\"text-align: center;\"><strong>Ask Your\u00a0<a title=\"IT Management Assignment Question\" href=\"https:\/\/casestudyhelp.com\/mba\/it-management-assignment-help.html\" target=\"_blank\">IT Management Assignment Question<\/a><\/strong><strong><strong>?<\/strong><\/strong><br \/>\n<strong>Check out our\u00a0<a title=\"Fundamentals Assignment Help Services\" href=\"https:\/\/casestudyhelp.com\/sample-questions\/iti-581-security-fundamentals-assignment-help\/\" target=\"_blank\">Fundamentals Assignment Help Services<\/a><\/strong><br \/>\n<strong>Find Your\u00a0<a title=\"MBA Assignment Experts\" href=\"https:\/\/casestudyhelp.com\/mba\/\" target=\"_blank\">MBA Assignment Experts<\/a><\/strong><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<script type=\"text\/javascript\" charset=\"utf-8\" src=\"http:\/\/w.sharethis.com\/widget\/?wp=6.2.9\"><\/script>","protected":false},"excerpt":{"rendered":"<p>CCA Pty Ltd Case Study Your report should detail the following section and points below commensurate with the\u00a0marks\u00a0allocated\u00a0and be addressed primarily to the management of CCA Pty Ltd\u00a0who are not\u00a0security or IT\u00a0experts. Some issues may\u00a0require the acquisition of new software and hardware; you\u00a0should identify\u00a0suitable products that could be used to resolve the issues. Your proposal\u00a0should\u00a0adhere [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[9],"tags":[88,640],"_links":{"self":[{"href":"https:\/\/casestudyhelp.com\/sample-questions\/wp-json\/wp\/v2\/posts\/907"}],"collection":[{"href":"https:\/\/casestudyhelp.com\/sample-questions\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/casestudyhelp.com\/sample-questions\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/casestudyhelp.com\/sample-questions\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/casestudyhelp.com\/sample-questions\/wp-json\/wp\/v2\/comments?post=907"}],"version-history":[{"count":4,"href":"https:\/\/casestudyhelp.com\/sample-questions\/wp-json\/wp\/v2\/posts\/907\/revisions"}],"predecessor-version":[{"id":2480,"href":"https:\/\/casestudyhelp.com\/sample-questions\/wp-json\/wp\/v2\/posts\/907\/revisions\/2480"}],"wp:attachment":[{"href":"https:\/\/casestudyhelp.com\/sample-questions\/wp-json\/wp\/v2\/media?parent=907"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/casestudyhelp.com\/sample-questions\/wp-json\/wp\/v2\/categories?post=907"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/casestudyhelp.com\/sample-questions\/wp-json\/wp\/v2\/tags?post=907"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}