Assignment title: Management


A medium-scale motel chain has branches at several cities in Australia. Each branch has its own Local Area Network (LAN) but all LANs are isolated. The motel chain wants to securely connect their branch offices with the headquarters, which is based in Brisbane. The description of current state of infrastructure at each LAN is given below. Table 1: ICT infrastructure owned by the motel chain Branch Name Servers Desktops Printers Portable Devices Capacity Brisbane – Headquarters 2 35 3 200 Gold Coast 1 15 2 70 Sydney 1 25 2 120 Melbourne 1 25 2 140 Perth 1 20 2 95 Each LAN has two segments, namely, official and client . The official segment is further divided into two sub-segments, viz., management and staff . The client segment is based on portable devices such as laptops, smart phones, etc., that belong to the customers of the motel. On the other hand, official segment is based on different types of devices (Servers, Desktops & Printers) listed as in Table 1. 2. Workflow The unified WAN has following usual access and communication pattern. 1) The client segments' users, at each branch, have paid-only access to the printers. 2) The CEO has full access to all machines except clients' portable devices. 3) The staff segment's users of each branch office is required to send daily confidential progress report to the CEO via management segment of headquarter LAN. 4) The local management of each branch has to send confidential income-expenditure report to the CEO on daily basis. 5) The peer communication between branch managers is carried out on weekly basis, in the form of confidential business-strategic -plan report, to share weekly business activities and strategies. 6) The headquarter and branch offices have monthly confidential video conference meeting to discuss monthly targets and devise operational plan for next month. Page 1 of 2 3. Technical requirement 1) Setup a secure e-mail system that is able to provide following services Authentication Confidentiality Compression Fragmentation E-mail compatibility. 2) Setup a secure video conference service that is able to provide following services Authentication Confidentiality 3) Setup a central server that grants time-bound service access to single (or group) of users (hint: Kerberos). 4. Deliverable report You are hired as an IT security and network consultant by the motel chain and asked to design a technical plan to connect branch LANs into a unified network, i.e., Wide Area Network (WAN), by ensuring secure inter and intra-LAN communication. The technical report must explain that which and how security service(s) satisfy each of the access and communication pattern described in Section 2. The structure of report must include but not limited to the following sections. Abstract: (about 150 words) Introduction Network Model: A detailed network layout denoting communication flow in each sub-segment, segment, LAN, and WAN. Technical specifications: o Hardware requirements for implementation of each security service and connecting network (if any). o Software requirements for implementation of each security service at every machine. o Description about how specific service satisfies desired security requirement. Cost analysis: o Deployment cost (for additional hardware and software) o Running cost o Maintenance cost Conclusion: Summarise problem description, your recommendations, advocating about how expenditure of additional security services will benefit business owner from potential security breach, which may result in financial loss (about 250 words). References: At least 10 references, including 5 latest journal articles' references (not old more than 5 years). References should be in the IEEE format. Note: The report should adhere to the standard IEEE paper format and must be within 4 - 5 pages . Page 2 of 2