Assignment title: Information


UEE60411 Advanced Diploma of Computer Systems Engineering ICT60215 Advanced Diploma of Information Technology Network Security Subject: Network Management Units of Competency:UEENEED147a, UEENEED149a 1 / 7 CHISHOLM INSTITUTE Information Technology and Computer Systems Student Name: Student ID: Date: Start Time: Finish Time: Due Date: week of 20th March Network Managment Network Design and Security Report Major assignment 1UEE60411 Advanced Diploma of Computer Systems Engineering ICT60215 Advanced Diploma of Information Technology Network Security Subject: Network Management Units of Competency:UEENEED147a, UEENEED149a 2 / 7 DESCRIPTION OF TASKS – PLEASE READ CAREFULLY OVERVIEW The Zipper Biz Company has taken over the Fair Dinkum Retail Company. They have discovered that they have inherited a company network made up of 2 licensed Microsoft 2012 standard R2 servers with 25 Client Access Licenses (CALs) and out of these CALs, 10 are Windows 8.1 Professional client workstations and 2 HP Laser Printers. All of these networks are on a WorkGroup called LOCAL. The network itself is a peer-to-peer network and provides basic network basic file and print services to its users. The Zipper Biz company and its stakeholders will liaise with YOU (-the networking consultant) to discuss and document design, security improvements and determine solutions that will lead: 1. (a) to the use of a development tool (eg. Microsoft Visio) to draw up a current topology of the network. (b) to describe how the Active Directory Services structure will be implemented in this current network. 2. to list occupational work safety issues and implement an OHS risk a control assessment that might be expected in the building housing the Zipper Biz network. 3. to determine and document security requirements to the current network. 4. to indicate the current authentication being used by the current network. 5. to implement an Active Directory structure(which includes domain controllers, users and computers – with rights and permissions, domains and trusts), security controls and test procedures to the Zipper Biz network. 6. to setup compliance management of the server/network and an audit of the network to determine current vulnerabilities that could lead to counter measures. 7. to implement: email, Internet Information Server (IIS) – that is web and FTP services, DNS (forward and reverse zone), and certificate server services. 8. to setup a security policy. 9. to setup deployment of software to specific user groups. 10. to implement Windows Deployment Services to build more devices on the Active Directory network topology. 11. to setup remote desktop services. Sign off to the commencement of the work and the end of the project will be done by the company IT manager – Mr George Mickeman. Your report task should address all of the above requirements 1-11. In essence, each numbered statement above is to be treated as section in your report. A summarized version of the above overview will act as introduction to your report. IMPORTANT NOTES FOR YOU ONLY: 1. The 4 areas that make the Zipper Biz Company are : 1. Managers, 2. Production, 3. Marketing and 4. Printers. This important for the Active Directory design! In each area, there are 10 users present. From the manager to supervisors to the general staff.UEE60411 Advanced Diploma of Computer Systems Engineering ICT60215 Advanced Diploma of Information Technology Network Security Subject: Network Management Units of Competency:UEENEED147a, UEENEED149a 3 / 7 2. Group policy is used to deploy software to particular areas and organize security. 3. Microsoft antivirus and antimalware solutions can be used in this network. 4. Microsoft 2012 Server Roles need to be considered in this assessment. 5. Third party security software solutions can be considered in this assessment. 6. Microsoft server security policies can be also be modified to suit this assessment task. APPENDIX – FURTHER CONSIDERATIONS (THESE SHOULD ATTACHED TO THE BACK OF YOUR REPORT): Answer each section's requirements. APPENDIX 1.1: 1.1 REQUIREMENTS - WHAT, WHY AND HOW MUCH You often work with an Australian government agency. Provide brief answers to the following: 1.1.1 Write the link YOU would use connect to the Australian Government Information Security Manual Controls. 1.1.2 List 2 client stakeholders involved with this assessment scenario. APPENDIX 1.2: RISKS, VULNERABILITIES AND CONTROLS You want to indicate what real risks may be present. Provide brief answers to the followingUEE60411 Advanced Diploma of Computer Systems Engineering ICT60215 Advanced Diploma of Information Technology Network Security Subject: Network Management Units of Competency:UEENEED147a, UEENEED149a 4 / 7 1.1.3 Explain some of the general types of risk that good security will help protected against. 1.1.4 Explain the generic types of security controls 1.1.5 List 2 URLs to "security vulnerability advisories / databases" 1.1.6 What are zero day vulnerabilities? 1.1.7 If all protocols/products sooner or later have vulnerabilities, how can you mitigate this risk? APPENDIX 1.3: INCIDENT DETECTION AND RESPONSE Possible responses to a security incident surround legal responses. Provide brief answers to the following: 1.1.8 What is the status of legal requirements for mandatory reporting of a data breach in Australia? a) for government agencies b) for private companies 1.1.9 Explain intrusion detection and recovery procedures Summarize the procedures published at http://www.comptechdoc.org/independent/security/policies/incidentresponse-plan.html APPENDIX 1.4: 1.2 SECURITY BASELINE The security baseline will involve an audit and penetration test. Provide brief answers to the following: 1.2.1 Briefly outline auditing and penetration testing techniques used with a Windows network. NETWORK SERVICE SECURITY ANALYSIS AND DESIGN 1.2.2 Windows 2012 Server - IIs WEB Server , IIs FTP, Email Server, Domain Controller and its DNS, and Firewall. Your tasks: a) briefly describe security vulnerabilities with the above. b) list URL links to best practice configuration guidelines to rectify these issues and what the rectification was.UEE60411 Advanced Diploma of Computer Systems Engineering ICT60215 Advanced Diploma of Information Technology Network Security Subject: Network Management Units of Competency:UEENEED147a, UEENEED149a 5 / 7UEE60411 Advanced Diploma of Computer Systems Engineering ICT60215 Advanced Diploma of Information Technology Network Security Subject: Network Management Units of Competency:UEENEED147a, UEENEED149a 6 / 7 2 DOCUMENTATION REQUIREMENTS At the completion of the research, you are to submit your documentation in the form of a report. The report should be word processed, professionally written and presented, proof read, and should address all of the tasks outlined above. The report must contain a title page, a table of contents, have a heading for each task and sub-task (you could use this document as a template), screen shots or diagrams must be included under the relevant headings (not submitted as separate files, or the report will not be marked), whole sentences and proper grammar must be used, material that is copied from the internet must be attributed and include a link at the point that it is used (a list of links at the end of the document is not acceptable). Instructor Use Only: Yes No Meets Requirements (satisfactory evidence): Further Evidence Required Re-assessment required See Below Signed (by Instructor) DateUEE60411 Advanced Diploma of Computer Systems Engineering ICT60215 Advanced Diploma of Information Technology Network Security Subject: Network Management Units of Competency:UEENEED147a, UEENEED149a 7 / 7 If you have been assessed as "Further Evidence Required" an opportunity for you to be re-assessed has been made available. Please sign below to acknowledge re- assessment time. Reason for reassessment _________________________________________________________________________ _________________________________________________________________________ _________________________________________________________________________ _________________________________________________________________________ _________________________________________________________________________ Re-assessment Date Time Location Student signature