Assignment title: Information


1 Capstone Project Case Study City of Yule Background The City of Yule is a local government area in Antioquia, in the north-eastern suburbs of Gundenai. It has an area of 63 square kilometres (24.3 sq mi) and lies between 7 and 21 km from central Gundenai. At the 2010 Census, Yule had a population of 100,000. The Iron River runs along the City’s south border while the west is defined by the Crocodile Creek. The City of Yule has plenty of open spaces and parklands, especially along the Iron River and Crocodile Creek valleys. There are 617 hectares of open space owned by the City, as well as substantial areas of parkland managed by Parks and Gardens department. These provide a wealth of recreational, environmental and tourism opportunities for the region. Cycling and walking through Yule City is a popular pastime, made enjoyable by the many kilometres of bicycle and pedestrian trails throughout the city, particularly along the Iron River and Crocodile Creek. There are 21 suburbs in the City of Yule (Banyule, 2016). Services The City of Yule has a number of services to offer to its citizens including, but not limited to: 1. Permits ​ - permission to carrying out various activities like house renovation, planning and building, gardening and landscaping (e.g. tree removal) and operating a business. 2. Rubbish and Recycling ​ - regular collection services for residents: garbage collection collected weekly and recycling and green waste collected fortnightly, on alternating weeks. 3. Waste Recovery Centre ​- to divert as much waste from landfill as possible. This enables the residents to disposal of recyclable materials like glass bottles, steel and aluminium cans, fridges, mattresses, batteries, burnt motor oil, etc. 4. Parks and Facilities ​ - for citizens leisure, recreation and multi-cultural activities. 5. Public Health - ​ basic health services like vaccination, dental care, etc. 6. Libraries ​ - each of the 21 suburbs has a library facility with an extensive physical collection of books, DVDs etc. available for loan. The libraries are also connected to an online library service to access databases, journals, newspapers, e-books etc. 7. Transport, Parking and Roads ​ - maintaining, regulating and controlling the traffic within the city. 8. Community services ​- for the family, youth and the elderly (Banyule, 2016). Networks and Information Security Case study - Copyright © Edilson Arenas - CQUniversity2 Management Structure The City of Yule is managed by the City Council elected every four years. The current management structure is depicted in the next diagram. Figure 1 Management Structure (Adapted from Banyue, 2016) Yule’s workforce is made up of approximately 1000 staff, with a wide range of nationalities, age groups, backgrounds and skills that enrich the workplace (Banyule,2016). The allocation of staff to each of the four directorates is as follows: Table 1 Staff Allocation Corporate Services Community Programs City Development Assets & City Services 1 x Director 4 x Managers 50 x Finance staff 50 x Governance & Comm staff 50 x HR staff 50 x Organisation systems staff 1 x Director 3 x Managers 100 x Health, Aged & Community 100 x Youth & Family Services 100 x Leisure, Recreation and Cultural services 1 x Director 3 x Managers 75 x Transport & Municipal Laws 50 x Urban Planning 25 x Property & Economic Dev 1 x Director 4 x Managers 50 x Capital Projects 100 x Assets & Infrastructure 100 x Operations 100 x Parks & Gardens Networks and Information Security Case study - Copyright © Edilson Arenas - CQUniversity3 City of Yule Facilities and ICT infrastructure Yule’s facilities comprise 4 main buildings: 1) Headquarters, 2) Operations Centre, 3) Community Centre, and 4) Maintenance Yard. There are also 21 buildings to house the libraries and two (2) waste recovery centres conveniently located in the outskirts of the city. Currently, the City of Yule has a good ICT infrastructure to support all businesses and services within the city, however, leveraging modern Internet, Mobile and Web technologies, the Council is planning to modernise the existing ICT infrastructure as the first step to fulfil its vision of a smart city by 2025. Specifically, the Council is envisaging to use cutting edge technology for the following: 1. Smart Energy for public areas, residential and commercial buildings 2. Smart Transportation with smart traffic and smart parking 3. Smart Data 4. Smart infrastructure - to help address hazards, complications and costs associated with water, lighting and waste management 5. Smart Internet of Things 6. Automatic Online processing of permits and parking fines 7. Online payments 8. Driverless trucks for rubbish collection 9. Parks equipped with sensor networks to track fauna and protect the environment. 10. Bushfires prediction 11. Council Online Electronic Voting 12. Electronic surveillance of roads, parks and public areas 13. Reducing CO2 emissions through traffic management 14. Free Wi-Fi across the city The implementation of such a critical infrastructure is not without a challenge. It demands a complete redesign of the current computer facilities and the implementation of a robust security plan to make sure that the services and the infrastructure are protected against any type of attack including physical and cyber attacks. Your company has been selected to help fulfil Yule’s vision with the ultimate goal of being world's most liveable city by 2025. The contract stipulates the following business factors that need attention: 1. City infrastructure to support a population of 130,000 in 10 years’ time. 2. Improve business efficiency through the automation of the majority of the city services. 3. Provide excellent customer service typical of a smart city. 4. Allow staff, registered citizens, and tourists to access the free Wi-Fi. 5. Allow staff to access the City’s computer network remotely using mobile devices like notebooks, smartphones and tablets. 6. ​Secure the computer networks from intruders. Networks and Information Security Case study - Copyright © Edilson Arenas - CQUniversity4 The contract also stipulates the following technical goals: 1. Redesign the current network infrastructure in all buildings as described above including provision for wireless services. 2. Implement a new IP addressing scheme to accommodate current and new services. 3. Increase the bandwidth of the Internet connection to support new smart applications and the expanded use of current applications. 4. Provide a secure, private wireless network for staff to access the computer network and the Internet remotely. 5. Provide a secure, Wi-Fi network for citizens and tourists. 6. Provide a campus network that is available approximately 99.9 percent of the time and offers an MTBF (mean-time-between-failure) of 4000 hours and an MTTR (mean-time-to-repair) of 2 hours (with a low standard deviation from these average numbers). 7. Automation of network management to increase the efficiency and effectiveness of the ICT department. 8. Provide a computer network that can scale to support future expanded usage of sensitive applications including Council elections via online voting, electronic surveillance and car parking metering automation. 9. Provide security to protect the Internet connection, internal network, hosts, servers and data assets from intruders. Statement of Works Part A For this part you are required to design and implement a secure information and network infrastructure that ensures high availability, reliability, scalability, performance and security to support the City of Yule current and new services. This requires: 1. In line with Yule’s aspirations, redesign the network to cater for the needs of a smart city. 2. Delivery of a comprehensive network security plan. 3. Security technology implementation 4. Proof of concept. The following is the breakdown of the tasks for part A. Part A - 1. Network Redesign The new network proposal should be justified in terms of traffic, reliability, performance, availability, and scalability that best cater for the needs of business and services operations Networks and Information Security Case study - Copyright © Edilson Arenas - CQUniversity5 within the City of Yule. To do this you need to make a number of assumptions (discuss this with your mentor / facilitator / teacher). For example, assume that the majority of Yule’s services operate from 8:00am to 5:00pm Monday to Friday, whereas other services like online payment, electronic surveillance, and car park automation operate 24/7. Specifically for this redesign, take into account the following: 1. Traffic generated by the hosts: clients, servers and backup devices. 2. Appropriateness of WAN links to support current traffic and forecasted growth. 3. Appropriateness of WANs. What WAN protocols would you use? 4. Appropriateness of wired LANs and Wireless LANs to support future growth. 5. Would you use VPNs? Why? 6. The specifications of networking devices including routers and switches at each site or location (wired and wireless). 7. IP address allocation of each network and main network devices. Use CIDR format (x.y.z.t/n). 8. Sub-netting to separate traffic including IP address allocation. 9. Firewalls positioning and strategy. Would you use separate packet filtering and routing? 10. Would you consider Proxy servers? Why? 11. DMZ configuration. 12. Firewalls Access Control Lists. 13. Network diagram for both logical and physical topologies showing devices; and IP addresses for the main clients, hosts, servers and network devices. 14. Provision of data encryption to secure data travelling between internal and external networks. Part A - 2. Comprehensive Network Security plan The network security plan should contain an ​executive summary ​ and as ​minimum ​ the following items: 1. ​ ​Introduction ​ outlining the ​ importance of the plan and its purpose. Your introduction should also provide a brief description of the components of the proposed network security plan in terms of the City of Yule’s needs. 2. ​ ​Scope ​ outlining the areas of the City that the Plan applies. The scope also relates to the breakdown of the tasks that are needed to make sure that the network is secure. 3. ​ ​Assumptions ​documenting any assumptions you have made in order to prepare the plan. There are things that might not be clear from the case study, hence you have either to consult with the mentor or assume them in a reasonable way with a clear justification. 4. ​ ​Clear and concise statements ​ about what the Security Plan is designed to achieve. This statement must relate the business and technical goals of the City. 5. ​ ​Summary and analysis ​ of the City’s ​risks ​, highlighting the current threats, ​challenges and vulnerabilities ​ along with an ​assessment of current security environment and treatments in place ​. This is perhaps the most important component of the security plan. It Networks and Information Security Case study - Copyright © Edilson Arenas - CQUniversity6 includes the complete assessment of each of the network assets (computer hardware, PCs, servers, application and system software, network devices, employees, partners and the like) and its importance for the normal operation of the network services. The analysis also investigates the vulnerabilities of each asset and its associated threat that might exploit those vulnerabilities. 6. ​ ​Network Security policies ​ to address all possible network attacks and vulnerabilities. Note that these policies address the likely issues that might occur during the transmission of the data through the network. 7. ​ ​Information Security policies ​to address unauthorized and misappropriate use of City’s data and software applications. Note that these policies address the likely issues that might occur during the storage and processing of the data. 8. ​ ​Disaster ​ recovery and Business continuity plans. 9. ​ ​Security Strategies ​ and ​Recommended controls ​ including security policies. The recommended controls are the action points you are to put in place to mitigate the risks you uncovered as part of your risk analysis. 10. ​ ​In practice, achieving total information and network security in the City is impossible ​. Residual risks ​ that remain after all possible (cost-effective) mitigation or treatment of risks should be taken into account. Your security plan should estimate, describe and rate these residual risks ​ to guide the priorities for ongoing monitoring of risks. 11. ​ ​Resources ​for implementing the recommendation. This should include any type of resources like humans, communities of practice, quality audit groups, and the like. Part A - 3. Security Technology Implementation As part of the security technology implementation and in line with the recommended controls mentioned above in the network security plan (item 9), you need to provide the ​complete design ​of the following: 1. Data backup and recovery technology including the procedures for backup and recovery. You need to provide the strategy of the backup, technical details, specifications and functionalities of the recommended backup technology. 2. A proper authentication and authorisation system that takes care of highly secured roles and permissions to access, share, download, upload files and folders. This should include authentication for wireless and mobile services as well (work at home - WAT and bring your own device - BYOD). You need to provide the complete details of the recommended technology including the product and vendor specifications. 3. ​File, Web (and secure Web), Mail (and secure Mail including spam email prevention), DHCP, DNS and Domain Controllers. Make sure you address all these services. For example, you may suggest Apache HTTT Server as the Web server software. If that is the case, then you must describe the full configuration of the Apache HTTP Server and the application architecture used including the load balancer, replica web server, and data server (if you Networks and Information Security Case study - Copyright © Edilson Arenas - CQUniversity7 opt for a three-tier architecture for example). Again you need to provide details of the software vendor and recommended hardware to run the service. 4. ​Hardening of servers described above in section 3. All the services need to be hardened with products as recommended in the network security plan. 5. Network security including DMZs, Firewalls, Intrusion Detection and Prevention Systems (IDSs and IPSs) fully configured For the five (5) items above, you need to justify your recommendations (chosen technology) in terms of cost, reliability, maintainability, performance and scalability. As mentioned, for each technology, make sure to provide details of the vendor, and the version of hardware and software. Part A - 4. Proof of concept As part of the project requirements, you are required to implement and test ​at least three of the recommended controls ​suggested in the security technology implementation section above. The solution should address current City of Yule needs, including the installation of the software, configuration of the system, and developing of test cases to check the complete functionality of the system. Discuss with your mentor all the possible options as soon as possible. Do not wait until the end of the term to do this task. For the proof of concept, it is mandatory that you include the documented results (procedures and screen dumps) of various network security attacks tests (such as Network Penetration Tests) as part of your final project report. You may use your choice of security software/tools (including freeware open software systems) and operating systems (Windows, Linux, or Ubuntu) in a virtualised environment to build and simulate the security tests. You are required to demonstrate your implementations at the end of the term using your own equipment. Part B For Part B, your task is to write two separate short reports (1000 words each) to recommend the City of Yule Council on: 1. Automation of Car Parking Revenue Control System 2. Council Elections via Online Electronic Voting For 1 and 2 above, you need to provide a feasibility study, focusing primarily in security. The reports should include: a) requirement analysis, b) cost-benefit analysis, c) risk analysis, and d) final recommendation. In researching about 1 and 2, take into account these applications deal with critical infrastructure, that is to say, assets that are essential for the functioning of a society and economy. These applications are likely to be the target of sophisticated and powerful cyber attacks, therefore it is essential you address these cybersecurity issues in the two reports. Networks and Information Security Case study - Copyright © Edilson Arenas - CQUniversity8 References 1. Banyule (2016). BanYule City Council Website. https://www.banYule.vic.gov.au/ 2. Ciampa, M. (2015). CompTIA Security+ Guide to Network Security Fundamentals (5th Edition). Clifton Park, NY: Course Technology. 3. Forouzan, B. (2009). TCP/IP Protocol Suite (4th edition). Boston: McGraw-Hill Education. 4. Oppenheimer, P. (2011). Top-Down Network Design (3rd Edition). Indianapolis, In: Cisco Press 5. ​Panko, R. R. (2003). Business Data Networks and Telecommunications. (4th Edition edition). Prentice Hall. 6. ​Weaver, R., Weaver, D., & Farwood, D. (2013). Guide to Network Defense and Countermeasures (3rd edition). Australia ; Boston, MA, USA: Course Technology. 7. Whitman, M. E., Mattord, H. J., & Green, A. (2011). Guide to Firewalls and VPNs (3rd edition). Boston, MA: Delmar Cengage Learning. Networks and Information Security Case study - Copyright © Edilson Arenas - CQUniversity