IT Forensics代写|CS代写|编程代写

IT Forensics - Assignment


本作业的内容是为一家IT公司设计网络架构图,其中包含web服务器,防火墙,文件服务器,VPN,路由器等等。

ENTERPRISE FORENSIC READINESS

The CEO of a consulting IT company has asked you to design the company’s network. She has asked you to be prepared as much as possible for the next 10 years in terms of IT equipments and being prepared for forensic investigations and cyber attacks. The company’s infrastructure is to stay like what you have designed for the next 10 years. The company has one headquarter and it has X-1 branch offices in different cities, some national and some international ones. The number X that is representing the total number of branches (including headquarters) depends on your student ID. The main office and each branch has exactly 40 employees. Each employee is exactly equipped with one single workstation. You may also have a working from home (WFH) option for employees in your diagram (based on your student ID).

You have to use the empty layout given to you and add more branches to it and integrate by yourself. The following servers of the company are to be located in a proper place.

1. Database server (inaccessible to public)

2. Application/web server (public)

3. File server (inaccessible to public)

4. Email server (inaccessible to public)

Based on your specific X you have to design a network diagram by using only various options given in the legend of the empty diagram and answer questions 1-4 below.

1) Server Farm Location, WAN connections, and Internet connection (3 options)

You have to decide where to put the server farm. First, decide about the location of the company’s server farm. You have four different options: in the main office, on the cloud, in the data center, or a hybrid choice (data center + cloud). You can use the icons in the legend to put the servers in the desired location. Second, decide about the WAN connection and draw the connections in your diagram (including the routers) between the headquarter, branches, and the location of the server farm (based on the legend, you have two choices for WAN connections, MPLS or Internet). Finally, decide about the Internet connection to your company/server farm, which has been shown as a red cloud in the empty diagram. Justify your choices in all these steps according to your network size and forensic readiness.

Note: The difference between "Cloud" and "Data Center" for us is that a cloud is public but a data centre is owned by the company and can act as a private cloud. In fact, A public cloud for a company is a cloud that is not owned by the company itself. It is owned by a third party. In contrast, a private cloud (a data centre) is something that the company can build for itself, own and manage forever.

2) AAA server location, SIEM server location, VPN, SSL Terminator, and Firewall (5 options)

Now, you have a complete diagram with all connections and the company's servers’ location specified. First, decide about the location of AAA (authentication, authorization, and accounting) Server and SIEM (Security information and event management) Server. Second, use Firewall, VPN, and SSL terminator, if needed, to provide security. Justify all your 5 choices based on your network size and forensic readiness. For the tools that need a start and endpoint like VPN, use the tool for the start and endpoint, and determine these by numbers, e.g., one VPN connection has a start point of VPN1 and endpoint of VPN1’.


3) Enterprise Defence System (6 options)

Develop a more detailed cyber system defence mechanism for the enterprise considering all 6 tools: Web Application Firewall (WAF), Web filtering, Malware filtering, SSL inspection, IDS/IPS, and Email security.

Their icons have been given in the legend. Use the icons to complete your diagram, some of them can be enabled on the firewall, mention each of them you use by using the icon. Based on your design, you may not use all the tools listed in the legend of your network, though. If you decide to use any of these, specify its location and justify your choice according to the size of your network and forensic readiness. If you decide not to use any of these, explain why you have not used it.

4) Cost Estimation and Justification

Based on your design, estimate the cost to implement the defence system and maintain the system for 10 years. Break down the tasks and put references whenever necessary if you are referring to any specific product or service. Your cost estimates should be proportionate to the size of your network.

咨询 Alpha 小助手,获取更多课业帮助。