Procedures relating to the deployment of the server, Computer Engineering

Edith & Associates is a modern law firm. They have an Internet Link that is an ADSL 8MB links from JJNET. The server they are to deploy will the main service giving  server and will give email services to 98 users in the organization by the use of SMTP and IMAP services. The server will also serve the organisational web page using Apache services and should be accessible by all except those IP's that are determined to be malicious by the IDS. This list of denied IP's is reviewed monthly & Firewall routing is changed appropriately. This server is placed in a DMZ though it is expected that the server produced will be highly secure. The server will only run SSH for selected users from within the organizational network these are admin, jill and jack. Edith & Associates is strictly an 8:00am to 6:00pm operation at which point in time the premises are secured and all staff are made to vacate the premises. There is no access to the internal network after hours by any organisational staff. A number of staff want to access their POP3 accounts from the corporate ISP who has a dynamically allocated subnet range of 172.16.15.0-172.16.65.0 and management has agreed to this and have asked for a high level of security for the transport of the email across the Internet. The server will be backed up from 2-4 am every morning. DNS services are forwarded from the ISP's DNS Server, which has an IP of 172.16.1.1. Edith & Associates has an internal IP address range of 10.77.27.X and should permit  all connections from this address space to the server. The server should also have IDS capabilities.

Task:

a. Deploy a secured Linux Server that will run set network services & functions, including the setup and configuration of network countermeasures and forensics capability. The server will require to run the following services
Web Services - Apache
Email Services - IMAP and SMTP
SSH
As a minimum the server should have firewalling and intrusion detection solutions deployed with full logging.

b. Create the associated documentation associated with the policies and procedures relating to the deployment of the server.

Posted Date: 3/18/2013 2:10:25 AM | Location : United States







Related Discussions:- Procedures relating to the deployment of the server, Assignment Help, Ask Question on Procedures relating to the deployment of the server, Get Answer, Expert's Help, Procedures relating to the deployment of the server Discussions

Write discussion on Procedures relating to the deployment of the server
Your posts are moderated
Related Questions
Q. Explain about Double Error Detection bit? Let's presume now that two bit errors take place in data. Data received: So on -matching we conclude P3-D3 pair doesn't

What is Hamiltonian path?  A Hamiltonian path in a directed graph G is a directed path that goes through every node exactly once. We consider a special case of this problem whe

A digital signature is   encrypting information

What are latches and flipflops? There are two types of circuits as follows: a. Combinational b. Sequential Flipflops and latches both come into the category of "sequen

ADDING LAYERS TO THE TIMELINE AND GIVING MOTION TO THE LAYER Step 1:  Choose Layer from Common toolbar after that draw a layer. Step 2:  Write the text inside Layer. Step

What value is inferred when multiple procedural assignments made to the same reg variable in an always block? When  there  are  multiple  nonblocking  assignments  made  to  th

The message queue provides the information about sizes of queues under utilization of various processors. It points to size of every processor incoming message queue that would be

Disadvantages of unauthenticated sites All the Units entering the Intranet must be scrutinised to ensure that they are not coming from the unauthenticated sites or users. It a

In the message-passing model, there exists a set of tasks that use their own local memories during computation. Multiple tasks can reside on the similar physical machine as well ac

State and prove Demorgan’s First theorems: Ans. Statement of First Theorem of De Morgan: = A‾. B‾   Proof: The two sides of the equation i.e. = is represented with logic