Procedures relating to the deployment of the server, Computer Engineering

Assignment Help:

Edith & Associates is a modern law firm. They have an Internet Link that is an ADSL 8MB links from JJNET. The server they are to deploy will the main service giving  server and will give email services to 98 users in the organization by the use of SMTP and IMAP services. The server will also serve the organisational web page using Apache services and should be accessible by all except those IP's that are determined to be malicious by the IDS. This list of denied IP's is reviewed monthly & Firewall routing is changed appropriately. This server is placed in a DMZ though it is expected that the server produced will be highly secure. The server will only run SSH for selected users from within the organizational network these are admin, jill and jack. Edith & Associates is strictly an 8:00am to 6:00pm operation at which point in time the premises are secured and all staff are made to vacate the premises. There is no access to the internal network after hours by any organisational staff. A number of staff want to access their POP3 accounts from the corporate ISP who has a dynamically allocated subnet range of 172.16.15.0-172.16.65.0 and management has agreed to this and have asked for a high level of security for the transport of the email across the Internet. The server will be backed up from 2-4 am every morning. DNS services are forwarded from the ISP's DNS Server, which has an IP of 172.16.1.1. Edith & Associates has an internal IP address range of 10.77.27.X and should permit  all connections from this address space to the server. The server should also have IDS capabilities.

Task:

a. Deploy a secured Linux Server that will run set network services & functions, including the setup and configuration of network countermeasures and forensics capability. The server will require to run the following services
Web Services - Apache
Email Services - IMAP and SMTP
SSH
As a minimum the server should have firewalling and intrusion detection solutions deployed with full logging.

b. Create the associated documentation associated with the policies and procedures relating to the deployment of the server.


Related Discussions:- Procedures relating to the deployment of the server

Concept of pipelining, Describe the concept of pipelining. Ans: Pipeli...

Describe the concept of pipelining. Ans: Pipelining is the means of executing machine instructions concurrently. This is the effective way of organizing concurrent activity in

Convention used to represent micro-operations, Q. Convention used to repres...

Q. Convention used to represent micro-operations? The convention used to represent micro-operations is: 1.  Computer register names are designated by capital letters (someti

Determine the ad hoc testing, Determine the Ad hoc testing - It is a ty...

Determine the Ad hoc testing - It is a type of testing which is performed without the use of planning or/and documentation. - These tests are run only one time unless a defe

Fact finding techniques on banking system, what are the questionnaries and ...

what are the questionnaries and observation of work site for banking system?

Basic operational concepts of a computer, Basic Operational Concepts of a C...

Basic Operational Concepts of a Computer: Most of computer operations are executed in the ALU (arithmetic and logic unit) of a processor. For an example: to add 2 numb

Write your array of text into file, Part I: 1. The program starts by prin...

Part I: 1. The program starts by printing your initial with an end sign ">". For example, "cjx >"; 2. Then, you can type in the following "vi filename". For example, "vi myp.c

Displays a message when an applet starts up, Write an applet that sets the ...

Write an applet that sets the background colour to cyan and foreground colour to red and displays a message that illustrates the order in which various applet methods are called wh

What is data structure, What is data structure? A data structure is a w...

What is data structure? A data structure is a way of organizing data that considers not only the items kept, but also their relationship to each other. Advance knowledge abo

Automatic typewriter in information distribution, Automatic typewriter : I...

Automatic typewriter : It is a power-driven machine, which automatically types a standard pro forma from a previously punched or stencilled master. When the master is placed on th

What is random access memory, What is Random access memory (RAM) This i...

What is Random access memory (RAM) This is a volatile memory (i.e. contents are lost when computer is switched off). A user can write or delete data and read the contents. Befo

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd