COIT20265 Networks and Information Security Project

Assignment Help Computer Networking
Reference no: EM132480302

COIT20265 - Networks and Information Security Project - CQUniversity

Objective
You are to design and build a secure, responsive, reliable, scalable, and resilient distributed system to support the online learning operations of a large university.

General Requirements

1. The new system should scale to support a student base growth of 10% yearly for the next three years.

2. The new Moodle LMS should leverage four-tier application architectures.

3. The new system should operate 24/7, except for some scheduled downtime maintenance windows.

4. The mean availability of the new system should fall within industry standard systems, typically between 99.5 per cent and 99.9 per cent uptime.

5. All network tasks and services concerning the new system should be automated to improve business efficiency and effectiveness.

6. The services running in the new system should be accessible from any device including desktops (Windows and MacOS), laptops (Windows and MacOS), tablets, and smart phones (Android and iOS).

7. The services running in the new system should be compatible with all major browsers including Chrome, Firefox, Safari, Internet explorer, and Opera.

8. The new infrastructure should provide support for the on-demand storing and streaming of HDTV videos (1080p 1920×1080 progressive scan) produced for each of the units of study.

9. The new infrastructure should support the real-time streaming of online classes, online meetings, chat, and mobile collaboration.

10. The new system should leverage micro-services technology. It is estimated that around 1,000 micro-services will be available to control all the components of the new network service.

11. The new system should leverage the deployment of the latest 5G digital cellular network services.

12. The new system should leverage the Internet of Things (sensors located at each LaaS); and devices like students' Apple Watch and augmented / mix reality gear employed by TGU to gather data on the habits and patterns of its students.

13. The new system should support the implementation of learning and academic analytics.

Security Requirements

1. The security of the Moodle system and remote labs (LaaS) should be as solid as possible to defend against both physical and malware attacks specifically designed to compromise the lab equipment, application stack, web services, micro-services, and the cloud infrastructure in general.

2. For remote lab access via a Moodle activity, the authentication should be done at the Moodle LMS and the authorisation at a third-party authorisation server that checks the validity of the Moodle LMS as a consumer for the lab.

3. The implementation and configuration of LaaS (at the four CDCs) should leverage load balancers, proxy servers, reverse proxy server, and NAT (Network Address Translation).

4. The LaaS and the Moodle LMS internal range of private IPv4 addresses should be 172.16.0.0/12

5. Any security event at LaaS or Moodle LMS should be resolved within three hours of being logged (from event detection to ticket generation, and final resolution). The optimal goal would be the resolution of such events in real-time using automation as much as possible.

Statement of Works

TGU is concerned that changing its infrastructure from proprietary to commercial-of-the-shelf solutions (COTS) (LaaS and Moodle) will likely cause a big impact on the security of its

operations. On these grounds, TGU has contracted YOU to conduct a preliminary assessment of the situation and recommend the senior management on the feasibility of the project. This should include:

1. A business analysis and recommendation to TGU of the most appropriate infrastructure to host the Moodle LMS and LaaS integration. You need to recommend from a mix of on-premises private and third-party; or fully public cloud services; or hybrid (private clouds running on rented datacentres spaces). Your business analysis should be based on five factors, namely, compliance, performance, privacy, cost, and control. In your final recommendation, you should justify your selection in terms of technical issues concerning the security, responsiveness, reliability, scalability, and resiliency of the system. This is not a copy and paste activity. You should contextualise your analysis and recommendation in accordance with TGU requirements and goals.

2. Using both the general and security requirements; and the background outlined in the introduction of the case study, conduct a thorough analysis and design of the new network infrastructure (Moodle and LaaS integration). As part of this, and based on your recommendation on point 1 above, provide a logical network diagram before and after the change of the infrastructure. Make sure to use the recommended internal range of private IPv4 addresses. You may use Packet Tracer or any other network diagram tool to draw your diagram.

3. For the new network and system infrastructure, use the NIST Special Publication 800-30 Guide for Conducting Risk Assessments [3] to recommend a cyber security risk mitigation strategy to TGU.

4. Using the NIST Contingency Planning Guide 800-34, provide a tailored Disaster Recovery Plan (DRP) and a Business Continuity Plan (BCP) [4] that meets TGU business goals.

5. Based on your cyber security risk management approach in point 3 above, provide a proof of concept (PoC) to demonstrate the security of the Moodle LMS as implemented in a four-tier architecture.

Attachment:- Networks and Information Security Project.rar

Reference no: EM132480302

Questions Cloud

Interactions and symbolic interaction related : Give examples of two symbolic gestures and their interpretations explaining how are social interactions and symbolic interaction related?
What are some techniques a social worker : What are some techniques a social worker can use to help your client feel safe?
Increased understanding of diversity and inclusion : Are there individual factors that could improve as a result of an increased understanding of diversity and inclusion?
Experiencing low earnings compared to native-born canadians : Describe two reason why new immigrants to Canada are experiencing low earnings compared to native-born Canadians.
COIT20265 Networks and Information Security Project : COIT20265 Networks and Information Security Project Assignment help and solution, CQUniversity - assessment writing service - Design and build a secure
How suitable are the choices and deployment of the colours : How suitable are the choices and deployment of these colours? If they are not, what do you think they should have been? Go through the set of ‘Influencing.
How much property tax will Perez pay this year : Perez, Inc., is headquartered in an area in which assessed valuation is 60% of market value. How much property tax will Perez pay this year
Difference between politics and economics : Explain the difference between politics and economics. What model does the U.S. have of each?. Define deindustrialization and explain why it occurred
Contrast the coleman report with the bell curve study : Compare and contrast the Coleman Report with the Bell Curve Study. What is a religious ritual and how do they work? Provide an example. What is secularization?

Reviews

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd