Online presence of a newspaper company

Assignment Help Basic Computer Science
Reference no: EM131330199

Objectives

Design and plan the implementation of a web architecture to support the online presence of a newspaper company. The design must include diagram(s) of the network and web architecture and have installation and configuration instructions for each of the servers and features identified in the instructions below.

A template for the Course Project report is available in Doc Sharing.

Background

Because of the explosion in digital news sources, the DeVry Daily News and the DeVry Tribune have decided to merge their newspaper businesses in order to better defend against this online assault. They plan to co-locate their business and news offices in a single building where they also plan to establish a strong digital news presence. The new business is called the DeVry Daily Tribune (DDT) and has the domain www.ddt.edu.

The business has hired us-WEB375 Consulting-to design a secure and robust web architecture for its new facility. Our contract requires us to deliver a diagram of the web architecture plan and instructions that their system administrator can use to set up each of the servers they need. Luckily for us, DDT has chosen to go with Linux, which is our specialty, as the core operating system for its servers.

The following are the core requirements for the web architecture.

  • Electronic mail for DDT's 100 employees. Employees in the building (on the LAN) can access their e-mail with any e-mail client, but employees off-site must use a web-based e-mail client.
  • Secure FTP for the company and freelance photographers to upload digital images wherever they happen to be photographing the story. All photographers should upload digital images to their own individual directories and not have access to other user photos.
  • Anonymous FTP for the public to download selected royalty-free or creative commons photos that the newspaper decides to make available. This may be hosted on a different machine from the secure FTP server.
  • A dynamic new website supported by a LAMP architecture. Reporters will be able to write and submit their news stories through the web interface, which will save the stories in the database. The web application will present these stories to users when they visit the website.
  • The newspaper already has the PHP web application developed; we just need to design and develop instructions for the installation of the web server and database server to support the application.
  • A DHCP server on the local network to distribute IP addresses. DDT leaders do not want to use a router-based solution, but instead want the ability to configure their own computer-based DHCP server.
  • A local DNS service to speed name resolution for web access.

The DeVry Daily Tribune plans to try several innovative web-based digital initiatives in the next year in order to reassert itself in the news marketplace. The company is very security conscious because it wants to keep these initiatives secret until they are ready. Once its web technologies are deployed, its does not want the website or its data breached.

The company wants as few services exposed to the Internet as possible, and each server should have a local firewall installed that only permits access to services installed on the server and SSH for remote access.

You only need to provide a design and instructions that explain the steps required to install and configure the web architecture you are recommending. You do not need to install and configure these servers on a VM, though it may help you in testing and refining your instructions.

Task Details and Recommended Milestone Dates

Download the Course Project Template document in Doc Sharing and complete each deliverable section using the information below. You should write the instructions and create diagrams that a system administrator with your level of knowledge and experience could follow. When describing installation and configuration steps, describe the process in a manner a classmate could follow to perform the work.

The Course Project is due Week 8 of the course, but you should work on it each week. To help plan your time, the task details for each section include a recommended week to complete that section's instructions.

Introduction

Recommended Completion: Week 1 

Give background on the project and explain the design approach you are taking to the web architecture. This section should be expanded after completing the design diagrams in Week 2.

Linux Administrator Account Set-Up

Recommended Completion: Week 1 

Take steps to create the primary Linux system admin account: [email protected]. Even though this activity will be performed on each of the servers in the web architecture, you only need to describe the steps once.

Network and Web Architecture Design

Recommended Completion: Week 2

Create a diagram of the network and web architecture you are proposing. The diagram should be similar to those in the lectures. You should document your design by explaining why you decided on the proposed web architecture. For example, make decisions on whether or not to use Bastion hosts, single servers, DMZs, and so on.

Mail Server Installation and Configuration

Recommended Completion: Week 3 

Take steps to install and configure the mail server. The mail server should not relay mail from other servers. Mail user accounts correspond to Linux user accounts. Therefore, on this machine, you need to establish a user account for every employee. Your directions should explain how to set up one sample account and describe items to keep in mind as the administrator sets up the other accounts. The only virtual user account for mail is mapping [email protected] to the admin user account defined above.

Anonymous FTP Server Installation and Configuration

Recommended Completion: Week 4 

Take steps to install and configure an anonymous FTP server. The anonymous FTP server resides at ftp.ddt.edu and is available to anyone in the world. As is common practice, the top-level folder is at /var/pub on the server workstation. Because it is an anonymous server, users do not need to log in, but anonymous users can only download files. The admin account (admin), should have full rights to the server to upload photos and manage file and directory organization.

Secured FTP Server Installation and Configuration

Recommended Completion: Week 4 

Take steps to install and configure the secure FTP server. You may decide to make this server the same workstation and the anonymous FTP server, or it may be a different machine. In either case, the secure FTP server must limit users to one directory hierarchy (chroot jail). Each FTP user will also have a Linux user account on the server workstation. The admin account (admin), should have full rights to the server to organize all photos and manage the file and directories.

Web Server Installation and Configuration

Recommended Completion: Week 5 

Take steps to install and configure the web server (Apache). The ServerAdmin should be [email protected], and for security purposes, the directory for the DocumentRoot should be at /var/www/ddt. Because the newspaper will have reporters connecting from all over the world-often with intermittent Internet connections-we want the connection parameters set to the following.

  • Timeout      120
  • KeepAlive    On
  • MaxKeepAliveRequests    500
  • KeepAliveTimeout        120

They also want to set up virtual hosting for the previous websites of the two companies.

www.devrydaily.com and www.devrytribune.com

Database Server Installation and Configuration

Recommended Completion: Week 6 

Take steps to install and configure the MySQL server. The firewall on the MySQL server workstation should only the root user to log in from the localhost. The root account must have a password. Explain how to create a database, ddttest, to test the server with a single table, ddtusers. The table should have columns for username, firstname, lastname, and e-mail. Add five records to the table for testing purposes.

Firewall Installation and Configuration

Recommended Completion: Week 7 

Take steps to install and configure the firewall (iptables) on the web server. The workstation that hosts the web server may host other services; that is your decision. The firewall on the web server should only allow incoming traffic for the services hosted on the workstation and should deny all other traffic.

DHCP Server Installation and Configuration

Recommended Completion: Week 7

Steps to configure the DHCP server. The DHCP server should

  • distribute IP addresses to anonymous clients in the range 10.3.75.0 through 10.3.75.255 with a 6 hours lease time;
  • ensure the primary DNS is 203.0.113.1 and the secondary DNS is 203.0.113.2;
  • ensure the subnet mask is 255.255.255.0; and
  • give each server workstation a host name and set up the DHCP server to give a fixed IP address to that workstation. For example, the web server workstation could be named "ddt_web" and assigned the IP address 203.0.113.15 and the FTP server. If it is on a different workstation, it may be "ddt_ftp" and assigned 203.0.113.10.

Reference no: EM131330199

Questions Cloud

How many contracts did the defendant have with the state : Who are the parties to this action? How many contracts did the defendant have with the State? Why were there 4 contracts between the plaintiff and the defendant?Who won at the trial level? Why? Under the Supreme Court's decision, the plaintiff was ..
Android mobile application development : You are a mobile application developer working for Mick Jagger who owns Wild Horses Incorporated (WHI).  Mick's company is just getting started with Android mobile application development. Mick wants to make sure that his developers understand and..
What is the rationale for acquiring professional credentials : What functions does the internal security consultant perform, and what are the key qualifications and requirements for the position?
Calculate the firstorder correction to the wavelength : Calculate the first-order correction to the energy of a ground-state harmonic oscillator subject to an anharmonic potential of the form ax3 +bx4 where a and b are small (anharmonicity) constants.
Online presence of a newspaper company : Design and plan the implementation of a web architecture to support the online presence of a newspaper company. The design must include diagram(s) of the network and web architecture and have installation and configuration instructions for each of..
Accounting theory concepts with critical analysis : This assignment requires a consideration of accounting theory concepts with critical analysis with application to General Purpose Financial Reporting by corporations. Students are required to prepare a comprehensive report directed to an Australia..
Who should pay for the expenses of certification : List and describe the standard personnel practices that are part of the InfoSec function. What happens to these practices when they are integrated with InfoSec concepts?
Analyzing and computer security : Suppose four other parties, whom we might call E, F, G, and H, are all working on a common task, so they use one encryption key for all communication. Now, suppose H leaves the project and should no longer have access to encrypted communication. H..
Describe the types of nonemployee workers : Why shouldn't you show a job candidate secure areas during interviews?- List and describe the types of nonemployee workers often used by organizations.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  How much money was taken in at each game

A baseball team has home games on friday and saturday. the two games together earn $3853.00 for the team. Friday's game generates $1227.00 less than Saturday's game. How much money was taken in at each game?

  Average of the values in an array of doubles

Question 1: Write a method that computes the average of the values in an array of doubles. The header of the method is as follows:

  How it is used to create abstract data types

l how it is used to create abstract data types.

  Create a program to print a battleship grid to the console

Create a program to print a battleship grid to the console

  What is the data wiping process?

What is the data wiping process?

  New privacy issues related to cyberspace

New Privacy Issues Related to Cyberspace

  Create a true rgb image from that output

Now create a true RGB image from that output and compare with the original.

  Why are there so many differing technologies available

This complicates the middleware landscape, making for a variety of technologies that can be appropriately used to accomplish an integration goal.

  Find the maximum allowable time interval

A waveform 20 + 20 sin (500t + 30°), is to be sampled periodically and reproduced from these sample values.

  Which index of central tendency would you use

Assume appropriate distributions, if necessary, and justify your assumptions. Include at least one example of each of the possible indices: mean, median, mode, geometric mean, range, variance, and percentiles. (This may require you to extend the p..

  Update the display once every second

Display the temperature on the LCD display, and update the display once every second

  Describes any voluminous amount of structured

describes any voluminous amount of structured

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd