I declare that this assignment is my own work and that the sources of information and material I have used (including the internet) have been fully identified and properly acknowledged as required in the referencing guidelines provided.
Fit to Sit Policy
The University operates a Fit to Sit policy whereby all students, in submitting or presenting themselves for any assessment, are declaring that they are fit to sit the assessment. Students cannot subsequently claim that their performance in that assessment was affected by extenuating circumstances.
This assignment addresses the following learning outcome(s) of the module:
To demonstrate a practical understanding of the design and implementation of information systems.
To demonstrate the ability to recognise any risks or safety aspects that may be involved in the operation of computing equipment within a given context.
You are a network administrator at a company. There is a database server that stores accounting data, customer data, and employee data. There is also a web server that must be accessed by customers and employees. Some employees work remotely and need access to an FTP server to upload and download files. The company uses Microsoft Exchange for internal email.
a) Describe the justification for running FTP and the web service on different computers.
b) The table below lists some well-known ports and some servers. Identify whether the ports should be open or closed.
|Ports||Exchange server||Domain controller||Web server||FTP server||Database server|
c) Describe the danger port scanners pose to your network.
d) You decide to segment your network using a DMZ. Which servers should you place in the DMZ?
e) What precautions should you take to physically secure the servers?
f) The database servers are in a locked closet on the internal network. How should you apply access permissions to add another layer of depth to the database servers’ defence?
You are designing a cryptography and public key strategy for a large company. The company has identified some files it considers confidential and others that require integrity. Some users send email that must be authenticated. In addition, the company has a website that customers use to view product information and place orders.
a) Why is it preferable to use longer keys when encrypting data?
b) Why should you use symmetric encryption to encrypt data instead of asymmetric encryption?
c) How can you ensure that emails can be authenticated?
d) How can you ensure that the contents of emails are not changed during transit?
e) Which requirement should be met by purchasing a certificate from a well-known third-party Certificate Authority (CA)?
Understanding how to identify a risky download, attachment, or phishing email is an essential part of mitigating the threat of malware. Automated scanners have limitations – they can only identify known attacks. Identifying new or unpublished attacks requires a sharp eye and a keen nose for trouble. Users can develop those over time, but they need training. Of course, before you can train users in what to look for, you have to know yourself.
Think about the following situations and determine whether the action is safe, moderately safe, moderately risky or risky and explain why.
a) You access an online shopping site. A dialog is displayed that reports the site’s SSL certificate has expired. How risky is it to provide your credit card on this site?
b) You access an online shopping site. A dialog is displayed that reports that the site’s SSL certificate was not issued by a trusted certificate authority. How risky is it to provide your credit card on this site?
c) You receive an email from your bank asking you to verify your address and phone number. The email contains a link with a different domain name than your online banking site. When you click the link, you are prompted for a username and password. How safe is it to enter the information?
d) You receive an email from a former business acquaintance that you haven’t heard from in several years. The subject of the message is Hello. The message contains an attachment, how risky is it to open the attachment?
e) You have antivirus software installed, but you are connecting to the Internet through a dial-up connection until your broadband service is restored. How risky is it to ignore the virus signature update message?
f) An online training website uses a non-persistent cookie to track your progress in a session. How risky is it to accept the cookie?
g) You are creating a website for your business and need to publish your email address so that customers can contact you. How risky is it to use your regular email address?
SUMMARY OF DELIVERABLES
You are required to produce a short report that answers all of the questions in each of the scenarios presented. (Each of the questions requires no more than a paragraph to answer.)
Quality Researched Papers
We always make sure that writers follow all your instructions precisely. You can choose your academic level: high school, college/university or professional, and we will assign a writer who has a respective degree.
We have hired a team of professional writers experienced in academic and business writing. Most of them are native speakers and PhD holders able to take care of any assignment you need help with.
If you think we missed something, send your order for a free revision. You have 10 days to submit the order for review after you have received the final document. You can do this yourself after logging into your personal account.
All papers are always delivered on time. In case we need more time to master your paper, we may contact you regarding the deadline extension. We will always strive to deliver on time.
Original & Confidential
We use several writing tools checks to ensure that all documents you receive are free from plagiarism. Our editors carefully review all quotations in the text.
24/7 Customer Support
Our support agents are available 24 hours a day 7 days a week and committed to providing you with the best customer experience. Get in touch whenever you need any assistance.
Try it now!
How it works?
Follow these simple steps to get your paper done
Place your order
Fill in the order form and provide all details of your assignment.
Proceed with the payment
Choose the payment system that suits you most.
Receive the final file
Once your paper is ready, we will email it to you.
If you are looking for exceptional academic writing services, then you are in the right place. Studyacer offers customised academic assignments and academic papers for students at all levels.
Writing an essay can be a challenge. However, we know what every student needs. And we purpose to deliver. Here at StudyAcer, we do all we can to help with academic essays and assignments. We have a dedicated team of professional essay writers.
We understand students need satisfactory results. Our cheap assignment writing service helps and never leaves any doubt. We always strive to ensure the ultimate and best results. It is our joy to offer a cheap reliable essay writing service.
Have you been asking yourself, where can get a pre written research papers for sale? Worry no more, the fact that you have a term paper that is due tonight and you haven’t touched it. At Study Acer it is our responsibility to get your paper on time.