diff_months: 0

CP2414 Network Security Applications Assessment

Flat 50% Off Order New Solution
Added on: 2024-05-09 05:40:12
Order Code: CLT318052
Question Task Id: 0

Introduction

This assignmentcontainsfour (4)parts. You are asked to prepare a report for the CEO of a mattress-in-a-box company about

Part I–User authentication.

Part II – Cloud computing for handling the Company's data.

Part III – Network diagram.

Part IV – Citation and referencing.

Scope

The concepts covered between the fourth and seventh weeks encompass everything you need to successfully complete this assignment.

Deliverables

  1. Submit a single PDF document (.pdf) – containing all parts to the Assignment 1 submission box in LearnJCU.
  2. Formatting
    1. If you use Word: Calibri 11, Line Spacing 1.5, leave Margins and Space before/after Paragraph as default.
    2. If you use LaTeX: Article class specifying A4paper and 1.5 line spacing.
  3. Use IEEE referencing (including both in-text citations and reference lists). Seehttps://libguides.jcu.edu.au/IEEE

NOTE

  1. We strongly suggest you check the originality of your submission via “Draft submission – SafeAssign Originality Report”. If your report returns more than 40% similarity (including the reference list), you shouldfurther paraphrase your report to reduce this number.
  2. The assignment rubric can be found in the subject outline.
  3. A suggested report structure sample is at the end of this assignment sheet.
  4. If you use answers from ChatGPT, you should find the original resources to cite the ChatGPT answers. For example, ChatGPT tells you how packet-filtering firewalls work. You go to Google to find a citable resource saying (almost) the same thing as ChatGPT, then cite that resource.

ScenarioBackground

Your client, TheSleepyheads, was pleased with your advice during the previous consultation and has chosen to seek your expertise once more. Considering their accumulation of valuable data and plans to license this information to other companies, the CEO is prioritising security.

Since your last meeting, the company's business has grown, with a new branch opening in Christchurch, New Zealand. Each of their branches—Perth, Sydney, and Christchurch—now consists of five departments, employing approximately fifty staff members. The Perth location remains the headquarters, housing one mail server, two file servers, two web servers, one DNS server, and four database servers. Meanwhile, the other branches each have one mail server, two database servers, and two file servers.

The CEO is aware that all company data, including employee usernames and passwords across all branches, is stored in plaintext format. This has raised concerns that an external party may gain access to employee credentials and subsequently obtain sensitive company data.

Your tasks were categorised into the following three parts based on their needs.

Assignment tasks:

Part I. Kerberos and User Authentication

As the company expands, the CEO is increasingly concerned about the potential for legitimate users to be impersonated, resulting in unauthorised access to the company's network resources. As a consultant, you recognise that implementing the Kerberos authentication system would effectively address the CEO's concerns regarding user authentication.

Your task for this part is to explain how Kerberos cryptography can be used for user authentication. The following aspects may be explained.

  • Why should Kerberos be chosen for this purpose?
  • Does Kerberos use symmetric or asymmetric cryptography? Explain.
  • How does Kerberos authenticate each client? You may discuss Kerberos Ticket-Granting Server (TGS) and Ticket Granting Ticket (TGT).
  • How does Kerberos tackle the problem of replay attacks?

You must also

  • Recommend a commercial software program for user authentication; and
  • Explain and justify your recommendation clearly.

Part II. Cloud Computing for Handling the Company's Data

As you have been informed, the CEO is eager to protect the company's valuable data. Having heard about cloud computing, the CEO is curious to learn if this technology could be employed to enhance the security of the company's data. For this part, you are required to:

  • Explain the possibility of deploying Cloud Computing for the company to protect valuable data.
  • You must recommend (a) cloud computing service(s) to be used for the company's data and how data may be sent to an authorised partner securely using the Cloud. It would be best to justify why you recommend such cloud computing service/s over the other services.

Part III. Network Diagram employing Kerberos and Cloud Computing for Perth Branch

Implementing Kerberos for user authentication and incorporating cloud computing can significantly enhance the security of the company's valuable data. Consequently, you are tasked with designing a network diagram for the Perth branch, considering the existing devices at the location, the user authentication software recommended in Part I, and the cloud computing services suggested in Part II. Hence, you are required to:

  1. Draw your proposed network diagram, including:
    1. The user authentication software (from Part I)
    2. The cloud computing service integrated into the Perth branch (partially from Part II)
    3. Existing devices at the Perth branch
  2. Explain and justify the proposed network diagram concerning the placement and purpose of each hardware/software, the user authentication software and the cloud computing service.

Part IV. References

Use IEEE referencing style. Seehttps://libguides.jcu.edu.au/IEEE.

Suggested Report Structure

For the highest marks possible, you should READ THE RUBRICand submit your report using the following structure:

Part I. User authentication

  • Makea recommendation on Kerberos cryptography.
    • Explain all aspects asked about Kerberos.
    • Recommendation and justification on software off the shelf for user authentication.

Part II. Cloud Computing for Handling the Company's Data

  • Explain the possibility of employing CC for the company’s valuable data.
    • Provide recommendations and justification on employing CC (which model you’ve recommended and why).

Part III. Network Diagram employing Kerberos and Cloud Computing for Perth Branch

  • Explanation and justification of the proposed configuration

Are you struggling to keep up with the demands of your academic journey? Don't worry, we've got your back!
Exam Question Bank is your trusted partner in achieving academic excellence for all kind of technical and non-technical subjects. Our comprehensive range of academic services is designed to cater to students at every level. Whether you're a high school student, a college undergraduate, or pursuing advanced studies, we have the expertise and resources to support you.

To connect with expert and ask your query click here Exam Question Bank

  • Uploaded By : Mohit
  • Posted on : May 09th, 2024
  • Downloads : 0
  • Views : 11

Order New Solution

Can't find what you're looking for?

Whatsapp Tap to ChatGet instant assistance

Please Pay the Amount