Ask Question, Ask an Expert

+61-413 786 465

Ask Computer Network & Security Expert


“Big Red Rocks” (BRR) mining company is based and operates in Western Australia. They are mainly an iron ore miner, but they also produce electricity through tidal power to support their crushing operations, with any excess power sold back to power grid through the electricity market. BRR maintains the head office in Perth, and the site office in Port Hedland. There is also a control system network operated at their crushing plant outside of Port Hedland. There is a need for database information from the crusher site to be sent to Perth for accounting and other purposes.

BRR has been informed by CERT Australia that some of their internal documents have been found on external third party websites, and that they have important security issues which have to to be rectified. You are the network security consultant who has been hired to advise on issues present in the present architecture and associated network security issues.
Following hardware and software is in operation at each site:

Perth Head Office

• 200 client desktop PCs running Windows Vista
• Web server (external) running Apache on Redhat Linux
• MS Exchange Server on Windows Server 2008
• 802.11 wireless using WPA TKIP
• Executives have iPads to access the internal network
• Connection between Head Office and PH Site over Telco private WAN
• External Access is via VPN (PPTP) user name and password
• There is an AV server

Port Hedland Office

• Runs 20 PCs with Windows Vista
• Authentication to ADS over the WAN link to Perth
• Connected to mine site via 802.11 wireless (WPA TKIP)

Mining Site

• No ADS – all PCs belong to workgroup
• Connection to PH Site Office via 802.11g point to point link (WPA TKIP)
• 10 PCs running Windows Vista in office
• 5 PCs running Windows NT in the control room (NOTE: This cannot be changed as the SCADA software will not run on the newer OS)
• There are no individual logons or passwords on the control room PCs (Usernames and passwords cannot be implemented as this is an operational issue)
• SCADA engineers remotely connect to the mine site through a VPN Server PPTP Other information:
• The network security policy has not been updated since 2005
• There is no patching regime
• See network diagram shown below (Note: this may be out of date but is the most current we can find)
• The VPN at the Head Office and the VPN at the mine site are not connected


You are required to produce the following deliverables as part of your contract:

1. A list of the issues with BRRs network as it currently stands. The list will describe the vulnerabilities associated with each issue
2. Treatment recommendations to address the identified issues in BRRs networks
3. A detailed network diagram which creates a more secure network for BRRs operations
4. Updated network security policies which take into consideration current issues and hardware

1277_Network diagram.jpg

The report should be set out in the following manner:

• 11 point Times New Roman
• 1.5 line spaced
• Margins set to 2.5 cm
• Justification: block justified
• Footer: Should contain your ECU StudentID and Full Name (8 point type) and a Page number
• The report should contain an index and have appropriate headings and sub headings.
• The style of the report is a business report and as such it is expected that you present a professional report in both format and style.
• Your report should not exceed 30 pages in total length

All sources of references must be cited (in text citation) and listed (end reference list). For details about referencing and the required format, please refer to the ECU Referencing Guide, which can be found from the following URL:


Network Diagram
• Complete network diagram detailing new architecture
• IP addresses and other architecture detailed
 Network Security Policy
• Policy not procedure
• Covers all relevant devices and technologies and is relevant to BRR

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M9586

Have any Question? 

Related Questions in Computer Network & Security

Question suppose public-key cryptography is used to encrypt

Question : Suppose public-key cryptography is used to encrypt the communications between Alice and Bob. Alice's public key is eA, private key is dA; Bob's public key is private key is de. Now Bob wants to send a message ...

Assignment - 8021q tunneling q-in-q configuration8021q

Assignment - 802.1Q Tunneling (Q-in-Q) Configuration 802.1Q tunneling (aka Q-in-Q) is a technique often used by Metro Ethernet providers as a layer 2 VPN for customers. 802.1Q (or dot1q) tunneling is pretty simple...the ...

Americans purchase a lot of coffee grown in brazil and

Americans purchase a lot of coffee grown in Brazil and elsewhere in Latin America. It would seem that in order to avoid the huge transportation costs of bringing coffee here and to provide jobs for Americans, we should g ...

Assignment descriptionproject scope a typical network

Assignment Description Project Scope: A typical network layout diagram of a firm is given below for illustrative purposes only. The service requirements are enclosed. Figure. Network layout of a firm Service requirements ...

Objectivesthis assessment item relates to the unit learning

Objective(s) This assessment item relates to the unit learning outcomes as in the unit descriptors. This checks your understanding about configuring and troubleshooting medium-size networks. PART-1 IP Addressing: 1. Subn ...

Consider the following series of paymentsyear 0 20year 1

Consider the following series of payments: Year 0: 20 Year 1: 30 Year 2: 40 Year 3: 10 Year 4: 5 Using an interest rate of 10%: a. What is the present value of this series of payments? b. What is the future value of this ...

Metasoft ltd is a software development company which works

MetaSoft Ltd is a software development company which works across Australia and New Zealand. The company is considering the following strategic proposal: - They plan to close down the Melbourne data centre rather than up ...

Advanced network design assessment - human factors in

Advanced Network Design Assessment - Human factors in network analysis and design Purpose of the assessment - This assignment is designed to assess students' knowledge and skills related to the following learning outcome ...

Part ian attacker seeks to view the contents of a specific

Part I An attacker seeks to view the contents of a specific Microsoft Word document file to which they do not have any kind of access. You may assume that: - no exploitable vulnerabilities of any kind exist; - the attack ...

You need to prepare packet tracer fileattached pdf contains

You need to prepare packet tracer file attached pdf contains topology and required configurations and assigned ip address. In packet tacer file you need to include banner, router and switches. 1. VLSM Design a) As first ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As