Ask Computer Network & Security Expert

Introduction

“Big Red Rocks” (BRR) mining company is based and operates in Western Australia. They are mainly an iron ore miner, but they also produce electricity through tidal power to support their crushing operations, with any excess power sold back to power grid through the electricity market. BRR maintains the head office in Perth, and the site office in Port Hedland. There is also a control system network operated at their crushing plant outside of Port Hedland. There is a need for database information from the crusher site to be sent to Perth for accounting and other purposes.

BRR has been informed by CERT Australia that some of their internal documents have been found on external third party websites, and that they have important security issues which have to to be rectified. You are the network security consultant who has been hired to advise on issues present in the present architecture and associated network security issues.
Following hardware and software is in operation at each site:

Perth Head Office

• 200 client desktop PCs running Windows Vista
• Web server (external) running Apache on Redhat Linux
• MS Exchange Server on Windows Server 2008
• 802.11 wireless using WPA TKIP
• Executives have iPads to access the internal network
• Connection between Head Office and PH Site over Telco private WAN
• External Access is via VPN (PPTP) user name and password
• There is an AV server

Port Hedland Office

• Runs 20 PCs with Windows Vista
• Authentication to ADS over the WAN link to Perth
• Connected to mine site via 802.11 wireless (WPA TKIP)

Mining Site

• No ADS – all PCs belong to workgroup
• Connection to PH Site Office via 802.11g point to point link (WPA TKIP)
• 10 PCs running Windows Vista in office
• 5 PCs running Windows NT in the control room (NOTE: This cannot be changed as the SCADA software will not run on the newer OS)
• There are no individual logons or passwords on the control room PCs (Usernames and passwords cannot be implemented as this is an operational issue)
• SCADA engineers remotely connect to the mine site through a VPN Server PPTP Other information:
• The network security policy has not been updated since 2005
• There is no patching regime
• See network diagram shown below (Note: this may be out of date but is the most current we can find)
• The VPN at the Head Office and the VPN at the mine site are not connected

Tasks:

You are required to produce the following deliverables as part of your contract:

1. A list of the issues with BRRs network as it currently stands. The list will describe the vulnerabilities associated with each issue
2. Treatment recommendations to address the identified issues in BRRs networks
3. A detailed network diagram which creates a more secure network for BRRs operations
4. Updated network security policies which take into consideration current issues and hardware

1277_Network diagram.jpg

The report should be set out in the following manner:

• 11 point Times New Roman
• 1.5 line spaced
• Margins set to 2.5 cm
• Justification: block justified
• Footer: Should contain your ECU StudentID and Full Name (8 point type) and a Page number
• The report should contain an index and have appropriate headings and sub headings.
• The style of the report is a business report and as such it is expected that you present a professional report in both format and style.
• Your report should not exceed 30 pages in total length

All sources of references must be cited (in text citation) and listed (end reference list). For details about referencing and the required format, please refer to the ECU Referencing Guide, which can be found from the following URL: http://www.ecu.edu.au/centres/library-services/workshopsand-
training/referencing/related-content/downloads/refguide.pdf

Deliverable

Network Diagram
• Complete network diagram detailing new architecture
• IP addresses and other architecture detailed
 Network Security Policy
• Policy not procedure
• Covers all relevant devices and technologies and is relevant to BRR

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M9586

Have any Question? 


Related Questions in Computer Network & Security

Question calculate the total time required to transfer a

Question: Calculate the total time required to transfer a 1.5-MB file in the following cases, assuming an RTT of 80 ms, a packet size of 1 KB data, and an initial 2 × RTT of "handshaking" before data is sent: (a) The ban ...

Nbspfor the remaining questions consider a 4-bit block

For the remaining questions, consider a 4-bit block cipher, described in hexadecimal by the following table: Plaintext Ciphertext Plaintext Ciphertext 0 a 8 e 1 c 9 d 2 f a 0 3 6 b 7 4 3 c 5 5 8 d b 6 4 e 9 7 2 f 1 You c ...

Content analysis assignmentoverviewthis assignment has

Content Analysis Assignment Overview This assignment has three major aims: - To help students gain good understanding of all ITECH1102 theoretical and practical material. - To encourage students to use content analysis s ...

Content analysis assignmentoverviewthis assignment has

Content Analysis Assignment Overview This assignment has three major aims: - To help students gain good understanding of all ITECH1102 theoretical and practical material. - To encourage students to use content analysis s ...

Question suppose you wish encrypt the message beyonce using

Question : Suppose you wish encrypt the message BEYONCE using the one-time pad with the key RIHANNA (a) Encode to this message and the key as bits. (b) Encrypt with the one-time pad using XOR. What is the resulting ciphe ...

Data communications and networks assignment -aim a library

Data Communications and Networks Assignment - Aim: A library research and industry related project is to be carried out on a topic of your choice. The project topic must be related to Data Communications and Networking. ...

After reading this weeks materials please respond to two 2

After reading this week's materials, please respond to TWO (2) of the following questions. AND PROVIDE CITATION IN APA 1. Describe the differences between bus, ring, star and mesh topologies. 2. Explain the TCP/IP Model ...

Assignment -global finance inc gfi - global finance inc gfi

Assignment - GLOBAL FINANCE, INC. (GFI) - Global Finance, Inc. (GFI) is a financial company that manages thousands of accounts across Canada, the United States, and Mexico. A public company traded on the NYSE, GFI specia ...

The software company niksoft is selling a new defense

The software company NikSoft is selling a new defense against DDoS attacks. Their software looks at the source IP address on all incoming packets, and if it finds any IP address that accounts for more than 1% of traffic ...

Suppose after collecting data on an existing firms actual

Suppose, after collecting data on an existing firm's actual short-run ouput, the following production function is found to match the data: TP = Q = 5*L + 0.6*L2 - 0.01*L3 1. Using the equation above, find the following e ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As