Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Network & Security Expert

Introduction

“Big Red Rocks” (BRR) mining company is based and operates in Western Australia. They are mainly an iron ore miner, but they also produce electricity through tidal power to support their crushing operations, with any excess power sold back to power grid through the electricity market. BRR maintains the head office in Perth, and the site office in Port Hedland. There is also a control system network operated at their crushing plant outside of Port Hedland. There is a need for database information from the crusher site to be sent to Perth for accounting and other purposes.

BRR has been informed by CERT Australia that some of their internal documents have been found on external third party websites, and that they have important security issues which have to to be rectified. You are the network security consultant who has been hired to advise on issues present in the present architecture and associated network security issues.
Following hardware and software is in operation at each site:

Perth Head Office

• 200 client desktop PCs running Windows Vista
• Web server (external) running Apache on Redhat Linux
• MS Exchange Server on Windows Server 2008
• 802.11 wireless using WPA TKIP
• Executives have iPads to access the internal network
• Connection between Head Office and PH Site over Telco private WAN
• External Access is via VPN (PPTP) user name and password
• There is an AV server

Port Hedland Office

• Runs 20 PCs with Windows Vista
• Authentication to ADS over the WAN link to Perth
• Connected to mine site via 802.11 wireless (WPA TKIP)

Mining Site

• No ADS – all PCs belong to workgroup
• Connection to PH Site Office via 802.11g point to point link (WPA TKIP)
• 10 PCs running Windows Vista in office
• 5 PCs running Windows NT in the control room (NOTE: This cannot be changed as the SCADA software will not run on the newer OS)
• There are no individual logons or passwords on the control room PCs (Usernames and passwords cannot be implemented as this is an operational issue)
• SCADA engineers remotely connect to the mine site through a VPN Server PPTP Other information:
• The network security policy has not been updated since 2005
• There is no patching regime
• See network diagram shown below (Note: this may be out of date but is the most current we can find)
• The VPN at the Head Office and the VPN at the mine site are not connected

Tasks:

You are required to produce the following deliverables as part of your contract:

1. A list of the issues with BRRs network as it currently stands. The list will describe the vulnerabilities associated with each issue
2. Treatment recommendations to address the identified issues in BRRs networks
3. A detailed network diagram which creates a more secure network for BRRs operations
4. Updated network security policies which take into consideration current issues and hardware

1277_Network diagram.jpg

The report should be set out in the following manner:

• 11 point Times New Roman
• 1.5 line spaced
• Margins set to 2.5 cm
• Justification: block justified
• Footer: Should contain your ECU StudentID and Full Name (8 point type) and a Page number
• The report should contain an index and have appropriate headings and sub headings.
• The style of the report is a business report and as such it is expected that you present a professional report in both format and style.
• Your report should not exceed 30 pages in total length

All sources of references must be cited (in text citation) and listed (end reference list). For details about referencing and the required format, please refer to the ECU Referencing Guide, which can be found from the following URL: http://www.ecu.edu.au/centres/library-services/workshopsand-
training/referencing/related-content/downloads/refguide.pdf

Deliverable

Network Diagram
• Complete network diagram detailing new architecture
• IP addresses and other architecture detailed
 Network Security Policy
• Policy not procedure
• Covers all relevant devices and technologies and is relevant to BRR

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M9586

Have any Question? 


Related Questions in Computer Network & Security

You just signed a 30-year lease agreement for a business

You just signed a 30-year lease agreement for a business property. The monthly rent for the first year is $1,000/month, with the ?rst month's rent due today. Starting from the second year onward, the monthly rent will be ...

Question calculate the total time required to transfer a

Question: Calculate the total time required to transfer a 1.5-MB file in the following cases, assuming an RTT of 80 ms, a packet size of 1 KB data, and an initial 2 × RTT of "handshaking" before data is sent: (a) The ban ...

Compare the importance of three categories described in the

Compare the importance of three categories described in the article: 1. window of exposure, 2. full public disclosure, 3. reasonable disclosure for three types of software applications: 4. military, 5. medical, 6. educat ...

Assignment descriptionproject scope a typical network

Assignment Description Project Scope: A typical network layout diagram of a firm is given below for illustrative purposes only. The service requirements are enclosed. Figure. Network layout of a firm Service requirements ...

Assessment taskstarting from the logical network design

Assessment Task Starting from the logical network design that you completed in Assessment Item 1, you are required to undertake the physical design of the network taking into consideration the feedback that you received ...

Question a small company is assigned the class c network

Question : A small company is assigned the class C network 205.67.35.0. You need to divide this network to provide subnets for three departments using fixed-length subnetting. The departments are approximately the same s ...

Assignment descriptionproject scope a typical

Assignment Description Project Scope: A typical network layout diagram of a firm is given below for illustrative purposes only. The service requirements are enclosed. Figure. Network layout of a firm Service requirements ...

If a router is attached to a network with a base ip address

If a router is attached to a network with a base IP address of 198.10.0.0/20 and receives a packet addressed to 198.10.10.144, answer the following questions: a. What is the network mask used by the router? (in dotted de ...

Discussion bulldefine a packet analyzer and describe its

Discussion: • Define a packet analyzer and describe its use • List commonly used packet analyzers (beyond WireShark) • List best practices for analyzing packets • Describe uses (good and bad, ie. hacker) of a packetanaly ...

Question in a short paragraph explain the transmission of

Question : In a short paragraph, explain the transmission of data for a TCP connection between a client computer and a web server to request a web page. Assume that the server responds with a web page that fits in one pa ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As