Given recent network and computer system breaches such wannacry
|
|
---|---|
|
|
|
|
---|
Teesside University School of Computing, Engineering & Digital Technologies
|
---|
2.2 Scenario .......................................................................................................................................................... 3
2.3 Your Report ................................................................................................................................................... 4
5. Marking Scheme ................................................................................................................................................... 7
6. Criteria ..................................................................................................................................................................... 9
This assessment is worth 100% of the total module marks.
2. Your Work
Currently, the existing network infrastructure has been shoe-horned onto an ageing server which is running Windows 2003 Small Business Server with clients as old as Windows XP and some as new as Windows 10. The company acknowledges that, given recent network and computer system breaches such as WannaCry, that they need to update their IT infrastructure and are looking to create a more secure IT infrastructure with room for expansion.
Due to the current company data governance framework, the company has no plan to move to a cloud solution yet, apart from the email service, such as Office 365. Therefore, the current plan is to upgrade their existing network to a fault tolerant server network, which can spread existing workloads across multiple servers. You will also need to build Windows 10 clients which you can join to the domain to use to help document that all the services are working correctly.
The company has limited budget for this upgrade. Therefore, you have to consider how many servers and which operating systems are required, in order to achieve such requirement.
Smith Logistics has emphasised that they want to take this opportunity to strengthen their network security and are looking for you to explain what security considerations and/or improvements you can make as you outline the solution.
Write a report which should at a minimum contain:
➢ A network diagram, including IP addresses. (10%)
➢ A recommendation and explanation of chosen disk redundancy and backup solutions for the final build (does not need simulating). (10%)
• You do not need to discuss any network devices, e.g., switches and routers.
➢ Documentation of a proof-of-concept network, evidencing the setup and configurations made using screenshots. (25%)
• Client machine evidence should be used to demonstrate that the wider system works.
(5%)
➢ Pro-active security advice including policy recommendations for the new network. (5%)3. Deliverables and submission instructions
➢ Introduction
➢ Your works
➢ Appendices (if applicable)
The words in the table of contents, references, and appendices will not be counted above the word limit (3,500 words).
• Communicate effectively and professionally in writing using appropriate tools.
•Analyse a range of server solutions to make evidenced-based decisions on the combination of technologies that gives the best solution for a specified business scenario.
•Demonstrate understanding of a range of server monitoring techniques with due consideration of potential legal, professional and ethical issues.
6
Marks | ||||
---|---|---|---|---|
7-10 | ||||
|
4-6 | |||
1-3 | ||||
0 | ||||
|
|
7-10 | ||
4-6 | ||||
1-3 | ||||
0 | ||||
|
14-20 | |||
|
8-13 | |||
1-7 | ||||
0 | ||||
|
|
20-25 | ||
11-19 |
7
|
||
---|---|---|
|
||
|
||