Download as:
Rating : ⭐⭐⭐⭐⭐
Price: $10.99
Language:EN
Pages: 10

Given recent network and computer system breaches such wannacry

Module Code: CIS2018-N

Assignment Title:

Submission Method:
Online (Blackboard)

Online Submission Notes:

Teesside University School of Computing, Engineering & Digital Technologies

FULL DETAILS OF THE ASSIGNMENT ARE ATTACHED
INCLUDING MARKING & GRADING CRITERIA

2.2 Scenario .......................................................................................................................................................... 3

2.3 Your Report ................................................................................................................................................... 4

5. Marking Scheme ................................................................................................................................................... 7

6. Criteria ..................................................................................................................................................................... 9

This assessment is worth 100% of the total module marks.

2. Your Work

Currently, the existing network infrastructure has been shoe-horned onto an ageing server which is running Windows 2003 Small Business Server with clients as old as Windows XP and some as new as Windows 10. The company acknowledges that, given recent network and computer system breaches such as WannaCry, that they need to update their IT infrastructure and are looking to create a more secure IT infrastructure with room for expansion.

Due to the current company data governance framework, the company has no plan to move to a cloud solution yet, apart from the email service, such as Office 365. Therefore, the current plan is to upgrade their existing network to a fault tolerant server network, which can spread existing workloads across multiple servers. You will also need to build Windows 10 clients which you can join to the domain to use to help document that all the services are working correctly.

The company has limited budget for this upgrade. Therefore, you have to consider how many servers and which operating systems are required, in order to achieve such requirement.

Smith Logistics has emphasised that they want to take this opportunity to strengthen their network security and are looking for you to explain what security considerations and/or improvements you can make as you outline the solution.

Write a report which should at a minimum contain:

➢ A network diagram, including IP addresses. (10%)
➢ A recommendation and explanation of chosen disk redundancy and backup solutions for the final build (does not need simulating). (10%)

• You do not need to discuss any network devices, e.g., switches and routers.

➢ Documentation of a proof-of-concept network, evidencing the setup and configurations made using screenshots. (25%)
• Client machine evidence should be used to demonstrate that the wider system works.

(5%)
➢ Pro-active security advice including policy recommendations for the new network. (5%)

3. Deliverables and submission instructions

➢ Introduction

➢ Your works

➢ Appendices (if applicable)

The words in the table of contents, references, and appendices will not be counted above the word limit (3,500 words).

• Communicate effectively and professionally in writing using appropriate tools.

•Analyse a range of server solutions to make evidenced-based decisions on the combination of technologies that gives the best solution for a specified business scenario.

•Demonstrate understanding of a range of server monitoring techniques with due consideration of potential legal, professional and ethical issues.

6

Marks
7-10

Most of given issues have been addressed, but not all of them.

Well-designed network, but no subnetting technologies were involved.

4-6
1-3
0

A recommendation and explanation of chosen disk redundancy and
backup solutions for the final build (does not
need simulating).



7-10
4-6
1-3
0

Documentation for each network component,

describing briefly it’s
function and explaining what dependencies it may have and/or how it interacts with other
components on the
network

14-20

Shows an understanding of each network component.

Describes the function of each network component in details. Briefly explains how each component interacts with others.

8-13
1-7
0

Documentation of a
proof-of-concept
network, evidencing the


20-25
11-19

7

90%-100%


70%-79%


50%-59%

Copyright © 2009-2023 UrgentHomework.com, All right reserved.