STUDYSHIELDS ASSIGNMENT HELP

  • Home
  • Blog
  • Courses
    • Child Category 1
    • Child Category 2
    • Child Category 3
    • Child Category 4
  • Services
  • Country
    • Childcare
    • Doctors
  • Home
  • Blog
  • Sample Works
  • Order Now

Saturday, February 13, 2016

Assignment 2 In extenuating circumstances a late submission may be considered upon the production

 February 13, 2016     No comments   

Assignment 2

In extenuating circumstances a late submission may be considered upon the production of supporting documentation and at the discretion of the unit convener.
Extensions: Extensions must be applied for before the due date.
Students can apply for an extension to the due date for submission of an assessment item on the grounds of illness or other unavoidable and verifiable personal circumstances. Documentary evidence will be expected in order that an extension be granted.
It should be noted that such documentation will be considered but will not guarantee that the application will be successful. The Unit Convenor will decide whether to grant an extension and the length of the extension.
Should an extension to the submission deadline is needed, please fill in the Assignment Extension Form, available on Moodle, and submit the filled form together with the evidences needed. If a medical certificate is your evidence, the original copy is required. A scanned copy sent via an email is not acceptable. For the other types of evidences, the original or its certified equivalent is required.
If a student chooses to submit his/her assignment via the Internet off the campus, it is the responsibility of the student to guarantee the accessibility of the Internet. Not being able to access to the Internet at the location which is off the campus is not an excuse for extension.
You are allowed to use the materials from the text book and also any materials produced by your lecturer, Dr Wanli Ma, without formal referencing. The materials quoted from any other sources should be properly referenced. Your own writing in your report should account for at least 70% of the content. After reading your report, one should have a basic understanding on the relevant topics without referring to any other sources. Please write concisely and clearly. A report with just a collection of key words or phrases won’t attract any mark.
Please note:
• The textbooks are your primary sources of information.
• Paraphrasing from the other sources without the correct context won’t attract any mark.
• Copying from any sources will be reported as a plagiarism attempt, and upon being proven, a proper disciplinary action will be taken.
1. [5 marks] An organization has 2 server computers and a number of desktop computers and a few printers. All of them are connected together via an internal network, and the network is connected to the Internet via the border router of the organization. From the outside of the organization, on the Internet, only these 2 server computers are visible. One of them is the email server (IP address: e1.e2.e3.e4), and the other one is the web server (IP address: w1.w2.w3.w4). In other words, only these 2 server computers accept requesting incoming network traffic. All desktop computers are allowed to access the Internet, without any restriction. Therefore, they accept responding incoming network traffic, but not accepting any requesting incoming network traffic.
• [3 marks] Please design the network and draw the network diagram. You have the freedom to assume the internal network structure. In the diagram, in addition to the 2 servers, you should also include a few desktop computers and a printer. Please explain the rationale on why you put a computer or a printer in its designated location, 1 example for each location. A subnet (or a segment) is regarded as the same location. (hint: a firewall or a few firewalls, depending on your design, are needed to regulate the network traffic)
• [2 marks] Please write down the firewall rules to fulfil the access requirement of the organization. Please also explain the meaning of each firewall rule. If you have multiple firewalls, you should explain to which firewall each of the rules belongs. Below is a set of sample firewall rules. Please follow the sample firewall rule format to write down your firewall rules. Please also be advised that the order of the rules matters.
The meaning of the columns of the sample firewall rules in the screen dump is as follows. Please use only the information provided here and the textbook for your assignment. The information provided here is overly simplified from iptables manual to make the assignment manageable.
• action – ACCEPT means accepting the connection, and REJECT means not.
• prot – the protocol of the connection, e.g., tcp, udp, icmp, and all etc.;
• opt – please ignore;
• source – source IP address of the packet;
• destination – destination IP address of the packet, plus extra information, for example: o “tcp dpt: https” means that the TCP port of the destination host is https.
o state lists the connection state for the firewall to match on to perform the action of the rule. RELATED: the connection is new, but is related to another. connection already permitted; ESTABLISHED: the connection is already established.
o reject-with: please ignore. No need to include it in your assignment.
The textbooks are your reference: Week 1 slides; Stallings: Chapter 9.
2. [10 marks] Please write a summary to briefly explain to senior managers, who know very little on computer security but have a general understanding of IT, on what a buffer overflow problem is and what the consequences of a buffer overflow problem could cause [3 marks]. What programming techniques the software development team should adopt to avoid buffer overflow problems in the software it develops [2 marks].
Below is from a Nessus report on a computer.
• [1 marks] pretending that the application is developed by the software development team of this organization, how to fix the problem.
• [2 marks] Accepting the recommendations given by the report, what action you should take? Assuming that this computer is one of the many desktop computers, and an automatic system for software updating is in operation. Write down the operational steps, by following the principle of “one, some, and many”.
• [2 marks] Assuming that this computer is a server computer, please write a brief report to the senior managers, who know very little on computer security but have a general understanding of IT, explaining why the software Firefox (a web browser) should not be installed on the computer. In your report, you should use trusted information sources to explain to your senior managers on the best practices of operating system security administration. The senior managers trust only the text books of this unit, nothing else.
The textbook is your reference: Limoncelli: Chapter 1; Stallings: Chapter 9, 10, 11, 12.
  • Share This:  
  •  Facebook
  •  Twitter
  •  Google+
  •  Stumble
  •  Digg
Email ThisBlogThis!Share to XShare to Facebook

Related Posts:

  • Mass Haul Planning Exercise Mass Haul Planning ExerciseInstructionsDownload the following file from moodle - Civil 2 eworks planning exercise.dwg Plot an A1 copy of Layout 1.The … Read More
  • This assignment must be your own work. It is acceptable to discuss course content with others to improve your This assignment must be your own work. It is acceptable to discuss course content with others to improve your understanding and clarify requirements, … Read More
  • Development of an internal communication program Development of an internal communication programThis assignment will be developed in two parts. Part A will be a report that is aimed at securing supp… Read More
  • As a final project for this class, students must conduct an interview with a human resources or labor relations As a final project for this class, students must conduct an interview with a human resources or labor relations professional and write a paper based o… Read More
  • Write an individual paper on a company in the textiles or fashion industryWrite an individual paper on a company in the textiles or fashion industry. You will apply various product development and production management tools… Read More
Newer Post Older Post Home

0 comments:

Post a Comment

Click Here to Place order

Popular Posts

  • A “criminal minds” Aileen Wournos individual will be your “patient”
     A “criminal minds” Aileen Wournos individual will be your “patient”  A brief history of the patient including diagnoses (documented or your...
  • CEO Jane Lionel has some hard decisions to make with regard to some of the company’
     CEO Jane Lionel has some hard decisions to make with regard to some of the company’solder hands, and even on the eve of that decision, I be...
  • Problem in Supply Chain
    Problem in Supply Chain Problem 2. (Chapter 11: The Storage and Handling System) Compare the constrast private ownership of storage space to...

Recent Posts

Unordered List

Pages

  • Home

Text Widget

Blog Archive

  • November 2022 (20)
  • October 2022 (50)
  • September 2022 (119)
  • August 2022 (107)
  • February 2022 (501)
  • January 2022 (443)
  • December 2021 (488)
  • November 2021 (1574)
  • October 2021 (28)
  • September 2021 (11)
  • July 2021 (8)
  • June 2021 (15)
  • May 2021 (39)
  • April 2021 (15)
  • March 2021 (303)
  • February 2021 (712)
  • January 2021 (903)
  • December 2020 (2)
  • September 2020 (33)
  • April 2016 (5183)
  • March 2016 (3763)
  • February 2016 (4356)
  • January 2016 (1749)
  • December 2015 (22)
  • November 2015 (147)
  • October 2015 (23)

Sample Text

Copyright © 2025 STUDYSHIELDS ASSIGNMENT HELP | Powered by Blogger
Design by Hardeep Asrani | Blogger Theme by NewBloggerThemes.com | Distributed By Gooyaabi Templates