logo

CS3609 Cybersecurity Coursework Template

   

Added on  2022-09-10

7 Pages1604 Words31 Views
 | 
 | 
 | 
CS3609 CYBERSECURITY COURSEWORK TEMPLATE
STUDENT NUMBER:______________________
SYSTEM ARCHITECTURE DIAGRAM ( 1 PAGE ):
A diagram depicting the environment (nodes, networks, applications)
SYSTEM ARCHITECTURE DESCRIPTION ( UP TO 2 PAGES ):
CS3609 Cybersecurity Coursework Template_1

A narrative analysis of the environment that covers nodes, networks, and applications. This
must include the articulation of the elements of the office network, identifying possible risks
in the network, devices, and applications (and any assumption made).
Setting up the new office requires a complete Information Technology (IT)
infrastructural setup. In the case of Brunel tech startup, different IT infrastructure would be
required for effective operations. Brunel tech startup would require laptops to be used by
employees while in the office. The laptops should be connected to the office network to
access operational data from an organizational database or from Amazon backup service.
Accessing organizational data requires a secure connection to avoid unauthorized access to
the data. In the work desks, users would be supplied with the network through a WLAN
router. All laptops would be assigned a static Internet Protocol (IP) address to make it
possible to tracker all incoming and outgoing signals in the firewall. Considering
employees would be required to access organizational data from home and through their
personal laptops and smartphones, it would be important to use secure network
connections. Employees are advised not to connect to the organizational databases from
public networks to avoid eavesdropping.
The meeting room needs to be equipped with modern tools and equipment. The
Brunel tech startup meeting room would be installed with a projector that would be used
for presentations. During training sessions within the organization or from outside the
organizations, employees would be able to showcase their work. Important to note is that
projection during the presentation is one of the aspects that firms are adopting to avoid
manual processes such as whiteboards and paper presentations. In the meeting, a gaming
laptop is installed for presentation when connected with the projector. It has gaming
capability to make it possible to present any form of a graphical interface such as 3D
during demonstration and pieces of training. The room is also installed with a voice-over
device that would be used during conference calls. The voice-over devices are very
CS3609 Cybersecurity Coursework Template_2

essential as they are used to conference all stakeholders from different parts of the world.
The machine room is equipped with very sensitive devices such as database and
application server, mail server, network server, and a firewall. A single server would be
used as a database and application server to minimize the cost of IT infrastructure setup. In
this regard, the Linux server in the machine room would host databases and applications.
Organization operational data such as customer and employees’ data would be hosted on
this server. The same Linux server would be used to host applications such as an
organizational website. Some applications hosted in this server would be accessible by
different users from home and each user should be provided with specific access privileges
for security reasons. Employees would be connected to all organizational applications
through a network from the network server. Each user would be assigned an IP address to
the network server to be connected through either Ethernet cable or Wi-Fi. For users to
connect to either the application or database, all requests would be routed to the firewall for
internal security checks. The firewall should be configured to prevent unauthorized users
from accessing organizational data. Notably, Brunel tech startup would require a mail
server which hosts the organization's internal and external mail communications. Each
employee would be provided with an internal mail associated with the Company which
would be the official communication channel either internal or externally. Mails are
commonly used by unauthorized persons to gain access to organizational systems and it is
important to educate employees on responsible. Employees should be sensitive to spam
emails and avoid opening any on their attached documents or links.
With advanced technology, the security of the organizational network and devices
remains an essential aspect. It is important to protect devices, information systems,
CS3609 Cybersecurity Coursework Template_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents