IT340_IP5

.docx

School

Colorado Technical University *

*We aren’t endorsed by this school

Course

340-1603B-

Subject

Information Systems

Date

Dec 6, 2023

Type

docx

Pages

18

Uploaded by carant417

Report
Client / Server System and Network Administration IT340-2104A-01 Instructor: Professor Thomas October 20, 2021
Table of Contents Introduction ..................................................................................................................................... 3 Network Architecture ...................................................................................................................... 4 Network Diagram ......................................................................................................................... 5 Managing and Protecting Data ........................................................................................................ 6 Risk Assessment ............................................................................................................................. 10 Digital Evidence Controls ............................................................................................................... 13 Drive Imaging ............................................................................................................................. 13 Hash Values ................................................................................................................................ 13 Chain of Custody ........................................................................................................................ 13 Computer Forensic Analysis ........................................................................................................... 14 Wireshark ................................................................................................................................... 14 Autopsy ...................................................................................................................................... 14 Recovering Files ............................................................................................................................. 15 Recommendations for Best Practices ............................................................................................ 16 References ..................................................................................................................................... 18
Introduction The company I have chosen is Global Television Sales Corporation, GTSC. GTSC is located in Charleston, SC and is a locally owned small business employing at any given time between 10 and 20 employees. The employees have different roles such as sales agents, field technicians, administrative assistants, and team managers. The services they offer are any sort of telecommunication and security system, they serve as a dealer for Satellite services such as ViaSat and DIRECTV, for internet and VOIP services such as Comcast, AT&T and Ring Central, as well as audio and video surveillance. GTSC was chosen for many reasons including it’s size, it is a manageable size that is not overwhelming but is also large enough to have some various needs. GTSC has an existing hard- wired ethernet infrastructure but also uses Wi-Fi so various types of devices are required. GTSC also relies on being connected and cannot operate if their internal LAN fails. Additionally, GTSC has been in business for over 20 years and much of their infrastructure and systems are aging so they may need to consider updates hardware and software in the near future for performance and security concerns.
Network Architecture GTSC will be using a wired (ethernet) Local Area Network, (LAN) as well as a Wireless Local Area Network, (WLAN) which uses Wi-Fi to connect their many clients with one another and the server. We will be using a Star Topology which means that each client is not connected directly to one another, but instead is connected to a central hub (switch or router) which is then responsible for providing the connection and relaying the data to the other clients and the server (Ashrit, 2020). Our internet is provided by Comcast Business and is a very high-speed Gigabit connection to support all the users on our LAN. The equipment required will be a business class modem which is provided by Comcast, our Internet Service Provider, (ISP), a business class Linksys router to take the signal from the modem and transfer it to each of the different workstations, as well as provide our Wi-Fi signal, a Linksys business class ethernet network switch to allow additional clients to connect ( Linksys business switches - Managed, Unmanaged, Smart ). We also will require a server to store the company’s data as well as an individual client for each workstation. The individual clients are either PCs connected by ethernet to the switch or router, or cell phones and tablets connected to the router by Wi-Fi. All the ethernet cables in the building are Cat5e to support Gigabit speeds. Each workstation also has a Cisco VOIP phone which is connected by a short Cat5e patch cable to the PC.
Network Diagram
Managing and Protecting Data User access to computer resources User access will be determined by a need to know basis, restricting access to systems and data based on specific department and individual roles within the company. The sales department will have access to customer lead information such as a brief profile of the customer and their contact information but not billing. Existing customer’s billing information will be restricted to the administrative team. Field technicians will have access to open work orders but not customer’s billing information. There will be an acceptable use policy stating what the computers can be used for, such as no personal use and not streaming services. Office resources such as printers and scanners will be limited to supervisors. Security profiles Security profiles will be in place based on where the user is attempting to access data. The most sensitive data must be accessed from an Office PC and access will be blocked to user’s Home computers and mobile devices. Passwords The policy for Passwords will be that all users must create a “strong” password which consists of at least 8 characters including at least one lower case, one uppercase, one number and a special character. Passwords will be required to be reset every 6 months and cannot be set to a previous 2 passwords already used. In addition to Passwords we will use a multi-factor
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help