IT340_IP5
.docx
keyboard_arrow_up
School
Colorado Technical University *
*We aren’t endorsed by this school
Course
340-1603B-
Subject
Information Systems
Date
Dec 6, 2023
Type
docx
Pages
18
Uploaded by carant417
Client / Server System and Network Administration
IT340-2104A-01
Instructor: Professor Thomas
October 20, 2021
Table of Contents
Introduction
.....................................................................................................................................
3
Network Architecture
......................................................................................................................
4
Network Diagram
.........................................................................................................................
5
Managing and Protecting Data
........................................................................................................
6
Risk Assessment
.............................................................................................................................
10
Digital Evidence Controls
...............................................................................................................
13
Drive Imaging
.............................................................................................................................
13
Hash Values
................................................................................................................................
13
Chain of Custody
........................................................................................................................
13
Computer Forensic Analysis
...........................................................................................................
14
Wireshark
...................................................................................................................................
14
Autopsy
......................................................................................................................................
14
Recovering Files
.............................................................................................................................
15
Recommendations for Best Practices
............................................................................................
16
References
.....................................................................................................................................
18
Introduction
The company I have chosen is Global Television Sales Corporation, GTSC. GTSC is located
in Charleston, SC and is a locally owned small business employing at any given time between 10
and 20 employees. The employees have different roles such as sales agents, field technicians,
administrative assistants, and team managers. The services they offer are any sort of
telecommunication and security system, they serve as a dealer for Satellite services such as
ViaSat and DIRECTV, for internet and VOIP services such as Comcast, AT&T and Ring Central, as
well as audio and video surveillance.
GTSC was chosen for many reasons including it’s size, it is a manageable size that is not
overwhelming but is also large enough to have some various needs. GTSC has an existing hard-
wired ethernet infrastructure but also uses Wi-Fi so various types of devices are required. GTSC
also relies on being connected and cannot operate if their internal LAN fails. Additionally, GTSC
has been in business for over 20 years and much of their infrastructure and systems are aging so
they may need to consider updates hardware and software in the near future for performance
and security concerns.
Network Architecture
GTSC will be using a wired (ethernet) Local Area Network, (LAN) as well as a Wireless
Local Area Network, (WLAN) which uses Wi-Fi to connect their many clients with one another
and the server. We will be using a Star Topology which means that each client is not connected
directly to one another, but instead is connected to a central hub (switch or router) which is
then responsible for providing the connection and relaying the data to the other clients and the
server (Ashrit, 2020). Our internet is provided by Comcast Business and is a very high-speed
Gigabit connection to support all the users on our LAN.
The equipment required will be a business class modem which is provided by Comcast,
our Internet Service Provider, (ISP), a business class Linksys router to take the signal from the
modem and transfer it to each of the different workstations, as well as provide our Wi-Fi signal,
a Linksys business class ethernet network switch to allow additional clients to connect (
Linksys
business switches - Managed, Unmanaged, Smart
). We also will require a server to store the
company’s data as well as an individual client for each workstation. The individual clients are
either PCs connected by ethernet to the switch or router, or cell phones and tablets connected
to the router by Wi-Fi. All the ethernet cables in the building are Cat5e to support Gigabit
speeds. Each workstation also has a Cisco VOIP phone which is connected by a short Cat5e
patch cable to the PC.
Network Diagram
Managing and Protecting Data
User access to computer resources
User access will be determined by a need to know basis, restricting access
to systems and data based on specific department and individual roles within the
company. The sales department will have access to customer lead information
such as a brief profile of the customer and their contact information but not
billing. Existing customer’s billing information will be restricted to the
administrative team. Field technicians will have access to open work orders but
not customer’s billing information.
There will be an acceptable use policy stating what the computers can be
used for, such as no personal use and not streaming services. Office resources
such as printers and scanners will be limited to supervisors.
Security profiles
Security profiles will be in place based on where the user is attempting to
access data. The most sensitive data must be accessed from an Office PC and
access will be blocked to user’s Home computers and mobile devices.
Passwords
The policy for Passwords will be that all users must create a “strong” password which
consists of at least 8 characters including at least one lower case, one uppercase, one number
and a special character. Passwords will be required to be reset every 6 months and cannot be
set to a previous 2 passwords already used. In addition to Passwords we will use a multi-factor
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help