An organization has 2 server computers and a number of desktop computers and a few printers. All of them are connected together via an internal network, and the network is connected to the Internet via the border router of the organization.
An organization has 2 server computers and a number of desktop computers and a few printers
1. [5 marks] An organization has 2 server computers and a number of desktop computers and a few printers. All of them are connected together via an internal network, and the network is connected to the Internet via the border router of the organization. From the outside of the organization, on the Internet, only these 2 server computers are visible. One of them is the email server (IP address: e1.e2.e3.e4), and also the other one is the web server (IP address: w1.w2.w3.w4). In other words, only these 2 server computers accept requesting incoming network traffic. All desktop computers are to access the Internet, without any restriction. Therefore, they accept responding incoming network traffic, but not accepting any requesting incoming network traffic.
• [3 marks] Please design the network and draw the network diagram. You have the freedom to assume the internal network structure. In the diagram, in addition to the 2 servers, you should also include a few desktop computers and a printer. Please explain the rationale on why you put a computer or a printer in its designated location, 1 example for each location. A subnet (or a segment) is regard as the same location. (hint: a firewall or a few firewalls, depending on your design, are needed to regulate the network traffic)
• [2 mark] Please write down the firewall rules to fulfil the access requirement of the organization. Please follow the sample firewall rule (below) format to write down your firewall rules.
The textbooks are your reference: Week 1 slides; Stallings: Chapter 9. ‘
2. [5 marks]
Please write a summary to briefly explain to senior managers, who know very little on computer security but have a general understanding of IT, on what a buffer overflow problem is and what the consequences of a buffer overflow problem could cause [1 mark].
What programming techniques the software development team should adopt to avoid buffer overflow problems in the software it develops [1 mark].
Below is from a Nessus report on a computer.
• [1 mark] Pretending that the application is developed by the software development team of this organization, how to fix the problem.
• [1 mark] Accepting the recommendations given by the report, what action you should take? Assuming this computer is one of the many desktop computers, and an automatic system for software updating is in operation. Write down the operational steps, by following the principle of “one, some, and many”.
• [1 mark] Firstly, assuming this computer is a server computer, please write a brief report to the senior managers, who know very little on computer security but have a general understanding of IT, also, explaining why the software Firefox (a web browser) should not be installed on the computer. In your report, you should use trusted information sources to explain to your senior managers on the best practices of operating system security administration.
The textbook is your reference: Limoncelli: Chapter 1; Stallings: Chapter 9, 10, 11, 12.