Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

About the company: TheSleepyheads is a growing mattress in a box company with, now, 3 branches. Some changes have been made to the company networks

image text in transcribed

image text in transcribed

image text in transcribed

image text in transcribed

image text in transcribed

About the company: TheSleepyheads is a growing mattress in a box company with, now, 3 branches. Some changes have been made to the company networks to accommodate this growth. The Perth branch is still the main branch for the company; however, there are smaller branches in Melbourne, and Christchurch. Each branch now has 5 departments with approximately 50 employees working in each department. The Perth branch now has a mail server, 2 file servers, 2 web servers, a DNS server, and 4 database servers. The smaller branches each now have a mail server, 2 database servers, and two file servers. To the best of Jessica's knowledge, all of the company data, including all employees' usernames and passwords for all branches, are being stored in plaintext form. Jessica is concerned that employees' credentials may be accessed from someone outside of the company and be used to obtain company data. Part I Kerberos and User Authentication As the company grows, Jessica fears legitimate users may be impersonated to access company network resources. You, as a consultant, know that Kerberos would be the answer to Jessica's requirement regarding user authentication. Your task for this part is to explain how Kerberos cryptography can be used for the user authentication purpose. The following aspects may be explained: Why Kerberos should be chosen for this purpose? Does Kerberos use symmetric or asymmetric cryptography? Explain. How does Kerberos authenticate each client? You may discuss Kerberos Ticket-Granting Server (TGS) and Ticket Granting Ticket (TGT). How does Kerberos tackle the problem of replay attacks? You must also: Recommend a commercial software program for user authentication; and Explain and justify your recommendation clearly. . Part II Cloud Computing and Blockchain for Handling the Company's Data As you were already informed, Jessica wants to keep her company's valuable data secure. She told you that she has heard about Cloud Computing and blockchain, as a result, she wants to know if they could be used to keep the company's data secure. For this part, you are required to: . Explain the possibility of employing Cloud Computing (CC) for the company to protect valuable data. You have to recommend a kind/s of CC service/s to be used for the company's data as well as how data may be sent to an authorised partner securely using the Cloud. You will have to justify why you recommend such CC service/s over the other services. Explain blockchain in detail to Jessica. Furthermore, list and describe any drawbacks and advantages of employing blockchain in general. You are to advise the possibility of using Blockchain to keep the company's data secure and whether blockchain is suitable for this purpose. Explain any drawbacks and advantages of employing blockchain within the company. You will have to explicitly make a recommendation and justification on employing blockchain for storing the company's data. Part III Network Diagram employing Kerberos and Cloud Computing for Perth Branch Employing Kerberos for user authentication and Cloud Computing can be an effective means of protecting the company's valuable data. As such, you are required to design a network diagram for the Perth branch of the company. To do this, you will need to consider the existing devices (see About the company" Perth branch ONLY), user authentication software you recommended in Part I, and Cloud Computing service/s you recommended in Part II. You are required to: a. 1. Draw your proposed network diagram, including: User authentication software b. Cloud Computing service integrated to the Brisbane branch network c. Existing devices (e.g. servers, workstations, router, switches) Continue on Next Page 2. Explain and justify the proposed network diagram with respect to the placement and purpose of each piece of hardware/software, user authentication software and CC service

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Students also viewed these Databases questions

Question

' Do any measures show up for multiple objectives?

Answered: 1 week ago

Question

Draw a picture consisting parts of monocot leaf

Answered: 1 week ago