Secure system design report

Inaendelea Ilichapishwa Miaka 5 iliyopita Kulipwa wakati wa kujifungua
Inaendelea Kulipwa wakati wa kujifungua

You need to design a completely new secure system for Recruit4U. Your design should be presented

in the format of a report (full outline given below) with diagrams where necessary. It

is important that your new system design takes into consideration the fundamental requirements

stipulated by Recruit4U. Furthermore, it is important that the new design is not vulnerable to any attacks that have to do with IP, geographic , location or any form of attack

Recruit4U’s requirements

Required services:

• File storage

• FTP

• SSH

• Mail

• Webmail application

• MySQL databases

• External web site and web applications running on PHP and Perl. These contain both static

and dynamic content, with high volumes of unique visits per day.

• Internal web applications (PHP only), which serve dynamic content

Operability:

• Only authorised client devices can connect to the network

• Should support 400 client machines running Windows 10, but other devices must be supported too e.g. Macs, iPad, Android

• Should support enhanced security for devices from Finance and Management departments

• Must support hot-desking

• File storage must be accessible to all authorised staff

• Different network resources are only available to certain staff

• Staff can access the Internet at any time, apart from prohibited sites

• Support for wireless and wired devices

• Roaming and remote staff should be able to connect to the network

Security:

• The system must be as secure as possible

• The security of client data must be a priority (stored on file storage and MySQL databases)

System Design Report Your report should contain the following information as a minimum:

• System architecture

o Network diagram of the new system architecture

• Services

o Details of the OSs, role and software used to provide each service and a brief justification

o Security considerations and configurations for these services

• Security

o Security technologies that will be deployed

o Configuration of such technologies

o Relevant security techniques that will be used

• Users/Client devices

o Access control mechanisms and parameters

o Authentication mechanisms and parameters

• Policies

• Administration & Management

o Administration considerations and techniques

o Approaches for system maintenance and management

• Redundancy & Failover

o Resilience measures in place to cope with various failures (give example failures for each measure)

Usalama wa Mtandao Software Architecture Ujenzi wa Software

Kitambulisho cha Mradi: #19280979

Kuhusu mradi

5 mapendekezo Mradi wa mbali Ipo mtandaoni %project.latestActivity_relativeTime|badilisha%

Imetuzwa kwa:

kaindo2017

I have worked on many papers in report writing, research.I have read and understood your requirement and I know you will never regret, thank you.

₹2361 INR kwa siku 3
(Maoni 55)
5.8

5 wafanyakazi huru wanazabuni wastani wa ₹10142 kwa kazi hii

mubashirabbas07

Hello, i can design best secured system for Recruit4U because i have near 6 years of experience in Cyber security and systems deployment. Just contact me i can explain you my way of working. contact me

₹15000 INR kwa siku 6
(Maoni 19)
4.8
Naivedya24

I will deliver in just 3 days as per your need. I have done same projects many times in my professional career. Thanking you

₹1750 INR kwa siku 3
(Maoni 0)
0.0