IT340_IP5
docx
keyboard_arrow_up
School
Colorado Technical University *
*We aren’t endorsed by this school
Course
340-1603B-
Subject
Information Systems
Date
Dec 6, 2023
Type
docx
Pages
18
Uploaded by carant417
Client / Server System and Network Administration
IT340-2104A-01
Instructor: Professor Thomas
October 20, 2021
Table of Contents
Introduction
.....................................................................................................................................
3
Network Architecture
......................................................................................................................
4
Network Diagram
.........................................................................................................................
5
Managing and Protecting Data
........................................................................................................
6
Risk Assessment
.............................................................................................................................
10
Digital Evidence Controls
...............................................................................................................
13
Drive Imaging
.............................................................................................................................
13
Hash Values
................................................................................................................................
13
Chain of Custody
........................................................................................................................
13
Computer Forensic Analysis
...........................................................................................................
14
Wireshark
...................................................................................................................................
14
Autopsy
......................................................................................................................................
14
Recovering Files
.............................................................................................................................
15
Recommendations for Best Practices
............................................................................................
16
References
.....................................................................................................................................
18
Introduction
The company I have chosen is Global Television Sales Corporation, GTSC. GTSC is located
in Charleston, SC and is a locally owned small business employing at any given time between 10
and 20 employees. The employees have different roles such as sales agents, field technicians,
administrative assistants, and team managers. The services they offer are any sort of
telecommunication and security system, they serve as a dealer for Satellite services such as
ViaSat and DIRECTV, for internet and VOIP services such as Comcast, AT&T and Ring Central, as
well as audio and video surveillance.
GTSC was chosen for many reasons including it’s size, it is a manageable size that is not
overwhelming but is also large enough to have some various needs. GTSC has an existing hard-
wired ethernet infrastructure but also uses Wi-Fi so various types of devices are required. GTSC
also relies on being connected and cannot operate if their internal LAN fails. Additionally, GTSC
has been in business for over 20 years and much of their infrastructure and systems are aging so
they may need to consider updates hardware and software in the near future for performance
and security concerns.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Network Architecture
GTSC will be using a wired (ethernet) Local Area Network, (LAN) as well as a Wireless
Local Area Network, (WLAN) which uses Wi-Fi to connect their many clients with one another
and the server. We will be using a Star Topology which means that each client is not connected
directly to one another, but instead is connected to a central hub (switch or router) which is
then responsible for providing the connection and relaying the data to the other clients and the
server (Ashrit, 2020). Our internet is provided by Comcast Business and is a very high-speed
Gigabit connection to support all the users on our LAN.
The equipment required will be a business class modem which is provided by Comcast,
our Internet Service Provider, (ISP), a business class Linksys router to take the signal from the
modem and transfer it to each of the different workstations, as well as provide our Wi-Fi signal,
a Linksys business class ethernet network switch to allow additional clients to connect (
Linksys
business switches - Managed, Unmanaged, Smart
). We also will require a server to store the
company’s data as well as an individual client for each workstation. The individual clients are
either PCs connected by ethernet to the switch or router, or cell phones and tablets connected
to the router by Wi-Fi. All the ethernet cables in the building are Cat5e to support Gigabit
speeds. Each workstation also has a Cisco VOIP phone which is connected by a short Cat5e
patch cable to the PC.
Network Diagram
Managing and Protecting Data
User access to computer resources
User access will be determined by a need to know basis, restricting access
to systems and data based on specific department and individual roles within the
company. The sales department will have access to customer lead information
such as a brief profile of the customer and their contact information but not
billing. Existing customer’s billing information will be restricted to the
administrative team. Field technicians will have access to open work orders but
not customer’s billing information.
There will be an acceptable use policy stating what the computers can be
used for, such as no personal use and not streaming services. Office resources
such as printers and scanners will be limited to supervisors.
Security profiles
Security profiles will be in place based on where the user is attempting to
access data. The most sensitive data must be accessed from an Office PC and
access will be blocked to user’s Home computers and mobile devices.
Passwords
The policy for Passwords will be that all users must create a “strong” password which
consists of at least 8 characters including at least one lower case, one uppercase, one number
and a special character. Passwords will be required to be reset every 6 months and cannot be
set to a previous 2 passwords already used. In addition to Passwords we will use a multi-factor
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
authentication in the form of a SMS sent to the user’s registered cell phone that will provide a
code for them to enter. If an incorrect password is entered 3 times, the user’s account will be
locked after the 3
rd
attempt and they must call Help Desk to get a temporary password that will
allow them to login and prompt them to create a new password.
E-mail
According to (Talamantez, 2020), some basic policy guidelines are to prohibit personal
use of company email as best as possible. It should also be specified that company’s private
information, or “trade secrets” should not be emailed to a third party. User’s need to be
educated and advised not to open attachments from third party or unrecognized senders as
these could be viruses or spam. Users should also be advised to use professional and
appropriate language in their email communications.
Internet access
As previous outlined in the company resource section, an Acceptable Use policy will be
in place. Absolutely prohibited websites would be anything regarding illegal activities,
violence, or pornography. Casual web browsing will be allowed during lunches and breaks
such as reading the news regarding industry updates and business-related events. Streaming
music or video will absolutely be prohibited to conserve bandwidth.
Antivirus
Antivirus software will be Windows Defender. The policy will be that the users should,
under no circumstances, disable the anti-virus or install any sort of mal-ware or third-party
app to interfere with its operation.
Backup
System-wide backups of company servers will be handled by system administrators and
will not be the personal responsibility of each user. The user’s responsibility will be to
ensure that important documents are saved and located on the central server and not on
their personal PC, in case of a hardware failure on their personal client.
System patches
Users should update their system as soon as the newest update is released. The policy
will be that if the user does not download and install the update and then restart their
computer within 7 days from the release, then their computer will force restart and install
the update. Regular notices will go out if individual systems such as Java need to be updated
and will provide the timeline as far as when their previous version will no longer be
compatible with the latest update.
Remote access
Remote access generally will not be used on a regular basis but in a time of emergency
such as a natural disaster, severe weather, or health pandemic, it may be authorized. When
accessing company resources, employees will be required to be connected through a VPN,
Virtual Private Network.
Intrusion detection
Intrusion detection will be the responsibility of the system administrator who will
monitor network activity for any suspicious activity when it comes to web sites frequently
visited, network bandwidth consumed, and time and date of access. If an intrusion is
detected, the system administrator should take the necessary actions to stop the attack,
identify what damage was done, and then perform damage recovery. Required will be an
Incident Handling Form to document any security breach, and all security incidents will be
logged in an Incident Log.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Risk Assessment
System assets include all networking hardware such as the cables, routers, switches and
servers as well as individual clients, (employee’s computers) and the mainframe systems such as
the network server. Assets also include data records such as client lists, client account
information, employee data for Human Resources purposes, as well as internal proprietary
information such as business plans and the business model of the company. Most software that
we use is purchased from a vendor such as Microsoft Office or Windows and could easily be
downloaded since we maintain an account with them, so it is not really at risk of being lost in
the case of an emergency.
Security policies for software and acceptable use have been defined in the previous section.
Security procedures need to be implemented as far as the physical access goes to the facilities
and access to hardware. This needs to be implemented in the form of identifying who has
access to the building at what time. Individuals need to be designated as “keyholders” who can
unlock the entrance doors and individuals who are not a keyholder do not need to be allowed
access if a keyholder is not present. Also, the main server and router need to be locked in an
equipment room with limited access only by IT personnel. This protects the company external
vulnerabilities such as strangers, vandals or thieves as well as internal vulnerabilities such as
untrustworthy employees.
Checking for patches and updates will be a weekly task assigned to the IT Manager. The IT
manager will check the software developer’s publications to see if anything new has been
released as well as read security blogs and news sources for possible widespread vulnerabilities.
The download, installation and update of patches will be a weekly requirement for all
employees.
In addition to having dedicated keyholders, physical security will be reenforced by
conducting a perimeter check ensuring all of the building and parking lot are covered by lighting
at night. Security cameras will be reviewed to ensure they are positioned to provide complete
visibility with no blind spots. The DVR footage from the security cameras will be reviewed to
confirm that all cameras are functioning and all footage is being properly recorded in the case of
needing to be reviewed. Also for physical security, the alarm system should be tested to ensure
that it alerts in the case of a breech. The physical IT equipment room should also be attempted
to be accessed to see if someone can breech the security without a key.
Some attempts should be made to access unauthorized data as a user without access, for
example, the IT manager probing for vulnerabilities should log in as a sales agent and attempt to
access data restricted for HR. The manager can then attempt to guess the password or brute
force attack it. If our testing is unsuccessful then when know the security in place will be
effective. We can also hire a low cost “white hat hacking” company or “penetration testing”
company to attempt to probe our system for any vulnerabilities and see if there are ways to
access restricted content that we did not anticipate. Security training should be provided to all
employees to educate them on the best ways to create and manage secure passwords.
A 2019
study conducted by Microsoft determined that two factor authentication effectively blocks
automated attacks up to 99.9% of the time (Bott, 2021).
The effects of a system breech could be catastrophic. If our systems were compromised, our
server could be taken offline which would make conducting business as usual impossible.
Client’s specific account information could be compromised which could lead to lawsuits. The
likelihood of these events are very slim as we are such a small company, employing less than 20
people, but still have to be protected against. The level of risk we are comfortable taking would
be classified as moderate. We do not have the budget for a massive security investment and do
not have the anticipation of a large-scale attack due to the minimum value of any data an
attacker could steal, and because all of our equipment is easily replaceable with only a few
thousand dollars.
Risk
Action
Recommendation
Video surveillance
Viewed DVR footage
N/A
Power failure
Disconnected power for test
Purchase battery backup
Hardware failure
Test all equipment
Have spare backup equipment and on backup servers
Internal Data Security
Send fake phishing attempts
A) Limit user access to certain directories "needs based"
B) Employee security training
External Data Security
Attempt brute force login
Enforce 2FA
Fire
Test fire alarm
Routine fire drills, extinguisher inspections
External Hackers
Hire white hat hacker to test
Employ firewall and security measures as advised
Security Patches
Check update version
Update all systems weekly
Natural disaster
n/a
Configure remote access for employees
Internal Employees
Audit list of users
Delete terminated employees
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Digital Evidence Controls
There are three main methods for preserving digital evidence for computer forensic
analysis. The three methods we will be looking at are: Drive Imaging, Hash Values and Chain of
Custody (Hamilton, 2021).
Drive Imaging
consists of creating a physical copy of the entire drives being analyzed. A real-
world or contemporary comparison could be along the lines of taking a photograph of a crime
scene and then studying the photograph for clues instead of analyzing the scene in person.
Hamilton notes that the forensics should take place on the copied drive and not the original
source in order to preserve its integrity.
Hash Values
authenticate the integrity of a file by ensuring that is exactly a duplicate of the
original file. The algorithms that create a hash value create a unique value for every single
individual file, meaning that even one bit or digit was changed, the hash value on the altered
file would be different from the original, indicating a modification or alteration took place.
Chain of Custody
is a critical documentation process to log where all evidence has been
transferred to and who has been in position of it. If there was a gap in the record, then it could
be argued legally that during that time evidence could have been tapered with.
Computer Forensic Analysis
Wireshark
is the first Forensic tool I would recommend that our IT department utilize.
Wireshark is available for Windows and Unix based systems such as Linux. It captures packets
that are transmitted over Wi-Fi and displays who is requesting what information. It is an Open-
Source Software so it is free from fees or licensing and will be a cost-effective means of network
monitoring for the business (
Wireshark Introduction
).
Autopsy
is the second forensic tool should be implemented, which is a GUI to
Sleuth Kit,
which helps analyze disk images. the reason this tool was chosen is because it utilizes Hash
Filtering, to identify when changes were made, and it shows a Timeline Analysis for a drive
image. Disk imaging comparison is important because if there is a suspected security breech,
comparing images of a disk from before and after the incident will allow us to see exactly what
was changed, when it was changed, and hopefully identify who it was changed by. Autopsy is
also free, which will help us minimize costs (
Autopsy
).
Recovering Files
According to (
Computer forensics: Recovering deleted files
2018), some basic methods of
recovering deleted files could be as simple as checking a recycling bin on a device, as most
devices ranging from smartphones to Personal Computers have a recycling bin sort of function.
Another more advanced method could be to scan the entire hard drive. When Windows deletes
a file it does not immediately erase the data from the drive, instead it deletes the path to that
file, which makes it seem like the data is no longer there since there is not a “road map” to find
it. The data remains on the disk until it is over written. By scanning the drive in detail, deleted
files that have not yet been overwritten can be recovered.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Recommendations for Best Practices
In summary, we have chosen a star topology for our architecture so that if any one of
our clients fails, the rest will not be affected as they would be in a bus or ring topology. We have
implemented both wired and wi-fi connections for speed and reliability but also to provide
flexibility and connection for smaller devices such as phones or tablets that do not have an
ethernet port. In the star topology, the only failure that could impact the system would be our
main server or router, of which we have backup equipment to rapidly replace. The reason we
are using all Linksys networking equipment is so that we can have a single company for a point
of contact if customer service is required and we don't have to worry about compatibility issues,
and setup and configuration will be familiar on all devices.
For security, we recommend users have restricted access on a "need to know" basis
based on their job role and what data they need to perform their duties. We have also
established a company policy for Password strength, expiration dates, two factor authentication
and lockout scenarios in the event of an attempt to guess a password. We have created an
acceptable use policy
that defines how company email as well as internet resources can be
used.
System administrators will be responsible for implementing Antivirus Software, creating
data backups, and installing regular system patches to ensure all programs and operating
systems are up to date with the most recent security updates.
Some recommendations from our Risk Assessment include purchasing a battery backup,
purchasing spare equipment (extra routers and switches as well as spare hard drives and
individual clients for each user), and providing security training to all employees. Administrators
are also required to be familiar with Forensic programs such as Wireshark and Autopsy and will
monitor activity logs on the network and the server drives. Another best practice will be for the
administrators to regularly audit the list of users to remove access for terminated employees.
This plan should be implemented because with these steps in place, a secure and
reliable network will be established that will have minimum risk to threats from both internal
employees and external attackers. Regular security training should be conducted annually as a
refresher for all existing employees, and security training should be included with onboarding
training for new hires. It is also recommended that in the event an employee changes their role
within the company that additional training be provided for their new position and the security
risks and expectations of the new role.
References
Ashrit, L. (2020, July 2).
LAN (Local Area Network) - Topology, Types, Applications, Advantages
.
electricalfundablog.com. Retrieved September 23, 2021, from
https://electricalfundablog.com/lan-local-area-network-topology-types/
Linksys business switches - Managed, Unmanaged, Smart
. Linksys. (n.d.). Retrieved September
23, 2021, from
https://www.linksys.com/us/c/business-network-switches/
Talamantez, J. (2020, November 24).
Back to basics: How to write a company email policy
.
Advance2000. Retrieved September 30, 2021, from
https://www.advance2000.com/write-
email-policy/
Bott, E. (2021, April 15). Better than the best password: How to use 2FA to improve your
security. ZDNet. Retrieved October 4, 2021, from
https://www.zdnet.com/article/better-
than-the-best-password-how-to-use-2fa-to-improve-your-security/#:~:text=A
%202019%20report%20from%20Microsoft,from%20Google%20offered%20similar
%20conclusions
Hamilton, M. (2021).
3 methods to preserve digital evidence for computer forensics
. Critical
Insight. Retrieved October 14, 2021, from
https://www.criticalinsight.com/resources/news/article/3-methods-to-preserve-digital-
evidence-for-computer-forensics
Wireshark Introduction
. Wireshark. (n.d.). Retrieved October 14, 2021, from
https://www.wireshark.org/docs/wsug_html_chunked/ChapterIntroduction.html#ChIntro
Features.
Autopsy
. Sleuthkit. (n.d.). Retrieved October 14, 2021, from
https://www.sleuthkit.org/autopsy/.
Computer forensics: Recovering deleted files
. Atlantic Data Forensics. (2018, December 19).
Retrieved October 14, 2021, from
https://www.atlanticdf.com/blog/2018/11/20/computer-forensics-recovering-deleted-
files/
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help