Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- This archive file contains COM 135 Final Project User Manual
- Deadline: ( ), Computer Science - General Computer Science
- Objective
- ABC Invitation Design and XYZ Invitation Printing have decided to merge into one company, A2Z Invitations. ABC is a virtual company with a proprietary website that allows customers to do some preliminary work on invitations and then consult with a designer for the final product. XYZ is a traditional company with a system that allows customers to submit designs and track their orders. It also has a contact management and invoicing system. ABC will be moving its application into the XYZ data center and will be using all of XYZ's back end systems.
- Both companies have experienced data breaches in the past and do not want to have them in the future. A2Z has hired you to do a security analysis of its new network and to recommend how it can be set up in a secure manner. It has budgeted for a capital expenditure (outside of man hours) of $250,000 for hardware and software and $25,000 every year for additional security measures.
- Guidelines
- The Statement of Work objectives are:
- Perform online reconnaissance on XYZ to see what information is available to an attacker. No social engineering of employees is allowed. Use the Week 1 You Decide as the data for this section.
- Perform an analysis of the current XYZ network, using the current network diagram and nmap report Diagram; NMAP and files are below.
- Check the user's password strength. Use the Week 3 You Decide as the data for this section.
- Redesign of network. Current network below.
- System hardening procedures for both IIS and Apache (even if they only use IIS).
- Three complete security policies. Use the Week 5 writing assignment as your starter policy for this section.
- Template for future security policies.
- Your paper must conform to all requirements listed below.
- Requirements
- Papers must be at least 5–10 pages in length, double-spaced.
- Papers must include at least three references outside of the text.
- Paper and references must conform to APA style, including:
- cover page;
- header with student’s name and page number; and
- sections including Introduction, Body, and Conclusion/Summary.
- Milestones
- Each You Decide and other write-ups should be used as the raw material for this report. This report is the analysis of that data.
- Week 1 You Decide
- Week 3 You Decide
- Week 5 writing assignment
- Grading Rubrics
- Category
- Points
- Recon Report
- IP Addresses
- Mail Servers
- WHOIS
- CNAME
- 20
- Current Network Diagram Analysis
- 20
- Quantitative Analysis Ranking of Assets
- 20
- NMAP Analysis
- 20
- Password Cracking Report
- 20
- Redesigned Network Diagram
- 20
- Web Server Hardening Procedure IIS
- 20
- Web Server Hardening Procedure Apache
- 20
- Security Policy Template
- 20
- Three Complete Policies
- 20
- Three Outside References
- 10
- Spelling, Grammar, and APA Formatting
- 10
- Total
- 220
- Best Practices
- You should begin working on this course project on Day 1.
- Official XYZ Network Diagram
- Complete course guide available here - https://bitly.com/12BV7ms
- There is no one to clean up after you and cook healthy meals at college. Some indulgences are okay, but still maintain a nutritious diet, get proper sleep, and take care of yourself and your possessions. Take care of yourself well, study appropriately, attend all your classes and follow a regular schedule. You can get ill from being too stressed or not eating healthy enough.
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement