Secure system design report

En curso Publicado hace 4 años Pagado a la entrega
En curso Pagado a la entrega

You need to design a completely new secure system for Recruit4U. Your design should be presented

in the format of a report (full outline given below) with diagrams where necessary. It

is important that your new system design takes into consideration the fundamental requirements

stipulated by Recruit4U. Furthermore, it is important that the new design is not vulnerable to any attacks that have to do with IP, geographic , location or any form of attack

Recruit4U’s requirements

Required services:

• File storage

• FTP

• SSH

• Mail

• Webmail application

• MySQL databases

• External web site and web applications running on PHP and Perl. These contain both static

and dynamic content, with high volumes of unique visits per day.

• Internal web applications (PHP only), which serve dynamic content

Operability:

• Only authorised client devices can connect to the network

• Should support 400 client machines running Windows 10, but other devices must be supported too e.g. Macs, iPad, Android

• Should support enhanced security for devices from Finance and Management departments

• Must support hot-desking

• File storage must be accessible to all authorised staff

• Different network resources are only available to certain staff

• Staff can access the Internet at any time, apart from prohibited sites

• Support for wireless and wired devices

• Roaming and remote staff should be able to connect to the network

Security:

• The system must be as secure as possible

• The security of client data must be a priority (stored on file storage and MySQL databases)

System Design Report Your report should contain the following information as a minimum:

• System architecture

o Network diagram of the new system architecture

• Services

o Details of the OSs, role and software used to provide each service and a brief justification

o Security considerations and configurations for these services

• Security

o Security technologies that will be deployed

o Configuration of such technologies

o Relevant security techniques that will be used

• Users/Client devices

o Access control mechanisms and parameters

o Authentication mechanisms and parameters

• Policies

• Administration & Management

o Administration considerations and techniques

o Approaches for system maintenance and management

• Redundancy & Failover

o Resilience measures in place to cope with various failures (give example failures for each measure)

Seguridad en Internet Arquitectura de software Desarrollo de software

Nº del proyecto: #19280979

Sobre el proyecto

5 propuestas Proyecto remoto Activo hace 4 años

Adjudicado a:

kaindo2017

I have worked on many papers in report writing, research.I have read and understood your requirement and I know you will never regret, thank you.

₹2361 INR en 3 días
(55 comentarios)
5.8

5 freelancers están ofertando un promedio de ₹10142 por este trabajo

mubashirabbas07

Hello, i can design best secured system for Recruit4U because i have near 6 years of experience in Cyber security and systems deployment. Just contact me i can explain you my way of working. contact me

₹15000 INR en 6 días
(19 comentarios)
4.8
Naivedya24

I will deliver in just 3 days as per your need. I have done same projects many times in my professional career. Thanking you

₹1750 INR en 3 días
(0 comentarios)
0.0