Department Number of Users
Customer Care 10
Sales and Marketing 20
Finance 25
Legal 5
HR 10
Developers 55
Network Team 5
Server Room
Servers +ISP connections
· All the departments must be separated with unique subnet and should not communicate with each other unless there is a special requirement.
· IPs should assign using DHCP.
· ERP and CRM Systems need to be implemented in this in local servers.
· Number of servers required for the Server room need to be Uses static IPs.
· High level of redundancy is expected in network design to eliminate single point of failures and traffic bottle necks.
· Sales and Marketing need to access Network resources using WIFI connectivity.
· Proper methods for networking monitoring and troubleshooting need to be established.
· All possible network security mechanisms should be implemented.
· Develop test cases and conduct verification to test the above Network and analyses the test results against the expected results.
Department Number of Users
Customer Care 10
Sales and Marketing 20
Finance 25
Legal 5
HR 10
Developers 55
Network Team 5
Server Room
Servers +ISP connections
· All the departments must be separated with unique subnet and should not communicate with each other unless there is a special requirement.
· IPs should assign using DHCP.
· ERP and CRM Systems need to be implemented in this in local servers.
· Number of servers required for the Server room need to be Uses static IPs.
· High level of redundancy is expected in network design to eliminate single point of failures and traffic bottle necks.
· Sales and Marketing need to access Network resources using WIFI connectivity.
· Proper methods for networking monitoring and troubleshooting need to be established.
· All possible network security mechanisms should be implemented.
Provide examples for networking software that can be used in above network design.
Department Number of Users
Customer Care 10
Sales and Marketing 20
Finance 25
Legal 5
HR 10
Developers 55
Network Team 5
Server Room
Servers +ISP connections
· All the departments must be separated with unique subnet and should not communicate with each other unless there is a special requirement.
· IPs should assign using DHCP.
· ERP and CRM Systems need to be implemented in this in local servers.
· Number of servers required for the Server room need to be Uses static IPs.
· High level of redundancy is expected in network design to eliminate single point of failures and traffic bottle necks.
· Sales and Marketing need to access Network resources using WIFI connectivity.
· Proper methods for networking monitoring and troubleshooting need to be established.
· All possible network security mechanisms should be implemented.
Recommend servers for the above scenario and justify your selection with valid points.
Given the following host requirements and using the IP address 195. 20. 5.0/18 divide the network using VLSM. 550, 30, 1050, 880, 58, 2, 2, 2
· Discuss the inter-dependence of workstation hardware with networking software and provide examples for networking software.
Describe three things (risks) that can cause damage to computer hardware; and explain measures an organization can use to minimize or prevent the risks.
This is another client-server application. It builds on echoserver and has a more complex protocol based on the well-known series of (very bad) jokes. It is based on the standard Java introduction to distributed systems. The objective is to get it the simple client-server application working on the same machine and then on two different ones. Once you’ve done that the next step is to run a multi-client server version!
The following diagram shows the networked application.
As with the echoserver application, KKClient and KKServer are two processes (programs) that interact via the Socket API. You can run them on the same computer or on different computers (as you did in the last tutorial). You can see that the protocol is more extensive. The following shows the architecture.
Using two examples each, explain the difference between cyber technical vulnerabilities and people‐related vulnerabilities.
Using the stages of an attack below , give two examples of what an attacker would do if the attacker is to achieve the attack
Stages to focus on
a. Reconnaissance
b. Weaponisation
c. Delivery
d. Exploitation
e. Installation
An attack can impact individuals in the home and individuals working in organizations in different ways.
Considering the statement above , describe any two possible individual or personal cyber impacts using examples