You are on page 1of 3

ITNE3006

Design Network Infrastructure

Tutorial – 4, Lesson 7

2022
ITNE3006 Tutorial 4

Read the design scenario and answer the given questions.


ElectroMyCycle is a manufacturer of a new electric motorcycle. ElectroMycycle has chosen you to design a new
network that will let the compony scale to a larger size.

ElectroMycycle will support about 200 employees. The network will include a data centre and a new state of
art manufacturing facility. Users in the campus network will access the servers in the data centre from their
PCs.

Electromycycle plans to have a DMZ that connects a web server, a DNS server and an email server. They also
plan to open a branchs sales office in a ciy that 500 miles from headquarters.

Focusing on security,

1. What is ElectroMycycles most important asset that must be protected with security mechanism?
- The data centre is ElectroMyCycle's most valuable asset (Servers. Routers. Switches). All
workstations/devices in the facility, as well as the physical security of the structure. Any entry into
any of these devices or regions might jeopardise ElectroMyCycle's data integrity. Employees'
workstations contain sensitive data, therefore any illegal access may be disastrous. Finally, no
backend information should be accessible to the end user. Only corporate personnel and
administrators should have access to this.
2. What is the biggest security risk that Elecromycle faces?
- The release of customer and staff data is the greatest security risk for ElectroMyCycle. As a result,
security measures are included into every part of the company's policies. The data centre poses
the greatest security threat. All client data can be viewed and potentially destroyed if an intruder
gains access to the main data centre. False identity is the next major security issue, since it allows
employees to bypass security barriers and get access to sensitive data. If an unauthorised
individual gains access to the datacenter premises, the end danger is an authorisation problem.
3. Design a high-level security policy for them.

- The release of customer and staff data is the greatest security risk for ElectroMyCycle. As a result,
security measures are included into every part of the company's policies. The data centre poses
the greatest security threat. All client data can be viewed and potentially destroyed if an intruder
gains access to the main data centre. False identity is the next major security issue, since it allows
employees to bypass security barriers and get access to sensitive data. If an unauthorised
individual gains access to the datacenter premises, the end danger is an authorisation problem.

Authentication Policy: This policy establishes remote location authentication and provides safe
password procedures. The needed password for the password policy contains a lot of
requirements (it can't be found in a dictionary, etc.). There is only one capital letter and one
symbol. There will be no recurring numbers or characters. It can't be a password that's been used
before. With a change, you won't be able to use your old password. A minimum of 10 characters is
required. and must be replaced every three months.) For the purpose of remote authentication.
Employees can verify their identities using two different kinds of identification. (Insert employee
number here.) Password for company account, last four digits of SSN Or any other particular term
that has been built up specifically for this purpose. Privacy Statement: The legality of how
customer data is disclosed is described in this policy. Customer information is never shared with
anybody outside of the organisation. All client data will be stored on a secure data server with
intrusion detection measures in place. Customer data will only be accessible to those who have a
need to know. Computer-technology Guidelines for Purchasing: ElectroMyCycle can acquire,
configure, and audit computer systems and networks under this policy. Throughout each audit. To
conduct a policy check, ElectroMyCycle can request access to each device/computer in the firm. If
any problems emerge, a meeting with the device's owner will be scheduled to address the
problem.

Copyright © 2022 VIT, All Rights Reserved. 2

You might also like