Assignment 02 IT Infrastructure 05042023 054326pm
Assignment 02 IT Infrastructure 05042023 054326pm
Assignment#: 02
Name: M. Amir Roll No: 03-135202-008
Evaluation of CLO-2 Question Marks Obtained
Number Marks
CLO-2 statement
Analyze the requirements and identify the core IT 1 10
infrastructure components for a given scenario.
2 10
Total Marks 20
Instructions: Submit the Assignment on LMS.
Question #1:
Suppose at a company where you are employed, you are responsible for securing a network
server that is being used mainly for data storage, sharing internal applications and for securing
numerous desktop computers connected to the network. Describe the access control that you
would put in place for each and explain why.
Answer:
If I were responsible for securing a network server at a company, I would implement several
access control measures to ensure the security of the server and the desktop computers connected
to the network.
I would implement user authentication and authorization measures for the network server to
ensure that only authorized personnel have access to the server. This could include using strong
passwords, multi-factor authentication, and setting up user accounts with different levels of
access based on their roles and responsibilities within the company.
For the desktop computers connected to the network, I would implement measures such as
firewalls and antivirus software to prevent unauthorized access and protect against malware. I
would also ensure that all software and operating systems are kept up-to-date with the latest
security patches.
These measures are important to protect the company’s data and internal applications from
unauthorized access and potential security threats.
Question #2:
Suppose you are designing a network for a university campus. Identify the security requirements
need to be addressed. Be sure to consider physical as well as electronic security. For electronic
security, be sure to include items like virus checks, firewalls, and encryption protocols employed
in addition to any access controls. Explain how each helps to secure the network.
Answer:
When designing a network for a university campus, there are several security requirements that
need to be addressed to ensure both physical and electronic security.
For physical security, measures such as surveillance cameras, security personnel, and access
controls (e.g., keycards or biometric scanners) can be implemented to prevent unauthorized
access to the network and its components.
For electronic security, several measures can be implemented to protect the network from cyber
threats. These include:
Virus checks: Regular virus scans can be performed on all devices connected to the network to
detect and remove any malware.
Firewalls: Firewalls can be used to monitor and control incoming and outgoing network traffic
based on predetermined security rules.
Encryption: Encryption protocols can be employed to protect sensitive data transmitted over the
network.
Access controls: User authentication and authorization measures can be implemented to ensure
that only authorized personnel have access to the network and its resources.
These measures help to secure the network by preventing unauthorized access, protecting against
malware and other cyber threats, and ensuring the confidentiality and integrity of data
transmitted over the network.
Consider a representation of a
work organization or school
with which you are familiar.
Identify the major
components that characterize
the primary operations
within the
organization and draw a
diagram that represents the
system’s organization. Show
and
identify the links that connect
the various components.
Consider a representation of a
work organization or school
with which you are familiar.
Identify the major
components that characterize
the primary operations
within the
organization and draw a
diagram that represents the
system’s organization. Show
and
identify the links that connect
the various components.
Consider a representation of a
work organization or school
with which you are familiar.
Identify the major
components that characterize
the primary operations
within the
organization and draw a
diagram that represents the
system’s organization. Show
and
identify the links that connect
the various components.