The network diagram presented below is for a local government council in WA. The
ID: 3756766 • Letter: T
Question
The network diagram presented below is for a local government council in WA. The ISP has provided their own device for Internet connectivity and is fully managed by them. As far as the council is concerned, their network’s edge starts at the Cisco ASA firewall. All the servers facing the Internet are hosted in a DMZ and the internal devices access the Internet via the Proxy server.
The following VLANs exist internally:
VLAN1: Active Directory and File Servers
VLAN2: Lan C devices
VLAN3: Lan D devices
Since the local government’s IT department is under-staffed, for quick response to support request, the IT support staff use dedicated management networks that are accessible wireless from anywhere in the building using their laptops. WLAN-1 (wireless LAN) is used for the DMZ management and the WLAN-2 is for internal network management. Since they are the only wireless access points in the organisation, the CEO is provided wireless access to his personal iPad under special consideration.
Lan C and D are dedicated to the various departments of the council staff.
TASK TO DO:
a) Research the devices and topology provided in the network diagram and complete the following tasks in the form of a technical report. Your answers should be specifically for the scenario described above and as per the network diagram provided, rather than generic answers. You should explicitly state any assumptions made in each section.
b) Identify the vulnerabilities in the network with clear indications on what they are, where they are found, and how they expose the organisation to cyber threats.
c) Elaborate upon security countermeasures to reduce the risk that the organisation is facing due to the vulnerabilities identified in (a).
d) Given the type of organisation, formulate the most critical five (5) security policies for reducing the cyber security risks. You must also provide the justification for choosing these five security policies. You may assume there are no security policies in place at this stage.
Proxy Server Web Server Mail Server Internet WLAN-1 AP DMZ Switch Cisco 2960 Internet Modem Cisco ASA Firewall 5585 WLAN-2 AP Lan C Cisco Catalyst 4500 Cisco 2960 Active Directory Server File Server Lan D Cisco 2960Explanation / Answer
Closing Case SOCIAL NETWORKING INITIATIVES BY THE NEW ZEALAND GOVERNMENT
1.
Given the richness of New Zealand’s offerings, do you believe that the portal style of e-government will disappear?
Governments have started using social media top increase internal collaboration among employees and public engagement. This helps in increased participation, increased feedback etc
A portal style may prevail for processes and efficiency. It acts more like a notice board, with a one –way communication predominating. But it is still useful for accessing essential documents like social security cards, bills etc and for transactions. A portal is more formal and helps in storing essential information. Portals allow for more privacy and security
But a social media based initiatives will try to occupy various areas, especially that require the engagement of various stakeholders including the public, officials, experts, NGO’S, corporations etc. Social media is easy to use & participate and is hassle free. This helps in connecting and putting all in one stakeholder in one basket resulting in increased transparency. Social media is more rapid and responsive to queries. In Governments systems buckled by bureaucracy, social media, more than a portal, will cause a paradigm shift in structure and functioning resulting increased efficiency, sped and effectiveness
2.
What are the benefits of the internal initiatives?
Internal networking initiatives
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.