Assessment type: Problem Based Scenario – individual report and presentation Purpose: This assessment will allow students to demonstrate a Network design based on a real time scenario. This assessment...

1 answer below »
Assessment type: Problem Based Scenario – individual report and presentation
Purpose: This assessment will allow students to demonstrate a Network design based on a real time
scenario. This assessment contributes to learning outcomes c and d.
Value: 30% (report 25%, presentation 5%) Due Date: Week 11 (report), weeks 12 (presentations)
Topic: Network Design Report and Presentation
Task details: In this assessment, students must demonstrate their understanding of critical thinking in an IT
context by examining given problems and proposing solutions using the methods explored in the unit.
Students will choose a solution, then implement and evaluate their solution. Students must submit a report
that outlines the steps they followed to solve the problems.
The approximate word length is up to 1500 words with topology diagrams. The report should be
presented with supporting material as appendices, such as the calculations for the IP addressing
scheme
Practical assignment brief
Bank of Adelaide has different branches all around Australia, BOA is keen to expand more new
branches in big cities:
• New branch in Sydney (700 users)
• New branch in Melbourne (600 users)
• New branch in Brisbane (500 users)
You are required to design the topology for the four new sub-networks and their connection to the
head office (Adelaide) . You must document each step you have taken, including your research
sources.
You need to come up with a design report and send it to your technical manager.
Report: The report must contain the following sect
• New branch in Perth (400 users)
The BOA uses 187.XY.0.0/16 at the bank headquarters in Adelaide with 1000 users and needs to use
a subnetting structure to incorporate the new cities. Adhering to the subnetting scheme and using
VLSM, assign a subnet address to the networks and their links. Each branch’s offices have 8 levels of
building and access to the Internet is crucial for each office, as well as inter-branch-office networking.
Each branch has 3 servers which are located on the Fifth floor of each branch.
The large branch headquarter is in Adelaide and the new subnets must have connectivity with headquarter
office. You need to think about cost-effectiveness and BOA is aiming to create an INTRANET for its
branches in Australia. You need to think about creating a VPN for this bank. Recently two branches in
Sydney and Melbourne were impacted by DDoS attacks and ransomware attacks. The servers in Sydney
and Melbourne are out of reach and the customers are facing losing their personal information such as
credit card numbers and other related bank details. It can create a big impact on the reputation of BOA
among other competitors. You need to come up with the solutions for these types of attacks and also
physical securities for server rooms.
Note: XY is the last 2 numbers in your student’s ID
Answered 1 days AfterSep 10, 2022

Answer To: Assessment type: Problem Based Scenario – individual report and presentation Purpose: This...

Shubham answered on Sep 12 2022
63 Votes
Identification of problem
Bank of Adelaide has 4 branches and two branches are implicated by ransomware and DDoS attacks. In DDoS attacks, attackers have flooded the server with internet traffic that prevented users of the bank from accessing the connected online services. This type of attack aims to overwhelm the service, network and device o
f the intended target with fake internet traffic and rendering the accessibility for user. One of the biggest issues with this attack is that it is hard to identify and it results in slow downloading and uploading speed and the website becomes unavailable to view (Arora, Yadav and Sharma, 2021). It can result in unusual content and media, dropped internet connection and excessive amount of span. In the bank, users cannot access the service because of a DDoS attack that has disrupted the traffic and of the target server, network and service from its surroundings that is flooded with internet traffic. This attack achieves effectiveness by utilizing multiple compromised computer systems as the source of the traffic. It can exploit machines that include network resources and computers. It is like unexpected traffic that can block the network and prevent regular traffic from arriving at the destination system. In this situation, network and server are targeted by the botnet and every bot requests the target IP address or server that can cause the server to become overwhelmed and it results in denial of service. Every bot is a legitimate internet device that separates the attack traffic from the normal traffic.
Melbourne and Sydney branches have also been attacked with ransomware and it can threaten block and public access to the computer system or server as the data becomes encrypted and the victim has to pay ransom to get the data decrypted. In the current scenario, the user of the bank cannot access the system and the bank will have to pay ransom for getting the system free from attackers. The ransomware scans local device and network connected storage that can make the device vulnerable and makes the local network a potential victim. The ransomware can encrypt important and confidential system files and documents that halt productivity and service. Attackers gain access to the data and blackmail victims to pay ransom by threatening to release confidential data in the public (Wani and Revathi, 2020). It has also decreased productivity of a bank and it is the first step to containment and it can impact the organization. Sophisticated attackers can use ransomware with authors for building multiple versions. Variants used in the codebase can have enough function for changing the payload and methods of attack. It can be led when the user authenticates into the dashboard and launches the campaign.
Topology Diagram
Figure 1: Topology Diagram
Proposed solution
The solution for DDoS attacks requires defining a typical internet pattern for the organization. It will help in understanding the normal traffic pattern and the baseline of the traffic. Creating a DDoS plan can help in defining the plan and it can help the organization in responding quickly and efficiently when the network is being targeted. It requires planning and development of complex infrastructure with a detailed response plan. It includes a system checklist, trained response team and well-defined notification. The use of a firewall can help in keeping the server and system from attack (Varalakshmi,...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here