Secure system design report

In Progress Posted 5 years ago Paid on delivery
In Progress Paid on delivery

You need to design a completely new secure system for Recruit4U. Your design should be presented

in the format of a report (full outline given below) with diagrams where necessary. It

is important that your new system design takes into consideration the fundamental requirements

stipulated by Recruit4U. Furthermore, it is important that the new design is not vulnerable to any attacks that have to do with IP, geographic , location or any form of attack

Recruit4U’s requirements

Required services:

• File storage

• FTP

• SSH

• Mail

• Webmail application

• MySQL databases

• External web site and web applications running on PHP and Perl. These contain both static

and dynamic content, with high volumes of unique visits per day.

• Internal web applications (PHP only), which serve dynamic content

Operability:

• Only authorised client devices can connect to the network

• Should support 400 client machines running Windows 10, but other devices must be supported too e.g. Macs, iPad, Android

• Should support enhanced security for devices from Finance and Management departments

• Must support hot-desking

• File storage must be accessible to all authorised staff

• Different network resources are only available to certain staff

• Staff can access the Internet at any time, apart from prohibited sites

• Support for wireless and wired devices

• Roaming and remote staff should be able to connect to the network

Security:

• The system must be as secure as possible

• The security of client data must be a priority (stored on file storage and MySQL databases)

System Design Report Your report should contain the following information as a minimum:

• System architecture

o Network diagram of the new system architecture

• Services

o Details of the OSs, role and software used to provide each service and a brief justification

o Security considerations and configurations for these services

• Security

o Security technologies that will be deployed

o Configuration of such technologies

o Relevant security techniques that will be used

• Users/Client devices

o Access control mechanisms and parameters

o Authentication mechanisms and parameters

• Policies

• Administration & Management

o Administration considerations and techniques

o Approaches for system maintenance and management

• Redundancy & Failover

o Resilience measures in place to cope with various failures (give example failures for each measure)

Internet Security Software Architecture Software Development

Project ID: #19280979

About the project

5 proposals Remote project Active 5 years ago

Awarded to:

kaindo2017

I have worked on many papers in report writing, research.I have read and understood your requirement and I know you will never regret, thank you.

₹2361 INR in 3 days
(55 Reviews)
5.8

5 freelancers are bidding on average ₹10142 for this job

mubashirabbas07

Hello, i can design best secured system for Recruit4U because i have near 6 years of experience in Cyber security and systems deployment. Just contact me i can explain you my way of working. contact me

₹15000 INR in 6 days
(19 Reviews)
4.8
Naivedya24

I will deliver in just 3 days as per your need. I have done same projects many times in my professional career. Thanking you

₹1750 INR in 3 days
(0 Reviews)
0.0