Tuesday, March 20, 2007

Trevor's Tips - System Building Project- Communications

You have been hired by Trevor's Tips as an Information and Communications specialist to set up an illegal betting system. Trevor plans to hire the following staff
  • a secretary to do administrative work such as write letters and memos
  • ten data entry operators to enter phone wagers
  • five sports analysts to analyse the various sporting events, set the odds and enter this data into the sports database
  • a web designer to create the web interface for internet betting.
Trevors has authorised you to purchase desktop computers for himself, you, his secretary, the ten data entry operators and the web designer. He has authorised you to purchase laptops for the sports analysts. Four printers and two print servers have been authorised. Trevor feels that the data entry operators can share one printer, the sports analysts can share one printer, his secretary and himself need their own printers as they may need to print confidential materials.

Task 1
Trevor's first task for you is to draw an annotated diagram showing how all the computers will be networked and identify communications equipment needed for this. Trevor would like to host the web site at his secret location as opposed to hosting it at an ISP. The betting system will contain lots of confidential data such as client names and credit card numbers. He would also like the diagram to address the following security issues:
  • loss of data due to hardware failure
  • loss of confidential data due to external intrusion
  • information theft due to interception of wireless transmission

Task 2
Trevor is very concerned about computer viruses, worms, trojan horses and spyware. He would like you to explain the difference between each of these and propose a company policy to prevent company problems due to them.

Task 3
Although your network diagram addressed the issue of unauthorised access from external sources (hacker/ cracker), Trevor is worried that some of his employees may access information (such as credit card numbers) and steal them. Identify what access controls are and how they can be used to secure confidential data internally.

Task 4
Loss of laptops has lead to the loss of confidential information in a number of organisations. Trevor would like you identify and describe three measures you would recommend that would recommend that would keep confidential information private even if a laptop containing confidential information was lost or stolen.

Task 5
Some clients may want to email their betting information to Trevor's Tips. Describe and recommend a system that will keep this information secure.

2 comments:

Anonymous said...

mr mcwilliams,

i feel like we haven't learnt what we should know to finish this project to the best of our abilities. im stuck. maybe we can go over it on friday?
diana.

Kris Olson said...

Task 1

This is a synthesis of what you have learned. Chapter 9 has several diagrams that should help - such as in the "Connecting Networks" section. Chapter 11 has several ideas that you will want to incorporate as well to address Trevor's concerns.

Task 2
See Chapter 11 of your text book and the blog post titled computer security.

Task 3
Chapter 11 - Unanauthorised access and use section and Information Theft section


Task 4

Computer security blog post and Chapter 11 Information Theft section and High Tech Talk

Task 5

Computer Security blog post, Chapter 11 Internet Security risks and High Tech Talk