CSF 3103 Project Specification
CSF 3103 Project Specification
CSF 3103 Project Specification
2
1. Introduction
A group of students will be required to analyze the requirements of the Company XYZ. Following points
to be considered during analysis. Please read the project specification document carefully.
1. Operations
2. Data center
3. Network infrastructure
a. Logical Diagram
b. Physical Diagram
4. Normal Operations
5. Physical Security Issues
6. Disaster Recovery Implementation
a. RAID 1, 3, 5 Implementation
b. Windows Server 2012 cluster implementation
After analysis of the company the group is required to design a Contingency Plan which mainly includes
Incident Response and Disaster Recovery Plan. Once the IR and DR plan is ready a practical
implementation of the solution will be required. The practical implementation will require to setup
RAID 1, 3, 5 and failover cluster configuration on the Windows Server 2012. The project will require at
least 5 weeks of continuous work. You will be working on the project at your own free time, however
one hour of class time per week will be allocated to discuss the project with each team. All the resources
such as operating system, computers and support will be provided by the college.
During the discussion each team member must be present. A team leader will be chosen by the team
members who will be responsible for communication and project progress, and team meetings. Team
members will be selected during the class time in week 7.
Students can use different templates available on the internet to seek help in designing the project
requirements. A proper reference should be listed, if any internet resource is used.
NOTE: Project submission time will be in Week 14 and the presentation will be in the
same week.
Any project submitted late will be penalized by 5% reduction/day
Group Marks: 20% (Project Report including all the design details)
Individual Marks: 10% (Demonstration with questions)
3
2. Project Requirements
Below are the project requirements which each group is supposed to fulfil.
1. Introduction
2. Form Contingency Planning Management Team
3. Draw CPMT organization and structure diagram
4. Conduct Business Impact Analysis
5. Identify preventive controls
6. Ensure plan testing, training, and exercises
4
3. Project Specifications
Company XYZ is a software company which consists of 1500 total staff, employed at the headquarters
and other branches across the country. Its business model relies on electronic transactions with key
customers and suppliers. Company XYZ uses a BizTalk Server implementation for its transactions.
Company XYZ uses BizTalk Server to manage transactions and communications between internal and
external applications. Company XYZ communicates with approximately 85 internal applications and
2300 trading partners. It currently processes approximately 2.5 million documents per month, and
estimates that it will process 6 million documents per month by the end of 2016.
Company XYZ uses BizTalk Server as a message broker to communicate between internal applications
and to process, send, and receive correctly formatted messages to and from its suppliers and customers.
Company XYZ has to process internal and external documents in different formats. This includes flat
files and XML documents.
Company XYZ uses a single firewall to separate its corporate computers from the Internet. As an added
layer of security, Company XYZ incorporates Internet Protocol security (IPsec) communication between
all its corporate servers and workstations that reside within the corporate network. Company XYZ uses
IPsec to encrypt all communications within its internal domain.
Company XYZ uses a file share server to receive flat files. This file share server resides outside its
corporate network and domain. A firewall separates the file share server from the corporate network.
Company XYZ's external partners post their flat file documents on this file share server, and they
communicate with the file share server through an encrypted Point-to-Point Tunneling Protocol (PPTP)
pipeline. Company XYZ protects access to the file share server by partner passwords that expire every
30 days.
Company XYZ has created a custom file-movement application that retrieves the flat file documents
from the file share server and sends them to BizTalk Server for additional processing. The internal
applications for Company XYZ also use the custom file-movement application to pass flat files to
Application Server, transforms these documents and sends them to Company XYZ's trading partners.
Before BizTalk Server transforms the partner data to the internal application formats, it validates that it
has an entry for the sender, receiver, and document type. If BizTalk Server receives a message for which
it does not have an entry for either the sender, receiver, or document type, BizTalk Server rejects the
message, and the operations team of Company XYZ review the message. The internal applications send
messages in a variety of formats.
Company XYZ also receives documents through HTTP from internal and external sources. External
partners post their documents to a Web server outside the corporate network. A firewall separates this
Web server from the corporate network. The custom file-movement application also retrieves the
5
documents posted through HTTPS. Company XYZ uses a third-party product to encrypt and sign
messages to its trading partners. As an additional piece of security, Company XYZ performs a nightly
audit on all the servers to make sure they have the correct security settings. Company XYZ logs all
exceptions for review.
Company XYZ uses a Microsoft Exchange server to exchange emails internally and externally. A mail
exchange relay is installed outside the firewall to receive emails, check for any virus infection and then
move the message to the internal exchange server. An antivirus software is installed on the exchange
relay to do the virus check. Outlook web access (OWA) is provided to all the internal users to use the
email system outside the company using Microsoft Outlook software installed on their laptops.
6
5. Data Center Diagram
7
6. Information Technology Department
Company XYZ has an IT department which takes care of the data center, network infrastructure,
Application servers, software and user support. The IT department does not employ any specialized
security specialists, however, it relies on the network engineers to look after security issues. Company is
willing to spend considerable amount in hiring new staff for information security. The company realize
that the information security is more important than responding to an incident and loosing important
data. An organization chart of the company is shown below.
CEO
Assisstant
8
b) Finance Department Organization Chart
CFO
Mgr. Mgr.
Controller Exec. Asst
Accounting Marketing
Senior Markeing
Admin Asst. Audit Supv. Sr. Auditor
Accountant Spec.
PR.
Accountant Auditor
Coordinator
Accountant Auditor
COO
Admin Admin.
Asst. Asst.
9
d) Information Department Organization Chart
CIO
Mgr. Systems Mgr. Applications Mgr. Help Desk Exec. Asst Mgr. Netw
Senior System Senior Systems Senior Help Desk Senior Help Desk Senior Help Desk Ne
Admin Asst.
Admin. Developer Administrator Administrator Administrator A
Senio
Third Shift Supv. Systems Admin. Systems Dev. Help Desk Tech. Help Desk Tech. Help Desk Tech.
Admin Asst.
10
7. Potential Threats and Security Concerns
Company XYZ wants to make sure that it receives and processes only messages from authenticated
sources. Company XYZ also wants to make sure that it can receive and retrieve documents from outside
its corporate network as safely as possible. The firewall that separates Company XYZ's corporate
network from the Internet only lets through traffic from port 80 and port 443. The firewall rejects all
other traffic.
Company XYZ also wants to make sure that their email system is not hacked or cracked because they
heavily rely on the email messages from clients to process their transactions.
Company XYZ also want to protect its data regarding its employees, customers, transactions, financial
and other documents related to business by implementing proper RAID system and cluster systems in
the data center.
Company XYZ wants to make sure that the employees use encrypted USBs only, they would like to
distribute the digital certificate using the domain controllers.
Company XYZ also wants to implement backup process to secure all critical data of the business.
Company XYZ would like to implement physical security as well and central monitoring system.
Following are the recent incidents faced by the company few months ago.
1. The help desk person realized that someone is sending emails from the CEO account, he suspected
an email hack and escalate the Incident to the network team. The CEO assistant had access to the
email account but she was not present in the office at the time of the email sent. The CEO was also at
home and enjoying dinner with his family. The network team did its own checkup and concluded that
email has been initiated by the director account and it’s a legitimate email and not hacked. Since the
company do not have an information security team, they could not figure out on who has sent the
email to the system and the case was closed.
2. The helpdesk team reported that one of the BizTalk server failed to respond in the middle of the day,
when most of the transactions were processing. A cluster of BizTalk servers is running in the
datacenter and suppose to take over if one of the server fails, but it did not happen. A network team
member examined the situation and figured out that the problem in the network connection did not
force the redundant server to take over. However, it took him long time to fix the issue, which
resulted in many transaction failure and loss of revenue.
3. Many of the employees in the company report virus threats and assume hacking and cracking.
Therefore they have started copying their important data on the USB hard Drives and keep them in
their laptop bags in case of emergency. The employees are allowed to bring in the USB flash drives,
USB hard Drives and any other media into the company.
4. The company personal security officer reported that he has spotted a person roaming in the office
area. This person do not seems to be an employee or any partner vendor engineer or support. He
11
reported the issue to the management and the person was just asked to leave the premises without
any interrogation. The management is concerned about the physical security of the company. They
are concerned on privacy, identity theft, social engineering and physical theft of any device.
5. One of the female employee reported that another colleague is harassing her by sending personal
emails. The company management intervened and gave warning to the employee if this is reported
again he will be fired. However, the employee threatened the management if they fired him he will
sue the company and fight for his rights.
12
10. Report Assessment Criteria
1. Presentation 10 8 6 4 2 0
Appearance, format, cover page information,
sub-headings, font style, font size, spacing
Introduction
Form Contingency Planning Management Team
Draw CPMT organization and structure
diagram
Conduct Business Impact Analysis
Identify preventive controls
Ensure plan testing, training, and exercises
Contingency Plan Total Marks
13
4. Disaster Recovery Document 10 8 6 4 2 0
14
11. Project Demonstration Rubric
Demo: Windows A Clear Demonstration is Demonstration provides limited Demonstration do not provide
provided for topology, information on topology, proper discussion on topology,
connections, IP addresses and connections, IP addresses and connections, IP address and
domain configuration. domain configuration. domain configuration.
Demo: Cluster A clear demonstration is provided Demonstration provides limited Demonstration do not provide
on cluster configuration information on cluster information on cluster
including iSCSI, quorum, shared configuration including iSCSI, configuration including iSCSI,
storage, and health check. quorum, shared storage, and quorum, shared storage, and
health check. health check.
15
Demo: NAS A Clear Demonstration is Demonstration provides limited Demonstration do not
provided for NAS configuration, discussion on NAS configuration, provides clear discussion on
including adding a storage including adding a storage NAS configuration, including
device, allocation, and device, allocation, and adding a storage device,
configuration for Windows server configuration for Windows server allocation, and configuration
2012. 2012. for Windows server 2012.
T
o
16
12. Project Groups
17
13. Report Format Guidelines
You should include the following items in this order in your report:
1. Title (cover) page Project title: Arial, font size 14, capitals, bold, centered.
2. Proposal page Title: Arial, font size 12, capitals, bold, centered.
Text in indented paragraphs: Arial, font size 12, 1.5 spacing, justified.
3. Body Section headings: Arial, font size 14, capitals, bold, centered, underlined.
Text in indented paragraphs: Arial, font size 12, 1.5 spacing, justified.
Titles for tables, charts, graphics: Arial, font size 10, centered, italic.
4. Bibliography Heading: Arial, font size 14, capitals, bold, centered, underlined
18
Sources: Arial, font size 12, 1.5 spacing. List sources in alphabetical order, MLA style (see
page 15)
Use your spell-checker and use your own words. If you copy any material, it should be in quotation marks (“ “) and
footnoted. You should normally use your own words in the report unless you want to cite a fact related to setting up your
business. Plagiarism is not tolerated at HCT.
19
Sample title page
Project Report
Group Number
20
Students’ names & ID numbers:
Section number:
Submitted To:
Submission Date:
Note: in your own bibliography, do NOT write the headings (e.g. do NOT write “BOOK, ONE AUTHOR”)
BOOK, AN EDITOR
21
Lopate, Philip, ed. The Art of the Personal Essay: an Anthology from the Classical Era to the Present. New York: Anchor-
Doubleday, 1994.
WEB SITES
BASIC ENTRY
Miller, Elizabeth. “Update on the Dracula Park.” Dracula’s Homepage. 12 Oct 2003. Memorial Institute of Newfoundland,
Newfoundland, Canada. 6 Nov. 2003 <http://www.ucs.mon.ca/%7Eemiller/ >.
NO AUTHOR
Dutch Recipes. 9 Jun. 1998. 16 Sept. 2003 <http://www.fortunecity.com/victorian/verona/190/eten.htm>.
22
DATABASES
PROQUEST
Lichtblau, Eric. “Administration Plans Defense of Terror Law.” New York Times 19 Aug. 2003, late ed. (East Coast): A-1.
ProQuest. Abu Dhabi Men’s College, Abu Dhabi. 22 Oct. 2004.
< http://www.proquest.com >.
23