Question: Note: The user authentication software is BioSig-ID, but there are no Cloud Computing service!!!! About the company: TheSleepyheads is a growing mattress in a box


Note: The user authentication software is BioSig-ID, but there are no Cloud Computing service!!!!
About the company: TheSleepyheads is a growing mattress in a box company with, now, 3 branches. Some changes have been made to the company networks to accommodate this growth. The Perth branch is still the main branch for the company; however, there are smaller branches in Melbourne, and Christchurch. Each branch now has 5 departments with approximately 50 employees working in each department. The Perth branch now has a mail server, 2 file servers, 2 web servers, a DNS server, and 4 database servers. The smaller branches each now have a mail server, 2 database servers, and two file servers. To the best of Jessica's knowledge, all of the company data, including all employees' usernames and passwords for all branches, are being stored in plaintext form. Jessica is concerned that employees' credentials may be accessed from someone outside of the company and be used to obtain company data. Part III Network Diagram employing Kerberos and Cloud Computing for Perth Branch Employing Kerberos for user authentication and Cloud Computing can be an effective means of protecting the company's valuable data. As such, you are required to design a network diagram for the Perth branch of the company. To do this, you will need to consider the existing devices (see About the company" Perth branch ONLY), user authentication software you recommended in Part I, and Cloud Computing service/s you recommended in Part II. You are required to: a. 1. Draw your proposed network diagram, including: User authentication software b. Cloud Computing service integrated to the Brisbane branch network c. Existing devices (e.g. servers, workstations, router, switches) Continue on Next Page 2. Explain and justify the proposed network diagram with respect to the placement and purpose of each piece of hardware/software, user authentication software and CC service
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
