Requirements for accessing resources
The Orchid Bridge University which is private college provides degree courses to the student of Information Technology Area
This power Pont presentation is describe In brief about the network infrastructures that will enables both students and the staff to access and share resources from same network.
This proposed Framework will enhance and fulfil the daily operational requirements of the school.
In order to access the resources form the system of the school the user must have some of the basic requirements of computer technology.
The requirements are as follows:
Operating system
User access management & network services
Communication and resource management
Backup
It security
This system is one of the most advanced system that is to be included in the school in this world of the technology. Some of the major aspects that will be covered with this system are :
Centralize Management- It will provide a central management system for all the members of the school.
Scalability- The system is flexible for user of multiple domains
Security- The data in the system are secured and safe.
Naming- The administration can easily access all the active Ips of the systems.
Domain Tree
A common schema which shares several domains of configurations form as domain tree. These tress are also linked together using trusted relationships.
The Diagram shows the level of the users of the university.
Login Permissions
The management use the feature of the windows authentication feature which is one of the mot convenient feature.
It helps the administration to control all the aspect of the types of the authentication protocols and the other such factors.
Each user of the system is provided with a unique set of IDs and passwords for the purpose of login and the management have a full control of it (Langer, 2017).
This is one of the main feature of the system, File sharing helps the users to access huge amount of information related to any course in the college.
All the files and the information’s are stored in the servers that are hosted by the IT department (Yao et al 2015).
There are sub categories of the directory available to the users of the system.
Full Control
Read & Execute
Modify
List Folder Contents
Read
Write.
Printing
The users of system can use the printing service, which can be subject to availability depending on the document and the user.
This can be accessed though several physical printing ports that are available.
Proposed framework
The printers are available through the Wi-Fi service
There are two printers available for this purpose all time.
Printer service1 hosted @ 192.168.1.100
Printer2 service hosted @ 192.168.1.100
The System uses the technique of the CPN or the Virtual private network for the purpose of the File sharing. This makes the system more secure.
Some of the major features of the VPN are
The cost of the system is very low and it also uses low bandwidth for the use of the equipment.
Enhance the security performances of the system.
This can be easily managed, that is reducing the work of the management.
The System uses some of the best known technology for the purpose of authentication systems.
The certification centre can control, identify any user of the system effectively. The certificate helps to reduce the chances of forgery,.
Radius server is used for the purpose of maintaining the range of the network that is available.
It has some terms and policies for the users:
The VPN is only made for the school Staff.
The VPN service is Free
The system consist of settings that can backup the data are uploaded in the system.
The basic purpose of the system is to ensure that with time when the amount of the data will increase the important information does not gets lost and can be backtracked.
Types of the Backup- There are 3types of backup that can be made.
Full Backup system: Under this process all the information in the server and the machines will be copied to another server.
Incremental Backup: IN this process the data from the last backup will be copied.
Differential Backup : It is similar to incremental backup, but only the data that are not copied in the last backup status.
There are a number of backup polies that are to be implemented for the system.
The basic policy is to make sure that at every point of time there is at least a single data restoration process available.
The Administration has to make sure that the data is backup up at fixed interval of time without any error.
The administration must keep proper documentation for the backup data (Siponen, Mahmood & Pahnila, 2014).
This must include the catalogue of the backup data.
The Type of the backup that has to be done,
The monthly backup data test results.
The server administrator is responsible for the data that is been backed up and in which type the data comes under (Peltier, 2016).
Active Directory
The types of the data backup are :
Financial & accounting records
Staff & Student
Exam Transcripts
Teaching materials
Exam and Answerers
Data Recovery Process
In case of any emergency if the data is to be recovered, then the steps shall be as
In case of Emergency :
Attempts have to made to recover with in 1 day , of the last full backup that is done.
This is not a subject to natural disaster where the backup tapes are lost.
Non emergency :
The last incremental data is to be downloaded with in 3days of the requirement.
The staff member can request for backup by proving basic information like the file name, directory, last backup data.
In order to make the system secured many of modern technologies have been used by the administrator of the systems.
Both the systems and the data form are equally important for the system administrator to keep safe (Safa, Von Solms & Furnell 2016).
Some of the security steps that are taken are as follows:
Physical Security: CCTV surveillance, Secured Data Centres, Laptop locks’
Logical security : Biometric locks, Passwords Protections (Soomro, Shah & Ahmed, 2016).
Operational Security: Anti virus security systems, OS hardening, New patches Systems.
Power Backup:
Personal Data Backup
The purpose of monitoring is to maintain a proper consistency of the directory and the need of backup.
Need of the monitoring depends on
Reliability of the data.
Improvement of the data files.
Ensure the critical services that are running
Control the system Optimization.
Availability of Email Servers
In Order to make the email servers more secure and always available there are needs of the list of the deliverables:
Compatibility of the windows server.
Compatibility of the contOS servers (Lu et al., 2015 ).
Solutions for the styles of the problems
Axigen
Microsoft Exchange Server
Postfix Mail Server
References
Peltier, T. R. (2016). Information Security Policies, Procedures, and Standards: guidelines for effective information security management. Auerbach Publications.
Siponen, M., Mahmood, M. A., & Pahnila, S. (2014). Employees’ adherence to information security policies: An exploratory field study. Information & management, 51(2), 217-224.
Safa, N. S., Von Solms, R., & Furnell, S. (2016). Information security policy compliance model in organizations. Computers & Security, 56, 70-82.
Soomro, Z. A., Shah, M. H., & Ahmed, J. (2016). Information security management needs more holistic approach: A literature review. International Journal of Information Management, 36(2), 215-225.
Lu, P., Zhang, L., Liu, X., Yao, J., & Zhu, Z. (2015). Highly efficient data migration and backup for big data applications in elastic optical inter-data-center networks. IEEE Network, 29(5), 36-42.
Yao, J., Lu, P., Gong, L., & Zhu, Z. (2015). On fast and coordinated data backup in geo-distributed optical inter-datacenter networks. Journal of Lightwave Technology, 33(14), 3005-3015
Langer, M. (2017). Developing a Data Backup Strategy. Risk Management, 64(10), 12-13.