Design the layout of users and domains

Assignment Help Computer Engineering
Reference no: EM13311567

Design the layout of users, domains, trusted domains, anonymous users, etc for a start-up open source software company ABC. They should have an internal CVS server (only internal developers can access it), an anonymous CVS server for outsiders to download source code, a WWW server (one for internal and one for external) and an internal mail server. It is crucial that outsiders should not be able to access either internal CVS or internal WWW servers.

The design should be provide below requirements:

1. The topology diagram for the different servers and locations and trust domains. For example, where is the firewalls, and where are the users located in the topology.

2. The assumptions that you make for your design and the security policy to achieve this assumption.

3. Trust assumptions about users (e.g., who could be root, what a root could do). You do not need to create specific users, but you need to give a classification about users according to their.

Reference no: EM13311567

Questions Cloud

Find the magnitude of linear charge density for the ring : Given a uniform ring of charge, with charge q=+30E-6 C and radius 0.2 m. Find the magnitude of linear charge density for the ring
Explain the ph of a solution potassium hydrogen phosphate : What is the pH of a solution of 0.700 M K2HO4, potassium hydrogen phosphate. What is the pH of a solution of 0.450 M KH2PO4, potassium dihydrogen phosphate
Find electric potential energy for the electron in orbit : 2 protons, each with charge q=1.602E-19 C, are fixed in space. They form a spherical nucleus with diameter 1E-15 m. Find electric potential energy for the electron in orbit
A continuum between terrific and horriable : A continuum between "terrific" and "horrible".
Design the layout of users and domains : Design the layout of users, domains, trusted domains, anonymous users, etc for a start-up open source software company ABC.
What is the angle of second-order diffraction : X rays with a wavelength of 0.14 nm undergo first-order diffraction from a crystal at a 70^\circ angle of incidence. What is the angle of second-order diffraction
Marketing plan project for costcco : Marketing plan project for Costcco
Design and implementation of e-commerce website : Design and Implementation of E-commerce Website - the E-commerce management system needs to provide the following facilities to different classes of users
What is the acceleration of drop of blood : While a person is walking, his arms swing through approximately a 45.0^\circ angle in 0.520s. What is the acceleration of a 1.60 gram drop of blood in the fingertips at the bottom of the swing

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd