Highlights
Scenario
You are the sysadmin for a software development startup company, called cqunix, that is moving into a new building. The company has 10 full-time employees, as well as up to another 10 that either work part-time or perform short-term contract work at the company. Each full-time employee will have a dedicated workstation; most also have a laptop. The part-time/contract staff have their own or company-supplied laptops. There will also be several spare workstations. The company develops Unix and Linux software, and they are an (Ubuntu) Linux exclusive company for all their computers.
Workstations, Laptops and Servers
The company has grown quite quickly. Initially when there was just a few friends, they used all online services (e.g. Google Docs, GitHub, DropBox). But now as they move into the new building, they have decided to use their own infrastructure. Most of the employees work in a distributed mode, working on their own computers and sharing resources direct with colleagues, however there are several centralised services required. Specifically, they have identified the need for the following. Included are the selected names.
Each of the above will run on separate hardware within the internal network. That is, there are five computers, one for each of the above server applications.
Network
The company has an NBN business connection coming into the building. A single internal network is needed, using DHCP to configure all networked devices. The internal network is to be connected to the Internet via a single router, called rocky. This router is the gateway, performing NAT and acting as a firewall.
Backup
The current plan is to have automated back ups of important content and configurations of adelaide, sydney and gladstone to the backup server, bundaberg. The back up must be implemented as a set of scripts, and each backup of a server must generate a text file listing all files that were backed up, with details including timestamp and ownership details. This output text file should be stored within or with the back up file.
Additional backup of bundaberg to external storage (e.g. tape drive, external disk) is planned, but not needed in this initial project setup.
Security
The firewall, using iptables, must implement appropriate network access control.
All accounts with passwords must be configured in a secure manner, including with password ageing.
Servers should be hardened.
The SSH server should implement an auditing mechanism, that at minimum provides a regular summary of unsuccessful login attempts in a user friendly format. Optionally, unsuccessful attempts may trigger blocking or banning of IP addresses or accounts.
HTTPS and certificates must be supported on the web server.
The major section headings below (A, B, C, D) are mapped to the project marksheet for easier reference.
A. Task Description
In this project you need to consider the above scenario and:
This IT/Computer Science Assignment has been solved by our IT/Computer Science Experts at My Uni Paper. Our Assignment Writing Experts are efficient to provide a fresh solution to this question. We are serving more than 10000+ Students in Australia, UK & US by helping them to score HD in their academics. Our Experts are well trained to follow all marking rubrics & referencing style.
Be it a used or new solution, the quality of the work submitted by our assignment experts remains unhampered. You may continue to expect the same or even better quality with the used and new assignment solution files respectively. There’s one thing to be noticed that you could choose one between the two and acquire an HD either way. You could choose a new assignment solution file to get yourself an exclusive, plagiarism (with free Turnitin file), expert quality assignment or order an old solution file that was considered worthy of the highest distinction.
© Copyright 2026 My Uni Papers – Student Hustle Made Hassle Free. All rights reserved.