STU255293 - Introduction To Computer Systems and Security
STU255293 - Introduction To Computer Systems and Security
TCA Assessment
STU255293
Deadline:
Tuesday, 15 July, 12:00 PM (UK time)
Part 1
Task 1.1:
NI’s core network infrastructure is anchored by an edge router, which serves as the primary gateway
between the campus and the broader Internet. This router plays a critical role, not only by
facilitating external connectivity but also by enforcing essential traffic management policies (see
Cloudflare, 2023). Each academic unit—namely, Faculty Alpha (Administration) and Faculty Beta
(Technical)—operates its own dedicated switch. These switches are responsible for linking devices
within their respective departments, efficiently managing internal data transmission across the local
area network (LAN). Unlike routers, switches are concerned solely with forwarding frames to their
intended local destinations, ensuring seamless communication within each faculty.
The campus network also incorporates a central file and application server. This server consolidates
vital resources, such as student records and laboratory simulation files, while also delivering shared
services required by both departments. Centralization of these resources is essential, as it enables
reliable and consistent access from both faculties (Microsoft, 2025).
Additionally, a networked printer is integrated into the infrastructure, allowing users across the
campus to submit print jobs remotely without the need for direct cabled connections. This setup not
only enhances convenience but also optimizes resource utilization across departments. The absence
of such devices would significantly hinder interdepartmental communication and resource sharing.
For example, without switches, departmental computers would be isolated from each other, and
without the router, the campus would lose Internet connectivity entirely. Table 1.0 provides a
summary of each component and its respective function within the network.
Faculty Alpha (Admin) Department Switch Administrative systems are interconnected via
dedicated switches, which manage traffic within
the internal network. These switches direct data
packets only to their intended destinations,
ensuring efficient communication (such as email
and file sharing) while minimizing network
Department/Location Hardware/Device Why Necessary for NI (Role/Function)
collisions.
Each device mentioned above plays a crucial role within the network infrastructure. For instance,
without switches, communication between PCs would be impossible, and in the absence of a router,
Internet connectivity would not exist. The server serves as a centralized location for critical data and
applications, ensuring both security and accessibility. The table presented earlier provides a concise
overview of each hardware component’s function.
Turning to software:
System software is fundamental in managing hardware and delivering essential services. For
example, NI operates a server using an operating system such as Windows Server or Linux. This
system software is responsible for resource management—overseeing the CPU, memory, storage,
and network—and establishes the environment required for applications to function. Additional
utilities, such as SQL Server or automated backup software, also fall under the system software
category, as they manage data storage and recovery processes integral to system stability. These
forms of software interact directly with hardware and facilitate core services, including data
management and backup scheduling.
On the other hand, application software is designed for end-user tasks. Within NI, administrative
staff commonly utilize office productivity suites like Microsoft Office to prepare documents,
spreadsheets, and presentations. In contrast, engineering and simulation applications such as
MATLAB or AutoCAD are essential for students and faculty engaged in research within Faculty Beta.
These applications are selected according to departmental needs: administrative offices require
word processing and email capabilities, while laboratory environments depend on specialized
scientific and design tools. Each application operates on the underlying system software, which
manages hardware resources and ensures operational consistency.
Table 2.0 organizes representative software by category, indicating the relevant department and
providing justification for each selection.
Systems Software
Department(s) Reason/Use
(Category)
The rationale behind selecting each type of software comes down to what a specific department
needs. For example, administrative staff require a reliable office suite to handle documentation and
communication. Meanwhile, technical laboratories depend on specialized simulation software to
conduct experiments and analyses. In short, each software choice is directly linked to the
operational demands of its intended users.
This section presents a comparative overview of four fundamental network protocols utilized within
NI’s infrastructure. For each protocol, its primary function, the relevant department or device, and
the possible consequences of misconfiguration are identified. Additionally, the associated OSI model
layer is specified, with a brief justification for its classification. Where appropriate, realistic use cases
from NI’s campus environment are provided to illustrate each protocol’s practical application.
DHCP NI most likely relies All departmental PCs If the DHCP server is Application
(Dynamic Host on a DHCP server and devices that malfunctioning or Layer (OSI
Configuration within the network to need dynamic IPs unavailable, newly Layer 7). DHCP is
Protocol) assign IP addresses connected or a network
dynamically to both rebooted devices management
administrative and lab will not receive IP protocol that
computers, rather addresses. As a automatically
than configuring static result, these devices assigns IP
addresses manually. are unable to addresses and
Typically, the DHCP communicate on the other network
functionality— local network or parameters to
whether implemented access the Internet, clients.
on a dedicated server effectively resulting
or integrated into a in network
router—automatically connectivity failure.
allocates IP leases to
student workstations
in Faculty Beta as well
as administrative PCs
in Alpha. This
approach streamlines
Department/Device Impact if OSI Layer &
Protocol Real Use Case at NI
Affected Misconfigured Reason
network management
by reducing the need
for manual IP
configuration and
minimizing the
potential for address
conflicts.
| DNS (Domain Name System) | NI would use DNS to resolve names (e.g. “server.nedra.edu” or
Internet domain names) to IP addresses. For example, lab computers and admin computers use an
internal DNS (or external DNS servers) to translate domain names for web access or network shares.
| All devices that access internal or external servers by name (faculty PCs, servers) | If DNS is
misconfigured, computers cannot resolve hostnames to IPs. This breaks access to network resources
by name – e.g., staff would not reach websites or the file server via hostnames, and services
depending on names would fail. | Application Layer (OSI Layer 7). DNS is a distributed naming
service mapping domain names to IP addresses (ICO, 2023). It operates at the application layer
above TCP/UDP. |
| SMB/CIFS (Server Message Block/Common Internet File System) | NI’s Windows file share and
print services rely on SMB. For example, Faculty Alpha might have a file share on the server
(accessible as \NedraServer\Share) for administrative documents, and network printers are also
shared via SMB. Lab PCs use SMB to access project files on the file/app server. | File/application
server and all PCs in both faculties (shared folders, printers) | If SMB is broken (e.g. misconfigured
shares or security settings), users cannot access shared drives or printers. Data sharing halts: no one
can read/write network files, labs lose access to simulation data, and printers cannot be used. This
severely affects both departments. | Application Layer (OSI Layer 7). SMB is a network file-sharing
protocol operating at the application (or presentation) layer on top of TCP/IP.
| IEEE 802.1Q (VLAN Tagging) | NI may implement VLANs to segregate traffic (e.g. separate Faculty
Alpha and Beta networks on the same switches). 802.1Q tags would be used on the switches and
router to carry multiple VLANs over a single physical link. For instance, lab computers might be on
VLAN 10 and admin PCs on VLAN 20. | Switches and router trunks across the NI network. It affects
how broadcast domains are segmented between Alpha and Beta. | A 802.1Q misconfiguration (e.g.
wrong VLAN tags) could mix traffic between departments or cause devices to be in the wrong
network. This undermines security (data leakage between VLANs) and can cause connectivity issues
(devices can’t join intended VLAN). | Data Link Layer (OSI Layer 2). 802.1Q operates by tagging
Ethernet frames with VLAN IDs, enabling multiple virtual LANs on the same physical network
(JumpCloud, 2025). It is a link-layer protocol used by switches and routers for segmentation. |
Each of the selected protocols plays a vital role in NI’s network infrastructure. DHCP, for instance,
automates IP address allocation at OSI layer 7, streamlining network management. A
misconfiguration here would result in immediate loss of connectivity for clients, effectively isolating
them from network resources.
DNS is equally indispensable, serving as the backbone of name resolution—also operating at layer 7.
Without a properly functioning DNS, users would be unable to access servers by name, even if
underlying IP connectivity remains intact. This would severely disrupt day-to-day operations, as
reliance on numerical IP addresses is neither practical nor efficient.
The SMB protocol is central to providing file and print services within the server environment. Its
operation at layer 7 ensures that it leverages TCP/IP for communication. Incorrect configuration of
SMB could lead to loss of access to essential files, such as those related to research activities or
payroll, with significant organizational impact.
Lastly, 802.1Q VLAN tagging functions at layer 2 to maintain departmental traffic separation. By
tagging Ethernet frames, 802.1Q ensures that data streams remain isolated, enhancing both
performance and security. Improper VLAN configuration can introduce broadcast storms or allow
data to leak between departments, undermining the integrity and efficiency of the network.
The network topology described features a straightforward hierarchical structure: an edge router
connects to a core switch, which then branches out to dedicated departmental switches for Faculty
Alpha and Beta. Both the file/application server and the network printer reside on the core switch,
ensuring shared access across departments.
This architecture brings notable benefits. Each departmental switch localizes its internal traffic,
thereby improving reliability and reducing unnecessary congestion. Segmenting the network further
—whether through VLANs or separate subnets—not only streamlines performance but also bolsters
security. For instance, isolating Faculty Alpha and Beta on distinct VLANs means that disruptions or
security incidents in one do not directly affect the other.
Ultimately, such separation of network traffic results in a better user experience, with fewer data
collisions and higher speeds for students. It also supports robust data protection strategies by
minimizing opportunities for unauthorized access across departmental boundaries. This considered
approach aligns with best practices for institutional network design, balancing efficiency, security,
and accessibility.
Figure 1 displays the basic network topology for Nedra Institute. The Edge Router connects the organization to the Internet
and links to a Core Switch. Separate Alpha and Beta Faculty switches each connect to the core as well. Both the
File/Application Server and the Network Printer are shared by both departments, connected directly to the core switch.
Each faculty switch then connects to the respective PCs for that department. This setup improves reliability by keeping
network traffic local and allows for security options such as VLAN segmentation.
Part 3
Task 3.1
Three major cyber threats that universities like NI commonly face are (1) ransomware, (2)
phishing/social engineering, and (3) distributed denial-of-service (DDoS) attacks.
Ransomware attacks involve malicious actors delivering malware that encrypts important data such
as student records, research files, or financial information, then demanding payment for decryption.
The education sector has become a significant target for these attacks: for example, one report
found over 6.1 million malware attacks in education within a single month. Law enforcement
agencies, including the FBI, have specifically warned that universities are targeted by organized
groups who both exfiltrate and encrypt data, seeking extortion. If ransomware were to impact NI,
critical academic and financial data could become inaccessible, leading to potential data breaches,
operational downtime, and reputational harm, especially if the incident becomes public. Typical
entry points include phishing emails containing malicious attachments, unpatched servers, or
compromised remote access. In many cases, the initial vector is a phishing email or vulnerable
service, after which the ransomware spreads within the local network.
Phishing and social engineering represent another significant risk. These attacks typically arrive as
deceptive emails intended to trick staff or students into revealing credentials or unintentionally
installing malware. The education sector is especially vulnerable: approximately 40% of breaches
involve some form of social engineering. At NI, for example, attackers could use a fraudulent email
to capture login credentials. If successful, this could lead to unauthorized access, data theft, malware
infections, and further compromise of institutional systems. The most common entry point is the
university’s email system, where a single click on a malicious link or submission of credentials to a
spoofed site can result in a breach.
Distributed denial-of-service (DDoS) attacks are also a notable threat. Attackers overload the
university’s network or online services with excessive traffic, making them inaccessible to legitimate
users. DDoS attacks might target the university’s website, learning management systems, or email
services, causing substantial downtime and disrupting both teaching and administrative operations.
Such incidents can undermine stakeholder trust and damage institutional reputation. The attack
typically originates from botnets or compromised external devices, directing large volumes of traffic
at the university’s network edge.
Task 3.2:
Student exam records contain sensitive personal and academic details. Confidentiality here is
essential; only authorized staff and the student should have access. Encryption and strict access
controls serve to prevent unauthorized disclosure. The integrity of these records is also vital, as any
alteration to grades or exam content undermines trust in the system. To address this, mechanisms
such as secure hashing or audit logs can be used to detect and prevent unauthorized changes.
Availability must not be overlooked, as students and staff may need timely access to records for
appeals or transcripts. Regular backups and redundant storage help ensure these records remain
accessible even if there is a hardware failure. Recommended controls include encrypting data at rest
and using digital signatures or checksums for integrity verification. For example, student records may
be encrypted within the database and backed up nightly, aligning with requirements such as GDPR
Article 32.
Lab simulation files typically contain research data, models, and code. Confidentiality requirements
depend on NI’s specific policies; while some research may be public, proprietary projects require
access restrictions to protect sensitive information. Integrity is particularly important, as researchers
must trust the accuracy of their data. Corrupted or altered files can compromise research validity.
Tools such as version control and integrity checks (e.g., hash comparisons) help maintain data
integrity. Availability is also critical researchers must be able to access files as needed for simulations
or publication. Data loss due to storage failure can disrupt research activities, so regular backups and
fault-tolerant storage solutions (such as RAID or off-site backups) are recommended. Additional
controls include file integrity monitoring and secure backup procedures to support timely data
restoration.
Administrative payroll files contain highly sensitive information, including salary and bank account
details. Here, confidentiality is paramount—encryption and strict, role-based access controls are
necessary to prevent the exposure of financial data. Maintaining integrity is also crucial, as errors or
unauthorized changes in payroll data could result in incorrect payments. This can be managed
through detailed access logs and validation checks during data entry. Payroll systems must also be
highly available to ensure timely processing, so redundancy and business continuity plans are
essential. Recommended security measures include encryption, multi-factor authentication, and
transaction logging, in line with best practices for securing sensitive information.
In summary, the CIA triad underpins the recommended security measures for each asset.
Regulations such as GDPR Article 32 reinforce these principles, requiring organizations to implement
controls that ensure ongoing confidentiality, integrity, and availability. NI should document and
apply appropriate safeguards—including encryption, backups, access controls, and monitoring—to
protect its information assets according to these established standards.
Task 3.3:
Summary:
NI must ensure that its practices are fully aligned with GDPR and ISO/IEC 27001 requirements. For
data minimization, this means collecting and retaining only essential information. For risk
management, documented and regularly reviewed assessments are necessary. For data security,
implementing and evidencing appropriate technical measures is required. Supporting
documentation—such as policy documents, system configurations, audit logs, and training records—
serves as proof of compliance with each clause.
References
Christey, B.S., Smith, S.R. & Spector, S.J. (2020) The increasing threat of ransomware in
higher education. EDUCAUSE Review. Available at:
https://er.educause.edu/articles/2020/6/the-increasing-threat-of-ransomware-in-higher-
education (accessed 14 July 2025.
Hightable (2025) ISO 27001 Clause 6.1.2: Information Security Risk Assessment. Available at:
https://hightable.io/iso-27001-clause-6-1-2-information-security-risk-assessment-guide/
(accessed 14 July 2025).
Microsoft (2025) What is Microsoft SMB Protocol and CIFS Protocol? (Win32 apps). Available
at: https://learn.microsoft.com/en-us/windows/win32/fileio/microsoft-smb-protocol-and-
cifs-protocol-overview (accessed 14 July 2025).
TechTarget (2024) What is an operating system (OS)? By M.E. Shacklett & S.J. Bigelow.
Published Oct 31, 2024. Available at:
https://www.techtarget.com/whatis/definition/operating-system-OS (accessed 14 July
2025).
Veritas (2024) 2024 Data Breach Investigations Report. Verizon (May 2024). Available at:
https://www.verizon.com/business/resources/reports/dbir (accessed 14 July 2025).
Information Commissioner’s Office (ICO) (2023) A guide to the data protection principles &
security. Updated May 2023. Available at: https://ico.org.uk/for-organisations/uk-gdpr-
guidance-and-resources/data-protection-principles/a-guide-to-the-data-protection-
principles/ (Accessed 14 July 2025).