Report_final
Report_final
Author Name
[Email address]
UC Network for Blended Teaching Hubs [Author Name]
Executive Summary
The report focuses on the design of a university subnetwork for effective communication between
its teachers and students while adhering to stakeholder requirements, networking principles and
security. All recommendations made in the report will be due to change upon a budget being set
after a cost-benefit analysis is conducted based on the stakeholder requirements and equipment
costs.
i
UC Network for Blended Teaching Hubs [Author Name]
Contents
Executive Summary.................................................................................................................................. i
Contents .................................................................................................................................................. ii
1 Aims and Objectives of the Network Design .................................................................................. 3
1.1 Stakeholders, Stakeholder requirements and Stakeholder needs ......................................... 3
1.2 Purpose of the UC Subnetwork: Aims and Objectives ............................................................ 4
2 Policy and procedures relating to the Administration .................................................................... 5
2.1 Technological requirements of the proposed network .......................................................... 5
2.2 Software requirements for existing and future devices ......................................................... 5
3 Network Design and Implementation(OSI Reference Model Layer) .............................................. 6
3.1 New subnetwork topology design .......................................................................................... 6
3.2 Modelling the subnetwork...................................................................................................... 7
4 Securing the Network and relevant Principles................................................................................ 8
4.1 Cyber security threats to the UC model in higher education ................................................. 8
4.2 Relevant countermeasures and their operations ................................................................... 8
References .............................................................................................................................................. 9
ii
UC Network for Blended Teaching Hubs [Author Name]
Admin and IT staff • Conducting relevant • Moderate and ensure safe user
administrative activities activity across the network
• Ability to set access levels for • Troubleshooting network
different levels of users accessing issues for students
(UTAS, 2021)
Visitors • Access to the university website • Ease of use
and its resources/documents
Educational Technology • Consulting on the viability of the • A viable university sub-network
experts network infrastructure for setup
maximum efficiency
• Work collaboratively with
university IT staff
Government • Consulting on the government- • Secure network regulation
specific standards of networks based on standards set by the
in schools government (Australian
Government Department of
Home Affairs, 2022)
3
UC Network for Blended Teaching Hubs [Author Name]
A university subnetwork should be considered a vital part of the overall embedding of ICT in
Australian schools as it facilitates key communication channels between teachers and their students
to potentially create a more viable learning environment. The subnetwork will be responsible for
accommodating integrated teaching hubs where students can learn in a safe and secure
environment that is resistant to cyberattacks.
The aforementioned teaching hubs will host online classes for students to communicate across
campuses and learn in unity with consistency. The subnetwork will also enable enrolled students all
around the world to attend and engage in online classes. The subnetwork is also of great benefit to
teachers who can join online classes from any location and forward classroom quality learning
content. The teaching hubs will incorporate multiple teaching spaces, computer laboratories and
video conferencing software to accomplish the goals mentioned above.
The subnetwork will also accommodate interoperable ICT systems responsible for managing student
records and simplifying daily tasks for university staff. E.g., streamlining student data, and
automating student attendance checking will greatly enhance operational efficiencies to effectively
reduce time and costs.
4
UC Network for Blended Teaching Hubs [Author Name]
Existing software:
Potential Additions:
o Zoom/Skype: To bring together both distance learning students and campus attending
students
5
UC Network for Blended Teaching Hubs [Author Name]
The teaching space will primarily take the shape of a virtual private network that uses a public
network to connect remote users (this is important to connect distance learning students). The VPN
is established by using dedicated connections and tunnelling protocols. A firewall sits between the
network and the private network i.e., the teaching hub and acts as a protection barrier (Dandamudi,
2015).
IP and MAC Address filtering is enabled by the router for each campus which allows an administrator
to configure the network accordingly based on the available bandwidth. MAC address filtering to
6
UC Network for Blended Teaching Hubs [Author Name]
control wireless devices enables administrators to prevent malicious threats that may result in data
theft and other cyber security attacks (Sari, 2017).
Spare ports: 2
The university has a class C network 166.214 where the IP addresses 166.214.0.0 – 166.214.12.0 are
already in use. Given this information and from our previous calculations, the subnetwork needed to
accommodate both teaching spaces and all the devices within it, that amount to a total of 60(30x2)
ports, is presented below:
A class C network means a 24-bit network address and an 8-bit host address. Using the subnet
calculator at https://www.site24x7.com/tools/ipv4-subnetcalculator.html, the subnet can be
configured like this:
7
UC Network for Blended Teaching Hubs [Author Name]
On 11th August of 2020, electronic files belonging to university students were accessed without
authorization on a SharePoint site on the Office365 platform (Tasmania, 2022). The compromised
files contained the personal information of approximately 19,900 enrolled students in 2020
(Tasmania, 2022). The breach took place because of an unintentional misconfiguration of the
security settings of the SharePoint site.
According to a report published by Newsday (Tyrrell, 2022), Long Island schools have reported 29
occurrences of ransomware and other cyber security incidents over the last 3 years. The attacks
seemingly revealed private information such as social security numbers and addresses. The
increased number of online courses during the pandemic has created new opportunities for cyber
threats (Sharma, 2022).
Ransomware groups target weak systems which are often developed with a limited budget for
cybersecurity expertise (AL JAZEERA, 2022). Ransomware is a type of malware that encrypts files on
a device, making the system of the said device unusable. Ransomware gangs, injecting the malware,
demand ransom for decrypting the files (Stop Ransom Ware, 2022).
VLANs as existing countermeasures: Splits up university networks into separate VLANs for students
and staff (UTAS, 2021).
Demilitarized Zones (DMZs): Secure communications between the university and the internet
(UTAS, 2021).
Virtual Switches: The virtual switch is used for protecting network systems. It does this by acting as
the middleman between access points and computers while moderating the transmission and
assigning unique IP addresses using its ports (AlSarhan, 2016).
Further Network Segmentation: A large network can be secured by breaking it up into smaller
segments and limiting the damage that can be caused by a cyber attacker (Wagner, 2017) . E.g., old
networks using /8 and /16 are vulnerable to infection in a short amount of time. A class C network
i.e., /24 is comparatively safer but, if possible, it needs to be further broken-down meaning creating
individual clusters of computer networks instead of connecting all computers to the same network.
8
UC Network for Blended Teaching Hubs [Author Name]
Virtualization for endpoint devices: A virtual machine runs separately from the host computer’s
operating system meaning a user can do all their tasks safely without risking the safety of his/her
operating system.
Intrusion Detection Systems: An intrusion detection system watches networked devices and looks
out for malicious behaviour in the activity patterns within the audit stream (Marcos M. Campos,
2005). The malicious behaviour, upon detection, is reported to an administrator or a security
information management system. The IDS operates in the OSI Layer 3 which is also known as the
network layer.
Staff Training and Backup: Improve staff training to contain mishaps that caused the privacy breach
of university students in August 2020. Also, implement scheduled backups to keep copies of
information vital for the daily operation of university systems to counter malicious encryption.
References
AL JAZEERA. (2022, January 31). Cyberattacks on US schools increasing amid reliance on technology.
Retrieved from ALJAZEERA: https://www.aljazeera.com/news/2022/1/31/cyberattacks-on-
us-schools-increasing-amid-reliance-on-technology
Australian Government Department of Home Affairs. (2022, March 22). Cyber security regulation
incentives. Retrieved from Home Affairs: https://www.homeaffairs.gov.au/reports-and-
publications/submissions-and-discussion-papers/cyber-security-regulations-incentives
Dandamudi, S. a. (2015). Firewalls implementation in computer networks and their role in network
security. Journal of Multidisciplinary Engineering Science and Technology (JMEST), 408-411.
Hong, S. a. (2018). Ransomware attack analysis and countermeasures of defensive aspects. Journal
of Convergence for Information Technology, 139-145.
Sari, R. S. (2017). A review of ip and mac address filtering in wireless network security. Int. J. Sci. Res.
Sci. Technol, 3(6), 470-473.
Sharma, S. (2022, January 24). Education sector hounded by cyberattacks in 2021. Retrieved from
CSO : https://www.csoonline.com/article/3647760/education-sector-hounded-by-
cyberattacks-in-2021.html
Stop Ransom Ware. (2022). What is Ransomware? Retrieved from Stop Ransom Ware:
https://www.cisa.gov/stopransomware
9
UC Network for Blended Teaching Hubs [Author Name]
Tyrrell, C. S. (2022, March 27). LI schools hit with 29 ransomware attacks, hacks, other cyber
incidents in past 3 years. Retrieved from Newsday: https://www.newsday.com/long-
island/education/ransomware-cyberattack-virus-school-computer-networks-p5wjjhed
UTAS. (2021, March 24). ZAT111 Assignment 3 Site Visit. Hobart, Tasmania, Australia.
Victoria State Government. (2020, March). ICT design model for schools. Retrieved from Victoria
State Government Education & Training:
https://www.education.vic.gov.au/Documents/school/teachers/management/infrastructure
/ICT-Design-Model-for-Schools.pdf
Wagner, N. Ş. (2017). Capturing the security effects of network segmentation via a continuous-time
markov chain model. In Proceedings of the 50th Annual Simulation Symposium (pp. 1-12).
10