SlideShare a Scribd company logo
Case 1 – Network Design
Abstract
The company in this case is a small consulting
firm that specializes in providing their
customers with Microsoft Windows and Citrix networked
business solutions.
They believe their internal servers are secure due to
their diligence in keeping the
operating systems up to date with the latest service
packs, hotfixes, and patches. Virus
signatures and scanning software is also kept current.
Yoursecurity company has been
given the task of evaluating the security of
the network perimeter and to make
recommendations for securing their network perimeter
and Internet connection.
Examination of the perimeter infrastructure showed
the network to be virtually
defenseless. There is no firewall installed and
very little filtering of inbound or outbound
Internet traffic on either the router at the
corporate office or the router at the branch
office. The Linux, Help Desk, mail server, and
the two Active Directory servers have direct
network links to both the internal network and the
Internet making them prime targets
for intruders. Your proposal is to completely
redesign the network perimeter to provide
a layered Defense in Depth strategy.
Current Network Design
The original perimeter network design included two
Cisco routers and five publicly
addressable servers, four of which are Windows-
based and the fifth runs RedHat Linux.
As stated, the network did not have a firewall
device and the perimeter routers
performedextremely limited inbound packet filtering.
The corporate router is configured
with a serial interface for connection to the
Internet, an Ethernet interface for the public
network, and an Ethernet interface for the internal
(private) network. The branch office
router has a serial interface to the Internet
and an Ethernet interface to their internal
network (diagram 1).
The branch and corporate routers were connected by
VPN tunnel over the Internet. The
various network devices at the corporate office,
both internal and external, were
connected via threecascaded switches. Each of the
external (public) servers had a direct
link to the internal network and represented a
significant danger if they were
compromised. The branch office network consisted of
four PCs on a hub connected to
the router. A brief description of each network
device follows.
Routers
Corporate Router
The Cisco router at the corporate office
provided Network Address Translation (NAT)
for
outbound Internet connections. The five public servers
were assigned static NAT
addresses.All othertraffic is given the public
address of the serial interface by the NAT
“overload” feature of the Cisco Internetwork
Operating System (IOS). The router also
acted as one end of a point-to-point VPN tunnel
to the branch office router. This
provides secure access to the corporate Microsoft
Active Directory servers and other
network resources. The serial interface had an
inbound access list to block port 1433
(SQL Server) traffic to a single internal
server. All othertraffic, inbound and outbound, is
permitted.
Branch Office Router
The Branch office router is configured to
provide NAT for outgoing Internet traffic, in
addition to a VPN tunnel to the corporate router.
An inbound access list is applied to the
serial interface making it somewhat more secure.
The access list is designed to block
packets with spoofed private network addresses.No
othersecurity measures were in
place.
Public Servers
Help Desk Server
This is a Windows 2003 server providing web based
Help Desk services to clients and
staff. It runs Microsoft Internet Information Server
(IIS) and Microsoft SQL to support the
Help Desk application. There were two network
interfaces installed, one connected to
the public network, the otherconnected to the private
network. The patch levels and
virussignatures on this server were kept up to date.
Mail Server
The second server is also Windows 2003 based. It
acts as a mail server using Microsoft
Exchange and provides file and print services to the
internal network through a second
network interface. Mail sent to this server is
forwarded to the internal Exchange mail
server, storing it if the internal server is
unavailable. This server also acts as a public
NFuse front end to the internal Citrix server.
Linux Server
The Linux server runs the Redhat 9.2 operating
system and Apache web server software.
This server has a total of five network interfaces.
One public, one private, and three
others used to provide routing and Internet
gateway services to othercompanies in the
building for a monthly fee. There is a
minimal host firewall in place, allowing the
three
companies to access the Internet, but preventing
them from accessing the other
networks in the building. All Internet traffic
inbound or outbound is permitted to their
networks with no additional filtering. The service
agreementwith theseclients does not
require the company to provide any additional type of
security services. The Linux
machine also acts as a web server providing portal
access to internal servers. Clients and
staff can access each portal service by providing
their name and password. Credentials
are passed to the internal Active Directory server
for validation using LDAP.
Active Directory Servers
The primary and secondary Active Directory Servers
have two interfaces each, one
connected to the internal network and the otherto
the Internet. The reason for the dual
attachment is to provide Active Directory
services to the PCs in the branch office
over the
VPN. Without the internal interface, the branch
office is unable to browse the corporate
network.
Vulnerability Assessment
The network does not have a firewall installed for
protection against outside probes or
attacks. This is a critical weakness because even
the most well patched, up to date
operating system is vulnerable to a determined
attack. The same is true of web services
and otherapplications. Compromised resources on the
network could be used to
unknowingly participate in a Distributed Denial
of Service (DDOS) attack launched
against another network.
There is insufficient filtering on the routers. As
with the lack of firewall, this leaves the
network wide open to attack and exploitation.
Logs are not kept of the types or frequency of
Internet traffic. Without logs thereis no
way to determine if the network is being probed
or attacked.
Each of the public servers also had links to the
company’s internal network. If any of
thesemachines were compromised, they could act as
gateways to the rest of the
company’s data and servers.
The Linux server is built and is maintained by
one of the consulting engineers.Patches,
bugfixes, and otheradministrative taskswere performed
whenever his schedule
allowed. There is no one else in the company
familiar enough with Linux to assume this
responsibility.
There are no written policies concerning the
frequency or responsibility for maintaining
the security levels of hardware and software.

More Related Content

Similar to Case1–NetworkDesignAbstractThecompanyinthisc.docx

Cn
CnCn
Basic networking tutorial
Basic networking tutorialBasic networking tutorial
Basic networking tutorial
Rodel Morales
 
Basic lecture
Basic lectureBasic lecture
Basic lecture
Batzaya Dashdondog
 
Networking tutorial
Networking tutorialNetworking tutorial
Networking tutorial
ajaymane22
 
Building Intranet Assignment 2009 03 14 roshan basnet (1)
Building Intranet Assignment 2009 03 14 roshan basnet (1)Building Intranet Assignment 2009 03 14 roshan basnet (1)
Building Intranet Assignment 2009 03 14 roshan basnet (1)
rosu555
 
A Deep Dive in the World of IT Networking (Part 2)
A Deep Dive in the World of IT Networking (Part 2)A Deep Dive in the World of IT Networking (Part 2)
A Deep Dive in the World of IT Networking (Part 2)
Tuan Yang
 
J_McConnell_LabReconnaissance
J_McConnell_LabReconnaissanceJ_McConnell_LabReconnaissance
J_McConnell_LabReconnaissance
Juanita McConnell
 
lec3_10.ppt
lec3_10.pptlec3_10.ppt
lec3_10.ppt
ImXaib
 
introduction on server.pptx
introduction on server.pptxintroduction on server.pptx
introduction on server.pptx
Mugabo4
 
Web Technology
Web TechnologyWeb Technology
Web Technology
Sara Kasavandi
 
Web Technology
Web TechnologyWeb Technology
Web Technology
Fina KHosravi
 
Web Technology
Web TechnologyWeb Technology
Web Technology
Fina KHosravi
 
networking concepts
networking conceptsnetworking concepts
networking concepts
mtguillermo
 
Unit 4_Introduction to Server Farms.pptx
Unit 4_Introduction to Server Farms.pptxUnit 4_Introduction to Server Farms.pptx
Unit 4_Introduction to Server Farms.pptx
Rahul Borate
 
The Media Access Control Address
The Media Access Control AddressThe Media Access Control Address
The Media Access Control Address
Angie Lee
 
IRJET- Detection of Distributed Denial-of-Service (DDos) Attack on Software D...
IRJET- Detection of Distributed Denial-of-Service (DDos) Attack on Software D...IRJET- Detection of Distributed Denial-of-Service (DDos) Attack on Software D...
IRJET- Detection of Distributed Denial-of-Service (DDos) Attack on Software D...
IRJET Journal
 
Popeye - Using Fine-grained Network Access Control to Support Mobile Users an...
Popeye - Using Fine-grained Network Access Control to Support Mobile Users an...Popeye - Using Fine-grained Network Access Control to Support Mobile Users an...
Popeye - Using Fine-grained Network Access Control to Support Mobile Users an...
Tal Lavian Ph.D.
 
CSS12 LESSON 02.pptx
CSS12 LESSON 02.pptxCSS12 LESSON 02.pptx
CSS12 LESSON 02.pptx
RGSMags
 
Solution
SolutionSolution
Solution
amitkahire
 
Solution
SolutionSolution
Solution
amitkahire
 

Similar to Case1–NetworkDesignAbstractThecompanyinthisc.docx (20)

Cn
CnCn
Cn
 
Basic networking tutorial
Basic networking tutorialBasic networking tutorial
Basic networking tutorial
 
Basic lecture
Basic lectureBasic lecture
Basic lecture
 
Networking tutorial
Networking tutorialNetworking tutorial
Networking tutorial
 
Building Intranet Assignment 2009 03 14 roshan basnet (1)
Building Intranet Assignment 2009 03 14 roshan basnet (1)Building Intranet Assignment 2009 03 14 roshan basnet (1)
Building Intranet Assignment 2009 03 14 roshan basnet (1)
 
A Deep Dive in the World of IT Networking (Part 2)
A Deep Dive in the World of IT Networking (Part 2)A Deep Dive in the World of IT Networking (Part 2)
A Deep Dive in the World of IT Networking (Part 2)
 
J_McConnell_LabReconnaissance
J_McConnell_LabReconnaissanceJ_McConnell_LabReconnaissance
J_McConnell_LabReconnaissance
 
lec3_10.ppt
lec3_10.pptlec3_10.ppt
lec3_10.ppt
 
introduction on server.pptx
introduction on server.pptxintroduction on server.pptx
introduction on server.pptx
 
Web Technology
Web TechnologyWeb Technology
Web Technology
 
Web Technology
Web TechnologyWeb Technology
Web Technology
 
Web Technology
Web TechnologyWeb Technology
Web Technology
 
networking concepts
networking conceptsnetworking concepts
networking concepts
 
Unit 4_Introduction to Server Farms.pptx
Unit 4_Introduction to Server Farms.pptxUnit 4_Introduction to Server Farms.pptx
Unit 4_Introduction to Server Farms.pptx
 
The Media Access Control Address
The Media Access Control AddressThe Media Access Control Address
The Media Access Control Address
 
IRJET- Detection of Distributed Denial-of-Service (DDos) Attack on Software D...
IRJET- Detection of Distributed Denial-of-Service (DDos) Attack on Software D...IRJET- Detection of Distributed Denial-of-Service (DDos) Attack on Software D...
IRJET- Detection of Distributed Denial-of-Service (DDos) Attack on Software D...
 
Popeye - Using Fine-grained Network Access Control to Support Mobile Users an...
Popeye - Using Fine-grained Network Access Control to Support Mobile Users an...Popeye - Using Fine-grained Network Access Control to Support Mobile Users an...
Popeye - Using Fine-grained Network Access Control to Support Mobile Users an...
 
CSS12 LESSON 02.pptx
CSS12 LESSON 02.pptxCSS12 LESSON 02.pptx
CSS12 LESSON 02.pptx
 
Solution
SolutionSolution
Solution
 
Solution
SolutionSolution
Solution
 

More from wendolynhalbert

What appropriate sources of information did you use in finding your .docx
What appropriate sources of information did you use in finding your .docxWhat appropriate sources of information did you use in finding your .docx
What appropriate sources of information did you use in finding your .docx
wendolynhalbert
 
Western Civilization before The Thirty Years WarInstructions .docx
Western Civilization before The Thirty Years WarInstructions .docxWestern Civilization before The Thirty Years WarInstructions .docx
Western Civilization before The Thirty Years WarInstructions .docx
wendolynhalbert
 
Western Civilization – Week 7 Discussion ForumPlease choose just o.docx
Western Civilization – Week 7 Discussion ForumPlease choose just o.docxWestern Civilization – Week 7 Discussion ForumPlease choose just o.docx
Western Civilization – Week 7 Discussion ForumPlease choose just o.docx
wendolynhalbert
 
Wendy was addicted to her morning cup of coffee.  She had one cup be.docx
Wendy was addicted to her morning cup of coffee.  She had one cup be.docxWendy was addicted to her morning cup of coffee.  She had one cup be.docx
Wendy was addicted to her morning cup of coffee.  She had one cup be.docx
wendolynhalbert
 
WEEK 8 – EXERCISESEnter your answers in the spaces pro.docx
WEEK 8 – EXERCISESEnter your answers in the spaces pro.docxWEEK 8 – EXERCISESEnter your answers in the spaces pro.docx
WEEK 8 – EXERCISESEnter your answers in the spaces pro.docx
wendolynhalbert
 
Week 8The Trouble with Aid Please respond to the following.docx
Week 8The Trouble with Aid Please respond to the following.docxWeek 8The Trouble with Aid Please respond to the following.docx
Week 8The Trouble with Aid Please respond to the following.docx
wendolynhalbert
 
Week 8 Assignment 2 SubmissionInstructionsIf you are usi.docx
Week 8 Assignment 2 SubmissionInstructionsIf you are usi.docxWeek 8 Assignment 2 SubmissionInstructionsIf you are usi.docx
Week 8 Assignment 2 SubmissionInstructionsIf you are usi.docx
wendolynhalbert
 
Week1Writing SituationsOct 21 - Oct 27   15 pointsTasks.docx
Week1Writing SituationsOct 21 - Oct 27   15 pointsTasks.docxWeek1Writing SituationsOct 21 - Oct 27   15 pointsTasks.docx
Week1Writing SituationsOct 21 - Oct 27   15 pointsTasks.docx
wendolynhalbert
 
Week 8 -- Provide an example of some form of misrepresentation in me.docx
Week 8 -- Provide an example of some form of misrepresentation in me.docxWeek 8 -- Provide an example of some form of misrepresentation in me.docx
Week 8 -- Provide an example of some form of misrepresentation in me.docx
wendolynhalbert
 
WEEK 7 – EXERCISES Enter your answers in the spaces pr.docx
WEEK 7 – EXERCISES Enter your answers in the spaces pr.docxWEEK 7 – EXERCISES Enter your answers in the spaces pr.docx
WEEK 7 – EXERCISES Enter your answers in the spaces pr.docx
wendolynhalbert
 
weeks Discussion link in the left navigation.Description and .docx
weeks Discussion link in the left navigation.Description and .docxweeks Discussion link in the left navigation.Description and .docx
weeks Discussion link in the left navigation.Description and .docx
wendolynhalbert
 
Week1. Basics of Critical Thinking. 7 daysWeek1Basics of Critica.docx
Week1. Basics of Critical Thinking. 7 daysWeek1Basics of Critica.docxWeek1. Basics of Critical Thinking. 7 daysWeek1Basics of Critica.docx
Week1. Basics of Critical Thinking. 7 daysWeek1Basics of Critica.docx
wendolynhalbert
 
Week-2Here I attached two file. First one is poem file. In thi.docx
Week-2Here I attached two file. First one is poem file. In thi.docxWeek-2Here I attached two file. First one is poem file. In thi.docx
Week-2Here I attached two file. First one is poem file. In thi.docx
wendolynhalbert
 
Week 7 Exercise Prosocial BehaviorMuch of what we tend to focus.docx
Week 7 Exercise Prosocial BehaviorMuch of what we tend to focus.docxWeek 7 Exercise Prosocial BehaviorMuch of what we tend to focus.docx
Week 7 Exercise Prosocial BehaviorMuch of what we tend to focus.docx
wendolynhalbert
 
Week4 Project Human Resources and Procurement Management.docx
Week4 Project Human Resources and Procurement Management.docxWeek4 Project Human Resources and Procurement Management.docx
Week4 Project Human Resources and Procurement Management.docx
wendolynhalbert
 
Week4 DiscussionWireless CommunicationsSupporting Activity.docx
Week4 DiscussionWireless CommunicationsSupporting Activity.docxWeek4 DiscussionWireless CommunicationsSupporting Activity.docx
Week4 DiscussionWireless CommunicationsSupporting Activity.docx
wendolynhalbert
 
Week3 Project Cost and Quality ManagementSupporting .docx
Week3 Project Cost and Quality ManagementSupporting .docxWeek3 Project Cost and Quality ManagementSupporting .docx
Week3 Project Cost and Quality ManagementSupporting .docx
wendolynhalbert
 
Week Two IndividualReliability and ValidityWrite a 1,0.docx
Week Two IndividualReliability and ValidityWrite a 1,0.docxWeek Two IndividualReliability and ValidityWrite a 1,0.docx
Week Two IndividualReliability and ValidityWrite a 1,0.docx
wendolynhalbert
 
Week 7 DiscussionDiversity in the work environment promotes ac.docx
Week 7 DiscussionDiversity in the work environment promotes ac.docxWeek 7 DiscussionDiversity in the work environment promotes ac.docx
Week 7 DiscussionDiversity in the work environment promotes ac.docx
wendolynhalbert
 
Week Lecture - Evaluating the Quality of Financial ReportsThe coll.docx
Week Lecture - Evaluating the Quality of Financial ReportsThe coll.docxWeek Lecture - Evaluating the Quality of Financial ReportsThe coll.docx
Week Lecture - Evaluating the Quality of Financial ReportsThe coll.docx
wendolynhalbert
 

More from wendolynhalbert (20)

What appropriate sources of information did you use in finding your .docx
What appropriate sources of information did you use in finding your .docxWhat appropriate sources of information did you use in finding your .docx
What appropriate sources of information did you use in finding your .docx
 
Western Civilization before The Thirty Years WarInstructions .docx
Western Civilization before The Thirty Years WarInstructions .docxWestern Civilization before The Thirty Years WarInstructions .docx
Western Civilization before The Thirty Years WarInstructions .docx
 
Western Civilization – Week 7 Discussion ForumPlease choose just o.docx
Western Civilization – Week 7 Discussion ForumPlease choose just o.docxWestern Civilization – Week 7 Discussion ForumPlease choose just o.docx
Western Civilization – Week 7 Discussion ForumPlease choose just o.docx
 
Wendy was addicted to her morning cup of coffee.  She had one cup be.docx
Wendy was addicted to her morning cup of coffee.  She had one cup be.docxWendy was addicted to her morning cup of coffee.  She had one cup be.docx
Wendy was addicted to her morning cup of coffee.  She had one cup be.docx
 
WEEK 8 – EXERCISESEnter your answers in the spaces pro.docx
WEEK 8 – EXERCISESEnter your answers in the spaces pro.docxWEEK 8 – EXERCISESEnter your answers in the spaces pro.docx
WEEK 8 – EXERCISESEnter your answers in the spaces pro.docx
 
Week 8The Trouble with Aid Please respond to the following.docx
Week 8The Trouble with Aid Please respond to the following.docxWeek 8The Trouble with Aid Please respond to the following.docx
Week 8The Trouble with Aid Please respond to the following.docx
 
Week 8 Assignment 2 SubmissionInstructionsIf you are usi.docx
Week 8 Assignment 2 SubmissionInstructionsIf you are usi.docxWeek 8 Assignment 2 SubmissionInstructionsIf you are usi.docx
Week 8 Assignment 2 SubmissionInstructionsIf you are usi.docx
 
Week1Writing SituationsOct 21 - Oct 27   15 pointsTasks.docx
Week1Writing SituationsOct 21 - Oct 27   15 pointsTasks.docxWeek1Writing SituationsOct 21 - Oct 27   15 pointsTasks.docx
Week1Writing SituationsOct 21 - Oct 27   15 pointsTasks.docx
 
Week 8 -- Provide an example of some form of misrepresentation in me.docx
Week 8 -- Provide an example of some form of misrepresentation in me.docxWeek 8 -- Provide an example of some form of misrepresentation in me.docx
Week 8 -- Provide an example of some form of misrepresentation in me.docx
 
WEEK 7 – EXERCISES Enter your answers in the spaces pr.docx
WEEK 7 – EXERCISES Enter your answers in the spaces pr.docxWEEK 7 – EXERCISES Enter your answers in the spaces pr.docx
WEEK 7 – EXERCISES Enter your answers in the spaces pr.docx
 
weeks Discussion link in the left navigation.Description and .docx
weeks Discussion link in the left navigation.Description and .docxweeks Discussion link in the left navigation.Description and .docx
weeks Discussion link in the left navigation.Description and .docx
 
Week1. Basics of Critical Thinking. 7 daysWeek1Basics of Critica.docx
Week1. Basics of Critical Thinking. 7 daysWeek1Basics of Critica.docxWeek1. Basics of Critical Thinking. 7 daysWeek1Basics of Critica.docx
Week1. Basics of Critical Thinking. 7 daysWeek1Basics of Critica.docx
 
Week-2Here I attached two file. First one is poem file. In thi.docx
Week-2Here I attached two file. First one is poem file. In thi.docxWeek-2Here I attached two file. First one is poem file. In thi.docx
Week-2Here I attached two file. First one is poem file. In thi.docx
 
Week 7 Exercise Prosocial BehaviorMuch of what we tend to focus.docx
Week 7 Exercise Prosocial BehaviorMuch of what we tend to focus.docxWeek 7 Exercise Prosocial BehaviorMuch of what we tend to focus.docx
Week 7 Exercise Prosocial BehaviorMuch of what we tend to focus.docx
 
Week4 Project Human Resources and Procurement Management.docx
Week4 Project Human Resources and Procurement Management.docxWeek4 Project Human Resources and Procurement Management.docx
Week4 Project Human Resources and Procurement Management.docx
 
Week4 DiscussionWireless CommunicationsSupporting Activity.docx
Week4 DiscussionWireless CommunicationsSupporting Activity.docxWeek4 DiscussionWireless CommunicationsSupporting Activity.docx
Week4 DiscussionWireless CommunicationsSupporting Activity.docx
 
Week3 Project Cost and Quality ManagementSupporting .docx
Week3 Project Cost and Quality ManagementSupporting .docxWeek3 Project Cost and Quality ManagementSupporting .docx
Week3 Project Cost and Quality ManagementSupporting .docx
 
Week Two IndividualReliability and ValidityWrite a 1,0.docx
Week Two IndividualReliability and ValidityWrite a 1,0.docxWeek Two IndividualReliability and ValidityWrite a 1,0.docx
Week Two IndividualReliability and ValidityWrite a 1,0.docx
 
Week 7 DiscussionDiversity in the work environment promotes ac.docx
Week 7 DiscussionDiversity in the work environment promotes ac.docxWeek 7 DiscussionDiversity in the work environment promotes ac.docx
Week 7 DiscussionDiversity in the work environment promotes ac.docx
 
Week Lecture - Evaluating the Quality of Financial ReportsThe coll.docx
Week Lecture - Evaluating the Quality of Financial ReportsThe coll.docxWeek Lecture - Evaluating the Quality of Financial ReportsThe coll.docx
Week Lecture - Evaluating the Quality of Financial ReportsThe coll.docx
 

Recently uploaded

SWOT analysis in the project Keeping the Memory @live.pptx
SWOT analysis in the project Keeping the Memory @live.pptxSWOT analysis in the project Keeping the Memory @live.pptx
SWOT analysis in the project Keeping the Memory @live.pptx
zuzanka
 
Skimbleshanks-The-Railway-Cat by T S Eliot
Skimbleshanks-The-Railway-Cat by T S EliotSkimbleshanks-The-Railway-Cat by T S Eliot
Skimbleshanks-The-Railway-Cat by T S Eliot
nitinpv4ai
 
Level 3 NCEA - NZ: A Nation In the Making 1872 - 1900 SML.ppt
Level 3 NCEA - NZ: A  Nation In the Making 1872 - 1900 SML.pptLevel 3 NCEA - NZ: A  Nation In the Making 1872 - 1900 SML.ppt
Level 3 NCEA - NZ: A Nation In the Making 1872 - 1900 SML.ppt
Henry Hollis
 
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) CurriculumPhilippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
MJDuyan
 
How to Setup Default Value for a Field in Odoo 17
How to Setup Default Value for a Field in Odoo 17How to Setup Default Value for a Field in Odoo 17
How to Setup Default Value for a Field in Odoo 17
Celine George
 
CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...
CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...
CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...
Nguyen Thanh Tu Collection
 
A Free 200-Page eBook ~ Brain and Mind Exercise.pptx
A Free 200-Page eBook ~ Brain and Mind Exercise.pptxA Free 200-Page eBook ~ Brain and Mind Exercise.pptx
A Free 200-Page eBook ~ Brain and Mind Exercise.pptx
OH TEIK BIN
 
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptxRESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
zuzanka
 
BPSC-105 important questions for june term end exam
BPSC-105 important questions for june term end examBPSC-105 important questions for june term end exam
BPSC-105 important questions for june term end exam
sonukumargpnirsadhan
 
Contiguity Of Various Message Forms - Rupam Chandra.pptx
Contiguity Of Various Message Forms - Rupam Chandra.pptxContiguity Of Various Message Forms - Rupam Chandra.pptx
Contiguity Of Various Message Forms - Rupam Chandra.pptx
Kalna College
 
Pharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brubPharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brub
danielkiash986
 
Juneteenth Freedom Day 2024 David Douglas School District
Juneteenth Freedom Day 2024 David Douglas School DistrictJuneteenth Freedom Day 2024 David Douglas School District
Juneteenth Freedom Day 2024 David Douglas School District
David Douglas School District
 
MDP on air pollution of class 8 year 2024-2025
MDP on air pollution of class 8 year 2024-2025MDP on air pollution of class 8 year 2024-2025
MDP on air pollution of class 8 year 2024-2025
khuleseema60
 
HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.
deepaannamalai16
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 8 - CẢ NĂM - FRIENDS PLUS - NĂM HỌC 2023-2024 (B...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 8 - CẢ NĂM - FRIENDS PLUS - NĂM HỌC 2023-2024 (B...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 8 - CẢ NĂM - FRIENDS PLUS - NĂM HỌC 2023-2024 (B...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 8 - CẢ NĂM - FRIENDS PLUS - NĂM HỌC 2023-2024 (B...
Nguyen Thanh Tu Collection
 
Temple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation resultsTemple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation results
Krassimira Luka
 
Standardized tool for Intelligence test.
Standardized tool for Intelligence test.Standardized tool for Intelligence test.
Standardized tool for Intelligence test.
deepaannamalai16
 
78 Microsoft-Publisher - Sirin Sultana Bora.pptx
78 Microsoft-Publisher - Sirin Sultana Bora.pptx78 Microsoft-Publisher - Sirin Sultana Bora.pptx
78 Microsoft-Publisher - Sirin Sultana Bora.pptx
Kalna College
 
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdfREASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
giancarloi8888
 
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
TechSoup
 

Recently uploaded (20)

SWOT analysis in the project Keeping the Memory @live.pptx
SWOT analysis in the project Keeping the Memory @live.pptxSWOT analysis in the project Keeping the Memory @live.pptx
SWOT analysis in the project Keeping the Memory @live.pptx
 
Skimbleshanks-The-Railway-Cat by T S Eliot
Skimbleshanks-The-Railway-Cat by T S EliotSkimbleshanks-The-Railway-Cat by T S Eliot
Skimbleshanks-The-Railway-Cat by T S Eliot
 
Level 3 NCEA - NZ: A Nation In the Making 1872 - 1900 SML.ppt
Level 3 NCEA - NZ: A  Nation In the Making 1872 - 1900 SML.pptLevel 3 NCEA - NZ: A  Nation In the Making 1872 - 1900 SML.ppt
Level 3 NCEA - NZ: A Nation In the Making 1872 - 1900 SML.ppt
 
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) CurriculumPhilippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
 
How to Setup Default Value for a Field in Odoo 17
How to Setup Default Value for a Field in Odoo 17How to Setup Default Value for a Field in Odoo 17
How to Setup Default Value for a Field in Odoo 17
 
CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...
CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...
CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...
 
A Free 200-Page eBook ~ Brain and Mind Exercise.pptx
A Free 200-Page eBook ~ Brain and Mind Exercise.pptxA Free 200-Page eBook ~ Brain and Mind Exercise.pptx
A Free 200-Page eBook ~ Brain and Mind Exercise.pptx
 
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptxRESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
 
BPSC-105 important questions for june term end exam
BPSC-105 important questions for june term end examBPSC-105 important questions for june term end exam
BPSC-105 important questions for june term end exam
 
Contiguity Of Various Message Forms - Rupam Chandra.pptx
Contiguity Of Various Message Forms - Rupam Chandra.pptxContiguity Of Various Message Forms - Rupam Chandra.pptx
Contiguity Of Various Message Forms - Rupam Chandra.pptx
 
Pharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brubPharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brub
 
Juneteenth Freedom Day 2024 David Douglas School District
Juneteenth Freedom Day 2024 David Douglas School DistrictJuneteenth Freedom Day 2024 David Douglas School District
Juneteenth Freedom Day 2024 David Douglas School District
 
MDP on air pollution of class 8 year 2024-2025
MDP on air pollution of class 8 year 2024-2025MDP on air pollution of class 8 year 2024-2025
MDP on air pollution of class 8 year 2024-2025
 
HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 8 - CẢ NĂM - FRIENDS PLUS - NĂM HỌC 2023-2024 (B...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 8 - CẢ NĂM - FRIENDS PLUS - NĂM HỌC 2023-2024 (B...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 8 - CẢ NĂM - FRIENDS PLUS - NĂM HỌC 2023-2024 (B...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 8 - CẢ NĂM - FRIENDS PLUS - NĂM HỌC 2023-2024 (B...
 
Temple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation resultsTemple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation results
 
Standardized tool for Intelligence test.
Standardized tool for Intelligence test.Standardized tool for Intelligence test.
Standardized tool for Intelligence test.
 
78 Microsoft-Publisher - Sirin Sultana Bora.pptx
78 Microsoft-Publisher - Sirin Sultana Bora.pptx78 Microsoft-Publisher - Sirin Sultana Bora.pptx
78 Microsoft-Publisher - Sirin Sultana Bora.pptx
 
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdfREASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
 
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
 

Case1–NetworkDesignAbstractThecompanyinthisc.docx

  • 1. Case 1 – Network Design Abstract The company in this case is a small consulting firm that specializes in providing their customers with Microsoft Windows and Citrix networked business solutions. They believe their internal servers are secure due to their diligence in keeping the operating systems up to date with the latest service packs, hotfixes, and patches. Virus signatures and scanning software is also kept current. Yoursecurity company has been given the task of evaluating the security of the network perimeter and to make recommendations for securing their network perimeter and Internet connection. Examination of the perimeter infrastructure showed the network to be virtually defenseless. There is no firewall installed and very little filtering of inbound or outbound Internet traffic on either the router at the corporate office or the router at the branch office. The Linux, Help Desk, mail server, and the two Active Directory servers have direct network links to both the internal network and the Internet making them prime targets for intruders. Your proposal is to completely redesign the network perimeter to provide a layered Defense in Depth strategy.
  • 2. Current Network Design The original perimeter network design included two Cisco routers and five publicly addressable servers, four of which are Windows- based and the fifth runs RedHat Linux. As stated, the network did not have a firewall device and the perimeter routers performedextremely limited inbound packet filtering. The corporate router is configured with a serial interface for connection to the Internet, an Ethernet interface for the public network, and an Ethernet interface for the internal (private) network. The branch office router has a serial interface to the Internet and an Ethernet interface to their internal network (diagram 1). The branch and corporate routers were connected by VPN tunnel over the Internet. The various network devices at the corporate office, both internal and external, were connected via threecascaded switches. Each of the external (public) servers had a direct link to the internal network and represented a significant danger if they were compromised. The branch office network consisted of four PCs on a hub connected to the router. A brief description of each network device follows. Routers
  • 3. Corporate Router The Cisco router at the corporate office provided Network Address Translation (NAT) for outbound Internet connections. The five public servers were assigned static NAT addresses.All othertraffic is given the public address of the serial interface by the NAT “overload” feature of the Cisco Internetwork Operating System (IOS). The router also acted as one end of a point-to-point VPN tunnel to the branch office router. This provides secure access to the corporate Microsoft Active Directory servers and other network resources. The serial interface had an inbound access list to block port 1433 (SQL Server) traffic to a single internal server. All othertraffic, inbound and outbound, is permitted. Branch Office Router The Branch office router is configured to provide NAT for outgoing Internet traffic, in addition to a VPN tunnel to the corporate router. An inbound access list is applied to the serial interface making it somewhat more secure. The access list is designed to block packets with spoofed private network addresses.No othersecurity measures were in place. Public Servers
  • 4. Help Desk Server This is a Windows 2003 server providing web based Help Desk services to clients and staff. It runs Microsoft Internet Information Server (IIS) and Microsoft SQL to support the Help Desk application. There were two network interfaces installed, one connected to the public network, the otherconnected to the private network. The patch levels and virussignatures on this server were kept up to date. Mail Server The second server is also Windows 2003 based. It acts as a mail server using Microsoft Exchange and provides file and print services to the internal network through a second network interface. Mail sent to this server is forwarded to the internal Exchange mail server, storing it if the internal server is unavailable. This server also acts as a public NFuse front end to the internal Citrix server. Linux Server The Linux server runs the Redhat 9.2 operating system and Apache web server software. This server has a total of five network interfaces. One public, one private, and three others used to provide routing and Internet gateway services to othercompanies in the
  • 5. building for a monthly fee. There is a minimal host firewall in place, allowing the three companies to access the Internet, but preventing them from accessing the other networks in the building. All Internet traffic inbound or outbound is permitted to their networks with no additional filtering. The service agreementwith theseclients does not require the company to provide any additional type of security services. The Linux machine also acts as a web server providing portal access to internal servers. Clients and staff can access each portal service by providing their name and password. Credentials are passed to the internal Active Directory server for validation using LDAP. Active Directory Servers The primary and secondary Active Directory Servers have two interfaces each, one connected to the internal network and the otherto the Internet. The reason for the dual attachment is to provide Active Directory services to the PCs in the branch office over the VPN. Without the internal interface, the branch office is unable to browse the corporate network. Vulnerability Assessment The network does not have a firewall installed for protection against outside probes or attacks. This is a critical weakness because even
  • 6. the most well patched, up to date operating system is vulnerable to a determined attack. The same is true of web services and otherapplications. Compromised resources on the network could be used to unknowingly participate in a Distributed Denial of Service (DDOS) attack launched against another network. There is insufficient filtering on the routers. As with the lack of firewall, this leaves the network wide open to attack and exploitation. Logs are not kept of the types or frequency of Internet traffic. Without logs thereis no way to determine if the network is being probed or attacked. Each of the public servers also had links to the company’s internal network. If any of thesemachines were compromised, they could act as gateways to the rest of the company’s data and servers. The Linux server is built and is maintained by one of the consulting engineers.Patches, bugfixes, and otheradministrative taskswere performed whenever his schedule allowed. There is no one else in the company familiar enough with Linux to assume this responsibility. There are no written policies concerning the
  • 7. frequency or responsibility for maintaining the security levels of hardware and software.