100% found this document useful (1 vote)
734 views

VIP 2023 Industry Problem Statement F

The document describes three problem statements for the Cisco Virtual Internship Program in 2023. The first involves analyzing the network topology of a university campus, identifying security controls and vulnerabilities, and proposing improvements. The second involves designing a secure cloud database solution to store student and faculty details across multiple college branches. The third involves creating a visual representation of packet flow from devices on a college network to external networks by modeling the network in Cisco Packet Tracer and analyzing packet headers at each device.

Uploaded by

Aman Kumar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
734 views

VIP 2023 Industry Problem Statement F

The document describes three problem statements for the Cisco Virtual Internship Program in 2023. The first involves analyzing the network topology of a university campus, identifying security controls and vulnerabilities, and proposing improvements. The second involves designing a secure cloud database solution to store student and faculty details across multiple college branches. The third involves creating a visual representation of packet flow from devices on a college network to external networks by modeling the network in Cisco Packet Tracer and analyzing packet headers at each device.

Uploaded by

Aman Kumar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

Cisco Virtual Internship Program 2023

Industry Problem Statements


VIP 2023 - Industry Problem Statement
1. Cyber Security

Problem Statement: Choose a university/college campus and analyze its network topology. Map the network using Cisco Packet Tracer and identify the security
controls that are in place, such as network segmentation, intrusion detection systems, firewalls, and authentication and authorization systems. Apply the knowledge
gained from the NetAcad cyber security course to conduct an attack surface mapping, aiming to identify potential entry points for cyber-attacks. Propose
countermeasures to mitigate these risks.

Tasks:

1. Campus Network Analysis: Choose a university or college campus and conduct an analysis of its existing network topology, including the layout, devices, and
connections.

2. Network Mapping: Utilize Cisco Packet Tracer to map the network infrastructure, representing the placement and interconnectivity of routers, switches, firewalls, and
other relevant network components.

3. Attack Surface Mapping: Conduct an attack surface mapping exercise to identify potential vulnerabilities and weaknesses within the network architecture and design,
considering factors such as unauthorized access, data breaches, and network availability.

4. Secure Access Controls: Incorporate appropriate security controls (e.g., VLANs, IDP/IPS, VPN, Firewalls, password management, vulnerability management etc.) in
your design to enhance security posture.

Deliverables:

1. Network topology diagram depicting the existing infrastructure and attack surface findings.

2. Security assessment report highlighting identified security risks, proposed solutions, and countermeasures to mitigate attack surface risks.
VIP 2023 - Industry Problem Statement
2. Cloud Security

Problem Statement: Your College is hosting the Student and Faculty Details in Private Server within the Premise. Few more Branch of Colleges are now opening, and
you are required to leverage the Cloud Services to host and manage the Student and Faculty details, securely in a central location for all Branches. Please Note, College
wants to offload the management and maintenance of the Servers.

Using your Netacad Cloud Security Course, design the DB hosting service, which is resilient, fast, On-Demand Scalable and Secure.

Tasks:

1. Identify the Best Suited Cloud Service Model: Analyze the requirement and suggest the best possible model (Public or Private Cloud) to leverage the Cloud
Services.

2. Implement IAM for Cloud Service: Using the learnings from Cloud Security Couse, use IAM and RBAC to provide desired access to users based on their role.

3. Secure Access Control: Implement Secure Access Control on the Cloud Services, to make sure Details are not accessible via Public Internet and can only be
accessed via College’s VPN and authorized users can access the data.

Expected Outcomes:

1. Understanding the importance of IAM and RBAC in Cloud Environment.

2. Understanding of various in-built Security Controls available within a Cloud Service Provider and use cases of 3rd Party Security Controls.

3. Understanding of Private Cloud and Public Cloud Environment.


VIP 2023 - Industry Problem Statement
3. Networking
Problem Statement: Packet Flow Visualizer.
The main objective of this project is to create a visual representation of the packet flow from students' laptops/desktops (hosts) to external networks outside of
the college campus.

The project can be divided into two key parts, as outlined below:
• Network Topology Creation: To begin, students will need to determine the devices present within the college network. They can achieve this by using
tools like traceroute or by consulting with the college network administrator. Based on the gathered information, students will then create a network
topology using Cisco Packet Tracer (available at: https://www.netacad.com/courses/packet-tracer). The topology will illustrate the various network
devices, network design, and network boundaries, as explained in the Network Essential course, showcasing the path from the host to the external
network.

• Packet Flow Investigation: After establishing the network topology using Cisco Packet Tracer and configuring IPv4 addresses on all layer-3 devices,
students will proceed to collect packets at each device using a packet sniffer. They can choose to use either the inbuilt sniffer in Cisco Packet Tracer
(tutorial available at https://www.youtube.com/watch?v=gsCSKQAVT2M ) or a tool like Wireshark. By analyzing the packets captured from different
devices (nodes), students can extract relevant information from the packet headers, particularly noting changes occurring in the Ethernet and IP
headers. This data will enable them to create a flow diagram illustrating the path of the packet flow from their device (host) to the external network. Any
flow chart creator application can be used to create this diagram.

Expected Outcome: Upon completion of the packet inspection and header analysis at each node, students should be able to demonstrate the following:
• A clear understanding of different blocks of network design.
• Familiarity with the different OSI model layers and the importance of layering. They should also comprehend the relationship between the layers and
the metadata carried in each layer's packet header.
• A comprehensive understanding of the roles of various devices in a network. They should be able to distinguish the role of a router (L3 device) from
that of a switch (L2 device).

You might also like