VIP 2023 Industry Problem Statement F
VIP 2023 Industry Problem Statement F
Problem Statement: Choose a university/college campus and analyze its network topology. Map the network using Cisco Packet Tracer and identify the security
controls that are in place, such as network segmentation, intrusion detection systems, firewalls, and authentication and authorization systems. Apply the knowledge
gained from the NetAcad cyber security course to conduct an attack surface mapping, aiming to identify potential entry points for cyber-attacks. Propose
countermeasures to mitigate these risks.
Tasks:
1. Campus Network Analysis: Choose a university or college campus and conduct an analysis of its existing network topology, including the layout, devices, and
connections.
2. Network Mapping: Utilize Cisco Packet Tracer to map the network infrastructure, representing the placement and interconnectivity of routers, switches, firewalls, and
other relevant network components.
3. Attack Surface Mapping: Conduct an attack surface mapping exercise to identify potential vulnerabilities and weaknesses within the network architecture and design,
considering factors such as unauthorized access, data breaches, and network availability.
4. Secure Access Controls: Incorporate appropriate security controls (e.g., VLANs, IDP/IPS, VPN, Firewalls, password management, vulnerability management etc.) in
your design to enhance security posture.
Deliverables:
1. Network topology diagram depicting the existing infrastructure and attack surface findings.
2. Security assessment report highlighting identified security risks, proposed solutions, and countermeasures to mitigate attack surface risks.
VIP 2023 - Industry Problem Statement
2. Cloud Security
Problem Statement: Your College is hosting the Student and Faculty Details in Private Server within the Premise. Few more Branch of Colleges are now opening, and
you are required to leverage the Cloud Services to host and manage the Student and Faculty details, securely in a central location for all Branches. Please Note, College
wants to offload the management and maintenance of the Servers.
Using your Netacad Cloud Security Course, design the DB hosting service, which is resilient, fast, On-Demand Scalable and Secure.
Tasks:
1. Identify the Best Suited Cloud Service Model: Analyze the requirement and suggest the best possible model (Public or Private Cloud) to leverage the Cloud
Services.
2. Implement IAM for Cloud Service: Using the learnings from Cloud Security Couse, use IAM and RBAC to provide desired access to users based on their role.
3. Secure Access Control: Implement Secure Access Control on the Cloud Services, to make sure Details are not accessible via Public Internet and can only be
accessed via College’s VPN and authorized users can access the data.
Expected Outcomes:
2. Understanding of various in-built Security Controls available within a Cloud Service Provider and use cases of 3rd Party Security Controls.
The project can be divided into two key parts, as outlined below:
• Network Topology Creation: To begin, students will need to determine the devices present within the college network. They can achieve this by using
tools like traceroute or by consulting with the college network administrator. Based on the gathered information, students will then create a network
topology using Cisco Packet Tracer (available at: https://www.netacad.com/courses/packet-tracer). The topology will illustrate the various network
devices, network design, and network boundaries, as explained in the Network Essential course, showcasing the path from the host to the external
network.
• Packet Flow Investigation: After establishing the network topology using Cisco Packet Tracer and configuring IPv4 addresses on all layer-3 devices,
students will proceed to collect packets at each device using a packet sniffer. They can choose to use either the inbuilt sniffer in Cisco Packet Tracer
(tutorial available at https://www.youtube.com/watch?v=gsCSKQAVT2M ) or a tool like Wireshark. By analyzing the packets captured from different
devices (nodes), students can extract relevant information from the packet headers, particularly noting changes occurring in the Ethernet and IP
headers. This data will enable them to create a flow diagram illustrating the path of the packet flow from their device (host) to the external network. Any
flow chart creator application can be used to create this diagram.
Expected Outcome: Upon completion of the packet inspection and header analysis at each node, students should be able to demonstrate the following:
• A clear understanding of different blocks of network design.
• Familiarity with the different OSI model layers and the importance of layering. They should also comprehend the relationship between the layers and
the metadata carried in each layer's packet header.
• A comprehensive understanding of the roles of various devices in a network. They should be able to distinguish the role of a router (L3 device) from
that of a switch (L2 device).