VIP24 Problem Statement (Cybersecurity)
VIP24 Problem Statement (Cybersecurity)
2. Student must solve the Problem Statement using the Cisco Packet Tracer Software.
(Click here to download the software)
3. Student must submit the .pkt file (created using the packet tracer software) in the
google form shared to submit the solution of the problem statement.
(Click here for the submission form)
Note:
1. Students need to only use Packet Tracer and it’s in-built tools for the problem statement.
2. Student should submit the .pkt file with the proper filename. For eg: <student name>.pkt
Steps to do:
1. Conduct an analysis of your college campus network topology, including the layout, devices, and
connections.
2. Utilize Cisco Packet Tracer to map the network infrastructure, representing the placement and
interconnectivity of routers, switches, firewalls, and other relevant network components.
3. Conduct an attack surface mapping exercise to identify potential vulnerabilities and weaknesses within
the network architecture and design. Consider factors such as unauthorized access, data breaches, and
network availability.
Submission:
1. Network topology diagram depicting the existing infrastructure and attack surface findings.
2. Security assessment report highlighting identified security risks, proposed solutions and countermeasures to
mitigate attack surface risks.
Problem Scenario:
• Your college has hired you to design and architect a hybrid working environment for its faculty and
students. Faculty members will be provided with laptops by the college to connect to the college network
and access faculty specific services & resources.
• These should be accessible from home as well as on campus. Students are allowed to connect using their
personal devices to access student specific services & resources from home as well as on campus.
• Campus network services should not be exposed to public internet and accessible only via restricted
networks.
Task & Submission:
1. Explore options for how to achieve this and what kind of network security & Update the campus network topology
with the new components.
2. Explain the reasoning behind your choices detailing the risks & advantages of your proposed solution
Problem Scenario:
• The college has discovered that students are misusing campus resources and accessing irrelevant sites.
• They want a solution which will restrict access to only allowed categories of web content.
1. Explore how this can be achieved and what kind of network security product can provide this capability.
2. Update the campus network topology with new component(s)
3. Explain the reasoning behind your choice, detailing the risks & advantages of your proposed solution
4. Write the policies you would apply (can use simple English language commands)