PROBLEM
PROBLEM
Problem Statement:
PART 1:
Problem Statement:
PART 1:
A. Analyse your existing university/college campus network topology.
B. Map it out the using Cisco Packet Tracer and identify the security controls that are in place
today.
C. Consider and note how network segmentation is done.
D. Observe what kind of intrusion detection systems, firewalls, authentication and
authorization systems are in place.
E. Apply the knowledge gained from the NetAcad cyber security course to conduct an attack
surface mapping.
F. Aim to identify potential entry points for cyber-attacks. Propose countermeasures to
mitigate these risks.
Tasks:
1. Campus Network Analysis: conduct an analysis of your college campus network topology,
including the layout, devices, and connections.
2. Network Mapping: Utilize Cisco Packet Tracer to map the network infrastructure,
representing the placement and interconnectivity of routers, switches, firewalls, and other relevant
network components.
3. Attack Surface Mapping: Conduct an attack surface mapping exercise to identify potential
vulnerabilities and weaknesses within the network architecture and design. Consider factors such
as unauthorized access, data breaches, and network availability.
Deliverables:
1. Network topology diagram depicting the existing infrastructure and attack surface findings.
2. Security assessment report highlighting identified security risks, proposed solutions and
countermeasures to mitigate attack surface risks.
Apply the knowledge gained from the NetAcad cyber security course to conduct an attack surface
mapping :
A. Analyse your existing university/college campus network topology.
Can2.pkt
C. Consider and note how network segmentation is done.
Network Segmentation :
In a college network, segmentation refers to dividing the network into separate parts or segments to
improve performance, security, and manageability.
1. Physical Segmentation:
o LAN Segmentation: Physically separating different parts of the network using
switches or routers. For example, separating administrative offices from student
dormitories.
o VLANs (Virtual LANs): Using VLANs to logically segment the network. Different
VLANs can be used for different departments, floors of a building, or specific
purposes like research labs.
2. Logical Segmentation:
o Subnetting: Dividing the network into smaller subnets based on IP addressing. Each
subnet can represent different departments or groups within the college.
o Network Address Translation (NAT): Using NAT to hide internal IP addresses
from external networks, enhancing security by obfuscating the internal network
structure.
3. Segmentation by Access Control:
o Firewalls: Implementing firewalls to restrict traffic between different segments of
the network. For instance, blocking direct access from student networks to
administrative servers.
o Access Control Lists (ACLs): Configuring ACLs on routers and switches to control
traffic flow between different network segments based on IP addresses, ports, or
protocols.
4. Wireless Segmentation:
Wireless LAN (WLAN) Segmentation: Using multiple SSIDs (Service Set
o
Identifiers) or VLANs to segment wireless traffic. This allows different levels of
access or security policies for faculty, students, and guests.
5. Segmentation by Function:
o Separate Networks for Different Services: Maintaining separate networks for
critical services such as administrative systems, student information systems, library
resources, and research servers.
o Guest Networks: Providing a separate network for guest access to ensure security
and prevent unauthorized access to internal resources.
6. Segmentation for Security:
o DMZ (Demilitarized Zone): Creating a DMZ to host publicly accessible servers
such as web servers, while keeping them isolated from internal networks.
o Intrusion Detection/Prevention Systems (IDS/IPS): Deploying IDS/IPS to
monitor traffic between segments and detect potential security threats or policy
violations.
Firewalls:
RADIUS is an AAA (authentication, authorization, and accounting) protocol that manages network access.
1. Authentication Servers:
o Centralized systems like RADIUS (Remote Authentication Dial-In User Service) or
LDAP (Lightweight Directory Access Protocol) servers.
o Authenticate users before granting access to network resources.
o Examples include FreeRADIUS, Microsoft Active Directory, OpenLDAP, etc.
2. Single Sign-On (SSO):
o Allows users to authenticate once and access multiple applications or services
without re-authentication.
o Enhances user convenience and security by reducing the need for multiple
passwords.
o Examples include Shibboleth, Microsoft Azure Active Directory, Okta, etc.
3. Authorization Mechanisms:
o Ensures users have appropriate permissions based on roles or policies.
o Often integrated with authentication systems to enforce access control.
o Can include role-based access control (RBAC), attribute-based access control
(ABAC), etc.
Implementing these systems in a college campus network helps maintain a secure and resilient
environment for students, faculty, and staff, protecting against cyber threats and unauthorized
access to sensitive information and resources. Each system is typically chosen and configured based
on the specific security requirements and infrastructure of the college campus.
E. Apply the knowledge gained from the NetAcad cyber security course to
conduct an attack surface mapping.
Network Infrastructure:
Applications and Services: List all applications and services running on the network :
Web servers- IIS, Apache & Nginix, Active Directory services, SQL server, File Server,
DHCP server, DNS server.
2. Vulnerability Assessment:
Network Scanning: Tools like Nmap are used to scan the network for open ports, services,
and vulnerabilities.
Vulnerability Scanning: Tools like Nessus, OpenVAS, or Cisco's Security Manager are
usd to scan for known vulnerabilities in network devices and applications.
Privilege Escalation: Evaluated access controls and user privileges to prevent unauthorized
escalation.
Insider Threats: Consider risks posed by authorized users with malicious intent or
compromised credentials.
5. Wireless Networks:
Wireless Access Points: Secure wireless networks to prevent unauthorized access (use
strong encryption, disable SSID broadcasting, etc.).
Bluetooth and IoT Devices: Assess security of Bluetooth connections and IoT devices
connected to the network.
6. Physical Security:
Data Centers and Server Rooms: Ensured physical access controls are in place to prevent
unauthorized access to critical infrastructure.
Workstation Security: Secured workstations against physical attacks and unauthorized
access.
7. Social Engineering:
Phishing: Assess susceptibility of users to phishing attacks through training and awareness
programs.
Physical Security Awareness: Educated employees about the importance of physical
security and the risks of social engineering tactics.
8. Patch Management:
Software Updates: Ensured systems are regularly patched and updated to mitigate known
vulnerabilities.
Monitoring and Logging: Implement logging mechanisms and monitoring tools to detect
suspicious activities.
Response Procedures: Develop incident response procedures to quickly mitigate and
recover from security incidents.
3. Wireless Networks:
5. Physical Security:
6. Data Security: