The process of implementing security

 

The process of implementing security frequently opens one’s eyes to other forms of security not previously considered. In this two-part assignment, you should experience just that. This assignment focuses on a model of implementing security in layers, which, in many cases, requires a network that is designed accordingly.

The specific course learning outcome associated with this assignment is:

Recommend best security practices to achieve business objectives based on risk assumptions.
Instructions
Design a network that incorporates the following:

One corporate site (Chicago).
All servers exist here (web server, file server, print server, mail server, FTP server).
Connection to the Internet (50 MBps).
300 employees who only need access to local corporate resources and the Internet.
One remote site (8 miles away).
20 employees who need access to all resources at corporate, plus the Internet.
Connection to the Internet (3 MBps).
Part 1
Use Microsoft Visio or an open-source alternative, such as Dia Diagram Editor, to:

Create a network diagram with defense in depth in mind, citing specific, credible sources that support the design and depicting at least four-fifths of the following:
All necessary network devices (routers, switches and/or hubs, firewalls, VPNs, proxies, and others).
The interconnections between network devices.
Connections to end-user (client) devices (desktops, laptops).
Connections from the Internet cloud to the network input.
Part 2
Write a 6-10 page paper in which you:

Describe the flow of data through the network, citing specific, credible sources.
Assume data begins at the remote site.
Data flow may be monitored by an IDS.
Explain all three elements of the CIA triad and how isolating by network functions helps deliver a layered approach, citing specific, credible sources that support your assertions and conclusions.
Support your main points, assertions, arguments, or conclusions with at least four specific and credible academic sources synthesized into a coherent analysis of the evidence.

Sample Solution

Network Diagram with Defense in Depth

[Insert Network Diagram]

Diagram Explanation:

This network diagram depicts a layered security approach for a corporate network with one main site in Chicago and a remote site 8 miles away. The diagram includes:

Network Devices:

  • Routers: Two routers are used, one for each site, connecting the networks to the internet and filtering incoming and outgoing traffic.

  • Switches: Switches are deployed within each site to connect the network devices and user computers.

  • Firewalls: A stateful firewall is placed between the internet and the corporate network, blocking unauthorized access and filtering traffic.

  • VPN: A site-to-site VPN securely connects the remote site to the Chicago headquarters.

  • Proxy Server: A proxy server sits between the corporate network and the internet, acting as an intermediary for internet traffic.

  • Intrusion Detection System (IDS): An IDS monitors network traffic for suspicious activity, alerting administrators to potential threats.

Interconnections:

  • Internet Connectivity: Each site connects to the internet through its respective router.

  • Site-to-Site VPN: The remote site connects to the Chicago headquarters using a secure VPN tunnel.

  • Internal Connections: Switches connect user computers and servers within each site.

Connections to End-User Devices:

  • Client Devices: Employee computers (desktops and laptops) are connected to the network via switches.

Connections from the Internet Cloud:

  • Internet Traffic: Incoming traffic from the internet is filtered by the firewall before reaching the internal network.

Credible Sources:

  • Forrester Research. (2023). Network Security: Building a Robust and Flexible Infrastructure. Retrieved from https://www.forrester.com/

  • Cisco Systems. (2022). Best Practices for Network Security Design. Retrieved from https://www.cisco.com/

  • ** SANS Institute.** (2023). Top 10 Network Security Mistakes. Retrieved from https://www.sans.org/

Note: These are hypothetical source examples. You will need to find and cite relevant resources for your specific diagram.

Part 2: Data Flow and the CIA Triad

Data Flow:

  1. Origin at Remote Site: Data originates from a user computer at the remote site, connected to the remote site’s switch.

  2. VPN Tunnel: The data is encapsulated and transmitted through the VPN tunnel, encrypted for secure transmission to the Chicago headquarters.

  3. Firewall: The data reaches the Chicago headquarters’ firewall, which inspects the traffic for potential threats based on pre-configured rules. The firewall only allows authorized traffic to proceed.

  4. Intrusion Detection System (IDS): The data passes through the IDS, which actively monitors the network for malicious activity, analyzing traffic patterns and signatures for known threats.

  5. Switch and Server: The data reaches the appropriate switch and is directed to the relevant server (e.g., web server, file server) based on the destination IP address.

  6. User Access: The data is processed by the server and ultimately accessed by the user at the remote site, completing the data flow.

The CIA Triad and Layered Security:

The CIA triad, consisting of Confidentiality, Integrity, and Availability, forms the cornerstone of information security. A layered security approach enhances each element of the triad:

  • Confidentiality:

    • VPN: Encryption protects data transmitted through the VPN tunnel, preventing unauthorized access during transit.

    • Firewall: The firewall acts as a barrier, preventing unauthorized access from the internet to internal network resources.

    • Proxy Server: The proxy server can mask the internal network’s IP addresses, making it more difficult for attackers to identify and target specific systems.

  • Integrity:

    • Firewall: The firewall can filter malicious traffic, preventing data alteration or modification attempts.

    • IDS: The IDS monitors for anomalous network activity, detecting potential attempts to compromise data integrity.

    • Server Security: Implementing strong security measures on the servers themselves (e.g., access control, data backups) helps maintain data integrity.

  • Availability:

    • Redundant Systems: Implementing redundant network devices and server infrastructure ensures continued availability even in case of failure.

    • Disaster Recovery Plans: Having established disaster recovery plans allows for rapid restoration of service in the event of major outages.

    • Network Monitoring: Constant monitoring of the network helps identify and address issues promptly, minimizing downtime and maintaining availability.

Conclusion:

Layered security, incorporating the CIA triad principles, is crucial for safeguarding information systems and protecting sensitive data. The network diagram presented demonstrates how a well-designed network, with multiple security layers, can enhance confidentiality, integrity, and availability. By employing a layered approach, organizations can significantly reduce the risk of security breaches and protect their critical assets.

This question has been answered.

Get Answer