Uploaded by Lahiru Prasanna

Network

advertisement
Pearson
Higher Nationals in
Computing
1.0 Assignment Brief (RQF)
Unit Learning Outcomes:
LO1 Examine Network Security principles, protocols and standards
LO2 Design a secure network for a corporate environment
LO3 Configure Network Security measures for the corporate Environment
LO4 Undertake the testing of a network using a Test Plan
Assignment Brief and Guidance:
Task 01 – Technical Information Report
Create a technical report which includes the following information. Your report will be considered
as a complete report ONLY if you include all of the following.
●
Discuss at least 02 Network Security Devices such as Firewalls, Routers etc... (Word Limit: 400 words
per device)
In here I’m going to discuss about firewall and routers. Basically, a firewall is security system that will
secure the network by implementing security rules on the firewall. This will block data packets based
on the security rules and this monitors network traffic which is incoming and outgoing. And this is act
as a guard on the computer entry point which we call as port where all the information is exchanging
with extremal devices. But at some point, this also will fail to manage threat from the other networks
as well. A firewall can be a software or a hardware. If we have both it will be better. A software Firewall
is an application which is mostly built in on the Operating system and regulate traffic by using port
numbers and applications. Physical network is a device were installed in between the network and the
gateway. The most common firewall type is packet filtering firewall. This is just examined packets on
the network and restrict them from parsing unless they wont match with any on define rules on the
firewall. What this does is just check the destination of the source and the source IP address. If the
packet matches with rules on the firewall, then it will grant permission to enter the network. There are
two types of categories are there and those are,
•
•
Stateful
Stateless
Stateless firewall examines packets individually of on another and lack context. This will make hackers to
easy target. Stateful firewall are more secure since it remembers information about previously transferred
packets. But still, those are not more secure they still provide a basic protection. When we look in to further, we
can find Next Generation Firewall and Proxy firewall. This is a combination of traditional firewall and enhanced
additional feature. This will provide feature such as encrypted traffic inspection, intrusion prevention system,
anti-virus and more features. This includes DPI (deep packet inspection). This will examine the data in the
packet itself and let users to more effectively identify and categorize or stop packet having malicious data. Proxy
firewall this filter network traffic on application level and act as intermediary in between two end systems. And
another one is NAT (Network address translation firewall). This will allow independent network address where
multiple devices will allow to connect to the internet by using a single IP address and this keeps individual IP
addresses Hidden. By doing this attacker can find the correct details on IP addresses.
Londontec City Campus
Page PAGE \* Arabic \* MERGEFORMAT 2 of NUMPAGES \* Arabic \* MERGEFORMAT 8
And SMLI (Stateful multilayer inspection firewall) this filters packet at the network and application layer.
Comparing them against know trusted packet.
And when we talk about Routers. As name meaning this is the device that will guid and direct network data.
And this also doing this by using packets that contains some kind of data. Such as files, communications and
web interactions. This will have several layers or sections one of the its layer carrying identification information
such as type, size, sender information/ data, most importantly the IP address on the destination. The router is
smart enough to read those layers and make it prioritizes the data and choose the best route to use for each
transmission. This is a common tool for modern network computing. This will connect people to the network
both local network and the Internet. And this is a very important device since by this device we it can be
connect to the internet, and start communication gathering information and learn new things and the
important one is collaborated each other outside the current place and this is more vital for a business. This also
provides security and most of them have embedded firewall and content filtering software that will provide
additional protection against the wan wanted content and malicious websites without having any harm on your
online experience. This is not just a device that you will connect to the internet. This will allow you to connect
hard drives and use them as fie sharing severs or printers that can then be accessed by anyone on the network.
There are many more router models are there such as,
•
Core Routers
These types of routers are mostly used by service providers like AT&T, Verizon, Vodafone, SLT Or Cloud
Providers Such as Amazon, Google, Microsoft. Since they provide maximum bandwidth to other
additional switches and routers. These types of routers can’t see on small business but will see on large
enterprise level company like if they have many employees working in carious building or location. If
so, they will use core routers as their part of network architecture.
•
Edge Routers
AKA gateway routers. these types of routers are used to optimize the bandwidth. This is design to
Distribute data to end user by connecting to other routers. These are usually not able to manage local
network fully of offer Wi-Fi. And mostly provides Ethernet ports and input to connect to the Internet
and / Or several outputs to connect additional routers. Gateway routers and modem are somewhat
interchangeable, So the latter term is no longer commonly used by the manufacturer of IT Profs.
•
Distribution Routers
Londontec City Campus
Page PAGE \* Arabic \* MERGEFORMAT 2 of NUMPAGES \* Arabic \* MERGEFORMAT 8
This will receive data from the gateway through a wired connection and sends it to end users most
probably through Wi-Fi.
●
Examine the following network security protocols (200 words each)
o FTPs
The definition is File Transfer Protocol Secure is an advanced extension on the traditional file
transfer protocol and it supports LTS (Transport Layer Security) while the new one support SSL
(Secure Socket Layer). This will allow transfer files by encrypting through algorithms such as
AES. This uses many security methods to connect with other servers and verify authentication
by using various security and encryption strategies. There are few faults are there and one on
them is it is difficult to connecting through highly secure firewalls. For implicit and explicit
connection types, FTPS uses numerous port identifiers, necessitating the opening of additional
ports each time a file transfer request or directory listing is entered. If suitable risk
management methods are not in place, an overflow of port requests might put a system at
danger. We just know now that the FTPS is more secure than FTP and its more reliable and
flexible than FTP. FTPS is a secure file transfer protocol that enables organizations to securely
interact with their trading partners, users, and customers. FTPS is used to send and receive
files, and applications that support it, such as client certificates and server identities, are used
to authenticate them. Nowadays it is very important to use secure.
o
HTTPs
This is also something like above. This is also an upgraded version on a traditional HTTP. The
name is Hypertext transfer protocol secure. And this is the secure version of HTTP where the
primary protocol used to send data between a browser and a website. This is encrypted in
order to increase security of data transfer. This is particularly important when users transmit
sensitive data, such as by logging into a bank account, email service, or health insurance
provider. Any website, especially those that require login credentials, should use HTTPS. In
modern web browsers such as Chrome, websites that do not use HTTPS are marked
differently than those that are. Look for a green padlock in the URL bar to signify the webpage
is secure. HTTPS uses an encryption protocol to encrypt communications. The protocol is
Londontec City Campus
Page PAGE \* Arabic \* MERGEFORMAT 2 of NUMPAGES \* Arabic \* MERGEFORMAT 8
called Transport Layer Security (TLS), although formerly it was known as Secure Sockets Layer
(SSL). This protocol secures communications by using what’s known as an asymmetric public
key infrastructure. This type of security system uses two different keys to encrypt
communications between two parties: and one of them is,
The private key - this key is controlled by the owner of a website and it’s kept, as the reader
may have speculated, private. This key lives on a web server and is used to decrypt
information encrypted by the public key.
And Other one is,
The public key - this key is available to everyone who wants to interact with the server in a
way that’s secure. Information that’s encrypted by the public key can only be decrypted by
the private key.
o
POP3
POP3(Post office protocol 3). This is used to receive mail most commonly over the internet.
What this does is it is used to received emails from remote server and then send to local
client. This is one way client server protocol where email is held on the email server which was
received previously. The 3 represent to the third vision of the original Post Office Protocol.
The receiver or mail client can eventually download their mail from the server using
OPO3.This will allow client to read mail offline since the mail can be downloaded locally.
This can be like store and forward service. This is a most popular service. And even Outlook
also including this. And this can be configured on the Microsoft Outlook as well by providing
user name and the password. Even the POP3 is built in to the standard internet browsers such
as IE, Firefox, Chrome, Edge, etc, User can check their email without using an email client. This
is working by default using two ports and those are, and this is a huge advantage for users
port 110: default, non-encrypted port; and
port 995: should be used when the user needs to connect using POP3 securely.
o
SMTP
SMTP (Simple Mail Transfer Protocol) This is a protocol where it uses to send, receive, relay
outgoing mail in between receivers and the senders. This is like other applications and this
provides a service to other applications withing a network. This is a very important part since
without SMTP server the email would not be able to its destination. Once the user press or
initiate send mail the mail will convert in to a string format and then it will send to the SMTP
Server. SMTP server has ability to process that code and pass on the message.it will be lost in
translation unless the SMTP server was not there. And this is doing the verification process as
well like the outgoing email is an active source or protect inbox by safeguarding from
illegitimate email. And the mail will be back to SMTP sender if it can’t be delivered.
Londontec City Campus
Page PAGE \* Arabic \* MERGEFORMAT 2 of NUMPAGES \* Arabic \* MERGEFORMAT 8
Common SPTP Servers Providers,
Technically This is same as another normal server. This is Process and prepare data to send to
another server. And this is not necessarily on a machine. it is constantly running in anticipation
of sending new email. This is a very important process of emails configuration as well.
●
Compare and contrast any two of the above network security protocols.
Since these both protocol supports stateless Both HTTP and FTP can easily maintain multiple sessions.
When we talk about FTP this has stateful control connections, So FTP server maintains its state
information like a session like user’s current directory. The FTP needs to grant user permission to
exchange information successfully whereas with HTTP is not a mandatory thing.
Many Issues incurred by FTP will fixes by HTTP. HTTP provide more overhead and metadata while FTP
doesn’t provide them. FTP can use non-standard ports, which can make difficulties when it comes to
the firewall level. Especially if you use SSL (secure sockets layer), While HTTP is very well-known port
and simple to manage firewall rules. HTTP supports the data connection and use to Transmission
Control Protocol and runs on TCP port 80.FTP supports both data connection and control connection
and use to Transmission Control Protocol and runs on TCP port 20 and TCP port 21
●
Discuss different cryptographic types of Network Security
Cryptographic is kind of securing data when it passes over the internet. Like securing the data and both
communication through few codes So only the destination person knows regarding the actual
information transmitted. To be Clear the name also represents the meaning of this. crypt refers to
hidden to write. In cryptography It will Encode information, it follows mathematical hypotheses as
well as few calculations. And this describes as algorithms. Once the data encoded the man in the
middle cannot read those records. Most companies follow this methodology, those are
Privacy
Expect intend individuals’ other parties should not able to know the transmitted data.
Reliability
The data should directly go to the receiver. By not modifying in storage
Non-repudiation
The user doesn’t have ability to deny it in later phase once the data has transmitted
Authentication
Londontec City Campus
Page PAGE \* Arabic \* MERGEFORMAT 2 of NUMPAGES \* Arabic \* MERGEFORMAT 8
The Receiver and Sender needs to circumstantial their own identities about the transmitted and
received data.
There are three types of Cryptography are there Those are
Symmetric Key Cryptography
In here Sender and receiver only use a single key to encrypt and decrypt the message. The frequent
kind of cryptography used in this method is Advance Encryption System. This is much quicker and well
streamlined. Few types of Symmetric cryptography are follows.
• Block
• Block cipher
• DES (Data Encryption System)
• RC2
• IDEA
• Blowfish
• Stream cipher
Asymmetric Key Cryptography
Londontec City Campus
Page PAGE \* Arabic \* MERGEFORMAT 2 of NUMPAGES \* Arabic \* MERGEFORMAT 8
This also named as public cryptography. It follows a protected mothed in information transmission.
And this is not like above one, this uses couple of keys for both encryption and decryption process. And
the pattern is a private key stored with each person where a public key is shared in the network, SO the
message can transmit through the public key across the network. Few types of Asymmetric key
cryptography are
• RSA
• DSA
• PKCs
• Elliptic curve techniques
Hash Function
The algorithms are Taking the arbitrary length of the message as the input and delivering a fixed length
of the output. This one doesn’t need a key since it functions in a one-way scenario.
Few of the functionalities of the hash are
•
•
•
•
●
Message Digest 5 (MD5)
RIPEMD
Whirlpool
SHA (Secure hash Algorithm)
Discuss what is meant by Quality of Service (QoS) in Relation to Network Security Configuration.
Londontec City Campus
Page PAGE \* Arabic \* MERGEFORMAT 2 of NUMPAGES \* Arabic \* MERGEFORMAT 8
Quality of Service (QoS) is a group of technologies that operate together on a network to ensure that
high-priority applications and traffic are reliably delivered even when network capacity is constrained. This is
accomplished through QoS technologies, which provide differentiated handling and capacity allocation to
certain network traffic flows.
Task 02 – Aliki’s Bank Network
Londontec City Campus
Page PAGE \* Arabic \* MERGEFORMAT 2 of NUMPAGES \* Arabic \* MERGEFORMAT 8
Content
Security Proposal for Aliki’s Bank Network Infrastructure
•
•
•
•
•
•
•
•
Why is network security important?
The importance of cyber security in banking
What is the current state of the Aliki’s bank network?
Findings and Recommendations
Gaps in the current landscape
AWS VPC and Citrix Cloud landscape proposal
What are AWS VPC (Virtual Private Cloud)?
What is virtualization?
Why is network security important?
No matter how little or large your business is, network security is one of the most crucial factors to consider
when working over the internet, LAN, or other methods. While no network is resistant to attacks, a reliable and
effective network security solution is critical for safeguarding client data.
A solid network security solution can enable enterprises in reducing the danger of data theft and destruction.
Your workstations will be safeguarded from malicious programs because of network security. It also assures the
safety of shared information.
Massive traffic can cause chaos on the system's stability and expose weaknesses. Network security significantly
improves reliability by reducing slowness and downtimes by continuously monitoring any fraudulent activity
that could compromise the system. things go wrong in networks that affect people and businesses? Being
hacked on your network can put you out of business.
This usually entails the introduction of false information into the system. Hackers employ a variety of strategies,
including this one. Your company's consistency may be brought into question, and customers may feel misled, if
the wrong information is planted. One of the consequences of poor network security solutions is the loss of
intellectual property.
The majority of network attacks can cause a network to fail. Due to the prolonged downtime, your business
would be unable to conduct any transactions, resulting in income loss. The longer the network is down, the
more revenue is lost, and your organization will appear untrustworthy and lose credibility.
The importance of cyber security in banking
For hundreds of years, the banking industry has been under threat. The first was the actual theft of funds. Then
there was the issue of computer fraud. Hacking into servers to steal a customer's personally identifiable
information is now a common occurrence, in addition to cyber fraud (PII). hence cyber security in banking
sector is absolutely vital.
Because most people and businesses conduct their business online, the risk of a data breach grows every day.
This is why a greater emphasis is being placed on examining the role of cyber security in banking processes.
There are three current concerns linked with online banking.
●
More risks posed by smartphone apps — More people are using smartphone apps to access their bank
accounts. Because most of these people have little or no security, the risk of being attacked is substantially
higher. To prevent unauthorized activities, banking software solutions are needed at the endpoint.
●
Breach of privacy at third-party companies — Hackers have turned to shared banking systems and
third-party networks to get access as banks' cyber security has improved. If these aren't as well-protected as the
bank, the attackers will have little trouble breaking in.
Londontec City Campus
Page PAGE \* Arabic \* MERGEFORMAT 2 of NUMPAGES \* Arabic \* MERGEFORMAT 8
●
Risk of Cryptocurrency hacking is becoming more common — Hacks have escalated in the growing
realm of cryptocurrencies, in addition to traditional assets. Because the banking industry is confused how to
apply cyber security software in an ever-changing environment, attackers have a better chance of stealing large
sums of money. Especially when the number changes quickly.
What is the current state of the Aliki’s bank network?
As you can see in the above high-level network diagram Aliki’s Bank core banking and digital banking application
workloads running in the AWS private cloud instance and some other mission critical workloads such as main file
Londontec City Campus
Page PAGE \* Arabic \* MERGEFORMAT 2 of NUMPAGES \* Arabic \* MERGEFORMAT 8
server active directory is hosted in the Aliki’s Ho server farm. Apart from those all 70 branches are connected thru
the SLT MPLS. As per to this we can identify below major security gaps in the above network.
Risk
Observation
Ratin
g
It was observed that all High
internal user’s core banking
and publicly opened digital
banking traffic
currently
communicating via same
path (deferent subnets but
still it would be a kind of a
risk) which is connected
perimeter firewall to SLT
MPLS and AWS.
It
was
observed
that High
Currently Digital banking
customer
loggings
and
internal vpn users have no
multifactor
authentication
mechanism.
It was observed that the
security of MPLS solutions
are totally in the hands of the
High
user. There are no any
inherent security features
offered by the MPLS provider.
It
was
observed
that High
Insufficient endpoint security
measurements
in
the
Internal user’s endpoints
virus guard is a legacy one. It
depending on the signature
base DB. 0day attacks and
Modern ransomware attacks
can breach these AVs. and
Modern ransomware attacks
can breach these AVs.
Impact
In a loss of MPLS
connectivity.
Outside
digital
banking
customers
will
unable to logging
their
online
accounts.
Recommendation
It is recommended to host digital
banking application instance to in
hybrid cloud solution such as AWS VPC.
It would be more secure and provide
high availability when compared to
current design. also, it will accessible to
online banking customers to via direct
internet instead of using HO network
path.
Hackers can easily
compromise
customer
accounts.
It is recommended to configure
multifactor mechanism in the digital
banking customer loggings and
internal vpn users as well.
when happening
in some kind of
internal breach,
could affect all
across
the
network
These legacy virus
guards depending
on the signature
base DB. 0day
attacks
and
Modern
ransomware
attacks
can
breach these AVs.
It is recommended to implement VDI
solution such as Cirtix or SD WAN
solution instead of legacy and costly
MPLS.
It is recommended to get NGAV (next
generation anti-virus) solution Such as
CrowdStrike, Sentinelone. They are not
depending on the signature data base.
There are working on the behavior
base analysis. the behavior base
analysis.
Apart from the network security concern we can identify the below Disadvantages of MPLS
LAN as well.
Londontec City Campus
Page PAGE \* Arabic \* MERGEFORMAT 2 of NUMPAGES \* Arabic \* MERGEFORMAT 8
1.Maintenance
Even if MPLS is handled by carriers and the demand on network administration is reduced, maintenance still
necessitates a significant amount of effort.
All of the basic maintenance work, in particular, cannot be done directly. An ISP is required to carry out the
maintenance. Due to some speed constraints and technological intricacies of the ISP, this is not an easy operation.
2. Control
MPLS also falls short when it comes to network control. The service provider is solely responsible for the setting.
Dynamic routing is the only control the user has over MPLS.
3. Deployment
In MPLS, deployment is a huge issue. The process can be complicated if the offices are located in separate places.
Linking all of the locations often takes a long time, even months.
4. Accessibility
MPLS isn't well-suited to cloud-based applications. It's designed specifically for point-to-point communication. As
we are running our core banking and digital banking workloads in AWS this will another concern when its needs
to improve.
So, considering all the above security concerns and difficulty in the MPLS-based WAN. I would like to suggest
below hybrid cloud concept provided by AWS VPC (virtual privet cloud) and Citrix landscape. I hope this
collaborated network scenario will full fill our all requirements sharply. In this scenario, 90% of the infrastructure
will be situated in the cloud landscape. On-premises infrastructure investment and maintenance cost almost 0 in
this. But Initial investment will be a kind of big figure. It is the only downside I see here.
Londontec City Campus
Page PAGE \* Arabic \* MERGEFORMAT 2 of NUMPAGES \* Arabic \* MERGEFORMAT 8
What is AWS VPC (Virtual Private Cloud)?
Amazon Virtual Private Cloud (VPC) assists a company or individual by providing virtual cloud space for business
integration.
With AWS VPC, we can fully manage our virtual network infrastructure, including defining our own IP address
range, creating subnets, and configuring route tables and network gateways. These features are extremely useful
for integrating organizations like us. As you can see above all mission-critical workloads can be hosted in this
private subnet. So this will allow digital banking outside user can reach only its app server instance only. Ondemand we can reduce or increase the resources as per the current requirement.
What is Citrix virtualization / virtual desktop infrastructure?
It refers to the process of creating a virtual environment for a desktop or mobile device in order to provide
storage, network, hardware, and server virtualization while retaining quality and allowing
users to transition between many operating systems (Windows 7 to Windows 10, Linux). This provides users with
the flexibility to work productively regardless of their location , allowing them to access their files, apps, and
desktops while ensuring the security of our business - all at a cheaper, predictable cost than distributed
infrastructure.
Londontec City Campus
Page PAGE \* Arabic \* MERGEFORMAT 2 of NUMPAGES \* Arabic \* MERGEFORMAT 8
The best part is here with help of Citrix VDI solution we can remove our entire MPLS WAN and we will require
only ILL connection (for HO and metro branches) or a broadband connection (for the mini remote branch office).
network. apart from that wfh users can also connect this securely using the Citrix client. As we faced a global
pandemic situation like we had last year this will help a lot.
Londontec City Campus
Page PAGE \* Arabic \* MERGEFORMAT 2 of NUMPAGES \* Arabic \* MERGEFORMAT 8
Task 03 – Test Plan for Aliki’s Network
External Penetration Test
Penetration testing is one of the ways for safeguarding network before a cyber-attack strikes. The main
objective of a penetration test is to detect organization’s security flaws. Penetration testing could be used to
evaluate a company's security policy, adherence to compliance standards, staff security awareness, and ability
to detect and respond to security problems. The goal of this penetration test is to find security flaws in your
system and fix them so that system is safe from cyberattacks.
☐
Planning and Reconnaissance
Initializing the scope
Initiate the project plan for execute
Passive Information Gathering
Active Information Gathering
☐
☐
☐
Scanning the Network
Port Scanning
Service Enumeration
Check exposed credentials
1d
1d
Fingerprinting
1d
Vulnerability Assessment
Initiate Automated Vulnerability Assessment (Using recommended tools)
Duration
2d
Initiate Manual Vulnerability Assessment
5d
Exploitation
Initiate Manual Exploitation
Initiate Post Exploitation/Lateral Movements
Final Analysis and Review
Double checking the results
☐
1d
1d
1d
Duration
1d
Initiate Automated Exploitation (Using recommended tools)
☐
Duration
1d
Utilizing the results
Summary of Critical Findings
Duration
5d
7d
3d
Duration
2d
Duration
1d
Londontec City Campus
Page PAGE \* Arabic \* MERGEFORMAT 2 of NUMPAGES \* Arabic \* MERGEFORMAT 8
Observation
It was
observed
that the
some host
are
accessible
through
remote
desktop
service.
Risk
Rating
High
Impact
Recommendation
Access to RDP
services can
provide an
attacker with
the ability to
make a
machine or
network
resource
unavailable to
its intended
users by
temporarily or
indefinitely
disrupting(locki
ng) services.
Also, It is
possible for an
attacker to gain
reliable and
additional
information
about the
server such as
login user
names. This
may lead to a
successful
system
compromisatio
n by conducting
further
exploitations.
Recommendati
on
It is
recommended
It is recommended to
disable RDP protocol, block
the tcp/3389 port if it is not
in use or to restrict the
access by allowing
connections only with
Network Level
Authentication (NLA). NLA
enforces authentication to
the network before
establishing the RDP
connection.
Refer:
https://docs.microsoft.com
/en-us/windowsserver/remote/remotedesktopservices/clients/remotedesktop-allow-access
Supporting informa
Londontec City Campus
Page PAGE \* Arabic \* MERGEFORMAT 2 of NUMPAGES \* Arabic \* MERGEFORMAT 8
to disable RDP
protocol, block
the tcp/3389
port if it is not.
It was
observed
that sensitive
information
such as user
credentials
are sent over
clear text.
High
This flaw
exposes an
individual user’s
data and can
lead to account
theft. If the
adversary
intercepts an
admin account,
the entire site
could be
exposed. Poor
SSL setup can
also facilitate
phishing and
MITM attacks.
MITM attacks
may enable
attackers to
easily observe
It is recommended to apply
SSL/TLS to transport
channels that the web
application will use to
transmit sensitive
information, session
tokens, or other sensitive
data to a backend API or
web service.
Londontec City Campus
Page PAGE \* Arabic \* MERGEFORMAT 2 of NUMPAGES \* Arabic \* MERGEFORMAT 8
username,
password
information. At
a minimum,
interception of
sensitive data
through a
communication
channel will
result in a
privacy
violation. The
violation of a
user’s
confidentiality
may result in
identity theft,
fraud and
reputational
damage.
During the
test it was
observed
that Aliki's
Banks does
not centrally
collect and
review the
logs
High
Without
collecting and
reviewing logs
form the
Servers,
Network
devices, user
computers and
Applications
Aliki's Banks will
not be able to
identify
potential
security
incidents.
It is recommended to
collect and review the logs
from the Servers, Network
devices, user computers
and Applications.
Londontec City Campus
Page PAGE \* Arabic \* MERGEFORMAT 2 of NUMPAGES \* Arabic \* MERGEFORMAT 8
During the
test the
following
gaps were
observed in
the
Vulnerability
management
process.
1. It was
observed
that Aliki's
Banks did
not have a
formalized
server
hardening
process.
2. It was
noted during
the test that
a
Vulnerability
assessment
is yet to be
conducted
for the
business
critical
applications.
3. During the
test it was
observed
that Aliki's
Banks does
to have an
approved
software list.
High
Without a
proper threat
and
Vulnerability
management
process Aliki's
Banks will be
exposed to
cyber attackers
which could
result in a data
breach or
disruption to
business
operations.
It is recommended to
ensure that Procedures for
Threat and Vulnerability
management are created
and practiced to ensure the
security of the network and
Information. It is also
recommended do ensure
that this procedure
includes topics such as
Server Hardening,
Approved software list,
Approved operating
systems and Vulnerability
assessments.
1. The lack of a
formalized
server
hardening
process could
result in a
Security
misconfiguratio
n which could
expose the
server to
attackers.
Security
misconfiguratio
n is a
vulnerability
simply defined
as failing to
implement all
the security
controls for a
server. It should
be noted that
Security
Misconfiguratio
Londontec City Campus
Page PAGE \* Arabic \* MERGEFORMAT 2 of NUMPAGES \* Arabic \* MERGEFORMAT 8
Additionally
it was
observed
that Aliki's
Banks also
uses
freeware
such as Any
desk which
could
contain
vulnerabilitie
s.
Without a list
of software
used in the
network the
organization
will be
unaware of
the threats
posed by
Application
vulnerabilitie
s.
Additionally
the lack of
testing for
known
vulnerabilitie
s and not
following
proper
security
procedures
to secure
business
critical assets
could have
the same
n was listed as
one for the top
ten
vulnerabilities
by OWASP in
both 2019 and
2017.
2. Without
conducting a
Vulnerability
assessment for
the Critical
business
applications
Aliki's Banks will
not be able to
identify the
vulnerabilities
in the
application.
3. Without an
approved Aliki's
Banks will not
be able to
identify and
ensure the
security
compliance of
all the
applications
used. The
approved
software list will
help Aliki's
Banks to track
the software
used in the
network and
their versions.
Londontec City Campus
Page PAGE \* Arabic \* MERGEFORMAT 2 of NUMPAGES \* Arabic \* MERGEFORMAT 8
effect. It
should be
noted that
since the
users are
working
from home
and they still
have the
facility to
connect to
the internal
network any
compromise
on these
nodes could
expose the
network to
attackers.
The risk of
these nodes
being
compromise
d also
increases
since the
house of an
end user or
the home
network of
an end user
does not
provide the
same level of
protection as
the cooperate
environment
does.
Having this
information will
also help Aliki's
Banks to
eliminate the
usage of some
applications
which would
reduce the
attack surface
for an attacker.
Londontec City Campus
Page PAGE \* Arabic \* MERGEFORMAT 2 of NUMPAGES \* Arabic \* MERGEFORMAT 8
During the
test the
following
gaps were
observed in
the Anti-virus
management
portal.
1. It was
observed
that some
user
computers
had
outdated
Anti-virus
clients. It was
informed
that this was
due to the
upgrade
however
without the
latest
version the
Anti-virus
client will not
detect the
latest
threats.
Without the
updated Antivirus clients
Aliki's Banks will
not be able
ensure that the
end points are
protected
against the
latest security
threats.
High
It is recommended do
ensure that all the devices
have the updated Antivirus agent and it is also
recommended to ensure
that Malware is cleaned
from the computer once it
is identified and
Quarantined.
If the malware
is not cleaned
from the laptop
there is a
potential for an
attacker to gain
access to the
device through
another
method and
execute the
malware.
2. During the
test it was
observed
that even
though
Malware has
been
identified
and
Londontec City Campus
Page PAGE \* Arabic \* MERGEFORMAT 2 of NUMPAGES \* Arabic \* MERGEFORMAT 8
quarantined
by the Antivirus
software it
was not
cleaned from
the devices.
Any gaps in
the Anti-virus
management
process
could lead to
the endpoint
exposed to a
malware
attack and if
the end
point is
compromise
d it could
lead to an
intrusion
into the
network. It
should be
noted that
since the
users are
working
from home
the potential
of an
endpoint
being
compromise
d is higher.
Londontec City Campus
Page PAGE \* Arabic \* MERGEFORMAT 2 of NUMPAGES \* Arabic \* MERGEFORMAT 8
It was
observed
that real
time patch
monitoring is
not available
for the end
user
computing.
Gaps in the
patch
management
process
could leave
the endpoint
vulnerable to
known
vulnerabilitie
s which can
be exploited
by an
attacker
easily while
working
from home.
Without the
ability to
monitor the
patch
compliance in
real time Aliki's
Banks will not
be able to
ensure that all
the devices has
received the
patches.
It is recommended to
ensure that Aliki's Banks
can monitor the patch
compliance status of all the
user computers in real
time, it is further
recommended that Aliki's
Banks conduct such
monitoring to ensure that
all the devices have
received the latest patches.
High
Londontec City Campus
Page PAGE \* Arabic \* MERGEFORMAT 2 of NUMPAGES \* Arabic \* MERGEFORMAT 8
During the
test it was
observed
that the VPN
used by
Aliki's Banks
users does
not have two
factor
authenticatio
n. Which
would mean
that an
attacker can
easily steal
the VPN
credentials,
configure a
malicious
connection
and use it to
connect to
the network
while the
user is
working
from home.
It should laps
be noted
that the
security on
the home
network of a
user may not
be as good
as the
security in a
co-operate
network.
Mediu
m
The lack of two
factor
authentication
for VPN
connectivity
would mean
that if an
attacker is able
to obtain a
computer the
attacker will be
able to easily
connect to the
network.
It is recommended that
Aliki's Banks use two factor
authentication for VPN
connectivity.
Londontec City Campus
Page PAGE \* Arabic \* MERGEFORMAT 2 of NUMPAGES \* Arabic \* MERGEFORMAT 8
During this security check we notified file server firewall was disabled. As an immediate
action we have enabled and configured windows firewall wall with below configurations.
1.These options are intended to keep your device safe in most network situations. The
default Block behavior for Inbound connections.
2. we have change file server default RDP port 3389 to 3377 as security percussion.
Londontec City Campus
Page PAGE \* Arabic \* MERGEFORMAT 2 of NUMPAGES \* Arabic \* MERGEFORMAT 8
3. we have defined file server accessing in IP subnet in the file server. This will prevent
the unnecessary accessing attempts via remote networks.
References
1. Firewall defined - https://www.forcepoint.com/cyber-edu/firewall
2. How Firewalls Work - https://computer.howstuffworks.com/firewall.htm
3. What is a Router? - https://www.cisco.com/c/en/us/solutions/small-business/resourcecenter/networking/what-is-a-router.html#~how-does-a-router-work
4. FTPS - https://www.precisely.com/glossary/ftps
5. What is HTTPS - https://www.cloudflare.com/learning/ssl/what-is-https/
6. POP3 - https://whatis.techtarget.com/definition/POP3-Post-Office-Protocol-3
7. SMTP - https://sendgrid.com/blog/what-is-an-smtp-server/
Londontec City Campus
Page PAGE \* Arabic \* MERGEFORMAT 2 of NUMPAGES \* Arabic \* MERGEFORMAT 8
Londontec City Campus
Page PAGE \* Arabic \* MERGEFORMAT 2 of NUMPAGES \* Arabic \* MERGEFORMAT 8
Learning Outcomes and Assessment Criteria:
Learning Outcome
LO1 Examine Network
Security principles,
protocols and
standards
LO2 Design a secure
network for a
corporate environment
Pass
P1 Discuss the
different types of
Network Security
devices.
P2 Examine Network
Security protocols.
P3 Investigate the
purpose and
requirements of a
secure network
according to a given
scenario.
P4 Determine which
network hardware and
software to use in this
network.
LO3 Configure
Network Security
measures for the
corporate environment
P5 Configure Network
Security for your
network.
P6 Discuss different
cryptographic types of
Network Security.
P7 Create a Test Plan
for your network.
LO4 Undertake the
testing of a network
using a Test Plan
P8 Comprehensively
test your network
using the devised Test
Plan.
Merit
Distinction
M1 Compare and
contrast at least two
major Network Security
protocols.
M2 Create a design of a
secure network
according to a given
scenario.
M3 Provide Network
Security configuration
scripts/files/screenshots
with comments.
M4 Provide scripts/files/
screenshots of the
testing of your network.
M5 Make some
improvement
recommendations
LO1 & LO2
D1 Discuss, using
examples, the
importance of Network
Security.
D2 Discuss what is
meant by Quality of
Service (QoS) in
relation to Network
Security configuration.
D3 Critically evaluate
the design, planning,
configuration and
testing of your
network.
Londontec City Campus
Page PAGE \* Arabic \* MERGEFORMAT 2 of NUMPAGES \* Arabic \* MERGEFORMAT 8
** Please note that this Result will be Provisional till the ISV Process & IV Process is Completed.
Londontec City Campus
Page PAGE \* Arabic \* MERGEFORMAT 2 of NUMPAGES \* Arabic \* MERGEFORMAT 8
Download