File - Eric Chavez MD MMI

advertisement
1
FINAL EXAM
CIS 313 FINAL EXAM
Eric M Chavez MD
Northwestern University
Summer 2013
2
FINAL EXAM
1.
I would use multimode fiber cable to connect the router to the three core switches
and between one core switch and the three servers if the distance between these
devices is more than 55 meters. This same type of fiber cable can be used to connect
two core switches to the four distribution switches if the distance between the devices is
more than 55 meters. Multimode fiber can transmit data at 10 Gbps. The distance
between the devices will determine the core diameter and the modal bandwidth of the
fiber cable that I choose. Fiber cable with a core diameter of 62.5 microns and modal
bandwidth of 160 MHz.km can transmit data a maximum of 220 meters. Fiber cable with
a core diameter of 62.5 microns and a modal bandwidth of 200 Mhz.km can cover a
distance of up to 275 meters. Fiber cable with a core diameter of 50 microns and a
modal bandwidth of 500 MHz.km can transmit data up to 550 meters. (Most fiber cable
in the U.S. is 65 micron cable.) I could use Cat6 UTP cabling to connect any of these
core devices if the distance between them is less than 55 meters. This cabling can
transmit data up to 10 Gbps for a distance of up to 55 meters and is cheaper and easier
to repair than multimode fiber. In general, fiber cable can transmit data farther but not
necessarily faster than UTP cable.
I will use Cat5e UTP cabling to connect the four peripheral distribution switches
to each of the end-user network devices (240 personal computers in this diagram). This
cabling is less expensive and more durable, and it can carry data transmissions of up to
1 Gbps for a maximum of 100 meters which should be sufficient.
2.
I will separate the physical network into four VLANs. VLAN10 will be a DMZ network that
contains the router, three core switches, and the three servers connected to the core switches.
VLAN20 will contain two distribution switches and 115 network devices in engineering. VLAN30
will contain a distribution switch and 35 network devices in accounting/HR/management.
VLAN40 will contain a distribution switch and 90 network devices in sales.
Network Name
VLAN10 (core DMZ)
VLAN20
(engineering)
VLAN30
(acct/HR/mngt)
VLAN40
(engineering)
Network ID
172.16.10.0
172.16.20.0
Subnet Mask
255.255.255.0
255.255.255.0
Broadcast Address
172.16.10.255
172.16.20.255
172.16.30.0
255.255.255.0
172.16.30.255
172.16.40.0
255.255.255.0
172.16.40.255
3
FINAL EXAM
3.
Network Name
VLAN10
VLAN20
VLAN30
VLAN40
Address Range
172.16.10.1-172.16.10.254
172.16.20.1-172.16.20.254
172.16.30.1-172.16.30.254
172.16.40.1-172.16.40.254
Default Gateway
172.16.10.1
172.16.20.1
172.16.30.1
172.16.40.1
DNS Server Address
172.16.10.5
172.16.10.5
172.16.10.5
172.16.10.5
4.
A DNS hosting service will run the Domain Name System server. This is needed to
translate domain names which are alphabetic and easy for humans to remember into IP
addresses which are numbers that the computers use to route packets of information
around the network. This will be important so that users in different departments can
connect with the core servers and with each other.
An authentication service will be needed to provide security to the network.
Authentication services are used to verify the credentials of users using usernames and
passwords or other means of identification such as biometrics. Authentication services
limit access to network resources to those individuals that have privileges to those
resources.
Dynamic Host Configuration Protocol services will be necessary so that devices
connected to the network can receive IP addresses so that data can be routed correctly
around the network.
Network Address Translation service makes the translation between external IP
addresses and internal IP addresses. This will allow computers inside the company
network communicate with computers outside the company network via the Internet and
vice versa. This also allows the company to have fewer public IP addresses on the
Internet which saves money.
File sharing services will allow users to store information on the network and will allow
other users to access information that has been stored on the network. This will be
essential as users in the business will need to access database records stored on a
central server or other storage device.
Email services provide the necessary protocols to package and route electronic
messages among different computers on the network
Directory services store, organize, and provide access to information in a directory such
as usernames, email addresses, telephone numbers, physical addresses, employee
identification numbers, departments, etc. These services are necessary to locate
information about the employees of the company.
4
FINAL EXAM
Print server services allow multiple users to share common printers.
World Wide Web services allow users in the company to access information on the
Internet.
Simple Network Management Protocol services allows the network administrators to
monitor and map network availability, performance, and error rates and respond to
problems.
5.
I would recommend a wireless network based on the IEEE 802.11n standard.
802.11n networks can operate in the 5 GHz band or the 2.4 GHz band and can reach
transmission speeds of up to 300-600 Mbps. (Actual throughput is more like 100 Mbps.)
When operating in the 5 GHz band, 802.11n equipment can transmit data in 11-24 nonoverlapping channels (usually 11 in the U.S.). This allows for access points to be placed
closer together without mutual channel interference. This will allow more wireless users
to access network resources and will maintain a high level of throughput in the network.
Equipment in the 802.11n standard is backward compatible with older wireless
equipment and devices. 802.11n access points can utilize MIMO and can transmit on
more than one channel at a time. This greatly increases transmission speed.
The number of access points needed depends on the area to be covered, the
physical obstacles in the environment, and the number of wireless users expected. A
general rule is that one access point can cover a radius of about 30 meters. Care must
be taken to place the access points systematically to minimize interference and dead
zones. Adjacent access points should be assigned different operational channels to
avoid mutual channel interference. Access points in congested areas with a large
number of users should be adjusted to operate at a higher bandwidth. For security, the
wireless network should employ the 802.11i security standard otherwise known as
WPA2. This is the strongest security standard currently available for wireless networks
and it uses AES-CCMP 128-bit encryption. This security protocol should be operated in
802.11X mode or enterprise mode which uses an EAP to secure transmissions between
a wireless host and an access point. Other security measures include the use of virtual
private networks, periodically scanning the network for rouge access points, and
separating the wireless network into a DMZ with firewalls.
If the CIO wants to wait on deploying a wireless network, we could consider
using equipment in the 802.11ac standard. This standard is not scheduled to be ratified
until 2014 with equipment to follow. 802.11ac networks are expected to reach
transmission speeds of up to 1 Gbps.
5
FINAL EXAM
6.
Using server virtualization would help to maximize the efficiency of the physical servers.
Fewer physical servers would be needed. This would lead to a cost savings as fewer physical
servers would need to be purchased, installed (cabling, racks), and maintained (cooled and
updated). There would be less energy costs with fewer physical servers. The size of the room
needed to store the servers would be smaller. Virtual servers can be updated faster through
management software. The entire system would have more flexibility and potentially more
scalability since management software can make changes to many virtual servers quickly rather
than having to modify many different physical servers or purchase and install new physical
servers. There may be some older applications that the business needs that run only on older
operating systems. Having virtual servers would allow the business to buy the most modern
severs and still use older applications that could run on virtual machines. Security would be
enhanced since there is less physical hardware to protect. A disaster recovery plan would be
easier to implement since there would be less physical hardware to replace. Copies of the
virtual machines could be kept. In case of disaster the copies could be restored on new physical
servers and the business would be up and running again quickly.
7.
A security plan must begin with a risk analysis. In risk analysis, a business must
determine what the major threats to its assets are and how much a security breach of those
assets would cost. Then the business decides what security countermeasures are necessary to
protect those assets and how much the security measures would cost. If the security measures
cost more than the assets are worth, then it may not be economically advisable to implement
the security measures and more advisable to assume risk of a potential loss. Risk analysis is a
process of balancing the economic costs of loss due to threats and the costs of implementing
security measures.
Three major security principles are comprehensive security, defense in depth, and
access control. In comprehensive security a business must assess all potential weaknesses in
the network and attempt to close off all potential areas where an attacker could gain entry into
the system. An attacker only needs to find only one weakness to exploit in order to gain entry. A
comprehensive security plan must attempt to come as close as possible to protecting all
possible weaknesses. In defense in depth, it is important to set up multiple layers of defense in
all areas of weakness. An attacker may be able to break through one area of defense but will
probably get discouraged and stop trying if he has to break through multiple layers of defense.
In access control, network managers limit who has access to network resources and limit
permissions when using resources. Users who have access and permissions to network
resources can potentially do damage. Limiting access and permissions can help protect the
resources. Network managers must balance access and security since a major point of having a
network is so that multiple users can access shared resources.
6
FINAL EXAM
Three ways to address network security are authentication, firewalls, and encryption.
With authentication a user must prove his identity in order to gain access to network resources.
This can be done through passwords or biometric measurements. This helps to limit access and
permissions. Firewalls are installed in network systems to scan and examine arriving data
packets. Packets that are found to be provable attack packets are discards and not allowed to
enter the network. Other packets are allowed to pass through. Encryption is a means of
scrambling data messages so that eavesdroppers cannot read the messages. With encryption,
authenticated users have keys to encrypt and decrypt data packets.
8.
Businesses must have a response plan for network security breaches. These can be
broken down into the stages of detecting an attack, stopping the attack, repairing the damage,
and potentially punishing the attacker. Once the attacks have been recognized action should be
taken immediately since the longer an attacker has access to the network the more damage he
can do. Some responses may be reconfiguring the firewalls to block the attacker, finding a
rouge wireless access point and disabling it, or discovering an evil twin access point and
disabling it. The encryption algorithms may need to be changed, or the encryption keys may
need to be modified. A more robust authentication system may need to be implemented using
stronger passwords, access cards, biometrics, digital certificate authentication, or two-factor
authentication. If the attacks are coming from the wireless network, managers should ensure
that the wireless network is set to use the strongest security measure which is WPA2 operating
in enterprise mode which offers 128-bit AES-CCMP encryption. Other security measures to
implement would be setting up virtual local area networks which can help to separate network
resources. In this way if an attacker were able to gain access to one virtual network he would
not have access to all network resources. This can be especially important in setting up a DMZ
or demilitarized zone virtual network with added protection for the most important network
resources such as the core servers and for the network resources most vulnerable to attack
such as the wireless LAN.
9.
Security policies should be written and followed in order to protect data from
unauthorized users. Policies may include plans for how to protect sensitive data by limiting
access to certain network resources. This can be accomplished through authentication
measures which require a user to identify himself with a strong password, biometrics, or access
cards. This authentication can be strengthened by using digital certificates and two-factor
authentication. Sensitive data should be encrypted when transmitted so that unauthorized users
cannot intercept and read it. This can be accomplished by using a cryptographic standard such
as SSL/TLS or IPsec. Servers that contain sensitive data should be encrypted so that an
unauthorized individual within the organization cannot read the data on them even if they have
access to the servers. Encryption is especially important when sensitive data is located on a
mobile device such as a laptop, tablet computer, smart phone, or USB drive. All of these
devices should use encryption technology for data storage since a very common security
7
FINAL EXAM
breach is a lost device. No sensitive data should be transmitted via email without first being
encrypted. It may be necessary to establish a policy that all employees attend training on
security policies so that they understand how to protect sensitive data. Employees should be
educated on how to identify and avoid falling prey to social engineering scams such as email
attachments from unknown senders, unknown website links, and phishing. An inventory of
sensitive data should be kept and updated at regular intervals. It is difficult to determine when
data has been compromised with a security breach if good inventory records are not kept. Data
storage devices and network services that allow access to sensitive databases should be
audited at regular intervals to check for access by unauthorized users. A policy against peer-topeer file sharing should be implemented. Peer-to-peer file sharing software may expose the
business network to unauthorized users. An IT help desk should be set up to respond to
questions and reports about possible security breaches. If the company uses cloud computing
with remote storage or processing of sensitive data, a service level agreement with the cloud
computing company should clearly spell out how sensitive data will be protected. Employees
who use networked applications such as Google Docs and many others should not use them
when working with sensitive data unless they can ensure that the data is encrypted during
transmission and storage.
10.
I would recommend that the company use the global Internet as its WAN link to
the remote offices and for the mobile users. Use of the Internet is cheaper than using
leased lines from the Public Switched Data Networks. In addition to being more
expensive, leased lines take more planning to set up and incur a greater cost in labor
because they have to be managed carefully by network personnel. Another advantage to
using the Internet is that all of the company’s computers can be connected to it and so
are all of the computers of the companies that we will be doing business with. The main
issues with using the Internet are security and reliability or quality of service. Security
can be addressed by establishing a virtual private network (VPN). A virtual private
network is a cryptographically secured transmission path through an untrusted
environment, in this case the Internet. The two most common security standards for
VPNs are IPsec and SSL/TLS. Virtual private networks can be set up as site-to-site or as
remote-access. Site-to-site VPNs can be established between the headquarters and the
two remote offices. Remote-access VPNs can be set up for the 60 mobile users and for
all other employees to have remote access to email and the corporate intranet. For the
site-to-site VPNs we will use IPsec gateways which will establish secured tunnel
connections through the Internet between the two remote offices and the headquarters.
IPsec can be centrally managed and operating in tunnel mode will be transparent to
users since the gateways manage digital certificates. The mobile users will use SSL/TLS
standard for security when connecting to the headquarters via a VPN for email and other
applications that are SSL/TLS-aware because this standard is inexpensive and already
included in web browsers. If the remote users need access to applications that are not
SSL/TLS-aware then we might consider installing a SSL/TLS gateway which can webify
some applications that they need access to. Instead of setting all of this up internally we
may wish to contract with an IP carrier which can provide IP service over the Internet
with VPN and quality of service guarantees to connect the remote offices to the
headquarters.
Download