industry problem statement solution
industry problem statement solution
Network Components
1. Core Layer: Comprises high-performance routers and switches that form the
backbone of the network, connecting all other layers and ensuring fast and
reliable data transfer.
2. Distribution Layer: Includes routers and switches that manage traffic between
the core layer and access layer, applying policies and performing routing
functions.
3. Access Layer: Consists of switches and access points that connect end-user
devices to the network, providing connectivity and enforcing security policies.
Utilizing Cisco Packet Tracer, the network infrastructure can be visually represented to
display the placement and interconnectivity of various components.
1. Core Layer: High-capacity routers and Layer 3 switches form the central
backbone, interconnecting different campus buildings and critical services.
2. Distribution Layer: Layer 2/3 switches aggregate traffic from multiple access
layer switches, applying security policies and routing.
3. Access Layer: Edge switches connect to end-user devices and wireless access
points.
4. Data Centers: Include servers connected to core/distribution switches,
protected by firewalls.
Potential Vulnerabilities
Identified Weaknesses
Proposed Countermeasures
2. Subnets: Use subnets to further isolate critical systems and sensitive data.
2. Role-Based Access Control (RBAC): Enforce RBAC to ensure users have the
minimum necessary permissions.
1. Traffic Analysis and Filtering: Use traffic analysis tools to detect and filter out
malicious traffic patterns.
2. Redundant Network Paths: Design the network with redundant paths and
failover mechanisms to ensure availability during attacks.
Cyber Shield:
Defending the network Problem Statement:
PART 2:
Hybrid Working Environment Design
Objectives
1. Enable secure access for faculty and students to specific resources both on-
campus and remotely.
2. Ensure campus network services are not exposed to the public internet.
Solution Components
1. Virtual Private Network (VPN): Implement VPN solutions for secure remote
access.
2. Network Access Control (NAC): Enforce network policies and control device
access.
Component Details
1. VPN Solutions:
o Duo Security: Implement MFA for all network access points, requiring an
additional verification step beyond passwords.
4. Firewall:
o Cisco ASA Firewall: Provides robust protection at the network perimeter,
filtering traffic based on security rules.
6. Separate VLANs:
o Faculty VLAN: Dedicated VLAN for faculty devices with access to faculty-
specific resources.
o Student VLAN: Separate VLAN for student devices, isolating them from
faculty resources.
1. Core Layer:
2. Distribution Layer:
o Layer 2/3 switches, applying policies and routing between core and
access layers.
3. Access Layer:
4. Security Components:
5. VLAN Segmentation:
1. VPN Solutions:
o MFA adds an extra layer of security, mitigating the risk of credential theft.
5. VLAN Segmentation:
Risks:
Advantages:
Cyber Shield:
Defending the network Problem Statement:
PART 3:
Exploring Solutions
To restrict access to only allowed categories of web content, a robust web filtering
solution is necessary. This can be achieved through a combination of network security
products such as:
The updated topology includes the addition of Cisco Umbrella for cloud-based web
filtering and Cisco Firepower NGFW for advanced traffic management and content
filtering.
1. Core Layer:
2. Distribution Layer:
o Layer 2/3 switches, applying policies and routing between core and
access layers.
3. Access Layer:
4. Security Components:
5. VLAN Segmentation:
1. Cisco Umbrella:
o Offers granular control over network traffic and deep packet inspection,
enabling the college to enforce detailed content filtering policies.
Integration with existing Cisco infrastructure simplifies management.
Risks:
Advantages:
The following policies can be applied to enforce restricted access to allowed categories
of web content:
o "Block access to streaming services like Netflix, Hulu, and Amazon Prime
Video."
o "Block access to online gaming sites and platforms such as Steam, Xbox
Live, and PlayStation Network."
o "Monitor web traffic and generate reports on web usage for administrative
review."