CyberSecurity Week 4 Ismail
CyberSecurity Week 4 Ismail
Assignment
Identify and describe the key components of a typical network architecture. How do these components
contribute to the overall security of the network?
A typical network architecture consists of several key components, each playing an essential role in
the functioning, performance, and security of the network. These components include:
1. Network Devices
Routers: Routers direct data packets between different networks by analyzing headers and
forwarding them to their destination. They provide security by separating network segments and
implementing security protocols such as firewalls and access control lists (ACLs).
Switches: Switches connect devices within the same network (LAN). They facilitate efficient data
transmission by using MAC addresses to forward data to the correct destination. Security is
enhanced through VLANs (Virtual LANs) and features like port security.
Firewalls: A firewall monitors and controls incoming and outgoing network traffic based on
predetermined security rules. Firewalls are critical for network security as they block unauthorized
access and filter malicious traffic.
Access Points (APs): Wireless APs allow wireless devices to connect to the wired network.
Security can be ensured with encryption protocols (e.g., WPA3) and restricting access to authorized
devices.
Load Balancers: These devices distribute network traffic across multiple servers to ensure no
single server is overwhelmed. They contribute to security by mitigating DDoS (Distributed
DenialofService) attacks.
2. Network Infrastructure
Servers: Servers store data and provide services to clients. They must be secured with proper
access controls, encryption, and monitoring to prevent unauthorized access.
Clients/Endpoints: Endpoints like computers, smartphones, and IoT devices connect to the
network. Securing these devices with endpoint protection software, firewalls, and regular updates is
critical in preventing threats like malware and ransomware.
Data Storage: Centralized or cloudbased storage solutions where sensitive information is kept.
Security here focuses on encryption, access controls, and regular backups to prevent data breaches.
3. Security Mechanisms
Intrusion Detection and Prevention Systems (IDS/IPS): These systems monitor network traffic for
suspicious activity and either alert (IDS) or block (IPS) malicious traffic in realtime, enhancing
network security by identifying and responding to threats before they cause harm.
Virtual Private Networks (VPNs): VPNs allow secure remote access to the network by encrypting
data sent over the internet. This ensures confidentiality and protects against eavesdropping.
Encryption Protocols: Encrypting data in transit and at rest ensures that even if data is intercepted,
it cannot be read without the correct decryption keys.
Access Control Mechanisms: Access control includes authentication (e.g., usernames, passwords,
biometrics) and authorization (determining user permissions). Implementing strong access control
mechanisms ensures that only legitimate users can access network resources.
Analyze a network architecture from a case study and identify potential vulnerabilities. What security
controls would you propose to prevent breaches and strengthen the network’s defenses?
To analyze a network architecture from a case study and identify potential vulnerabilities, we’ll
follow a structured approach. Let’s assume we are dealing with a midsized company’s network that
includes various components such as routers, switches, firewalls, servers, workstations, and wireless
access points. The network is connected to the internet and serves both internal employees and
external clients.
Identified Vulnerabilities
1. Outdated Firmware on Routers and Switches
Risk: Devices running outdated firmware can have unpatched vulnerabilities, making them targets
for exploits that attackers can use to gain access to internal networks.
Potential Impact: Attackers could gain control over routing and switching paths, intercept data, or
launch maninthemiddle attacks.
3. Network Segmentation
Control: Use VLANs and subnetting to separate different departments and services, ensuring that
critical systems (e.g., finance, HR) are isolated from less sensitive areas.
Benefit: Limits the ability of attackers to move laterally within the network if they compromise
one part, protecting sensitive data and systems.
Conclusion
By analyzing the network architecture and identifying potential vulnerabilities, it is clear that a
combination of technical controls, updated policies, and ongoing monitoring is required to strengthen
the network’s security posture. Addressing these vulnerabilities through segmentation, patch
management, multifactor authentication, and proactive monitoring will significantly reduce the risk
of breaches and improve overall network defense.