Lab Assignment 03
Lab Assignment 03
Professionals
Cyber-Security Fundamentals
NAME ROLL
1.Mohammad Masudur Rahman Khan 24525201029
To design a secured network architecture we must have a strong knowledge of the components
that are being used in the designing before securing a network.
Let’s talk about some of the components which have been use in our design below:
Internet:
The internet is a global network of interconnected computers and devices that communicate
with each other using standardized protocols and technologies. It allows users to access and
share information, communicate with others, and utilize various online services and resources.
The internet is comprised of millions of interconnected networks, including public and private
networks that use a variety of wired and wireless technologies to transmit data across vast
distances.
The internet is decentralized, meaning that there is no single central authority or governing
body that controls it. Instead, it is composed of a distributed network of interconnected
routers, servers, and other devices that work together to facilitate communication and data
exchange.
The internet operates based on open standards and protocols, such as TCP/IP (Transmission
Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), and DNS (Domain
Name System). These standards ensure interoperability and compatibility between different
devices and systems connected to the internet.
DMZ:
In network architecture, DMZ stands for "Demilitarized Zone." It is a segregated network
segment that sits between an organization's internal network (often referred to as the "trusted
network") and the external, untrusted network (typically the internet). The DMZ serves as a
buffer zone between the internal network, where sensitive resources and data are located, and
the outside world, where potential threats and attacks originate.
The DMZ is isolated from both the internal network and the external network to prevent
unauthorized access to internal resources while still providing controlled access to external-
facing services.
Public-facing services, such as web servers, email servers, DNS servers, and FTP servers, are
often hosted within the DMZ. These services are accessible from the internet but are separated
from the internal network to minimize the risk of compromise.
Firewall:
A firewall is a network security device or software that monitors and controls incoming and
outgoing network traffic based on predetermined security rules. It acts as a barrier between an
internal network and external networks, such as the internet, to prevent unauthorized access,
data breaches, and cyber-attacks.
Firewalls inspect individual packets of data as they pass through the network and enforce
security rules based on factors such as source and destination IP addresses, port numbers, and
protocols.
Some firewalls are capable of inspecting the contents of application-layer protocols, such as
HTTP, FTP, and SMTP, to detect and block malicious or unauthorized activities. This allows
firewalls to enforce more granular access controls and protect against application-layer attacks,
such as SQL injection and cross-site scripting (XSS).
Firewalls maintain logs of network traffic and security events for auditing, analysis, and
troubleshooting purposes. They can generate reports summarizing network activity, security
incidents, and compliance status to help administrators monitor and manage network security
effectively.
Proxy Firewall:
A proxy firewall, also known as an application-level firewall or gateway firewall, is a type of
firewall that operates at the application layer of the OSI model. Unlike traditional packet-
filtering firewalls that operate at the network layer (Layer 3) and make decisions based on IP
addresses and port numbers, proxy firewalls inspect and filter traffic at the application layer
(Layer 7) based on the content of the data.
A proxy firewall acts as an intermediary between internal and external network connections.
When a client on the internal network requests access to a resource or service on the internet,
the request is intercepted by the proxy firewall.
Proxy firewalls inspect and analyze the content of network traffic at the application layer,
including HTTP, FTP, SMTP, and other application protocols. This deep packet inspection allows
the firewall to enforce more granular access controls and security policies based on the specific
characteristics of the application protocols.
Proxy firewalls can filter and block network traffic based on the content of the data, including
keywords, file types, URLs, and MIME types. This allows organizations to enforce acceptable use
policies, block access to malicious or inappropriate websites, and prevent the transmission of
sensitive information over unsecured channels.
Let’s see our diagram first , we design our network using smartdraw.com
(https://app.smartdraw.com/)
FIGURE: Secure Network Architecture Design.
Design Description:
Here we can see at the top left corner we have internet connection connected with DMZ .
Previously we learnt that DMZ is a segregated network segment that sits between an
organization's internal network (often referred to as the "trusted network") and the external,
untrusted network (typically the internet).
The DMZ is isolated from both the internal network and the external network to prevent
unauthorized access to internal resources while still providing controlled access to external-
facing services.
Here for the public-facing services, such as web servers, email servers, DNS servers, and FTP
servers, can be hosted within the DMZ. It will ensure the service towards the internet and also
will keep a barrier between secure internal networks.
From the DMZ we are connecting to Firewall, IDS and IPS system . Here Firewall will give
protection to the internal network by inspecting individual packets of data as they pass through
the network and enforce security rules based on factors such as source and destination IP
addresses, port numbers, and protocols. It acts as a barrier between an internal network and
external networks, such as the internet, to prevent unauthorized access, data breaches, and
cyber-attacks.
For more protection to the internal network we connect IDS(Intrusion Detection System) where
it monitors network traffic or system activities for signs of malicious behavior, policy violations,
or security breaches. These systems primarily focus on detecting and alerting administrators to
potential security incidents, allowing them to take appropriate action.
After that we also added IPS(Intrusion Prevention system), here it monitors network traffic for
malicious activities or security threats and takes proactive measures to prevent them from
compromising the network. IPS continuously monitors network traffic in real-time, inspecting
packets and analyzing their contents for signs of suspicious behavior or known attack patterns.
IPS systems use predefined signatures or patterns of known threats, such as malware, viruses,
and exploit attempts, to identify and block malicious traffic as it passes through the network.
IPS systems employ anomaly-based detection techniques to identify abnormal or suspicious
behavior that may indicate a potential security threat. This can include unusual patterns of
network traffic, unexpected changes in system behavior, or deviations from normal network
activity.
After that we have a internal router which maintains the internal routed from server section,
user section and also from DMZ and internet which are filtered by the firewall, IPS and IDS
systems.
From this router we have two legs towards server section and user section. Before the servers
there is a server firewall which maintains the packets coming inside the server zone and getting
out from the server zone by packet filtering depending on firewall rules. By using this firewall
we can ensure that only those will get service from this server which are authenticated by rule
and it will give protection against any attack from intruders as well as will ensure services to
those whom the enterprise wants to by establishing rule according to the requirements by the
organizations.
On the other leg can see a proxy server guarding the user zone. Here it will operates at the
application layer of the OSI model. Proxy server works as an intermediary between internal and
external network connections.
When a user on the internal network requests access to a resource or service on the internet,
the request is intercepted by the proxy firewall.Proxy firewalls inspect and analyze the content
of network traffic at the application layer, including HTTP, FTP, SMTP, and other application
protocols. By using this we can give access to only those websites which are needed and secure
and also can block access to malicious or inappropriate websites, and prevent the transmission
of sensitive information over unsecured channels.
In the end, creating a secure network setup is like putting together a puzzle. It needs careful
planning, hard work, and keeping an eye out for any problems that might pop up. As
technology changes and hackers get smarter, having good security is super important. By being
proactive about network security, businesses can lower the chances of bad stuff happening,
make sure things keep running smoothly, and keep their data safe and sound.
Remember, keeping a network secure is not a one-time thing. It's an ongoing job that needs
regular checks and updates to stay ahead of new problems. By staying in the loop about the
latest security tricks and tools, businesses can keep their networks safe and sound in our ever-
changing digital world.
To sum it up, building a secure network isn't just about stopping bad stuff from happening. It's
about giving businesses the confidence to grow, work together, and succeed in today's fast-
paced world. By putting security first, businesses can earn trust, protect their reputation, and
stay strong in the face of any challenges.