The process of implementing security
The process of implementing security frequently opens one’s eyes to other forms of security not previously considered. In this two-part assignment, you should experience just that. This assignment focuses on a model of implementing security in layers, which, in many cases, requires a network that is designed accordingly.
The specific course learning outcome associated with this assignment is:
Recommend best security practices to achieve business objectives based on risk assumptions.
Search the internet for a representation of a network figure with defense in depth in mind, that include all necessary network devices (routers, switches and/or hubs, firewalls, VPNs, proxies, and others), the interconnections between network devices, connections to end-user (client) devices (desktops, laptops) and connections from the Internet cloud to the network input.
Write a paper where you
Describe the flow of data through the network, citing specific, credible sources.
Assume data begins at the remote site.
Data flow may be monitored by an IDS.
Explain all three elements of the CIA triad and how isolating by network functions helps deliver a layered approach, citing specific, credible sources that support your assertions and conclusions.
Sample Answer
Network Defense-in-Depth Model
For this scenario, I’ll describe a typical enterprise network setup with defense in depth, focusing on data flow and the CIA triad.
Network Diagram (Conceptual):
[Internet Cloud]
|
| (Encrypted VPN Tunnel)
v
[Remote Site] --- [VPN Router/Firewall] --- [Internet Edge Router] --- [Firewall 1 (Perimeter)] --- [Proxy Server] --- [IDS/IPS] --- [Firewall 2 (Internal)] --- [Switch 1 (DMZ)] --- [Web/Application Servers]
|
| --- [Switch 2 (Internal)] --- [Database Servers]
|
| --- [Switch 3 (Internal)] --- [Client Devices (Desktops, Laptops)]
Data Flow Description
- Remote Site Initiation:
- A remote user initiates a connection to an internal application.
- The user’s data is encrypted via a VPN client on their device.
- The encrypted data is sent to the remote site’s VPN router/firewall.