Mission-Critical Components of a LAN | Study

Verified

Added on  2022/08/24

|19
|3346
|30
AI Summary

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: CST 610 9043 Cyberspace and Cyber security Foundation
CST 610 9043 Cyberspace and Cyber security Foundation
Name of the Student
Name of the University
Author Note

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
CST 610 9043 Cyberspace and Cyber security Foundation 1
Table of Contents
Introduction:...............................................................................................................................3
Assess suspicious activity:.........................................................................................................3
Mission critical systems:........................................................................................................3
Perimeter router:.................................................................................................................4
DMZ:..................................................................................................................................5
DNS server:........................................................................................................................6
Web server:........................................................................................................................8
Email server:....................................................................................................................10
Central switches:..............................................................................................................11
Network security:.................................................................................................................11
Penetration testing:...............................................................................................................11
The Financial Sector:...............................................................................................................13
Unencrypted data:................................................................................................................14
New automation technology without Security:....................................................................14
Unprotected Third Party Services:.......................................................................................15
Unsecured Mobile banking:.................................................................................................15
A constantly changing threat landscape:..............................................................................15
Financial services information sharing and analysis centre:....................................................15
Industrial control systems:.......................................................................................................16
Document Page
2CST 610 9043 Cyberspace and Cyber security Foundation
Supervisory Control and Data Acquisition (SCADA):........................................................16
Distributed Control System (DCS):.....................................................................................16
Actual ICS implementation:.................................................................................................16
Conclusion:..............................................................................................................................17
References:...............................................................................................................................17
Document Page
3CST 610 9043 Cyberspace and Cyber security Foundation
Introduction:
The United States critical infrastructure: water, power, natural gas and oil, financial
systems, military systems have become the target of physical and cyber attacks as much more
complex system frameworks are integrated with the web as well as with some of the other
control systems that are digital. The network security stands for all of the procedures and
policies which is used by a network administrator for mitigating the risks that can come to a
network. It includes policies for recording and finding a possible breach and policies that is
needed to make response to the events (Perlman, Kaufman & Speciner, 2016). An enacted
and well written network security effort will make response to the variety of threats. The
threats can include malicious codes, direct attacks and internal threats. In the computer
security, the threat is basically a possible danger which is able to exploit a vulnerability to the
security breach as well as therefore it can be reason for the possible harm. The purpose of this
paper is to provide situational awareness about the present security breach as well as cyber
attacks that is against various financial service institution.
Assess suspicious activity:
The financial world is littered with the organisations which have paid huge amount of
fines for the failures of them around the AML (anti money laundering) legislation.
Mission critical systems:
The mission critical system is basically a name for a system which is having functions
that are very much critical as well as complex to the survival of an institution. The systems
are required for the basic day to day operations in most of the cases. The time when the
systems fail or the communications with the other systems are blocked then the business may
suffer for a set back that is serious.

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
4CST 610 9043 Cyberspace and Cyber security Foundation
Mission-Critical Components of a LAN:
A LAN must be having several components in the place which needs to be function
efficiently and correctly. There are various mission critical components that are included in
LAN. They are as follows:
Perimeter router:
The perimeter router s basically a standard router which can connect the LAN with
the web, this can be utilized for providing the basic security when it is configured for filtering
out the traffic from the outsider areas as well as from the network traffic that is present
internally (Rao, Xu & Wang, 2017). The perimeter router can be configured also for running
a firewall for the additional security. The perimeter router needs to be placed inside the
environment that is secured by the firewalls. The firewall will be having some rules that will
be installed within it, for allowing only several ranges of IP for entering to the network.
(Figure: Perimeter router)
Document Page
5CST 610 9043 Cyberspace and Cyber security Foundation
The segments of the router that are existed in the network can connect to the internal servers.
The configuring steps of the perimeter router are as follows:
1. Set a hostname.
2. Enable password protection.
3. Enable User Datagram Protocol (UDP) and Transmission Control Protocol (TCP)
network services.
4. Configure console and network access.
5. Configure serial and Ethernet interfaces.
6. Add IP routes and set a default route.
7. Configure frame relay.
DMZ:
For securing the network servers, DMZ is required. The DMZ is an isolated and
separate network which cushions the network of the organisation from the chaos of the
Internet. The internal networks that are installed within an organisations, might be considered
as one of the trusted networks (Luskind, Zeng & Dias, 2019). A distinct network is thought
by DMZ which utilizes a separate set of the IP addresses, that are belong to the institution.
The DMZ existed behind the firewall, however it is not as secure as the Internet. The main
activity of the DMZ is preventing the attacks that happens within the trusted network of the
organisations.
Document Page
6CST 610 9043 Cyberspace and Cyber security Foundation
(Figure: DMZ)
The system frameworks which require the direct communication with the internet that is
installed in the DMZ. The system frameworks are remaining in risk as they are having as they
are directly connected to the Internet. The configuration steps of DMZ are as follows:
1. Determining the services that need to be accessed b by the users on the Internet.
2. Installing the components that are relevant of the internal LAN segment, like the Web
server, in the DMZ.
3. Configuring the ports of the DMZ which can pass through the firewall.
4. Ensuring all of the functionalities of the event management, such as with system logs
and audit logs, are enabled.
DNS server:
The DNS can facilitate the communication between the networks by doing the
translation of the name of the domain as well as the addresses of the websites in to an IP
address, so that the packets can be transported by the Internet itself (Pozzobon et al., 2018).
The internal servers of DNS, can provide information about routing for the intranet, it can

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7CST 610 9043 Cyberspace and Cyber security Foundation
also allow the employees for getting access to the sites that are non www. The organisations
are able to create specific domains for the departments like legal and human resources.
(Figure: DNS server)
The data of DNS is structured as an inverted free as well as the DNS servers might be act as
secondary or primary servers, the servers mainly operate in the known zones or in the known
domains. The configuring steps of the DNS are as follows:
1. Install the DNS.
2. Provide the IP address of the DNS server.
3. Provide the IP address of the DNS server in step II in the preferred DNS box.
4. Provide the IP address of an alternate DNS server in the alternate DNS box.
Document Page
8CST 610 9043 Cyberspace and Cyber security Foundation
5. Create a forward lookup zone. This zone is referred to whenever an IP address is
requested. All the IP address and hostname correlations are stored in the forward
lookup zone.
6. Provide the IP address of the current system.
7. Provide a name for the DNS zone.
8. Select the update mode.
9. Provide the IP address of the Internet Service Provider (ISP) DNS server so as to
resolve the hostnames outside the network.
Web server:
The web server is another component that is also needed for securing the network
security. The web servers can deliver web based contents to the users for computing the
devices by several protocols like HTTP (Hypertext Transfer Protocol), HTTPS (Hypertext
Transfer Protocol secure) as well as FTP (File Transfer protocol).
Document Page
9CST 610 9043 Cyberspace and Cyber security Foundation
(Figure: web server)
After getting requests, they can display the web pages that are relevant. Each of the web
servers are assigned with a distinct address, for that the other PCs can connect with the
Internet (Baloch, 2017). Several threats are faced the web servers that come from the
applications which are vulnerable. The configuring steps are as follows:
1. Install the Web server.
2. Create the working directory for the applications.
3. Configure the plug-ins used by the applications.
4. Provide the appropriate access rights for the working directory.
5. Create and apply the appropriate filters to the working directory.

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
10CST 610 9043 Cyberspace and Cyber security Foundation
Email server:
The email server another important part of the network security. The email servers is
actually an application which receives email messages from the email related services.
(Figure: Email server)
The configuration steps of email servers are as follows:
1. Install the SMTP service.
2. Define the default directory for the mail configuration file.
3. Configure the connection filters and port numbers.
4. Define the access rights for the server. Here, you specify who can access the server
with what rights.
5. Define the maximum number of recipients.
6. Configure the main exchange (MX) records to perform reverse DNS (rDNS) lookup.
rDNS refers to the host-to-IP conversion, which involves the conversion of the IP
address to its host name.
Document Page
11CST 610 9043 Cyberspace and Cyber security Foundation
Central switches:
There are many types of the switches. The switches can be vulnerable for the DoS
attack. The configuring steps of central switches are as follow:
1. Configure the switch hostname.
2. Enable the password.
3. Define the console logins.
4. Encrypt the password.
5. Define the default gateway.
Network security:
The network security stands for all of the procedures and policies which is used by a
network administrator for mitigating the risks that can come to a network. It includes policies
for recording and finding a possible breach and policies that is needed to make response to
the events. An enacted and well written network security effort will make response to the
variety of threats (Acemoglu, Malekian & Ozdaglar, 2016). The threats can include malicious
codes, direct attacks and internal threats. The network security is the combination of multiple
defence layers at the edge as well as in the network. Each of the layers network security can
implement controls and policies. The users who are authorised can gain access to the
resources of the networks, however the malicious actors are blocked from carrying out the
threats and exploits.
Penetration testing:
The penetration testing is also known as ethical hacking or pen testing. It is actually
the practice of testing network, computer system or web based application for finding the
security vulnerabilities which an attacker could exploit. The pen testing can process
Document Page
12CST 610 9043 Cyberspace and Cyber security Foundation
automatically with the help of software applications or it can be performed manually. The
procedure involves in gathering data and information. The primary objective of the pen
testing is actually to identify the weakness of the security. The pen testing can also utilized
for testing the security policy of the organisation (Backes et al., 2017). The pen testers also
utilize the automated tools for uncovering vulnerabilities of standard application. The
penetration testing tools can scan the codes for identifying the malicious codes that are
existed within the applications which might result as the security breach.
(Figure: Penetration testing)
The penetration testing tools are able to examine the techniques of data encryption as well as
they can identify the values that are hard coded like passwords and usernames for verifying
the security vulnerabilities that are existed in the system. The functions of penetration testing
tools are as per following:

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
13CST 610 9043 Cyberspace and Cyber security Foundation
The tools are very much easy for deploying, configuring as well as for using.
The tools can scan the system easily.
They can categorise the security vulnerabilities on the basis of severity that are
needed to be fixed.
The tools are capable of automating the verification of the vulnerabilities.
They can also re verify the exploits.
The tools can generate logs and detailed report about the vulnerabilities.
The Financial Sector:
The cyber attack is basically a deliberate exploitation of the technology-dependent
organisations and networks, computer systems. The hackers utilize malicious codes and
application software for altering logic, computer codes or even data that are resulting in the
disruptive consequences which can compromise the information and data as well as lead to
the cyber crimes like healthcare record, financial information, and system infiltration or
identity theft (Simola, 2019). The financial sectors face more cyber attacks than the any other
sectors. The hackers attack banking sectors for getting multiple benefits like profit through
theft, extortion and fraud. The finance related IT systems are exposed to a huge number of
risks that require consistent efforts for operating very much securely.
Document Page
14CST 610 9043 Cyberspace and Cyber security Foundation
(Figure: Security in banking)
The finance related sector is basically a complex aggregation of various players who
are regulated from various types of angles. The primary threats of cyber security in the
finance related sector are as follows:
Unencrypted data:
The majority of the security and data breaches that can happen for the reason of
improper encryption as well as for the stolen data that are accessible immediately after they
are being stolen.
New automation technology without Security:
The connected devices, CCTV cameras as well as a toy might be turned in to the bots,
if they are not protected. This is very much important for understanding that more than the
PCs or computers, the data of hard drive can be utilize for the cyber crime.
Document Page
15CST 610 9043 Cyberspace and Cyber security Foundation
Unprotected Third Party Services:
The internet is basically a universal connector where the third party services that are
unprotected, are able to open the door that is used for the cyber attackers for accessing the
data. Therefore, the security to network should be given priority, the time when a device is
connected.
Unsecured Mobile banking:
At present, the popularity of mobile banking has increased so much. It has provided
an opportunities for the experts or to the cyber hackers for getting access to the data because
of the less complicated security system that are available in the mobile devices. The
encryption have to increase for the mobile phones for the customers and bank data that they
may remain safe.
A constantly changing threat landscape:
The threats of cyber security landscape has changed over the past years. The cyber
criminals have stopped the activities after the low value monetary amounts as well as shifted
to the platforms that are payment related.
Financial services information sharing and analysis centre:
The Financial Services Information Sharing and Analysis Centre, is actually the
global resource of the finance related industries for the physical and cyber intelligence of the
threats and sharing (Simola, 2019). The Financial Services Information Sharing and Analysis
Centre is basically a member owned non profit which was created by as well as for the
finance related services infrastructure and individual organisations that are against the acts
which might impact the ability of the sectors significantly for providing services that are very
much critical as well as complex to the orderly function of the global economy as well as also
for the global financial system frameworks.

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
16CST 610 9043 Cyberspace and Cyber security Foundation
Industrial control systems:
The industry control system is basically a general term which is utilized for describing
the integration of the software and hardware with the help of the connectivity of the network
for supporting the critical infrastructure (Macaulay & Singer, 2016). The ICS is one of the
collective terms that is mainly utilized for describing various types of associated
instrumentation and control systems that include the systems, devices, controls and networks
that are utilized for operating as well as for automating the industry related procedures.
Depending on the type of the industry each of the functions of the ICS separately as well as
they are built for electronically managing the tasks efficiently.
There are various types of industry control systems. The types of them are as per following:
Supervisory Control and Data Acquisition (SCADA):
The SCADA systems are the composition of the devices which are distributed in
different locations (Macaulay & Singer, 2016). The SCADA system frameworks are able to
acquire as well as transmit confidential data and information as well as they are integrated
with a HMI (Human Machine Interface) which can provide centralized monitoring of the
systems well as they can provide control for various input and output processes.
Distributed Control System (DCS):
It is a system framework which is utilized for controlling the production systems
which can be found in just one location. In the DCS, a set point is sent first to the controller
which is having capability of instructing the valves, for operating in such a way that the set
point that is desired is maintained.
Actual ICS implementation:
The implementation of the ICS environment may be a hybrid of the SCADA and DCS
wherein the attributes from both the systems are incorporated.
Document Page
17CST 610 9043 Cyberspace and Cyber security Foundation
Conclusion:
Thus, it can be concluded from the entire report that the network security is very
much important for business world as well as for the home security. By increasing the
security the chances of privacy spoofing, identity or information theft as the piracy is one of
the biggest concerns to the organisations. At present most of the users are not ware about the
high level skills of programming as the use of tools are increasing as they are easily available
in the Internet. There are various stages that are needed to be passed by the attackers for
carrying out an attack.
References:
Acemoglu, D., Malekian, A., & Ozdaglar, A. (2016). Network security and
contagion. Journal of Economic Theory, 166, 536-585.
Backes, M., Hoffmann, J., Künnemann, R., Speicher, P., & Steinmetz, M. (2017). Simulated
penetration testing and mitigation analysis. arXiv preprint arXiv:1705.05088, 6.
Baloch, R. (2017). Ethical hacking and penetration testing guide. Auerbach Publications.
Luskind, Y., Zeng, G., & Dias, C. (2019). U.S. Patent No. 10,237,965. Washington, DC: U.S.
Patent and Trademark Office.
Macaulay, T., & Singer, B. L. (2016). Cybersecurity for industrial control systems: SCADA,
DCS, PLC, HMI, and SIS. Auerbach Publications.
Perlman, R., Kaufman, C., & Speciner, M. (2016). Network security: private communication
in a public world. Pearson Education India.
Document Page
18CST 610 9043 Cyberspace and Cyber security Foundation
Pozzobon, E., Weiss, N., Renner, S., & Hackenberg, R. (2018). A Survey on Media Access
Solutions for CAN Penetration Testing.
Rao, Z., Xu, T., & Wang, H. (2017). Mission-critical monitoring based on surround
suppression variational Retinex enhancement for non-uniform illumination
images. EURASIP Journal on Wireless Communications and Networking, 2017(1), 1-12.
Simola, J. (2019). Comparative Research of Cybersecurity Information Sharing Models.
1 out of 19
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]