Complete exercises A2
The next morning at 8 o’clock, Kelvin called the meeting to order. The first person to address the group was the network design consultant, Susan Hamir. She reviewed the critical points from her earlier design report, going over the options it had pre-sented and outlining the tradeoffs in those design choices. When she finished, she sat down and Kelvin addressed the group again: œ We need to break the logjam on this design issue. We have all the right people in this room to make the right choice for the company. Now here are the questions I want us to consider over the next three hours. Kelvin pressed the key on his PC to show a slide with a list of discussion questions on the projector screen.
1. What questions do you think Kelvin should have included on his slide to start the discussion?
2. If the questions to be answered were broken down into two categories, they would be cost versus maintaining high security while keeping flexibility. Which is most impor-tant for SLS?
Miller Harrison was still working his way down his attack protocol. Nmap started out as it usually did: giving the program identification and version number. Then it started reporting back on the first host in the SLS network. It reported all of the open ports on this server. Then the program moved on to a second host and began reporting back the open ports on that system, too. Once it reached the third host, however, it suddenly stopped. Miller restarted Nmap, using the last host IP as the starting point for the next scan. No response. He opened up another command window and tried to ping the first host he had just port- scanned. No luck. He tried to ping the SLS firewall. Nothing. He happened to know the IP address for the SLS edge router. He pinged that and got the same result. He had been blackholed meaning his IP address had been put on a list of addresses from which the SLS edge router would no longer accept packets. This was, ironically, his own doing. The IDPS he had been helping SLS configure seemed to be working just fine at the moment. His attempt to hack the SLS network was shut down cold.
Questions: 1. Do you think Miller is out of options as he pursues his vendetta? If you think there are additional actions he could take in his effort to damage the SLS network, what are they?
2. Suppose a system administrator at SLS happened to read the details of this case. What steps should he or she take to improve the company’s information security program?
1. Using the Web, search for œ software firewalls. Examine the various alternatives avail-able and compare their functionality, cost, features, and type of protection. Create a weighted ranking according to your own evaluation of the features and specifications of each software package.
2. Using Figure 6- 15, create rule( s) necessary for both the internal and external firewalls to allow a remote user to access an internal machine from the Internet using the soft-ware Timbuktu. This requires researching the ports used by this software packet.
3. Using Figure 6- 15, suppose management wants to create a œ server farm that is configured to allow a proxy firewall in the DMZ to access an internal Web server ( rather than a Web server in the DMZ). Do you foresee any technical difficulties in deploying this architecture? What advantages and disadvantages are there to this implementation?