Module: Introduction to Computer Security

Submodule 5: Security Administration

Network Map

Created: Feb. 5, 2004
Assignment version number: Version 0.1
Author: T. Andrew Yang


Level of Difficulty: Moderate

Completion Time: 2 weeks

Progaramming involved: No



Objectives

In this project, students will investigate an organization's network configuration and, if necessary, draw a network map. Vulnerability of the network will be analyzed.


Description

  1. Locate a copy of the network map of an organizaiton (the map).
  2. If you cannot find a copy of the map, talk to the network administrator to find out information about the network, and draw a map for the organization.
  3. Visit the WindowSecurity.com's online library of white papers (http://www.windowsecurity.com/whitepaper/) and find out information regarding network structure design. A sample article is Shimonski's Windows 2000 DMZ Design (available at http://www.secinf.net/windows_security/Windows_2000_DMZ_Design1280.html, or local copy).
  4. List and explain five aspects in the map that  should be improved. For each aspect, explain the vulnerability and possible  attacks, and how the improvement should be implemented.

Resources

Books
Articles
Links