KEMBAR78
Assignment Task 1 | PDF | Security | Computer Security
0% found this document useful (0 votes)
42 views3 pages

Assignment Task 1

The document outlines a task to analyze a network infrastructure diagram for security vulnerabilities across various zones, including DMZ, Internal Network, and Wireless Network. It provides a structured template for identifying vulnerabilities, attack vectors, impacts, and mitigation strategies. Deliverables include a detailed report with a minimum of three vulnerabilities per zone and risk ratings for each identified issue.

Uploaded by

modpubg391
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
42 views3 pages

Assignment Task 1

The document outlines a task to analyze a network infrastructure diagram for security vulnerabilities across various zones, including DMZ, Internal Network, and Wireless Network. It provides a structured template for identifying vulnerabilities, attack vectors, impacts, and mitigation strategies. Deliverables include a detailed report with a minimum of three vulnerabilities per zone and risk ratings for each identified issue.

Uploaded by

modpubg391
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

1 Task/Exercise Overview

Analyze the provided network infrastructure diagram and identify potential security vulnerabilities. This
exercise aims to develop your skills in security analysis and threat identification.

2 Instructions
For each network zone, identify and analyze potential vulnerabilities using the following structure:

2.1 Analysis Template


• Zone: [Specify network zone]

• Component: [Identify specific component]


• Vulnerability: [Describe vulnerability]
• Attack Vector: [Explain possible attack method]
• Impact: [Assess potential damage]
• Mitigation: [Propose security measures]

3 Analysis Areas
3.1 1. DMZ Analysis (30 points)
Examine the following components:
• Web Server
• DNS Server
• Mail Server

3.2 2. Internal Network Analysis (30 points)


Focus on:
• Workstations
• File Server
• Database
• Network Infrastructure

3.3 3. Wireless Network Analysis (20 points)


Consider:
• Wireless Access Point
• Mobile Devices
• Employee Laptops

1
3.4 4. General Security Considerations (20 points)
Evaluate:
• Network Segmentation

• Access Control
• Data Flow
• Security Policies

4 Deliverables
Submit a detailed report including:

1. Minimum of 3 vulnerabilities per zone


2. Comprehensive analysis using the template
3. Risk rating for each vulnerability (High/Medium/Low)

4. Practical mitigation strategies

5 Evaluation Criteria
• Thoroughness of analysis (40%)

• Technical accuracy (30%)


• Mitigation strategies (20%)
• Report presentation (10%)

6 Sample Response Format


Zone: DMZ
Component: Web Server
Vulnerability: Unpatched Software
Attack Vector: Exploitation of known vulnerabilities
Impact: High - Potential system compromise
Mitigation: Regular patch management, vulnerability scanning
Risk Rating: High

2
External Zone

Internet

Firewall

Internal Network DMZ Zone

Router Web Server DNS Server Mail Server

Wireless Network

Network Switch Wireless AP

Workstation 1 Workstation 2 File Server Database Mobile Devices Employee Laptops

You might also like