1 Task/Exercise Overview
Analyze the provided network infrastructure diagram and identify potential security vulnerabilities. This
exercise aims to develop your skills in security analysis and threat identification.
2 Instructions
For each network zone, identify and analyze potential vulnerabilities using the following structure:
2.1 Analysis Template
• Zone: [Specify network zone]
• Component: [Identify specific component]
• Vulnerability: [Describe vulnerability]
• Attack Vector: [Explain possible attack method]
• Impact: [Assess potential damage]
• Mitigation: [Propose security measures]
3 Analysis Areas
3.1 1. DMZ Analysis (30 points)
Examine the following components:
• Web Server
• DNS Server
• Mail Server
3.2 2. Internal Network Analysis (30 points)
Focus on:
• Workstations
• File Server
• Database
• Network Infrastructure
3.3 3. Wireless Network Analysis (20 points)
Consider:
• Wireless Access Point
• Mobile Devices
• Employee Laptops
1
3.4 4. General Security Considerations (20 points)
Evaluate:
• Network Segmentation
• Access Control
• Data Flow
• Security Policies
4 Deliverables
Submit a detailed report including:
1. Minimum of 3 vulnerabilities per zone
2. Comprehensive analysis using the template
3. Risk rating for each vulnerability (High/Medium/Low)
4. Practical mitigation strategies
5 Evaluation Criteria
• Thoroughness of analysis (40%)
• Technical accuracy (30%)
• Mitigation strategies (20%)
• Report presentation (10%)
6 Sample Response Format
Zone: DMZ
Component: Web Server
Vulnerability: Unpatched Software
Attack Vector: Exploitation of known vulnerabilities
Impact: High - Potential system compromise
Mitigation: Regular patch management, vulnerability scanning
Risk Rating: High
2
External Zone
Internet
Firewall
Internal Network DMZ Zone
Router Web Server DNS Server Mail Server
Wireless Network
Network Switch Wireless AP
Workstation 1 Workstation 2 File Server Database Mobile Devices Employee Laptops