Question
Issue 2 - Metropolis Campus Hacked A server, which resides on the main campus, and which acts as the repository for student grades, was hacked.
Issue 2 - Metropolis Campus Hacked
A server, which resides on the main campus, and which acts as the repository for student grades, was hacked. The incident actually went undiscovered for about three weeks, when it was discovered by happenstance by an instructor. She noticed the web grading program showing different grades for a couple of prior students than what she had assigned. She alerted the college's small I.T. department, which used the only evidence they had on the matter - an audit log and a monthly backup file. The department discovered through the audit log that the attacker illegally gained access and downloaded all grades in the system, and that the attacker had actually carried out the hack at the lab in the Springfield campus! By comparing the backup file with the current data, they also discovered that a few specific student grades had been altered. Thankfully only a few grades were altered, but this raised the question if those few students were involved with the attack. Regardless, the college is scrambling to upgrade security on their network to prevent this and other kind of attacks in the future.
The server room at the Metropolis campus currently has only one network security control, which is a packet filtering firewall that sits between the Internet link and the server room. That firewall is configured to prevent inbound traffic coming in over a few ports, and outbound traffic leaving the campus over a few ports.
Issue 2 - Metropolis Campus Hacked
A server, which resides on the main campus, and which acts as the repository for student grades, was hacked. The incident actually went undiscovered for about three weeks, when it was discovered by happenstance by an instructor. She noticed the web grading program showing different grades for a couple of prior students than what she had assigned. She alerted the college's small I.T. department, which used the only evidence they had on the matter - an audit log and a monthly backup file. The department discovered through the audit log that the attacker illegally gained access and downloaded all grades in the system, and that the attacker had actually carried out the hack at the lab in the Springfield campus! By comparing the backup file with the current data, they also discovered that a few specific student grades had been altered. Thankfully only a few grades were altered, but this raised the question if those few students were involved with the attack. Regardless, the college is scrambling to upgrade security on their network to prevent this and other kind of attacks in the future.
The server room at the Metropolis campus currently has only one network security control, which is a packet filtering firewall that sits between the Internet link and the server room. That firewall is configured to prevent inbound traffic coming in over a few ports, and outbound traffic leaving the campus over a few ports.
3. As one familiar with network security, you recognize it is essential that the campus secure its network perimeter so that only those authorized can gain access. Identify and describe two points of entry onto the main campus's network that could potentially be used by an intruder to gain access to the network. Make sure to explain to the firm how the intruder could have gained access through each point of entry.
4. Explain the mechanics of how the packet filtering firewall could be used to help secure Metropolis College's network perimeter, for each of the points of entry described in #3. Would anything need to change with the firewall's current setup to provide this network security?
4. Explain the mechanics of how the packet filtering firewall could be used to help secure Metropolis College's network perimeter, for each of the points of entry described in #3. Would anything need to change with the firewall's current setup to provide this network security?
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started