Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Issue 2 - Metropolis Campus Hacked A server, which resides on the main campus, and which acts as the repository for student grades, was hacked.

Issue 2 - Metropolis Campus Hacked

A server, which resides on the main campus, and which acts as the repository for student grades, was hacked. The incident actually went undiscovered for about three weeks, when it was discovered by happenstance by an instructor. She noticed the web grading program showing different grades for a couple of prior students than what she had assigned. She alerted the college's small I.T. department, which used the only evidence they had on the matter - an audit log and a monthly backup file. The department discovered through the audit log that the attacker illegally gained access and downloaded all grades in the system, and that the attacker had actually carried out the hack at the lab in the Springfield campus! By comparing the backup file with the current data, they also discovered that a few specific student grades had been altered. Thankfully only a few grades were altered, but this raised the question if those few students were involved with the attack. Regardless, the college is scrambling to upgrade security on their network to prevent this and other kind of attacks in the future.

The server room at the Metropolis campus currently has only one network security control, which is a packet filtering firewall that sits between the Internet link and the server room. That firewall is configured to prevent inbound traffic coming in over a few ports, and outbound traffic leaving the campus over a few ports.

Issue 2 - Metropolis Campus Hacked

A server, which resides on the main campus, and which acts as the repository for student grades, was hacked. The incident actually went undiscovered for about three weeks, when it was discovered by happenstance by an instructor. She noticed the web grading program showing different grades for a couple of prior students than what she had assigned. She alerted the college's small I.T. department, which used the only evidence they had on the matter - an audit log and a monthly backup file. The department discovered through the audit log that the attacker illegally gained access and downloaded all grades in the system, and that the attacker had actually carried out the hack at the lab in the Springfield campus! By comparing the backup file with the current data, they also discovered that a few specific student grades had been altered. Thankfully only a few grades were altered, but this raised the question if those few students were involved with the attack. Regardless, the college is scrambling to upgrade security on their network to prevent this and other kind of attacks in the future.

The server room at the Metropolis campus currently has only one network security control, which is a packet filtering firewall that sits between the Internet link and the server room. That firewall is configured to prevent inbound traffic coming in over a few ports, and outbound traffic leaving the campus over a few ports.

3. As one familiar with network security, you recognize it is essential that the campus secure its network perimeter so that only those authorized can gain access. Identify and describe two points of entry onto the main campus's network that could potentially be used by an intruder to gain access to the network. Make sure to explain to the firm how the intruder could have gained access through each point of entry.

4. Explain the mechanics of how the packet filtering firewall could be used to help secure Metropolis College's network perimeter, for each of the points of entry described in #3. Would anything need to change with the firewall's current setup to provide this network security?

4. Explain the mechanics of how the packet filtering firewall could be used to help secure Metropolis College's network perimeter, for each of the points of entry described in #3. Would anything need to change with the firewall's current setup to provide this network security?

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Data Communications and Networking

Authors: Behrouz A. Forouzan

5th edition

73376221, 978-0073376226

More Books

Students also viewed these Computer Network questions

Question

Summarize the employee benefits required by U.S. law.

Answered: 1 week ago

Question

11. What is a cable plan and why would you want one?

Answered: 1 week ago

Question

15. Briefly describe how CSMA/CD works.

Answered: 1 week ago