Assignment title: Information
Research proposal 2
Question 1:
You are the system's administrator of Reliable Power Supplies (RPS), a medium sized
company that builds UPSs and switched power supplies for the computing industry.
Your task is the analysis, design and configuration of a Firewall System that secures the
inbound and outbound traffic at RPS. After conducting the needs analysis you have a
clear picture of the type of firewall system that best suits RPS.
In the internal network, there is a special host (192.168.1.253/28) running an application
that would be disastrous if it was compromised. Therefore for your design, you opt for a
dual firewall system that you believe is the best option for this specific case. You also go
for a demilitarized zone (Network Address 10.0.0.0/24) containing the e-mail
(10.0.0.20/24) and Web services (10.0.0.30/24) of the company.
Apart from providing NAT services and Packet Filtering, the first firewall (part of the dual
configuration) acts as a Web and FTP Proxy server. This first firewall is connected to
the Internet via 200.27.27.10/25 and to the DMZ via 10.0.0.10/24.
The second firewall is used to filter traffic between the internal network and the DMZ. It
is connected via 10.0.0.254/24 to the DMZ and via 192.168.1.254/28 to the internal
network.
The internal network address is 192.168.1.240/28.
The security policy requirements used to configure the firewalls are outlined as follows.
RPS Web server contains public information including a product catalogue that is
accessible to Internet users and it also provides secure online purchasing
functionality using SSL/TLS. The internal users are also allowed to access all RPS
WWW services; however they are allowed to access Internet WWW and FTP
services only via the proxy located on the first firewall via port 3028.
As mentioned, the internal network has a special host (192.168.1.253/28) which has
complete access to any host and any services without using proxy services
configured in the first firewall system. The remaining internal hosts must go via proxy
on first firewall.
The security policy requirements also dictate the e-mail server to receive from and
send messages to hosts on the Internet and the internal users; however these
internal users are to retrieve their messages via IMAP.
Any other service which is not explicitly outlined in the security policy should be
restricted from RPS network.
A. Provide a network layout (network diagram) showing all the components of RPS
B. You are required to develop two sets of rules for the dual firewall. One will
network including both firewalls, the email and web servers, the DMZ, and all the
internal hosts (Note that you should draw all the internal hosts. The number of
internal hosts can be found from the internal network address given above).
Ensure you label all hosts (servers, internal computers and firewalls) with
appropriate names and write the IP addresses for each network interface.
process traffic travelling between the Internet to the DMZ and Intranet. The other
will process traffic travelling between the Intranet and the DMZ. You need to also
explain what each rule does. You should complete the following four (4) tables,
adding rows where necessary.
Table 1 Internet Rules (Firewall 1)
Rule Protocol Transport
Source IP Source
protocol
Destination
Port
Destination
IP
Port
Table 2 Internet Rules Explanations (Firewall 1)
Rule
Number
1
2
3
Explanation
Table 3 Intranet / DMZ rules (Firewall 2)
Rule Protocol Transport
Source IP Source
protocol
Destination
Port
Destination
IP
Port
Table 4 Intranet/DMZ Rule Explanations (Firewall 2)
Rule Explanation
1
2
3
Question 2:
The use of client-side scripting languages like JavaScript has been crucial in the
development of the semantic web. However, in terms of security, it has also given the
opportunity to computer criminals to conduct a wide range of cross-site scripting
attacks. Historically, the Same Origin Policy has been one of the many mechanisms
introduced to counteract this problem. With this policy in place, scripts are allowed to
run on WebPages only when they originate from the same source or site. This means
that for documents or WebPages to be retrievable, they have to belong to the same
origin: same scheme or application layer protocol, same host or server and same port of
a URL. Despite of its good intention, the SOP is seen as a nuisance by web
developers. The claim is that the SOP is too restrictive and inflexible affecting the
introduction of creative and innovate applications. In order to alleviate this problem, the
World Wide Web Consortium (W3C) introduced the Cross-Origin Resource Sharing
(CORS) as a mechanism to relax the SOP policy.
Based on this background information and your personal research, please address the
following issues associated with the SOP and CORS policies.
a) Using the Case domain (www.case.edu.pk) explain and provide your own
b) Assume that in the Case server you have an html page (your_homePage.html)
Provide two examples of URLs (web links) found in your_homePage.html for which the
retrieval of the documents is allowed. Similarly, provide two examples of URLs (web
links) in your_homePage.html for which the retrieval of the documents is denied. Use
illustrative example of how the SOP policy works
identified by the URL: www.case.edu.pk/your_homePage.html
the following table to provide the URLs and give the reasons for the outcome of the
retrieval of the pages.
Your examples (URLs) Retrieval Allow/Deny Explain the reason
Allow
Allow
Deny
Deny
c) In your own words explain the concept behind the CORS policy
d) Using the two examples given above where the retrieval of the pages was
denied, explain the interaction on how the access would be enabled using
CORS. Make sure that in describing the interaction the Origin and the Access-
Control-Allow-Origin are used in the HTTP headers.
Question 3:
Note: for this question, you need to download a PCAP file located in the course Moodle web
site.
Peter is the Network Security Manager for a small spare parts business. The organisation
uses an e-sales application to provide a front-end for its e-sales business. Customers are
complaining that in the last two or three days the system has become very slow, taking
them longer than normal to place their orders. This information has been corroborated by
staff complaining that they are not happy with the slow response of the system to complete
their daily activities. Peter suspects that the system has been the target of criminal hands
and before he starts responding to the attack, he decides to investigate the issue a little
further. First, he reviews the firewall logs and notices something abnormal in the type of
traffic directed to a number of internal hosts including the organisation's web server.
Curious about this traffic, Peter uses Wireshark to capture a trace of the traffic. [A section of
this trace can be accessed from the course Moodle web site].
Based on the above fictional scenario and the provided PCAP:
(a) Identify the anomaly in the traffic this organisation is going through. What sort of
evidence do you have to make this claim?
(b) What sort of utility or tool do you think the "attacker" is using to conduct this attack?
(c) Provide the IP address of the host used by the perpetrator. Based on this
information, what can you tell about the profile of this individual? Explain why.
Question 4:
DNS and ARP poisoning attacks are similar; however there are fundamental differences
between the two. You are to research these specific differences contrasting the way the
attacks are conducted and some of the countermeasures available. Ensure you use at least
three in-text academic references to contrast these attacks (include neither your textbook
nor Wikipedia in these references. Failure to do so may not give you marks).
Remember that you are not to repeat in your research what DNS and ARP poisoning
attacks are. We already know that from our discussions in class. In writing about the
differences between the two types of attacks, contrast for example the complexity of the
attacks (which one is easy to conduct and why), the impact (consequences) of the attacks,
which one is more common and the different mechanisms available to counter the attacks.
Write no more than 300 words (about a page including in-text references).
Question 5:
In this hypothetical case study, you should use the Internet to assist you in developing
responses to three questions. Use of the text only is not sufficient to attract full marks.
SafeBank recently received a series of reports from customers concerning security
breaches in online banking. Customers reported having money transferred from their
accounts, usually after they have found that their password has changed. A full security
audit revealed that the money transfers and changes to user passwords all originated
from an Eastern European country on servers within the domain of crazyhackers.com –
however – the question remained: how did the hackers undertake the attack?
Given that legitimate account numbers and passwords were used, it was initially
assumed that it could be some form of phishing attack. However, no evidence of such
emails was found. The only commonality between the victims was that they all used the
same ISP.
You are required to answer the following questions. Please reference all sources – do
not copy directly from sources.
A. Based on the information provided, what type of attack has been performed? Justify
your answer.
Hint: In order to capture account numbers and passwords, how would a hacker
"redirect" users to their servers instead of SafeBank's?
B. Describe in detail how the attack occurred – you may wish to include one or more
diagrams. You will need to make assumptions about host names, domains and IP
addresses – document these. You need not concern yourself with the technical details
of the capture and reuse of SafeBank's customer details (eg. Fake web sites/malware)
– you are documenting how it was possible from a network perspective.
C. What steps would you advise to prevent such attacks? What limitations does this form
of attack have?
Hint: Would this attack only have to be performed once?