• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Security Architecture

MIS 5214 - Section 001 - David Lanter

Security Architecture

MIS 5214.951 ■ Spring 2024 ■ Jose Gomez
  • Homepage
  • Instructor
  • Syllabus
  • Schedule
    • First Half of the Course
      • Unit 0a – Introduction
      • Unit 0b – The Threat Environment
      • Unit 1a – System Security Plan
      • Unit 1b – Planning and Policy
      • Unit 2a – Case Study 1 – A High Performance Computing Cluster Under Attack: The Titan Incident
      • Unit 2b – Cryptography
      • Unit 3a – Secure Networks
      • Unit 3b – Firewalls, Intrusion Detection and Protection Systems
    • Second Half of the Course
      • Unit 4b – Case Study 2 Data Breach at Equifax
      • Unit 5a – Access Control
      • Unit 5b Host Hardening
      • Unit 6a Application Security
      • Unit 6b Data Protection
      • Unit 7a – Incident and Disaster Response
  • Deliverables
    • Assignments
    • Case Studies
      • Case Study 1 – A High Performance Computing Cluster Under Attack: The Titan Incident
      • Case Study 2 – Data Breach at Equifax
    • Team Project Instructions
  • Harvard Coursepack

Boyle and Panko Module A Networking Concepts and Chapter 4 Secure Networks

January 1, 2022 by Jose Gomez 25 Comments

Post your thoughtful analysis about one key point you took from this assigned reading.

Filed Under: 3a - Secure Networks Tagged With:

Reader Interactions

Comments

  1. Chun Liu says

    February 28, 2024 at 11:07 pm

    Denial-of-service attack is a network attack technique that aims to exhaust the network or system resources of a target computer, temporarily disrupting or stopping services and making them inaccessible to normal users.
    When hackers use two or more compromised computers on a network as “zombies” to launch a “denial of service” attack on a specific target, it is called a distributed denial of service attack. According to 2014 statistics, the number of attacks identified as large-scale DDoS has reached an average of 28 per hour. DDoS initiators generally target important services and well-known websites, such as banks, credit card payment gateways, and even root domain name servers.
    DoS is also common in some online games, where they are widely used by disgruntled players or competitors, as well as in protests, which Richard Stallman, founder of the Free Software Foundation, has described as a form of “cyber street protest”.

    Log in to Reply
  2. Guanhua Xiao says

    February 29, 2024 at 3:54 am

    The four goals of establishing a secure network environment are confidentiality, availability, functionality, and access control.
    I also think that one of the most common web-based attacks is denial of service. Its purpose is to deplete the network or system resources of the target computer, temporarily interrupt or stop services, and make it inaccessible to ordinary users. But I believe that adopting cybersecurity solutions ensures that an organization’s sensitive data and information is protected across all channels and devices

    Log in to Reply
  3. Xiaozhi Shi says

    February 29, 2024 at 7:06 am

    One of the key points I learned from reading NISR Special Publication 800-53A, Revision 4, was to analyze the results of assessment reports. By using labels such as “Satisfactory” and “Unsatisfactory,” the reporting format of the assessment results provides organizational officials with visibility into specific weaknesses and deficiencies in security or proprietary controls within or inherited from the information system. Based on organizational priorities, it demonstrates that the organization’s resources are allocated effectively. It ensures that information systems are resourced first to support the organization’s most critical and sensitive missions. It can also correct shortcomings that post the greatest level of risk.

    Log in to Reply
  4. Yawen Du says

    February 29, 2024 at 8:41 am

    At the core of cybersecurity is the protection of information and systems from major cyberthreats, which can come in various forms, such as application attacks, malware, ransomware, phishing, vulnerability exploitation kits and so on. Cybersecurity is a dynamic process that requires constant adaptation to new technologies and threats. In order to counter these threats, a number of security measures are required, such as the use of antivirus software and firewalls, the installation of updates and patches, the use of dual identity authentication, the regular backup of critical data, and cybersecurity training for staff. Cybersecurity is critical for individuals, organizations and countries. Leakage of personal information, financial losses, and privacy violations can cause incalculable damage to individuals. For organizations, cyber-attacks may lead to serious consequences such as data leakage, system paralysis, business interruption, etc., and may even threaten the reputation and survival of the organization. For the state, network security has become an important part of national security, without network security there is no national security, there is no stable economic and social operation, and the interests of the general public can hardly be protected. Therefore, network security requires the participation of the whole society, and the government, enterprises, social organizations, and the majority of netizens should assume the responsibility of maintaining network security. Only through joint efforts can we build a safe, stable and trustworthy network environment to safeguard the legitimate rights and interests of the people and the security and stability of the country.

    Log in to Reply
  5. Shijie Yang says

    February 29, 2024 at 10:22 am

    One of the biggest challenges faced by network administrators and security professionals is protecting networks in an organization. It’s difficult because many organizations have employees working remotely using wireless devices, and employees carry personal mobile devices and connect them to the network. Wireless attacks are often focused on access points within an organization, and attackers may be located farther away, making prevention more difficult. There are three types of attacks, such as unauthorized access, man-in-the-middle attacks, and wireless denial of service. Another attack vector that makes network security difficult is that an organization’s employees sometimes set up a malicious access point that, if incorrectly configured, allows an attacker to access the network and bypass the firewall.

    Log in to Reply
  6. Yuanjun Xie says

    February 29, 2024 at 8:54 pm

    This chapter is understanding the different types of attacks and which aspect of the four main goals of a secured network they impact. For example, Denial of Service (DoS) attacks are designed to make a server or network unavailable to users. Another type of attack is ARP poisoning which is designed to impact both the functionality and confidentiality of the network. These attacks can be combined (ARP DoS) in order to impact availabiltiy. An ARP and Man in the Middle attack can be combined to impact the functionality of a system. It is important not only to understand the differnt types of attacks, but how they can be mitigated and remediated. This is has become more complex since the death of the perimeter and move from the traditional castle model to the city model as more and more individuals that are outside the network need access to information within the network. While the “city” defense is neccessary, it makes the network and systems more vulnerable to attack.
    I took from this reading is the importance of wireless security. Wireless networks have become nearly ubiquitous because they are quicker, easier, and less expensive to set up than traditional wired networks. They also offer greater mobility, productivity, and functionality. It is kind of surprise that wireless LANs have more security issues to consider than wired LANs. Wireless networks are particularly vulnerable to attacks because it is difficult to prevent physical access to them. For example, wireless network can be attacked by drive-by hackers who do not even have to enter the building to gain access to the LAN. The most common attack against wireless networks is unauthorized access or connecting to a network without permission. They could cause enormous harm to both internal resources and external resources.

    Log in to Reply
  7. Xinyi Peng says

    February 29, 2024 at 9:25 pm

    These topics provide a foundational understanding of networking concepts and secure network design principles, which are essential for building and maintaining secure information systems and protecting against cyber threats.

    Log in to Reply
  8. Shuting Zhang says

    February 29, 2024 at 9:57 pm

    Among the myriad of web-based attacks, denial of service (DoS) stands out as one of the most prevalent. Its primary aim is to disrupt the normal functioning of a target computer or network by overwhelming it with an excessive volume of traffic or requests. This inundation of traffic depletes the system’s resources, resulting in a temporary or prolonged interruption of services, rendering the system inaccessible to legitimate users. While denial of service attacks pose a significant threat to network availability, adopting comprehensive cybersecurity solutions is essential in mitigating risks and preserving the security of organizational data assets across all digital platforms and devices. These solutions encompass a wide array of measures, including but not limited to intrusion detection systems, firewalls, encryption protocols, and secure access controls. By proactively deploying such measures, organizations can fortify their defenses against cyber threats, ensuring the integrity, confidentiality, and availability of their sensitive information.

    Log in to Reply
  9. Zhang Yunpeng says

    February 29, 2024 at 10:25 pm

    The establishment of a secure network environment is crucial for protecting sensitive data and information across all channels and devices. Central to this objective are the four goals of confidentiality, availability, functionality, and access control. One of the significant threats to achieving these goals is the denial-of-service (DoS) attack, which aims to exhaust the network or system resources of a target computer, temporarily disrupting or stopping services and rendering them inaccessible to normal users. This attack, particularly in its distributed form (DDoS), has become increasingly common, with an average of 28 large-scale attacks per hour in 2014. These attacks are often launched against important services and well-known websites, such as banks, credit card payment gateways, and root domain name servers.

    The impact of DoS attacks extends beyond the corporate world, infiltrating online games and even being described by Richard Stallman, founder of the Free Software Foundation, as a form of “cyber street protest”. Given the prevalence and diversity of these attacks, it is imperative for organizations to adopt cybersecurity solutions that effectively safeguard their data and information. By prioritizing network security and implementing robust防御机制, companies can mitigate the risk of DoS attacks and ensure the confidentiality, availability, functionality, and access control of their critical systems and data.

    Log in to Reply
  10. Yujie Cao says

    February 29, 2024 at 10:56 pm

    One key point I took away from this weeks textbook reading was the difference between a regular DoS attack and DDoS. A DDoS attack is described as “distributed” because multiple systems (a botnet) are used to flood the victim with network traffic and interrupt the regular use of the victims systems. The reasons entities sometimes use DDoS attacks instead of regular DoS attacks is that they can flood the victim with more traffic since they are using more devices, they are harder to detect because communication with multiple devices looks more normal than lots of communication with just one device, and it is more difficult to track down the perpetrator. It is also important to note that DDoS is a type of DoS attack, but not every DoS attack is a DDoS.

    Log in to Reply
  11. Hongli Ma says

    March 1, 2024 at 6:00 am

    One key takeaway from this reading was the different application of security objectives in terms of network security. Boyle and Panko expanded upon the CIA triad in this context, noting that confidentiality, integrity, and availability differ for various functions of information security and through different layers of the OSI Layer Model. Confidentiality is crucial for preventing attack vectors such as fingerprinting, which can collect user information to deploy other attacks like spoofing. Availability of network services ensures data availability. Functionality and access control replace integrity in the CIA triad within the context of network security. Functionality prevents hackers from altering networking capabilities/services , while access control preserves a secure logical access system. This chapter gave great context on Layer 3’s role in applying the CIA triad within different stages of the OSI Layer model.

    Log in to Reply
  12. Shuyi Dong says

    March 1, 2024 at 6:12 am

    This chapter revealed for me the key issues of wireless security. Wired and wireless LANs coexist, but the latter is more challenging to protect. Due to the open nature of wireless networks, attackers do not need to be close to the access point to attempt access, which makes protection more difficult. Wireless networks are more vulnerable to attacks than wired networks. These attacks focus primarily on wireless access points because they communicate with devices via radio waves. Attackers can initiate unauthorized access to the network from a location far away from the access point, perform man-in-the-middle attacks, and even launch wireless DOS attacks. These attacks usually occur when the attacker succeeds in cracking the wireless security protocol, especially in enterprise networks. However, as long as wireless security protocols are properly configured and maintained, security teams can detect and respond to any unauthorized access in a timely manner. Another thing to note is that malicious access points are also a major security risk for wireless networks. These access points may be created by unauthorized individuals or departments who may not have sufficient security awareness or skills to protect them. This provides hackers with a convenient way to bypass the security measures of the primary access point, increasing the security risk of the network. Therefore, it is critical for the management and maintenance of wireless networks to ensure the security of access points and the overall security of the network. A number of measures need to be taken to minimize security risks, including regularly updating security protocols, monitoring network traffic, and training staff.

    Log in to Reply
  13. Yiwei Hu says

    March 1, 2024 at 9:15 am

    The four goals of building a secure network environment are confidentiality, availability, functionality, and access control. It is important to identify risks and security measures that protect and detect the network to ensure that unauthorized users cannot access services and resources, obtain information about the structure of the network, modify network functions, and have excessive permissions to invade the network. In addition, I also learned that network technology is constantly evolving and updated, which makes network protection personnel very headache, because network attacks and network threats will also be updated and changed, so it is necessary to constantly update protection systems such as firewalls and upgrade technology to cope with threats.

    Log in to Reply
  14. Haoran Wang says

    March 1, 2024 at 9:38 am

    After reading the article ,I learned some knowledge about network concept and secure networks.One of the key point I find after readining is that how to defense cyber attack,such as firewalls,intrusion detection systems(IDS),and security information and event managements(SIEM).It’s very important for organization to know how to defense the cyber attack and plan ahead before attack happen.

    Log in to Reply
  15. Chenhao Zhang says

    March 1, 2024 at 9:11 pm

    Network Basics: The definition of networks, network types (local area network, wide area network, metropolitan area network) and network topologies (star, bus, ring, mesh).
    Network hardware: This section describes network devices, such as routers, switches, servers, and workstations.
    Network protocols and services: Describes protocols such as TCP/IP, HTTP, FTP, and DNS, as well as network services such as email and file sharing.
    Network architecture: Discusses client-server architecture, peer-to-peer architecture, and cloud computing.
    Cyber Security Overview: The importance of cyber security, the types of cyber attacks (e.g., denial of service, man-in-the-middle), and the consequences of security breaches.
    Encryption technology: An explanation of encryption principles, encryption types (symmetric and asymmetric), and common encryption algorithms (such as AES, RSA).
    Firewalls and Intrusion Detection/Prevention Systems (IDS/IPS): discusses the configuration and functionality of firewalls, as well as IDS/IPS technologies.
    Security Protocols and standards: An introduction to secure communication protocols, such as SSL/TLS, and security standards, such as ISO 27001.
    Physical security: Precautions for physically protecting network infrastructure, including data centers and server rooms.
    Cybersecurity Best Practices: Guidelines for implementing and maintaining a secure network, including regular updates, patches, and employee training.

    Log in to Reply
  16. Zhaomeng Wang says

    March 1, 2024 at 9:51 pm

    DDoS (Distributed Denial of Service) attack is a malicious behavior aimed at overloading the target system’s network, servers, or applications to prevent them from functioning properly or providing services. Attackers typically use a large number of computers or devices to simultaneously send a large number of requests or packets to the target system, consuming its resources and preventing it from responding to legitimate user requests.

    Log in to Reply
  17. Hao Zhang says

    March 2, 2024 at 12:03 am

    One of my key takeaways in Charter 4 Secure Networks is the understanding of denial-of-service (DoS) attacks. It attempts to make a server or network unavailable to legitimate users. But not all interruptions are considered an attack. The loss of service might cause by internal employees and managers, or when a large website links to a much smaller website. The website becomes overwhelmed by the increase in traffic. The goal of a DoS attack is stopping a critical service or slowly degrading service over time. As the DoS attacks cannot be identified in a short period, the network administrator might have to force unnecessary capital expenses to expend the bandwidth, hardware, and software.

    Log in to Reply
  18. Yuming He says

    March 2, 2024 at 2:50 am

    Network security is a measure of protecting computers from unauthorized access, destruction, alteration, or leakage, ensuring the integrity, confidentiality, and availability of information systems. Network security threats may come from multiple aspects, including hacker attacks, viruses and malware, denial of service attacks, identity theft, and data breaches. In order to ensure network security, people have taken measures such as encrypted communication, using firewalls, installing antivirus software, and configuring IP security in accordance with Module A.

    Log in to Reply
  19. Xuanwen Zheng says

    March 2, 2024 at 4:33 am

    Cyber security is of vital importance to individuals, organizations, and countries. Personal information leakage, economic losses, and privacy violations may cause unpredictable damage to individuals. For the organization, cyber attacks may lead to data leakage, system crash, business interruption and other serious consequences,and even threaten the reputation and survival of the organization. At the level of national security, network security has gradually become an important part of it. Whether network security is directly related to the stability of national security, as well as the stability of economic and social operation, and then affects the protection of public interests. Therefore, network security urgently needs the participation of the whole society, and the government, enterprises, social organizations and the majority of Internet users should shoulder the responsibility of maintaining network security.Only by working together can we build a safe, stable and reliable network environment, protect the legitimate rights and interests of the people and the security and stability of the country.

    Log in to Reply
  20. Yue Wang says

    March 2, 2024 at 5:26 am

    Secure network architecture and design is based on the OSI and TCP/IP models and IP networks in general.
    Implementation of secure design principles in network architecture: OSI and TCP/IP models, Internet Protocol (IP) networks, implications of multilayer protocols, converged protocols, software-defined networks, wireless networks
    2. Secure network components include hardware operations, transmission media, network access control (NAC) devices, and endpoint security, Content Delivery Network

    Log in to Reply
  21. Nana Li says

    March 2, 2024 at 5:38 am

    Denial of Service attack (DoS) is a type of network attack whose main purpose is to cause a temporary interruption or stop of services by consuming network or system resources of a target computer, making normal users inaccessible. When hackers take advantage of two or more compromised computers in a network and use them as “zombie” machines to launch this kind of attack against a specific target, we call it a distributed denial of service attack (DDoS). The main targets of this type of attack are usually websites that provide important services or are well known, such as banks, credit card payment systems, or even root name servers.

    It is worth mentioning that DoS attacks are also quite common in some online games, and they are often exploited by disgruntled players or competitors. In addition, this type of attack has been widely used during protests. Richard Stallman, founder of the Free Software Foundation, once described it as a kind of “street protest on the Internet”.

    Log in to Reply
  22. Chunqi Liu says

    March 2, 2024 at 5:56 am

    Hi Nicholas – it’s true that the attack surface for an organization is much wider now than 15 or even 10 years ago. The standardization of wireless network access as a result of the convenience it offers means there are organizations typically have many wireless access points that must be sufficiently secured. Additionally, the popularization of remote work, especially in the last year, offers another attack vector into an organization’s network that administrators should take care to manage.

    Log in to Reply
  23. Haixu Yao says

    March 2, 2024 at 9:13 pm

    Through reading, I have a more comprehensive understanding of the basic knowledge of network and network security. Understand the basic framework and core concepts of computer networks, how networks connect devices distributed in different geographical locations, and how these devices communicate with each other and exchange information through protocols. At the same time, we understand the threats and challenges of network security, including malware, hacker attacks, data leaks, etc. To counter these threats, a variety of security measures are needed, such as firewalls, intrusion detection systems (IDS), encryption, and more. In addition, there are cybersecurity policies and best practices, and how to keep your network environment secure through regular security audits and monitoring. To protect the network from attacks, in addition to technical protection measures, it is also necessary to have a sound security policy and awareness training to ensure the overall security of the network.

    Log in to Reply
  24. Yue Ma says

    March 3, 2024 at 12:18 am

    I noticed DoS (Denial of Service) in this chapter. It is a cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to a network. Denial of service can be accomplished in a variety of ways, including programming or logical vulnerabilities, improper handling of resources, or by flooding the targeted machine or resource with superfluous requests in an attempt to overload systems and prevent some or all legitimate requests from being fulfilled. The range of attacks varies widely, spanning from inundating a server with millions of requests to slow its performance, overwhelming a server with a substantial amount of invalid data, to submitting requests with an illegitimate IP address. In addition to the monetary losses the company suffered when its systems were attacked, it should be noted that the company also suffered serious losses in terms of its reputation with existing and potential customers. One of the more interesting ways that organizations can help mitigate the potential damage of DoS attacks involves implementing alternate network paths and load balancing.

    Log in to Reply
  25. Hao Li says

    March 3, 2024 at 5:23 am

    This chapter begins with a discussion of the four main goals to consider when creating a secure network environment. These goals include availability, confidentiality, functionality, and access control. . The main DoS attack methods we examine are (1) direct/indirect, (2) intermediary, (3) reflected, and (4) sending malformed packets.

    Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

READINGS & CASE STUDY QUESTIONS

  • 0a – Introduction (1)
  • 0b – The Threat Environment (5)
  • 1a – System Security Plan (4)
  • 1b – Planning and Policy (4)
  • 2a – Case Study 1 (4)
  • 2b – Cryptography (4)
  • 3a – Secure Networks (5)
  • 3b – Firewalls and IDS and IPS (3)
  • 4b – Case Study 2 (4)
  • 5a – Access Control (5)
  • 5b – Host Hardening (3)
  • 6a – Application Security (4)
  • 6b – Data Protection (2)
  • 7a – Incident and Disaster Response (3)
Fox School of Business

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in