SEC 410 – Network Defense and Countermeasures – Report 1

Part One:

Research the following bulleted items below, using the relevant reading resources for this week and supplementary ones you may come up with:

  • What should a Firewall protect against?
    • Most threats that can travel over the network. For example, denial of service attacks, access from unauthorized locations (outside of the network and inside), vulnerable type of traffic like ptp sharing.
  • What can’t a Firewall protect against?
    • Non-network related security problems. They also aren’t 100% effective. So that’s why a layered security approach is necessary.
  • Why would you want firewalls at various locations of your network?
    • I would want them in places where I need to manage things separately (because there are typically routing capabilities combined with firewalls), to isolate part of a network, or even to connect different locations over vpn.
  • Where would you locate them?
    • One would be where the internet connection terminates. For example, Comcast has their modem, then the firewall goes after that. Others could be connected to switches throughout the building where appropriate.
  • What information did you gain learn from using Nmap about the effectiveness of the Windows Firewall?
    • You can see what ports are open by default
  • Could the Windows Firewall be made as secure as the ZoneAlarm Firewall? What would you need to do to accomplish that?

Part Two: Wireshark Lab Report

https://www.youtube.com/watch?v=jvuiI1Leg6w

Watch the video and write a 1-2 paragraph summary of what you learned.

Wireshark is a debugging tool to identify what the network is doing. It can capture traffic (in the form of packets) from a network. You can narrow down the types of packets  you want to capture rather than capturing everything. For example, if you just want to look for pings you can specify ‘icmp.’

Packet information is arranged by what layer of the network it’s on (OSI model). You can also figure out IP information, and also analyze congestion control. There are slow-start, congestion avoidance, and fast recovery states in tcp transmission. Wireshark can see if transmission is working as intended by analyzing all three of these states.