Network Security Assessment & Defense Implementation Guide
Learn network security fundamentals: scanning with Nmap, traffic analysis via Wireshark, and implementing defenses with pfSense firewall and VPN.
Network Security Assessment & Defense Implementation
Project 5: Network Security | Modular Assignment No. 5
Prepared by: Aryan Kumar Singh<br>Amity University Online<br>Course: IHC – Practical Approach to Cyber Security<br>Project by: TCS iON
Introduction & Objectives
<b>Objective:</b><br>• Understand basic network security concepts<br>• Analyze a small office network<br>• Demonstrate common network attacks<br>• Implement defenses (Firewall, VPN)<br><br><b>Importance:</b><br>Networks connect all systems. Attackers target them first. Securing the network reduces overall cyber risk.
Network Environment Overview
Network Setup
• Small office network simulation<br>• Multiple client systems<br>• Internal server deployment<br>• Internet gateway configuration
Tools Used
• <b>VirtualBox / VMware:</b> Environment simulation<br>• <b>Nmap:</b> Network scanning & discovery<br>• <b>Wireshark:</b> Traffic analysis<br>• <b>pfSense:</b> Firewall and VPN implementation
Network Reconnaissance (Scanning)
<b>Definition:</b> Information gathering about network devices to identify active hosts and open ports.<br><br><b>Activity Performed:</b><br>• Used Nmap to scan the target network.<br>• Identified live hosts.<br>• Detected open ports and running services.<br><br><b>Purpose:</b> To understand network exposure and identify potential attack points.
Common Network Attacks Demonstrated
Unauthorized Port Scanning
Packet Sniffing
Weak Protocol Usage
Impact of Attacks
• Information Leakage<br>• Network mapping by attackers<br>• Increased attack surface
Protocol Attack Demonstration
<b>Attack Description:</b><br>Observed unencrypted traffic and captured packets using Wireshark.<br><br><b>Findings:</b><br>• Plain text data visible in the stream<br>• Sensitive information exposed without encryption<br><br><b>Risk:</b><br>Attackers can intercept and read network communication easily.
Traffic Analysis & Monitoring
<b>Process:</b><br>• Captured network packets<br>• Analyzed protocols and data flow<br>• Identified suspicious traffic patterns<br><br><b>Benefits:</b><br>• Helps detect anomalies<br>• Improves visibility into network behavior<br>• Essential for identifying intrusions early
Firewall Configuration (pfSense)
<b>Implementation:</b><br>Installed pfSense and configured inbound/outbound rules.<br><br><b>Security Controls Applied:</b><br>• Blocked unnecessary ports<br>• Allowed only required services<br>• Restricted unauthorized access<br><br><b>Result:</b><br>Significantly reduced the network attack surface.
VPN Configuration
<b>What is a VPN?</b><br>A secure encrypted tunnel over the internet.<br><br><b>Setup & Configuration:</b><br>• Configured VPN using pfSense<br>• Enabled secure remote access capabilities<br><br><b>Key Benefits:</b><br>• Protects data in transit from interception<br>• Secures remote connections against eavesdropping
Overall Network Security Architecture
Network Scanning & Monitoring
Firewall Protection (Traffic Filtering)
Encrypted VPN Communication
Strict Access Control Policies
<b>Security Outcome:</b><br>Improved confidentiality, integrity, and better control over specific network access points.
Key Findings & Outcomes
• Networks are highly vulnerable without constant monitoring.<br>• Unencrypted traffic presents a major data risk.<br>• Firewalls and VPNs are essential filters that significantly improve the security posture.<br><br><b>Final Outcome:</b><br>The network transitioned from an exposed state to a secure, controlled, and monitored environment.
Conclusion
Network security is critical for modern organizations. While basic security controls can reduce major risks, proper configuration and continuous monitoring are essential for long-term safety.<br><br><b>Final Thought:</b><br>This project demonstrated a practical understanding of network security fundamentals, from identifying vulnerabilities to implementing robust defenses.
Personal Reflection
This project helped me understand how network attacks occur and how attackers exploit weak configurations. Scanning and traffic analysis provided a clear view of network exposure.<br><br>The main challenge was understanding traffic flow and firewall rules. Configuring pfSense and VPN bridged the gap between theory and real-world defense.<br><br>Overall, this assignment significantly strengthened my practical knowledge of network security controls.
- network-security
- cybersecurity
- pfsense
- wireshark
- nmap-scanning
- firewall-configuration
- vpn-setup
- it-security









