SlideShare a Scribd company logo
Secure network
design elements
and components.
Page 2
Instructor, PACE-IT Program – Edmonds Community College
Areas of Expertise Industry Certifications
 PC Hardware
 Network Administration
 IT Project Management
 Network Design
 User Training
 IT Troubleshooting
Qualifications Summary
Education
 M.B.A., IT Management, Western Governor’s University
 B.S., IT Security, Western Governor’s University
Entrepreneur, executive leader, and proven manger
with 10+ years of experience turning complex issues
into efficient and effective solutions.
Strengths include developing and mentoring diverse
workforces, improving processes, analyzing
business needs and creating the solutions
required— with a focus on technology.
Page 3
– Defense in depth.
– Elements and components of network
design.
PACE-IT.
Page 4
Secure network design elements and components.
Page 5
Due to the complexity of
modern networks, malicious
attackers have multiple
avenues that they can use to
breach network security.
This same complexity also allows for security to be placed in
multiple areas using different methods.
By placing security at different levels and in different places,
network administrators can increase the overall security posture
of a network. This concept is known as defense in depth.
Security should not just be placed in a single spot, as this creates
a single point of failure. Security should be emplaced at multiple
layers of the network, using a diversity of methods, in order to
create an effectively hardened network.
Secure network design elements and components.
Just as when peeling an onion, once one layer of
security is stripped away, the attacker should find
another layer waiting underneath.
Page 6
Secure network design elements and components.
Page 7
– Demilitarized zone (DMZ).
» The DMZ is a specific area (zone) created—usually between
two firewalls—that allows outside access to network resources
(e.g., a Web server), while the internal network remains
protected from outside traffic.
• The external facing router allows specific outside traffic into
the DMZ, while the internal router prevents that same outside
traffic from entering the internal network.
– Network address translation (NAT).
» NAT is a technique used to allow private IP addresses to be
routed across, or through, an untrusted public network.
• The NAT device—usually a router—assigns a public routable
IP address to a device that is requesting outside access.
» NAT has the added benefit of protecting the internal private
network.
• The private network’s IP addressing scheme is hidden from
untrusted networks by the NAT enabled router.
Secure network design elements and components.
Page 8
– Network access control (NAC).
» NAC is a method of controlling who and what gains access to a
wired or wireless network.
• In most cases, NAC uses a combination of credentials based
security (e.g., 802.1x) and some form of posture assessment
for a device attempting to log on to the network.
» A posture assessment considers the state of the requesting
device. The device must meet a set of minimum standards
before it is allowed access to the network.
• Common device assessments include the type of device,
operating system, patch level of the operating system, the
presence of anti-malware software and how up to date it is.
– Virtualization.
» Virtualization is the process of creating virtual resources
instead of actual resources.
• Hardware, operating systems, and complete networks can be
virtualized.
» A security advantage to virtualization is that, if the virtual
resource is compromised, it can easily be taken down,
recovered, fixed, and then brought back online.
Secure network design elements and components.
Page 9
– Subnetting.
» Subnetting is the logical division of a network—a single block of
IP addresses—into discrete separate networks.
• Can be done to match the physical structure of the network
(e.g., the network only requires enough addresses for 100
nodes, not 254).
• Can be done to increase the security of the network by
segmenting resources by needs and security level.
– Segmentation of resources.
» Security can be increased by segmenting a network based on
resources and security needs through the implementation of
virtual local area networks (VLANs).
• The segmentation can be done based on user groups (e.g., a
VLAN for the sales department and another one for human
resources).
• The segmentation can be done based on resource type (e.g., a
VLAN for file servers and another one for Web servers).
• Commonly, segmentation is accomplished with a combination.
» The use of VLANs supports a more secure, layered approach in
the network design.
Secure network design elements and components.
Page 10
In modern networks, it is
not uncommon to need to
allow remote access to local
network resources.
Remote workers often need to access resources that are located
on the main business network. This requires the use of remote
access technology in order for it to happen in a secure manner.
Remote access can occur using telephony technology (e.g., dial-
up) or through the use of a virtual private network (VPN). In all
cases, secure protocols and methods should be used in order to
ensure the security of the local network. For example, one of the
forms of Extensible Authentication Protocol (EAP) should be used
when allowing remote access.
Secure network design elements and components.
Page 11
Secure network design elements and components.
The complexity of modern networks means that there are different avenues
that attackers can use to breach a network’s security. Defense in depth
involves placing security at many different layers of a network. By placing
security at different layers and by using different security methods, even if
the outer security is breached, the inner security remains in place.
Topic
Defense in depth.
Summary
Defense in depth can be implemented in multiple ways, including adding a
DMZ, using NAT, implementing NAC, using virtualization, employing
subnetting and segmentation, and requiring remote access technology.
Elements and components of
network design.
Page 12
THANK YOU!
This workforce solution was 100 percent funded by a $3 million grant awarded by the
U.S. Department of Labor's Employment and Training Administration. The solution was
created by the grantee and does not necessarily reflect the official position of the U.S.
Department of Labor. The Department of Labor makes no guarantees, warranties, or
assurances of any kind, express or implied, with respect to such information, including
any information on linked sites and including, but not limited to, accuracy of the
information or its completeness, timeliness, usefulness, adequacy, continued availability
or ownership. Funded by the Department of Labor, Employment and Training
Administration, Grant #TC-23745-12-60-A-53.
PACE-IT is an equal opportunity employer/program and auxiliary aids and services are
available upon request to individuals with disabilities. For those that are hearing
impaired, a video phone is available at the Services for Students with Disabilities (SSD)
office in Mountlake Terrace Hall 159. Check www.edcc.edu/ssd for office hours. Call
425.354.3113 on a video phone for more information about the PACE-IT program. For
any additional special accommodations needed, call the SSD office at 425.640.1814.
Edmonds Community College does not discriminate on the basis of race; color; religion;
national origin; sex; disability; sexual orientation; age; citizenship, marital, or veteran
status; or genetic information in its programs and activities.

More Related Content

PPTX
PACE-IT, Security+1.3: Cloud Concepts
PPTX
PACE-IT, Security+1.2: Secure Network Administration Concepts
PPTX
PACE-IT, Security+2.8: Risk Management Best Practices
PPTX
PACE-IT, Security+ 2.1: Risk Related Concepts (part 3)
PPTX
PACE-IT, Security+1.1: Introduction to Network Devices (part 2)
PPTX
PACE-IT: Risk and Security Related Concepts
PPTX
PACE-IT, Security+2.6: Security Related Awareness and Training
PPTX
PACE-IT, Security+2.7: Physical Security and Enviornmental Controls
PACE-IT, Security+1.3: Cloud Concepts
PACE-IT, Security+1.2: Secure Network Administration Concepts
PACE-IT, Security+2.8: Risk Management Best Practices
PACE-IT, Security+ 2.1: Risk Related Concepts (part 3)
PACE-IT, Security+1.1: Introduction to Network Devices (part 2)
PACE-IT: Risk and Security Related Concepts
PACE-IT, Security+2.6: Security Related Awareness and Training
PACE-IT, Security+2.7: Physical Security and Enviornmental Controls

What's hot (20)

PPTX
PACE-IT, Security+2.9: Goals of Security Controls
PPTX
PACE-IT, Security+1.4: Common Network Protocols (part 3)
PPTX
PACE-IT, Security+ 2.1: Risk Related Concepts (part 2)
PPTX
PACE-IT, Security+ 2.4: Basic Forensic Procedures
PPTX
PACE-IT, Security+ 2.1: Risk Related Concepts (part 1)
PPTX
PACE-IT: Common Threats (part 2)
PPTX
PACE-IT, Security+3.8: Vulnerability Scanning vs Pen Testing
PPTX
PACE-IT, Security+3.4: Summary of Wireless Attacks
PPTX
PACE-IT, Security+3.6: Security Enhancement Techniques
PPTX
PACE-IT: Physical Network Security Control
PPTX
PACE-IT: Basic Forensic Concepts
PPTX
PACE-IT: Common Network Vulnerabilities
PPTX
PACE-IT, Security+ 4.3: Solutions to Establish Host Security
PPTX
PACE-IT: Common Threats (part 1)
PPTX
PACE-IT: Common Network Security Issues
PPTX
PACE-IT, Security+2.8: Disaster Recovery Concepts
PPTX
PACE-IT, Security+3.2: Summary of Types of Attacks (part 1)
PPTX
PACE-IT: IT Security Measures
PPTX
PACE-IT, Security+3.5: Types of Application Attacks (part 1)
PPTX
Pace IT - Common Security Threats
PACE-IT, Security+2.9: Goals of Security Controls
PACE-IT, Security+1.4: Common Network Protocols (part 3)
PACE-IT, Security+ 2.1: Risk Related Concepts (part 2)
PACE-IT, Security+ 2.4: Basic Forensic Procedures
PACE-IT, Security+ 2.1: Risk Related Concepts (part 1)
PACE-IT: Common Threats (part 2)
PACE-IT, Security+3.8: Vulnerability Scanning vs Pen Testing
PACE-IT, Security+3.4: Summary of Wireless Attacks
PACE-IT, Security+3.6: Security Enhancement Techniques
PACE-IT: Physical Network Security Control
PACE-IT: Basic Forensic Concepts
PACE-IT: Common Network Vulnerabilities
PACE-IT, Security+ 4.3: Solutions to Establish Host Security
PACE-IT: Common Threats (part 1)
PACE-IT: Common Network Security Issues
PACE-IT, Security+2.8: Disaster Recovery Concepts
PACE-IT, Security+3.2: Summary of Types of Attacks (part 1)
PACE-IT: IT Security Measures
PACE-IT, Security+3.5: Types of Application Attacks (part 1)
Pace IT - Common Security Threats
Ad

Similar to PACE-IT, Security+1.3: Secure Network Design Elements and Components (20)

PPTX
Pace IT - Network Devices (part 2)
PPTX
PACE-IT: Implementing a Basic Network - N10 006
PPTX
PACE-IT: The Importance of Network Segmentation
PPTX
PACE-IT: Introduction_to Network Devices (part 2) - N10 006
PPTX
PACE-IT, Security+1.5: Wireless Security Considerations
PDF
network security.pdf
PPTX
PACE-IT, Security+1.1: Introduction to Network Devices (part 1)
PPTX
Network design consideration
PPTX
PACE-IT: Network Hardening Techniques (part 2)
PPTX
Pace IT - Setting Up a SOHO Network
PDF
Is it an internal affair
PPTX
Zero trust model for cloud computing.pptx
PDF
Gigamon - Network Visibility Solutions
PPTX
Network security
DOCX
· How to Build a Secure NetworkThe local county health departmen.docx
PDF
Access Control For Local Area Network Performance Essay
PDF
Performance Analysis of Wireless Trusted Software Defined Networks
PPTX
PACE-IT: Networking Services and Applications (part 1) - N10 006
PDF
White paper scada (2)
PPTX
PACE-IT: Network Access Control
Pace IT - Network Devices (part 2)
PACE-IT: Implementing a Basic Network - N10 006
PACE-IT: The Importance of Network Segmentation
PACE-IT: Introduction_to Network Devices (part 2) - N10 006
PACE-IT, Security+1.5: Wireless Security Considerations
network security.pdf
PACE-IT, Security+1.1: Introduction to Network Devices (part 1)
Network design consideration
PACE-IT: Network Hardening Techniques (part 2)
Pace IT - Setting Up a SOHO Network
Is it an internal affair
Zero trust model for cloud computing.pptx
Gigamon - Network Visibility Solutions
Network security
· How to Build a Secure NetworkThe local county health departmen.docx
Access Control For Local Area Network Performance Essay
Performance Analysis of Wireless Trusted Software Defined Networks
PACE-IT: Networking Services and Applications (part 1) - N10 006
White paper scada (2)
PACE-IT: Network Access Control
Ad

More from Pace IT at Edmonds Community College (20)

PPTX
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PPTX
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PPTX
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
PPTX
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
PPTX
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
PPTX
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
PPTX
PACE-IT, Security + 5.3: Security Controls for Account Management
PPTX
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
PPTX
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
PPTX
PACE-IT, Security + 5.1: Summary of Authentication Services
PPTX
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PPTX
PACE-IT, Security+ 4.1: Application Security Controls and Techniques
PPTX
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PPTX
PACE-IT, Security+ 4.4: Controls to Ensure Data Security
PPTX
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PPTX
PACE-IT, Security+3.7: Overview of Security Assessment Tools
PPTX
PACE-IT, Security+3.5: Types of Application Attacks (part 2)
PPTX
PACE-IT, Security+3.3: Summary of Social Engineering Attacks
PPTX
PACE-IT, Security+3.2: Summary of Types of Attacks (part 2)
PPTX
PACE-IT, Security+3.1: Types of Malware
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
PACE-IT, Security + 5.3: Security Controls for Account Management
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
PACE-IT, Security + 5.1: Summary of Authentication Services
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PACE-IT, Security+ 4.1: Application Security Controls and Techniques
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+ 4.4: Controls to Ensure Data Security
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+3.7: Overview of Security Assessment Tools
PACE-IT, Security+3.5: Types of Application Attacks (part 2)
PACE-IT, Security+3.3: Summary of Social Engineering Attacks
PACE-IT, Security+3.2: Summary of Types of Attacks (part 2)
PACE-IT, Security+3.1: Types of Malware

Recently uploaded (20)

PDF
Basic Mud Logging Guide for educational purpose
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PPTX
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
PDF
Computing-Curriculum for Schools in Ghana
PPTX
GDM (1) (1).pptx small presentation for students
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PDF
Sports Quiz easy sports quiz sports quiz
PDF
Complications of Minimal Access Surgery at WLH
PDF
Insiders guide to clinical Medicine.pdf
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PDF
Pre independence Education in Inndia.pdf
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PDF
Anesthesia in Laparoscopic Surgery in India
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
Basic Mud Logging Guide for educational purpose
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
Computing-Curriculum for Schools in Ghana
GDM (1) (1).pptx small presentation for students
human mycosis Human fungal infections are called human mycosis..pptx
Sports Quiz easy sports quiz sports quiz
Complications of Minimal Access Surgery at WLH
Insiders guide to clinical Medicine.pdf
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
Pre independence Education in Inndia.pdf
Supply Chain Operations Speaking Notes -ICLT Program
2.FourierTransform-ShortQuestionswithAnswers.pdf
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
Module 4: Burden of Disease Tutorial Slides S2 2025
Abdominal Access Techniques with Prof. Dr. R K Mishra
Anesthesia in Laparoscopic Surgery in India
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...

PACE-IT, Security+1.3: Secure Network Design Elements and Components

  • 2. Page 2 Instructor, PACE-IT Program – Edmonds Community College Areas of Expertise Industry Certifications  PC Hardware  Network Administration  IT Project Management  Network Design  User Training  IT Troubleshooting Qualifications Summary Education  M.B.A., IT Management, Western Governor’s University  B.S., IT Security, Western Governor’s University Entrepreneur, executive leader, and proven manger with 10+ years of experience turning complex issues into efficient and effective solutions. Strengths include developing and mentoring diverse workforces, improving processes, analyzing business needs and creating the solutions required— with a focus on technology.
  • 3. Page 3 – Defense in depth. – Elements and components of network design. PACE-IT.
  • 4. Page 4 Secure network design elements and components.
  • 5. Page 5 Due to the complexity of modern networks, malicious attackers have multiple avenues that they can use to breach network security. This same complexity also allows for security to be placed in multiple areas using different methods. By placing security at different levels and in different places, network administrators can increase the overall security posture of a network. This concept is known as defense in depth. Security should not just be placed in a single spot, as this creates a single point of failure. Security should be emplaced at multiple layers of the network, using a diversity of methods, in order to create an effectively hardened network. Secure network design elements and components. Just as when peeling an onion, once one layer of security is stripped away, the attacker should find another layer waiting underneath.
  • 6. Page 6 Secure network design elements and components.
  • 7. Page 7 – Demilitarized zone (DMZ). » The DMZ is a specific area (zone) created—usually between two firewalls—that allows outside access to network resources (e.g., a Web server), while the internal network remains protected from outside traffic. • The external facing router allows specific outside traffic into the DMZ, while the internal router prevents that same outside traffic from entering the internal network. – Network address translation (NAT). » NAT is a technique used to allow private IP addresses to be routed across, or through, an untrusted public network. • The NAT device—usually a router—assigns a public routable IP address to a device that is requesting outside access. » NAT has the added benefit of protecting the internal private network. • The private network’s IP addressing scheme is hidden from untrusted networks by the NAT enabled router. Secure network design elements and components.
  • 8. Page 8 – Network access control (NAC). » NAC is a method of controlling who and what gains access to a wired or wireless network. • In most cases, NAC uses a combination of credentials based security (e.g., 802.1x) and some form of posture assessment for a device attempting to log on to the network. » A posture assessment considers the state of the requesting device. The device must meet a set of minimum standards before it is allowed access to the network. • Common device assessments include the type of device, operating system, patch level of the operating system, the presence of anti-malware software and how up to date it is. – Virtualization. » Virtualization is the process of creating virtual resources instead of actual resources. • Hardware, operating systems, and complete networks can be virtualized. » A security advantage to virtualization is that, if the virtual resource is compromised, it can easily be taken down, recovered, fixed, and then brought back online. Secure network design elements and components.
  • 9. Page 9 – Subnetting. » Subnetting is the logical division of a network—a single block of IP addresses—into discrete separate networks. • Can be done to match the physical structure of the network (e.g., the network only requires enough addresses for 100 nodes, not 254). • Can be done to increase the security of the network by segmenting resources by needs and security level. – Segmentation of resources. » Security can be increased by segmenting a network based on resources and security needs through the implementation of virtual local area networks (VLANs). • The segmentation can be done based on user groups (e.g., a VLAN for the sales department and another one for human resources). • The segmentation can be done based on resource type (e.g., a VLAN for file servers and another one for Web servers). • Commonly, segmentation is accomplished with a combination. » The use of VLANs supports a more secure, layered approach in the network design. Secure network design elements and components.
  • 10. Page 10 In modern networks, it is not uncommon to need to allow remote access to local network resources. Remote workers often need to access resources that are located on the main business network. This requires the use of remote access technology in order for it to happen in a secure manner. Remote access can occur using telephony technology (e.g., dial- up) or through the use of a virtual private network (VPN). In all cases, secure protocols and methods should be used in order to ensure the security of the local network. For example, one of the forms of Extensible Authentication Protocol (EAP) should be used when allowing remote access. Secure network design elements and components.
  • 11. Page 11 Secure network design elements and components. The complexity of modern networks means that there are different avenues that attackers can use to breach a network’s security. Defense in depth involves placing security at many different layers of a network. By placing security at different layers and by using different security methods, even if the outer security is breached, the inner security remains in place. Topic Defense in depth. Summary Defense in depth can be implemented in multiple ways, including adding a DMZ, using NAT, implementing NAC, using virtualization, employing subnetting and segmentation, and requiring remote access technology. Elements and components of network design.
  • 13. This workforce solution was 100 percent funded by a $3 million grant awarded by the U.S. Department of Labor's Employment and Training Administration. The solution was created by the grantee and does not necessarily reflect the official position of the U.S. Department of Labor. The Department of Labor makes no guarantees, warranties, or assurances of any kind, express or implied, with respect to such information, including any information on linked sites and including, but not limited to, accuracy of the information or its completeness, timeliness, usefulness, adequacy, continued availability or ownership. Funded by the Department of Labor, Employment and Training Administration, Grant #TC-23745-12-60-A-53. PACE-IT is an equal opportunity employer/program and auxiliary aids and services are available upon request to individuals with disabilities. For those that are hearing impaired, a video phone is available at the Services for Students with Disabilities (SSD) office in Mountlake Terrace Hall 159. Check www.edcc.edu/ssd for office hours. Call 425.354.3113 on a video phone for more information about the PACE-IT program. For any additional special accommodations needed, call the SSD office at 425.640.1814. Edmonds Community College does not discriminate on the basis of race; color; religion; national origin; sex; disability; sexual orientation; age; citizenship, marital, or veteran status; or genetic information in its programs and activities.