ICTNWK509 Design and Implement a Security Perimeter for ICT Networks
VerifiedAdded on 2022/08/17
|11
|2802
|16
AI Summary
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: ASSESSMENT TASKS 1
ICTNWK509 Design and implement a security perimeter for ICT networks
Name of the Student
Name of the University
Author’s Note
ICTNWK509 Design and implement a security perimeter for ICT networks
Name of the Student
Name of the University
Author’s Note
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1
ASSESSMENT TASKS 1
1.1. What are the network threats to consider? How can an enterprise achieve the right level of
security?
The following are the network threats that are needed to be considered for the development of
the network:
1. Computer Virus –
2. Rogue security software –
3. Trojan –
4. Spyware and Adware –
5. Computer worm –
6. DDOS and Dos attack –
7. Rootkit –
8. Phishing –
9. SQL injection attacks -
For achieving right level of security and develop the network all the software are needed
to be kept updated and standardized software are needed to be used such that it can be ensured
that approval of the administrator is required for installation of software. Network protection
measures are needed to be taken such as installation of firewall, ensuring proper access control,
using segmentation of network, conducting proper maintenance, use of IDS and IPS for tracking
flooding of packets. Training is also needed to be provided to the employees such that they can
understand the security and able to identify the threats (Rathore et al. 2017). An access control is
also important for the security and weak access control can make the system and data susceptible
to unauthorized access. The access control measures are needed to be boosted with the
ASSESSMENT TASKS 1
1.1. What are the network threats to consider? How can an enterprise achieve the right level of
security?
The following are the network threats that are needed to be considered for the development of
the network:
1. Computer Virus –
2. Rogue security software –
3. Trojan –
4. Spyware and Adware –
5. Computer worm –
6. DDOS and Dos attack –
7. Rootkit –
8. Phishing –
9. SQL injection attacks -
For achieving right level of security and develop the network all the software are needed
to be kept updated and standardized software are needed to be used such that it can be ensured
that approval of the administrator is required for installation of software. Network protection
measures are needed to be taken such as installation of firewall, ensuring proper access control,
using segmentation of network, conducting proper maintenance, use of IDS and IPS for tracking
flooding of packets. Training is also needed to be provided to the employees such that they can
understand the security and able to identify the threats (Rathore et al. 2017). An access control is
also important for the security and weak access control can make the system and data susceptible
to unauthorized access. The access control measures are needed to be boosted with the
2
ASSESSMENT TASKS 1
application of strong password system and it should be mix of upper case, lowercase, special
character and numerical.
1.2. Identify what Security Goals in Network Security you need to consider while design and
deploy a secure perimeter? List some examples of Active Attacks and Passive Attacks.
For the deployment of the secure perimeter network the security goals that are needed to
be considered is the protection of data center since they are vulnerable to different types of
attacks. The perimeter security is used for controlling the network traffic flowing in and out of
data center and a layered set of complimentary defense is needed to be implemented. The
potentially dangerous and unknown traffics are needed to be kept out with the help of firewall
and router configuration for eliminating the threats (Rapuzzi and Repetto 2018). The suspicious
traffics can also be detected with the implementation of IDS/IPS system once it passes through
the firewall.
The following are the example of active and passive attacks:
Active attack – Masquerade (An entity pretending to be a different one)
Passive attack – Tapping (monitoring unencrypted communication)
1.3. Explain in details Windows Firewall with Advanced Security? What Can Be Monitored
from the Windows Firewall with Advanced Security? How to Manage Existing Windows
Firewall Rules? How to Create an inbound and Outbound Rule for the Windows Firewall?
Windows firewall with advanced security is used as a management snap with which the
configuration can be controlled in an easy manner. It also governs the exceptions and rules for
ASSESSMENT TASKS 1
application of strong password system and it should be mix of upper case, lowercase, special
character and numerical.
1.2. Identify what Security Goals in Network Security you need to consider while design and
deploy a secure perimeter? List some examples of Active Attacks and Passive Attacks.
For the deployment of the secure perimeter network the security goals that are needed to
be considered is the protection of data center since they are vulnerable to different types of
attacks. The perimeter security is used for controlling the network traffic flowing in and out of
data center and a layered set of complimentary defense is needed to be implemented. The
potentially dangerous and unknown traffics are needed to be kept out with the help of firewall
and router configuration for eliminating the threats (Rapuzzi and Repetto 2018). The suspicious
traffics can also be detected with the implementation of IDS/IPS system once it passes through
the firewall.
The following are the example of active and passive attacks:
Active attack – Masquerade (An entity pretending to be a different one)
Passive attack – Tapping (monitoring unencrypted communication)
1.3. Explain in details Windows Firewall with Advanced Security? What Can Be Monitored
from the Windows Firewall with Advanced Security? How to Manage Existing Windows
Firewall Rules? How to Create an inbound and Outbound Rule for the Windows Firewall?
Windows firewall with advanced security is used as a management snap with which the
configuration can be controlled in an easy manner. It also governs the exceptions and rules for
3
ASSESSMENT TASKS 1
proper working of the firewall. For accessing the option the windows firewall is needed to be
clicked open and then the advanced option located in the left pane is needed to be selected.
In the left pane beneath the three rule types monitoring option can be found, on its
expansion the active firewall rules can be seen along with active security association and
connection security rules.
On opening the Windows firewall with advanced security it might look big for the first
time since it stores all the rules in a detailed level. But the view of the rules is user friendly that
helps in governing the function and it can be used for editing any of the parameter for any rule,
exception whether it is small or big.
Inbound Rules are applied for the traffic that comes from internet or network to the
computer. The inbound rule is needed to be selected and New Rule option present in the right is
needed to be clicked. The new inbound rule wizard starts and it asks for typing the rule. The
choices of program, port, predefined and custom are given. If program is selected and the next
option is clicked the program is needed to be added (Xu 2016). The protocol is needed to be
selected i.e. TCP or UDP and the next option is needed to be clicked. In the next step the action
is needed to be taken such as allow the connection, allow the connection if it is secure, block the
connection. In the next step the rule is needed to be applied to domain, private or public
networks and the finish option is needed to be clicked.
Outbound Rules are applied for the traffic that goes out from the PC for internet or
network. The outbound rule is needed to be selected and New Rule option present in the right is
needed to be clicked. The new outbound rule wizard starts and it asks for typing the rule. The
choices of program, port, predefined and custom are given. If program is selected and the next
ASSESSMENT TASKS 1
proper working of the firewall. For accessing the option the windows firewall is needed to be
clicked open and then the advanced option located in the left pane is needed to be selected.
In the left pane beneath the three rule types monitoring option can be found, on its
expansion the active firewall rules can be seen along with active security association and
connection security rules.
On opening the Windows firewall with advanced security it might look big for the first
time since it stores all the rules in a detailed level. But the view of the rules is user friendly that
helps in governing the function and it can be used for editing any of the parameter for any rule,
exception whether it is small or big.
Inbound Rules are applied for the traffic that comes from internet or network to the
computer. The inbound rule is needed to be selected and New Rule option present in the right is
needed to be clicked. The new inbound rule wizard starts and it asks for typing the rule. The
choices of program, port, predefined and custom are given. If program is selected and the next
option is clicked the program is needed to be added (Xu 2016). The protocol is needed to be
selected i.e. TCP or UDP and the next option is needed to be clicked. In the next step the action
is needed to be taken such as allow the connection, allow the connection if it is secure, block the
connection. In the next step the rule is needed to be applied to domain, private or public
networks and the finish option is needed to be clicked.
Outbound Rules are applied for the traffic that goes out from the PC for internet or
network. The outbound rule is needed to be selected and New Rule option present in the right is
needed to be clicked. The new outbound rule wizard starts and it asks for typing the rule. The
choices of program, port, predefined and custom are given. If program is selected and the next
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
4
ASSESSMENT TASKS 1
option is clicked the program is needed to be added (Arya 2016). In the next step the action is
needed to be taken such as allow the connection, allow the connection if it is secure, block the
connection. In the next step the rule is needed to be applied to domain, private or public
networks and the finish option is needed to be clicked.
1.4. Discuss VPN according to Protocol scalability and Device scalability considerations to
assess you needs?
A VPN is used for providing base security layer for the communications that have little or no
performance overheads. The success time and the failure rate is used as the test result for
application of VPN protocol. The following are the VPN protocol:
PPTP
L2TP
IPSec
SSL
Some of the VPN solution can support more than one protocol and the scalability needs can
affect tunneling protocols (Dang, Lu and Zhu 2017). The remote access users’ needs proper
client software for supporting the protocol. The site to site VPN needs the gateways to support
the common protocol.
1.5. An organisation is considering conducting a network perimeter penetration test based on
general industry concerns. What is a security Audit and Penetration Test? Discuss Key Benefits
of Security Audits and Penetration Tests?
A security audit is defined as the systematic evaluation of the IT infrastructure defense, in
this process the compliance of security protocol with the established criteria list is examined.
ASSESSMENT TASKS 1
option is clicked the program is needed to be added (Arya 2016). In the next step the action is
needed to be taken such as allow the connection, allow the connection if it is secure, block the
connection. In the next step the rule is needed to be applied to domain, private or public
networks and the finish option is needed to be clicked.
1.4. Discuss VPN according to Protocol scalability and Device scalability considerations to
assess you needs?
A VPN is used for providing base security layer for the communications that have little or no
performance overheads. The success time and the failure rate is used as the test result for
application of VPN protocol. The following are the VPN protocol:
PPTP
L2TP
IPSec
SSL
Some of the VPN solution can support more than one protocol and the scalability needs can
affect tunneling protocols (Dang, Lu and Zhu 2017). The remote access users’ needs proper
client software for supporting the protocol. The site to site VPN needs the gateways to support
the common protocol.
1.5. An organisation is considering conducting a network perimeter penetration test based on
general industry concerns. What is a security Audit and Penetration Test? Discuss Key Benefits
of Security Audits and Penetration Tests?
A security audit is defined as the systematic evaluation of the IT infrastructure defense, in
this process the compliance of security protocol with the established criteria list is examined.
5
ASSESSMENT TASKS 1
This is used for validating the security posture and the audits are needed to be conducted at a
regular interval such that the digital assets and data are kept secured (Stiawan et al. 2017).
Penetration testing is used for breaching the system as a hacker such that the resistance of
IT infrastructure can be examined. Multiple approaches are combined for breaching the system
and provides insights of the vulnerabilities and identify the weakness of the system (Türpe,
Kocksch and Poller 2016).
The following are the key benefits of security audit and penetration testing:
Detection and arrangement of security threats
Evading penalties and meeting monitoring necessities
Avoid network downtime rate
Protection of customer loyalty
1.6. Discuss different perimeter security solutions?
Direct perimeter security – A physical barrier is used for securing the server access and
keep the assets secured. Different products can be utilized such as security cameras, barbed wire,
breach alarm for enforcing direct perimeter security.
Threat Recognition – It is used for protecting an asset or facility and recognizing the
presence of the threats at an early stage. If the threat is detected then the likely operation can be
detected and it helps in effectively responding against the threat and mitigating possible damage
and trespassing.
ASSESSMENT TASKS 1
This is used for validating the security posture and the audits are needed to be conducted at a
regular interval such that the digital assets and data are kept secured (Stiawan et al. 2017).
Penetration testing is used for breaching the system as a hacker such that the resistance of
IT infrastructure can be examined. Multiple approaches are combined for breaching the system
and provides insights of the vulnerabilities and identify the weakness of the system (Türpe,
Kocksch and Poller 2016).
The following are the key benefits of security audit and penetration testing:
Detection and arrangement of security threats
Evading penalties and meeting monitoring necessities
Avoid network downtime rate
Protection of customer loyalty
1.6. Discuss different perimeter security solutions?
Direct perimeter security – A physical barrier is used for securing the server access and
keep the assets secured. Different products can be utilized such as security cameras, barbed wire,
breach alarm for enforcing direct perimeter security.
Threat Recognition – It is used for protecting an asset or facility and recognizing the
presence of the threats at an early stage. If the threat is detected then the likely operation can be
detected and it helps in effectively responding against the threat and mitigating possible damage
and trespassing.
6
ASSESSMENT TASKS 1
Automatic Detection Systems – it is used in distant areas since security deployment can
take extended time with limitation of response window (Göksel et al. 2019). Different types of
sensors and thermal imaging can be used for the improvement of perimeter security.
1.7. Why it is important to back up network configuration? How you will do that, discuss with an
example?
The network configuration is needed to be backed up since it is hard to replicate the
configurations manually. In large organization a single person cannot memorize the router and
firewall configurations and without any backup a lot of time and effort would be needed for
manually reconfiguring the devices.
The network backup is important for reducing human error, making storage more
manageable and scalable, improving the ability of disaster recovery and automating backups
(Chan et al. 2018). The nature of the hardware device is needed to be analyzed and they should
be included in the backup devices. The backup is needed to be updated as if any changes are
made in the configuration.
1.8. What is Log Analysis? How does log analysis work? Point out the purposes of Log analysis?
Log analysis is used for reviewing, interpreting and understanding the data that are
generated by the computers. There are different programmable technologies that helps in
generating the logs continuing network devices, applications and operating systems.
Log analysis is used for manipulating data and help the user to extract and organize the
information from the logs. It works with the common methodologies normalization, pattern
recognition, classification and tagging, correlation analysis. Normalization is used for
centralizing and indexing log data and contain including it in the steps of normalization and
ASSESSMENT TASKS 1
Automatic Detection Systems – it is used in distant areas since security deployment can
take extended time with limitation of response window (Göksel et al. 2019). Different types of
sensors and thermal imaging can be used for the improvement of perimeter security.
1.7. Why it is important to back up network configuration? How you will do that, discuss with an
example?
The network configuration is needed to be backed up since it is hard to replicate the
configurations manually. In large organization a single person cannot memorize the router and
firewall configurations and without any backup a lot of time and effort would be needed for
manually reconfiguring the devices.
The network backup is important for reducing human error, making storage more
manageable and scalable, improving the ability of disaster recovery and automating backups
(Chan et al. 2018). The nature of the hardware device is needed to be analyzed and they should
be included in the backup devices. The backup is needed to be updated as if any changes are
made in the configuration.
1.8. What is Log Analysis? How does log analysis work? Point out the purposes of Log analysis?
Log analysis is used for reviewing, interpreting and understanding the data that are
generated by the computers. There are different programmable technologies that helps in
generating the logs continuing network devices, applications and operating systems.
Log analysis is used for manipulating data and help the user to extract and organize the
information from the logs. It works with the common methodologies normalization, pattern
recognition, classification and tagging, correlation analysis. Normalization is used for
centralizing and indexing log data and contain including it in the steps of normalization and
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
7
ASSESSMENT TASKS 1
expressing as the same format. The pattern recognition can be implemented with log analysis
software for comparing the incoming messages using a pattern book and distinguishing the
interesting and understanding logs (Tayal, Mishra and Sharma 2017). Classification and tagging
is used for grouping the log entries that are of same type. The correlation analysis is used
gathering the log information from different system and discovering the log entries.
Logs contains a series of messages describing the activities running in the system and it
can be streamed using a log collector using an active network or stored in a file for later analysis.
Log analysis is used for reviewing messages and getting details about the inner working of the
system.
1.9. Because digitisation rules the technical world, it’s important for organisations to design
security mechanisms for their network infrastructures. Discuss.
Security mechanism is needed to be designed for a network infrastructure by analyzing
the four layers of security infrastructure such as perimeter defense, protecting servers and
operating system, protecting hosts and workstations and protecting information and data.
The perimeter defense layer acts as a wall of security securing the internal infrastructure
from outside environment containing firewall, proxy servers and routers. Layer 2 security is
needed to be used for protecting the application servers, operating systems, web and mail
servers. The functionality of OS can be abused and the security can be compromised for the
system and the network. The vulnerabilities can be eliminated by patching and covering the
loopholes and thus it is needed to be updated with latest technologies (Puthal et al. 2017).
Security policy is needed to be implemented for the workstation for protecting it against the
hacker trying exploit the vulnerability. The policies also help in securing the data stored in
ASSESSMENT TASKS 1
expressing as the same format. The pattern recognition can be implemented with log analysis
software for comparing the incoming messages using a pattern book and distinguishing the
interesting and understanding logs (Tayal, Mishra and Sharma 2017). Classification and tagging
is used for grouping the log entries that are of same type. The correlation analysis is used
gathering the log information from different system and discovering the log entries.
Logs contains a series of messages describing the activities running in the system and it
can be streamed using a log collector using an active network or stored in a file for later analysis.
Log analysis is used for reviewing messages and getting details about the inner working of the
system.
1.9. Because digitisation rules the technical world, it’s important for organisations to design
security mechanisms for their network infrastructures. Discuss.
Security mechanism is needed to be designed for a network infrastructure by analyzing
the four layers of security infrastructure such as perimeter defense, protecting servers and
operating system, protecting hosts and workstations and protecting information and data.
The perimeter defense layer acts as a wall of security securing the internal infrastructure
from outside environment containing firewall, proxy servers and routers. Layer 2 security is
needed to be used for protecting the application servers, operating systems, web and mail
servers. The functionality of OS can be abused and the security can be compromised for the
system and the network. The vulnerabilities can be eliminated by patching and covering the
loopholes and thus it is needed to be updated with latest technologies (Puthal et al. 2017).
Security policy is needed to be implemented for the workstation for protecting it against the
hacker trying exploit the vulnerability. The policies also help in securing the data stored in
8
ASSESSMENT TASKS 1
workstation environment coming from the firewall system. The data protection, collection,
political, privacy and legal environment of data is called data protection. Different data should
have the data protection for dealing with data integrity and protect it from threats and risks such
that privacy of data is maintained.
1.10. Explain how mobile devices and emerging applications can create weaknesses in installed
perimeter design. How might these weaknesses be addressed?
The mobile devices and emerging applications can create weakness for the installed
perimeter design since cyber security is concerned with the surrounding issues for diverse attacks
and defense strategies for preserving the integrity, confidentiality and availability of digital and
information technology. Malware can get install as a bundle with the emerging application and it
can open path for the attacker to compromise the system and install payload in the system (Hsieh
et al. 2019). Malware attack can target the hardware equipment, software piece, network level
with the exploitation of the design and implementation of vulnerability at each of the layer.
For addressing the weakness each of the device is needed to be installed with antivirus
software and emerging applications are needed to be installed in virtual machine such that it does
not have direct access of the physical platform. Access control mechanism is needed to be used
for improving the perimeter defense and the network traffic is needed to be intercepted for
examination such that no malware can penetrate inside the network.
ASSESSMENT TASKS 1
workstation environment coming from the firewall system. The data protection, collection,
political, privacy and legal environment of data is called data protection. Different data should
have the data protection for dealing with data integrity and protect it from threats and risks such
that privacy of data is maintained.
1.10. Explain how mobile devices and emerging applications can create weaknesses in installed
perimeter design. How might these weaknesses be addressed?
The mobile devices and emerging applications can create weakness for the installed
perimeter design since cyber security is concerned with the surrounding issues for diverse attacks
and defense strategies for preserving the integrity, confidentiality and availability of digital and
information technology. Malware can get install as a bundle with the emerging application and it
can open path for the attacker to compromise the system and install payload in the system (Hsieh
et al. 2019). Malware attack can target the hardware equipment, software piece, network level
with the exploitation of the design and implementation of vulnerability at each of the layer.
For addressing the weakness each of the device is needed to be installed with antivirus
software and emerging applications are needed to be installed in virtual machine such that it does
not have direct access of the physical platform. Access control mechanism is needed to be used
for improving the perimeter defense and the network traffic is needed to be intercepted for
examination such that no malware can penetrate inside the network.
9
ASSESSMENT TASKS 1
References
Arya, K., 2016. Managing the Windows Environment with Group Policy. In Windows Group
Policy Troubleshooting (pp. 71-104). Apress, Berkeley, CA.
Chan, C.L., Lee, S.C., Yeong, K.C. and Tan, S.W., 2018. Impact of Backup Power in Optimizing
Deployment Cost of Hybrid Optical Wireless Broadband Access Network (HOWBAN) with
Survivability. Wireless Personal Communications, 103(2), pp.1677-1697.
Dang, L., Lu, X.U. and Zhu, G., 2017. Application of the Smart Phone Based SSL VPN Virtual
Channel Technology in the Direct Network Report of Epidemic Situation of Infectious
Diseases. Journal of Medical Informatics, 38(5), pp.25-28.
Göksel, U.Ç.T.U., ALKAN, M., Doğru, İ.A. and Dörterler, M., 2019, October. Perimeter
Network Security Solutions: A Survey. In 2019 3rd International Symposium on
Multidisciplinary Studies and Innovative Technologies (ISMSIT) (pp. 1-6). IEEE.
Hsieh, H., Hsu, K.S., Jong, T.L. and Wang, L., 2019. Multi-Zone Fiber-Optic Intrusion
Detection System With Active Unbalanced Michelson Interferometer Used for Security of Each
Defended Zone. IEEE Sensors Journal, 20(3), pp.1607-1618.
Puthal, D., Mohanty, S.P., Nanda, P. and Choppali, U., 2017. Building security perimeters to
protect network systems against cyber threats [future directions]. IEEE Consumer Electronics
Magazine, 6(4), pp.24-27.
Rapuzzi, R. and Repetto, M., 2018. Building situational awareness for network threats in
fog/edge computing: Emerging paradigms beyond the security perimeter model. Future
Generation Computer Systems, 85, pp.235-249.
ASSESSMENT TASKS 1
References
Arya, K., 2016. Managing the Windows Environment with Group Policy. In Windows Group
Policy Troubleshooting (pp. 71-104). Apress, Berkeley, CA.
Chan, C.L., Lee, S.C., Yeong, K.C. and Tan, S.W., 2018. Impact of Backup Power in Optimizing
Deployment Cost of Hybrid Optical Wireless Broadband Access Network (HOWBAN) with
Survivability. Wireless Personal Communications, 103(2), pp.1677-1697.
Dang, L., Lu, X.U. and Zhu, G., 2017. Application of the Smart Phone Based SSL VPN Virtual
Channel Technology in the Direct Network Report of Epidemic Situation of Infectious
Diseases. Journal of Medical Informatics, 38(5), pp.25-28.
Göksel, U.Ç.T.U., ALKAN, M., Doğru, İ.A. and Dörterler, M., 2019, October. Perimeter
Network Security Solutions: A Survey. In 2019 3rd International Symposium on
Multidisciplinary Studies and Innovative Technologies (ISMSIT) (pp. 1-6). IEEE.
Hsieh, H., Hsu, K.S., Jong, T.L. and Wang, L., 2019. Multi-Zone Fiber-Optic Intrusion
Detection System With Active Unbalanced Michelson Interferometer Used for Security of Each
Defended Zone. IEEE Sensors Journal, 20(3), pp.1607-1618.
Puthal, D., Mohanty, S.P., Nanda, P. and Choppali, U., 2017. Building security perimeters to
protect network systems against cyber threats [future directions]. IEEE Consumer Electronics
Magazine, 6(4), pp.24-27.
Rapuzzi, R. and Repetto, M., 2018. Building situational awareness for network threats in
fog/edge computing: Emerging paradigms beyond the security perimeter model. Future
Generation Computer Systems, 85, pp.235-249.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
10
ASSESSMENT TASKS 1
Rathore, S., Sharma, P.K., Loia, V., Jeong, Y.S. and Park, J.H., 2017. Social network security:
Issues, challenges, threats, and solutions. Information sciences, 421, pp.43-69.
Stiawan, D., Idris, M.Y., Abdullah, A.H., Aljaber, F. and Budiarto, R., 2017. Cyber-attack
penetration test and vulnerability analysis. International Journal of Online and Biomedical
Engineering (iJOE), 13(01), pp.125-132.
Tayal, A., Mishra, N. and Sharma, S., 2017. Active monitoring & postmortem forensic analysis
of network threats: A survey. International Journal of Electronics and Information
Engineering, 6(1), pp.49-59.
Türpe, S., Kocksch, L. and Poller, A., 2016. Penetration tests a turning point in security
practices? Organizational challenges and implications in a software development team.
In Twelfth Symposium on Usable Privacy and Security ({SOUPS} 2016).
Xu, Z.X., 2016. Practices to Administration of Windows Server 2012 and 2012 R2. Memory, 4,
p.64.
ASSESSMENT TASKS 1
Rathore, S., Sharma, P.K., Loia, V., Jeong, Y.S. and Park, J.H., 2017. Social network security:
Issues, challenges, threats, and solutions. Information sciences, 421, pp.43-69.
Stiawan, D., Idris, M.Y., Abdullah, A.H., Aljaber, F. and Budiarto, R., 2017. Cyber-attack
penetration test and vulnerability analysis. International Journal of Online and Biomedical
Engineering (iJOE), 13(01), pp.125-132.
Tayal, A., Mishra, N. and Sharma, S., 2017. Active monitoring & postmortem forensic analysis
of network threats: A survey. International Journal of Electronics and Information
Engineering, 6(1), pp.49-59.
Türpe, S., Kocksch, L. and Poller, A., 2016. Penetration tests a turning point in security
practices? Organizational challenges and implications in a software development team.
In Twelfth Symposium on Usable Privacy and Security ({SOUPS} 2016).
Xu, Z.X., 2016. Practices to Administration of Windows Server 2012 and 2012 R2. Memory, 4,
p.64.
1 out of 11
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.