logo

ICTNWK509 Design and Implement a Security Perimeter for ICT Networks

11 Pages2802 Words16 Views
   

Added on  2022-08-17

ICTNWK509 Design and Implement a Security Perimeter for ICT Networks

   Added on 2022-08-17

ShareRelated Documents
Running head: ASSESSMENT TASKS 1
ICTNWK509 Design and implement a security perimeter for ICT networks
Name of the Student
Name of the University
Author’s Note
ICTNWK509 Design and Implement a Security Perimeter for ICT Networks_1
1
ASSESSMENT TASKS 1
1.1. What are the network threats to consider? How can an enterprise achieve the right level of
security?
The following are the network threats that are needed to be considered for the development of
the network:
1. Computer Virus –
2. Rogue security software –
3. Trojan –
4. Spyware and Adware –
5. Computer worm –
6. DDOS and Dos attack –
7. Rootkit –
8. Phishing –
9. SQL injection attacks -
For achieving right level of security and develop the network all the software are needed
to be kept updated and standardized software are needed to be used such that it can be ensured
that approval of the administrator is required for installation of software. Network protection
measures are needed to be taken such as installation of firewall, ensuring proper access control,
using segmentation of network, conducting proper maintenance, use of IDS and IPS for tracking
flooding of packets. Training is also needed to be provided to the employees such that they can
understand the security and able to identify the threats (Rathore et al. 2017). An access control is
also important for the security and weak access control can make the system and data susceptible
to unauthorized access. The access control measures are needed to be boosted with the
ICTNWK509 Design and Implement a Security Perimeter for ICT Networks_2
2
ASSESSMENT TASKS 1
application of strong password system and it should be mix of upper case, lowercase, special
character and numerical.
1.2. Identify what Security Goals in Network Security you need to consider while design and
deploy a secure perimeter? List some examples of Active Attacks and Passive Attacks.
For the deployment of the secure perimeter network the security goals that are needed to
be considered is the protection of data center since they are vulnerable to different types of
attacks. The perimeter security is used for controlling the network traffic flowing in and out of
data center and a layered set of complimentary defense is needed to be implemented. The
potentially dangerous and unknown traffics are needed to be kept out with the help of firewall
and router configuration for eliminating the threats (Rapuzzi and Repetto 2018). The suspicious
traffics can also be detected with the implementation of IDS/IPS system once it passes through
the firewall.
The following are the example of active and passive attacks:
Active attack – Masquerade (An entity pretending to be a different one)
Passive attack – Tapping (monitoring unencrypted communication)
1.3. Explain in details Windows Firewall with Advanced Security? What Can Be Monitored
from the Windows Firewall with Advanced Security? How to Manage Existing Windows
Firewall Rules? How to Create an inbound and Outbound Rule for the Windows Firewall?
Windows firewall with advanced security is used as a management snap with which the
configuration can be controlled in an easy manner. It also governs the exceptions and rules for
ICTNWK509 Design and Implement a Security Perimeter for ICT Networks_3
3
ASSESSMENT TASKS 1
proper working of the firewall. For accessing the option the windows firewall is needed to be
clicked open and then the advanced option located in the left pane is needed to be selected.
In the left pane beneath the three rule types monitoring option can be found, on its
expansion the active firewall rules can be seen along with active security association and
connection security rules.
On opening the Windows firewall with advanced security it might look big for the first
time since it stores all the rules in a detailed level. But the view of the rules is user friendly that
helps in governing the function and it can be used for editing any of the parameter for any rule,
exception whether it is small or big.
Inbound Rules are applied for the traffic that comes from internet or network to the
computer. The inbound rule is needed to be selected and New Rule option present in the right is
needed to be clicked. The new inbound rule wizard starts and it asks for typing the rule. The
choices of program, port, predefined and custom are given. If program is selected and the next
option is clicked the program is needed to be added (Xu 2016). The protocol is needed to be
selected i.e. TCP or UDP and the next option is needed to be clicked. In the next step the action
is needed to be taken such as allow the connection, allow the connection if it is secure, block the
connection. In the next step the rule is needed to be applied to domain, private or public
networks and the finish option is needed to be clicked.
Outbound Rules are applied for the traffic that goes out from the PC for internet or
network. The outbound rule is needed to be selected and New Rule option present in the right is
needed to be clicked. The new outbound rule wizard starts and it asks for typing the rule. The
choices of program, port, predefined and custom are given. If program is selected and the next
ICTNWK509 Design and Implement a Security Perimeter for ICT Networks_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Applications and Technology Conference (LISAT)
|11
|1209
|12

Security Presentation and Guidebook - IT Security
|10
|1587
|18

ICTNWK509 Design and Implement a Security Perimeter for ICT Networks | Assessment Task
|12
|877
|15

INSE 6980 Security Project 2022
|14
|1507
|18

Network Security Assessment | Patch Management
|7
|1603
|150

Network Design Proposal for XYZ Retails
|15
|873
|395