Advanced Network Security: Access Control, Authentication, Firewall, HTTPS & WiFi Security
VerifiedAdded on  2023/06/05
|10
|2243
|50
AI Summary
This article covers various aspects of Advanced Network Security such as Access Control, Authentication, Firewall, HTTPS & WiFi Security. It explains the importance of security tokens, two-factor authentication, MAC address filtering, SSL certificates and more. The article also discusses the different types of intellectual property and the need for trade secrets. It includes references to various sources for further reading.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
COIT20262 Assignment 2 Submission Term 2, 2018
Advanced Network Security
1
Advanced Network Security
1
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
COIT20262 Assignment 2 Submission Term 2, 2018
1. Access Control and Authenticating
The task here refers to authenticating and controlling the access for the small
enterprise, which contains nearly forty employees, in a years. The employees are categorized
with the following roles such as, Graphic design, IT administration, web development,
finance, CEO, software engineering, human resources, executive group and, sales and
marketing. Also multiple roles are taken by the employees, where the employees might be
available in both software engineering and also in web development. Also the company
contains key data resources such as, the marketing material, multimedia assets, company
policies, personnel records, trade secrets, meeting records, web content, and source code
(Bayometric, 2018).
Part (a)
2
1. Access Control and Authenticating
The task here refers to authenticating and controlling the access for the small
enterprise, which contains nearly forty employees, in a years. The employees are categorized
with the following roles such as, Graphic design, IT administration, web development,
finance, CEO, software engineering, human resources, executive group and, sales and
marketing. Also multiple roles are taken by the employees, where the employees might be
available in both software engineering and also in web development. Also the company
contains key data resources such as, the marketing material, multimedia assets, company
policies, personnel records, trade secrets, meeting records, web content, and source code
(Bayometric, 2018).
Part (a)
2
COIT20262 Assignment 2 Submission Term 2, 2018
Part (b)
Part (c)
Trade secrets refers to the data which by staying incognito, provides business
aggressive edge or certain monetary esteem. The definition shows that it contains, sensible
moves which has to be created for keeping up its mystery for the data that is to be seen as the
trade secret. It is not same as the other types of licensed innovations that has administration
managed security, hence the mysteries should be exchanged to ensure by the holder. The
trade secrets lasts uncertainly and they are substantial till they are revealed to the people. The
trade secret could be safeguarded from various point of views. It is unique from most of the
well-known techniques like, by using the non-disclosure agreement (QuickBooks, 2018).
Part (d)
The clients should use various, surprizing secret phrases for each of its business
associated records. The clients might not use any kind of business which is linked with the
passwords, of their own records. The passwords shouldn’t be imparted to anybody even the
associates or the managers (Martins, 2018).
3
Part (b)
Part (c)
Trade secrets refers to the data which by staying incognito, provides business
aggressive edge or certain monetary esteem. The definition shows that it contains, sensible
moves which has to be created for keeping up its mystery for the data that is to be seen as the
trade secret. It is not same as the other types of licensed innovations that has administration
managed security, hence the mysteries should be exchanged to ensure by the holder. The
trade secrets lasts uncertainly and they are substantial till they are revealed to the people. The
trade secret could be safeguarded from various point of views. It is unique from most of the
well-known techniques like, by using the non-disclosure agreement (QuickBooks, 2018).
Part (d)
The clients should use various, surprizing secret phrases for each of its business
associated records. The clients might not use any kind of business which is linked with the
passwords, of their own records. The passwords shouldn’t be imparted to anybody even the
associates or the managers (Martins, 2018).
3
COIT20262 Assignment 2 Submission Term 2, 2018
Part (e) Attack-1
Two-factor Authentication
The two-factor authentication could access the needs for the ownership of a particular
device. Then, it would be less useful for utilizing the normal passwords or the restricted
hardware. Such a method will be charged for providing high system security or data security
and such a security level can always be used easily (Community.jisc.ac.uk, 2018).
Part (e) Attack-2
Authentication that is federated.
The actualizing is unified, with the use of focal verification server, contains some
security advantages. It reduces the frameworks’ quantity, where the passwords secured, as
well as must guarantee that the protected conventions will be used for exchanging them over
the systems. Declining the password’s quantity can ensure the clients to recall negative
impacts and should use unique as well as secure passwords. Anyhow, the same password or
expression will now be able to offer access of different frameworks, it is significant and
highly important for anchoring the focal validation server, as well as for the clients to be
aware against phishing.
Part (f)
The security token denotes the small hardware device, which is utilized for approving
the access of the system properties. Such a security token provide additional level of
confirmation via, strategy that is known as the two-factor validation. This validation contains
separate PIN which are used for approving the particular task’s proprietor to show the
number that extraordinarily differentiates the client for administration and to enable sign in.
The security tokens refer to the physical question. For example, the key coxcomb is viable,
then is also simple for conveying, and similarly simple for securing. Irrespective of whether
the key coxcomb comes under the incorrect hands, however, it cannot be used for obtaining
the entrance on the grounds which is needed by the PIN.
Part (g) USB token
The USB security token provides security directors with the popular though,
"something you have" along with "something you know." Next, it lets to have a security for
various login certifications. Thus, the clients are required for recollecting only the single
password or the PIN for getting to the VPN, arranges the login, then deals and advertises the
intranet or the worker Internet webpage, makes the USB token an interesting verification
arrangement (SearchSecurity, 2018).
4
Part (e) Attack-1
Two-factor Authentication
The two-factor authentication could access the needs for the ownership of a particular
device. Then, it would be less useful for utilizing the normal passwords or the restricted
hardware. Such a method will be charged for providing high system security or data security
and such a security level can always be used easily (Community.jisc.ac.uk, 2018).
Part (e) Attack-2
Authentication that is federated.
The actualizing is unified, with the use of focal verification server, contains some
security advantages. It reduces the frameworks’ quantity, where the passwords secured, as
well as must guarantee that the protected conventions will be used for exchanging them over
the systems. Declining the password’s quantity can ensure the clients to recall negative
impacts and should use unique as well as secure passwords. Anyhow, the same password or
expression will now be able to offer access of different frameworks, it is significant and
highly important for anchoring the focal validation server, as well as for the clients to be
aware against phishing.
Part (f)
The security token denotes the small hardware device, which is utilized for approving
the access of the system properties. Such a security token provide additional level of
confirmation via, strategy that is known as the two-factor validation. This validation contains
separate PIN which are used for approving the particular task’s proprietor to show the
number that extraordinarily differentiates the client for administration and to enable sign in.
The security tokens refer to the physical question. For example, the key coxcomb is viable,
then is also simple for conveying, and similarly simple for securing. Irrespective of whether
the key coxcomb comes under the incorrect hands, however, it cannot be used for obtaining
the entrance on the grounds which is needed by the PIN.
Part (g) USB token
The USB security token provides security directors with the popular though,
"something you have" along with "something you know." Next, it lets to have a security for
various login certifications. Thus, the clients are required for recollecting only the single
password or the PIN for getting to the VPN, arranges the login, then deals and advertises the
intranet or the worker Internet webpage, makes the USB token an interesting verification
arrangement (SearchSecurity, 2018).
4
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
COIT20262 Assignment 2 Submission Term 2, 2018
Part (g) Fingerprint scan
In various application, the high usage of fingerprint authentication has resulted into a
skilled validation techniques to provide for the customers. The unique finger impression
scanners is compact, cheap and easy for incorporating. Moreover, fingerprinting is and
effective validation which is also popular.
Part (g) VR
In PC frameworks, the VR (voice recognition) improvement transforms over the
discourse directly to the electronic content. The VR guarantees enhancing the effectiveness as
well as it diminishes the interpretation postponements along with the costs. It also explores
the utility and the price adequacy of the focused VR deployment in different applications
(WH, 2018).
5
Part (g) Fingerprint scan
In various application, the high usage of fingerprint authentication has resulted into a
skilled validation techniques to provide for the customers. The unique finger impression
scanners is compact, cheap and easy for incorporating. Moreover, fingerprinting is and
effective validation which is also popular.
Part (g) VR
In PC frameworks, the VR (voice recognition) improvement transforms over the
discourse directly to the electronic content. The VR guarantees enhancing the effectiveness as
well as it diminishes the interpretation postponements along with the costs. It also explores
the utility and the price adequacy of the focused VR deployment in different applications
(WH, 2018).
5
COIT20262 Assignment 2 Submission Term 2, 2018
2. Firewall and IP tables
It is a task which uses virtual network and IP tables for creating the firewall. The firewall IP
tables’ files are presented as follows (nixCraft, 2018),
3. HTTPS & Certification
It is a task which is utilized for studying the HTTPs and related certifications with the
help of the virtual network. Here, there is a need of setting up the web server which supports
HTTPS. It contains the below mentioned phases:
 1st phase – Setup of the Topology
o Topology 7 must be created by the user in the virtual network.
o Next, deployment of MyUni website should take place.
o Then, the domain name must be changed to, www.12051157.edu.
 2nd phase –Creating certificates.
 3rd phase –Configuring HTTPs.
 4th phase – This includes Testing.
ï‚· 5th phase - This includes Analysis.
Part (e)
If a site contains legitimate testament, then it means that the endorsement professional
has identified the method for checking whether the web delivery contains the place with the
organization or not. When the URL is composed or the connection is taken for a secure site,
the program checks the authentication to have the following qualities such as, does the site
address coordinate well with the location on the endorsement, which is marked by certificate
authority (CA) which is perceived by the program as the "trusted" specialist. SSL and TLS
are utilized for using the deviated public key infrastructure framework. It even uses a couple
of keys namely, public key and private key, then it encrypts the data using the public key
infrastructure that should be decoded with the help of the private key. When a webpage is
visited, the website shows its open key which the program supports and utilizes for
6
2. Firewall and IP tables
It is a task which uses virtual network and IP tables for creating the firewall. The firewall IP
tables’ files are presented as follows (nixCraft, 2018),
3. HTTPS & Certification
It is a task which is utilized for studying the HTTPs and related certifications with the
help of the virtual network. Here, there is a need of setting up the web server which supports
HTTPS. It contains the below mentioned phases:
 1st phase – Setup of the Topology
o Topology 7 must be created by the user in the virtual network.
o Next, deployment of MyUni website should take place.
o Then, the domain name must be changed to, www.12051157.edu.
 2nd phase –Creating certificates.
 3rd phase –Configuring HTTPs.
 4th phase – This includes Testing.
ï‚· 5th phase - This includes Analysis.
Part (e)
If a site contains legitimate testament, then it means that the endorsement professional
has identified the method for checking whether the web delivery contains the place with the
organization or not. When the URL is composed or the connection is taken for a secure site,
the program checks the authentication to have the following qualities such as, does the site
address coordinate well with the location on the endorsement, which is marked by certificate
authority (CA) which is perceived by the program as the "trusted" specialist. SSL and TLS
are utilized for using the deviated public key infrastructure framework. It even uses a couple
of keys namely, public key and private key, then it encrypts the data using the public key
infrastructure that should be decoded with the help of the private key. When a webpage is
visited, the website shows its open key which the program supports and utilizes for
6
COIT20262 Assignment 2 Submission Term 2, 2018
scrambling the sent information (between the program and server) and only the server or the
website contains the private key that can unscramble the information.
Part (f)
The SSL endorsement refers to the method for tying the cryptographic key to benefit the
organizations. While using it legitimately, it promises web clients that the webpage can be
visited. Additionally, the SSL certificate contains a secure http (HTTPS) on the website,
similarly anchoring exchanges various types. The self-signed certificate are prepared to test
the objectives and the inward LAN-just administrations. Both these cases, should be
transmitted to fulfil, when the server programming acknowledges the self-marked
authentication. Luckily, the self-marked certificates can be made, thus it results the server
programming not to work with the self-marked authentication (SearchSecurity, 2018).
Part (g)
The phishing attack refers to a harmful programmer who tries trapping the casualty
for ensuring trust for the dependable, and for the client to finish the particular task.
7
scrambling the sent information (between the program and server) and only the server or the
website contains the private key that can unscramble the information.
Part (f)
The SSL endorsement refers to the method for tying the cryptographic key to benefit the
organizations. While using it legitimately, it promises web clients that the webpage can be
visited. Additionally, the SSL certificate contains a secure http (HTTPS) on the website,
similarly anchoring exchanges various types. The self-signed certificate are prepared to test
the objectives and the inward LAN-just administrations. Both these cases, should be
transmitted to fulfil, when the server programming acknowledges the self-marked
authentication. Luckily, the self-marked certificates can be made, thus it results the server
programming not to work with the self-marked authentication (SearchSecurity, 2018).
Part (g)
The phishing attack refers to a harmful programmer who tries trapping the casualty
for ensuring trust for the dependable, and for the client to finish the particular task.
7
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
COIT20262 Assignment 2 Submission Term 2, 2018
4. WiFi Security
Part (a)
High number of broadband switches as well as various wireless passages that
incorporates the discretionary component known as, MAC address filtering, or hardware
address filtering. It is believed to enhance the security with constraining gadgets which joins
the system. Prior to offering any kind of chance for the gadget to join the system, the MAC
address of the device is against the rundown of the endorsed addresses, which is checked by
the switch. If the location of the customer matches with either one of the switch's rundown,
then of course get to is permitted. Basically, it hinders to join.
Part (b)
The wireless encryption and verification allows the clients to settle with an
appropriate selection such as, the type of security for executing their wireless system. For
fixing the problems with WEP, the Wi-Fi Protected Access (WPA) was developed, as it helps
the clients in refreshing the gear using the firmware refresh other than purchasing it freshly.
The WPA incorporates another type framework key known as, TKIP (Temporal Key
Integrity Protocol), which for each wireless edge builds a unique encryption key, to
encourage highly secure connection. If the TKIP is defenceless to the attacks of the wireless
then it will never think of having the standards of an enterprise. At present, WPA2 refers to
the highly secure standard which uses AES (Advanced Encryption Standard) and for
validation it uses a pre-shared key. WPA2 is in turn is good with TKIP for permitting the
interoperability using the inheritance devices. CCMP encryption convention is used by AES
that is a highly justified calculation to have trustworthy messages and classifications. The
SSIDs are arranged as WPA2, thus it is recommended to utilize a mixture of TKIP as well as
the AES encryption.
Part (c)
Wi-Fi switches are mainly used for controlling the security settings of the encryption
and the confirmations. Also it allows the users to empower the system control access as well
as it indicates the protection level of the information which the user sends via air. The WPA2
personal i.e., AES refers to a security type and it is provided by the items if Wi-Fi for all the
employments. It contains enabling WPA2 for creating particular strong passwords and it
requires personal decision referred as, WPA mode or the WPA mixed mode. Actually, the
8
4. WiFi Security
Part (a)
High number of broadband switches as well as various wireless passages that
incorporates the discretionary component known as, MAC address filtering, or hardware
address filtering. It is believed to enhance the security with constraining gadgets which joins
the system. Prior to offering any kind of chance for the gadget to join the system, the MAC
address of the device is against the rundown of the endorsed addresses, which is checked by
the switch. If the location of the customer matches with either one of the switch's rundown,
then of course get to is permitted. Basically, it hinders to join.
Part (b)
The wireless encryption and verification allows the clients to settle with an
appropriate selection such as, the type of security for executing their wireless system. For
fixing the problems with WEP, the Wi-Fi Protected Access (WPA) was developed, as it helps
the clients in refreshing the gear using the firmware refresh other than purchasing it freshly.
The WPA incorporates another type framework key known as, TKIP (Temporal Key
Integrity Protocol), which for each wireless edge builds a unique encryption key, to
encourage highly secure connection. If the TKIP is defenceless to the attacks of the wireless
then it will never think of having the standards of an enterprise. At present, WPA2 refers to
the highly secure standard which uses AES (Advanced Encryption Standard) and for
validation it uses a pre-shared key. WPA2 is in turn is good with TKIP for permitting the
interoperability using the inheritance devices. CCMP encryption convention is used by AES
that is a highly justified calculation to have trustworthy messages and classifications. The
SSIDs are arranged as WPA2, thus it is recommended to utilize a mixture of TKIP as well as
the AES encryption.
Part (c)
Wi-Fi switches are mainly used for controlling the security settings of the encryption
and the confirmations. Also it allows the users to empower the system control access as well
as it indicates the protection level of the information which the user sends via air. The WPA2
personal i.e., AES refers to a security type and it is provided by the items if Wi-Fi for all the
employments. It contains enabling WPA2 for creating particular strong passwords and it
requires personal decision referred as, WPA mode or the WPA mixed mode. Actually, the
8
COIT20262 Assignment 2 Submission Term 2, 2018
WPA mode is utilized for using highly grounded WPA2 AES encryption. Also it enables
devices which are highly established for establishing WPA encryption’s top level.
References
Bayometric. (2018). 12 Reasons to Consider Fingerprint Authentication. [online] Available
at: https://www.bayometric.com/12-reasons-consider-fingerprint-authentication/ [Accessed
23 Sep. 2018].
Community.jisc.ac.uk. (2018). Passwords: Threats and Counter-Measures | Jisc community.
[online] Available at: https://community.jisc.ac.uk/library/janet-services-documentation/
passwords-threats-and-counter-measures [Accessed 23 Sep. 2018].
Martins, F. (2018). Creating a Strong Password Policy | DigiCert Blog. [online] DigiCert.
Available at: https://www.digicert.com/blog/creating-password-policy-best-practices/
[Accessed 23 Sep. 2018].
nixCraft. (2018). Linux: 25 Iptables Netfilter Firewall Examples For New SysAdmins -
nixCraft. [online] Available at: https://www.cyberciti.biz/tips/linux-iptables-examples.html
[Accessed 23 Sep. 2018].
QuickBooks. (2018). Understanding the Different Forms of Intellectual Property. [online]
Available at: https://quickbooks.intuit.com/r/protecting-your-idea/understanding-different-
forms-intellectual-property/ [Accessed 23 Sep. 2018].
SearchSecurity. (2018). USB security tokens may not be as secure as you think. [online]
Available at: https://searchsecurity.techtarget.com/USB-security-tokens-may-not-be-as-
secure-as-you-think [Accessed 23 Sep. 2018].
SearchSecurity. (2018). What is security token (authentication token)? - Definition from
WhatIs.com. [online] Available at: https://searchsecurity.techtarget.com/definition/security-
token [Accessed 23 Sep. 2018].
WH, H. (2018). The utility and cost effectiveness of voice recognition technology
in surgical pathology. - PubMed - NCBI. [online] Ncbi.nlm.nih.gov. Available at:
https://www.ncbi.nlm.nih.gov/pubmed/12011262 [Accessed 23 Sep. 2018].
9
WPA mode is utilized for using highly grounded WPA2 AES encryption. Also it enables
devices which are highly established for establishing WPA encryption’s top level.
References
Bayometric. (2018). 12 Reasons to Consider Fingerprint Authentication. [online] Available
at: https://www.bayometric.com/12-reasons-consider-fingerprint-authentication/ [Accessed
23 Sep. 2018].
Community.jisc.ac.uk. (2018). Passwords: Threats and Counter-Measures | Jisc community.
[online] Available at: https://community.jisc.ac.uk/library/janet-services-documentation/
passwords-threats-and-counter-measures [Accessed 23 Sep. 2018].
Martins, F. (2018). Creating a Strong Password Policy | DigiCert Blog. [online] DigiCert.
Available at: https://www.digicert.com/blog/creating-password-policy-best-practices/
[Accessed 23 Sep. 2018].
nixCraft. (2018). Linux: 25 Iptables Netfilter Firewall Examples For New SysAdmins -
nixCraft. [online] Available at: https://www.cyberciti.biz/tips/linux-iptables-examples.html
[Accessed 23 Sep. 2018].
QuickBooks. (2018). Understanding the Different Forms of Intellectual Property. [online]
Available at: https://quickbooks.intuit.com/r/protecting-your-idea/understanding-different-
forms-intellectual-property/ [Accessed 23 Sep. 2018].
SearchSecurity. (2018). USB security tokens may not be as secure as you think. [online]
Available at: https://searchsecurity.techtarget.com/USB-security-tokens-may-not-be-as-
secure-as-you-think [Accessed 23 Sep. 2018].
SearchSecurity. (2018). What is security token (authentication token)? - Definition from
WhatIs.com. [online] Available at: https://searchsecurity.techtarget.com/definition/security-
token [Accessed 23 Sep. 2018].
WH, H. (2018). The utility and cost effectiveness of voice recognition technology
in surgical pathology. - PubMed - NCBI. [online] Ncbi.nlm.nih.gov. Available at:
https://www.ncbi.nlm.nih.gov/pubmed/12011262 [Accessed 23 Sep. 2018].
9
COIT20262 Assignment 2 Submission Term 2, 2018
10
10
1 out of 10
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
 +13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024  |  Zucol Services PVT LTD  |  All rights reserved.