Ask a question from expert

Ask now

Advanced System and Network Security | Assignment

18 Pages4395 Words360 Views
   

Added on  2020-03-16

Advanced System and Network Security | Assignment

   Added on 2020-03-16

BookmarkShareRelated Documents
Running head: Advanced System and Network Security1Advanced System and Network SecurityNameAffiliate Institution
Advanced System and Network Security | Assignment_1
Running head: Advanced System and Network Security2Table of ContentsQuestion 1........................................................................................................................................3Question 2........................................................................................................................................5Question 3........................................................................................................................................8Question 4......................................................................................................................................10Question 5......................................................................................................................................13Question 6......................................................................................................................................14References......................................................................................................................................16
Advanced System and Network Security | Assignment_2
Running head: Advanced System and Network Security3Question 1Outline a security architecture for the distributed environment shown below, where userswish to access enterprise services from various remote locations such as home, airport andother branch offices.a) Analyze the security threats that can arise in such an environment. State any assumptionsthat you are making.SolutionPhysical threatsUsing distributed environment such as cloud computing is not an assurance that denial of serviceattacks cannot occur. When you work from a different location apart from the office, there areother external factors that ca lead to denial of service, they include pets, children who candestroy, hide or interfere with your work station at home. There doesn’t exist a solution to thistype of DOS unless if the organization issues devices like iPhone that supports feature such as“find my iPhone”. (Stewart, Chapple & Gibson, 2012). Cloud computing cannot totally prevent critical information from being transferred to devicesthat are not appropriately secured. To stop this, some extra controls need to be put in place.Use of emails by employees working remotely has enhanced loss of critical and confidential dataover time. In this particular generation, nobody really wants to utilize the secured browserbecause of its unfriendly interface. Sometimes the system admin forgets that employees workingoffline still have access to the data in their inboxes even after data center lock down in case of anattack.Sometimes the devices that the employees are using when working offline have the capability tobe wiped remotely. When this happens some of the crucial personal data that the employee hadstored there will be deleted permanently. (Wang, 2010).b) Specify the types of security services that would be needed to counteract this securitythreats and what type of security mechanisms could support these services.Solution
Advanced System and Network Security | Assignment_3
Running head: Advanced System and Network Security4Securing Multiple DevicesSecurity of the devices the remote employee is using is very critical. These devices are veryvulnerable as they can easily get lost or stolen and sensitive data could land in to the wrongperson if not well handled. (Zia, Zomaya, Varadharajan & Mao, 2013).The following are some of the ways to enable employees to work securely remotely. It is important to always use enhanced security software in the end devices used by the remoteemployees as malicious software that steals data always get in to the devices via emails andwhen browsing. It is recommended to use applications and interfaces provided by the cloud vendor. This ensurethat security of data is of high level since the vendor has implemented features to encrypt datawhile being transmitted from the remote servers to the organization’s intranet. (Morana &UcedaVelez, 2011).Implementing virtual private network can help keep the connections and internet secured. VPNprovided by a third party vendor would have implemented all the security patches that arerequire to continuously check the network for any malicious activity. The company should always make sure that strict procedures on data access, usability andmodification have been clearly stated to the employees opting to work remotely. Theorganization should clearly outline who have access to the data center and clearly defines theprotocols to be used during this access. (Shostack, 2014).Detection of packet sniffers to identify if hackers have had root access to the computer system.Packet sniffers are normally used by hackers to gather information transmitted by anorganization through the internet. It is important to train employees on the characteristics of a denial of service attacks. If this is notdone, hackers are very cunning and can trick these employees into revealing their logincredentials.If an employee account gets compromised it is important to immediately block that account fromfurther access, that is, suspend the account until further notice. This will stop data loss ormodification. (In Chang, In Ramachandran, In Walters & In Wills, 2017).
Advanced System and Network Security | Assignment_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Advanced Security and Network Assignment
|19
|2775
|84

Security Threats in Cloud Computing
|4
|668
|210

IS Security and Risk Management Assignment PDF
|10
|3410
|84

Assignment on Network and Security
|9
|1938
|35

Network Security and Types of Security Threats and Attacks in Information Technology
|8
|2577
|274

Cybersecurity and its Importance to ABCT
|5
|959
|422