Cyber Security - Assignment PDF

Verified

Added on  2021/10/26

|8
|2242
|71
AI Summary
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running Head: CYBER SECURITY
Question and Answers of Cyber Security
Name of the student:
Name of the university:
Author note:
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1CYBER SECURITY
1. Analyse how Intrusion Detection System (IDS) can resolve security issues in a
computer network.
Intrusion Detection System is used to resolve computer network security issues. The
attackers mainly target independent platforms to perform network intrusions. The intrusion
detection system assess access patterns to the network by the intruders and detects their
behaviour. The system analyses and monitors the network so that it can detect any signs of
security issues. There are two types of intrusion detection technique that are used to detect
unusual activities in the network. They are host-based and network-based using source of data.
Host based intrusion detection system is developed on individual computer for detecting attacks
and network based IDS are developed on raw network data (Quinn & Nadeau, 2015).
Additionally, security violation can also be detected in information systems. It prevents
exploitation of protocol and software vulnerabilities by intruders. Intrusion Detection System
uses various classifiers to detect access patterns to the network.
2. Analyse and explain footprinting in network security.
Data of a specific network environment is accumulated with the help of footprinting. The
system vulnerabilities are revealed by the process of footprinting. The objective and location of
intrusion are determined at the beginning of the process. After that non-intrusive method is used
to gather information about the organisation. The attackers use various technologies and tools to
gather these information that proves to be helpful to hackers. The pre-attack phase is referred as
footprinting that is the stage before performing the actual attack. The tools that are used for
footprinting are traceroute, Nmap and nslookup. The techniques of footprinting that are used are
network queries, DNS queries, ping sweeps, port scanning, World Wide Web spidering and
network enumeration. Information about target system is gained by the hacker through this
Document Page
2CYBER SECURITY
process. Internet is surfed by the process of crawling to get information about target. Another
web application that is used to get information about target website is WHOIS.
3. Evaluate how different tools can be used for footprinting with examples.
The tools that are used for footprinting are Sam Spade, SuperScan, Nmap and TcpView.
DNS interrogation is done with the help of Sam Spade graphical tool. Sam Spade is a key
security tool that has the features like Advanced DNS, Zone transfer, Scan addresses, Crawl
Website and SMTP relay check. SuperScan tool is used to do TCP port scanning and IP address
scanning (Czyz et al., 2016). The tool can scan the selected ports as well as all ports. SuperScan
is a powerful and smart tool that is used for footprinting. Nmap tool offers the added advantage
of being used in both UNIX/Linux and Windows operating systems. OS identification and ping
sweeps can be done through this tool. Another free tool that is used in Windows to monitor all
open UDP and TCP ports on local computer is TcpView. TcpView is not regarded as Intrusion
Detection System however, gives a picture of all happenings in the computer ports and
automatically refreshes them. As a result the user can see all the happenings.
4. Explain the main function of a firewall in network security. Analyse different kinds
of firewall in brief.
The main function of firewall is to block traffic that is intended to particular IP addresses
and server ports. The untrusted traffic are kept away from reaching incoming ports by the use of
firewalls. The two network interfaces that are used in Firewall are one for external side and the
other for internal side. The unwanted traffic cannot pass from external side to the internal side of
firewall interface (Luizelli et al., 2015). The trusted traffic are used to transverse from the
external interface of the firewall to internal interface of the firewall. Firewall allows only those
Document Page
3CYBER SECURITY
users to access the network who have a valid username and password. A secure connection is
established between the network and the user by the use of firewall. Firewalls additionally help
to eliminate Denial of Service attacks. Denial of Service (DOS) attack takes place when the
attacker tries to flood the network with huge amount of traffic that shut down the server. The
firewall assess traffic flow thereby resisting the network from DOS attack. Most companies use
two firewalls to protect its network. One firewall is connected to the internet and the other to the
internal network.
5. Evaluate and explain the selection criteria of a next generation firewall in details.
The common features that are provided by almost all type of firewalls are intrusion
detection systems, wireless management systems, intrusion prevention systems, quality of
service and application control systems. Huge number of next generation firewalls are available
in the market that provides the same features (Halpern & Pignataro, 2015). Therefore, to
differentiate among them selection criteria should be followed. They include platform type,
feature set, manageability, price and support provided. Most of the next generation firewalls are
either hardware, software or cloud based. The hardware based next generation firewalls can be
applied best to large and middle sized enterprise. Software based next generation firewalls finds
best application in small sized enterprise that consists of simple network infrastructures (Chen et
al., 2015). The cloud-based next generation firewalls finds best application in highly
decentralized enterprise. Additionally, the next generation firewalls should have features such as
inline deep packet inspection, website filtering, security of mobile devices, prevention of data
loss and threat intelligence. The performance and the quality of service of NGFWs needs to be
considered while selecting amongst them. System configuration should be considered before
selecting them. The system should be flexible and comprehensive and easy to manage. The price
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
4CYBER SECURITY
of different NGFW varies considerably with vendor. The price ranges from $599 to $80,000
(Kizza, J. M. (2013). Depending on the type of NGFW to be purchased the price is selected. The
support system of the firewalls are also considered as a selecting criteria.
6. Evaluate the common network security problems and their solutions.
The common security problems that are encountered by a network are Network card and
IP address issues, absence of connectivity, slow connectivity as well as problems that are caused
by firewall status. In a number of situation two computers are given the same IP address
therefore the network face connectivity issues while linking with the computers. The problem
can be resolved by changing the IP address of one computer (Balmer et al., 2014). The network
card functioning will be solved by checking functionality of the network card. In a network, a
number of computer remains undetectable. To resolve this issue all the computers must be within
the same subnet consisting of individual IP addresses. The problem of slow connectivity should
be solved by sending bulky files in the form of zip files (Liang & Xiao, 2013). The firewall
issues can be solved by setting strong firewall settings that will allow computers to share data.
7. Analyse and explain why network security is crucial for any business organisation.
The main reason that makes network security crucial for any business organisation is
protecting company’s assets. Information of company is considered as asset to the company that
needs to be secured. There are a large number of tangible assets in an organisation that makes it
crucial to protect them. The company should take care of the fact that information is not accessed
by unknown user. This can be achieved by limiting the access of users to the network. Every
organisation has the responsibility of developing their own policy that complies with the
regulatory requirements. In businesses like e-commerce and financial services network security
Document Page
5CYBER SECURITY
is of prime importance as they deal with sensitive data like customer bank account number,
credit card details and so on.
8. Analyse the scenario of TIA Software Company and create your own network
security policies to protect network users and computers from the hackers.
The policies to protect network from hackers can be divided into general, responsibility,
copyright and system vulnerability policies. The following points will describe the policies in
details:
1 General:
a. Access to organisation network should be limited to authorised users.
b. The organisation should restrict and limit the rights to access the network at its
sole discretion. The policy also reserves the right to check network configuration
and take action against individual who do not comply with the policy.
2 Responsibility:
a. The policies that are implemented should be monitored on a daily basis.
b. Security audits as well as security scans should be performed according to the
policy.
c. The users of the network should be educated with the ethical use of computers
and about network security.
d. Strong encryption and authentication techniques are required to protect the
network from security issues.
3 Copyright policies:
a. Plagiarism, authorial integrity, and privacy invasion should be eliminated as per
this policy.
Document Page
6CYBER SECURITY
References:
Balmer, M. L., Slack, E., De Gottardi, A., Lawson, M. A., Hapfelmeier, S., Miele, L., ... &
Bernsmeier, C. (2014). The liver may act as a firewall mediating mutualism between the
host and its gut commensal microbiota. Science translational medicine, 6(237), 237ra66-
237ra66.
Chen, G., Gong, Y., Xiao, P., & Chambers, J. A. (2015). Physical layer network security in the
full-duplex relay system. IEEE transactions on information forensics and security, 10(3),
574-583.
Czyz, J., Luckie, M. J., Allman, M., & Bailey, M. (2016, February). Don't Forget to Lock the
Back Door! A Characterization of IPv6 Network Security Policy. In NDSS.
Halpern, J., & Pignataro, C. (2015). Service function chaining (sfc) architecture (No. RFC 7665).
Jin, X., Li, L. E., Vanbever, L., & Rexford, J. (2013, December). Softcell: Scalable and flexible
cellular core network architecture. In Proceedings of the ninth ACM conference on
Emerging networking experiments and technologies (pp. 163-174). ACM.
Kizza, J. M. (2013). Guide to computer network security (pp. 387-411). London: Springer.
Liang, X., & Xiao, Y. (2013). Game theory for network security. IEEE Communications Surveys
& Tutorials, 15(1), 472-486.
Luizelli, M. C., Bays, L. R., Buriol, L. S., Barcellos, M. P., & Gaspary, L. P. (2015, May).
Piecing together the NFV provisioning puzzle: Efficient placement and chaining of
virtual network functions. In Integrated Network Management (IM), 2015 IFIP/IEEE
International Symposium on (pp. 98-106). IEEE.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7CYBER SECURITY
Manshaei, M. H., Zhu, Q., Alpcan, T., Bacşar, T., & Hubaux, J. P. (2013). Game theory meets
network security and privacy. ACM Computing Surveys (CSUR), 45(3), 25.
Manshaei, M. H., Zhu, Q., Alpcan, T., Bacşar, T., & Hubaux, J. P. (2013). Game theory meets
network security and privacy. ACM Computing Surveys (CSUR), 45(3), 25.
Quinn, P., & Nadeau, T. (2015). Problem statement for service function chaining (No. RFC
7498).
Scott-Hayward, S., O'Callaghan, G., & Sezer, S. (2013, November). SDN security: A survey.
In Future Networks and Services (SDN4FNS), 2013 IEEE SDN For (pp. 1-7). IEEE.
Yu, T., Sekar, V., Seshan, S., Agarwal, Y., & Xu, C. (2015, November). Handling a trillion
(unfixable) flaws on a billion devices: Rethinking network security for the internet-of-
things. In Proceedings of the 14th ACM Workshop on Hot Topics in Networks (p. 5).
ACM.
chevron_up_icon
1 out of 8
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]