A Report on Network Security and Access Control TopICS
VerifiedAdded on 2022/10/19
|17
|3732
|467
AI Summary
ICT301 ADVANCED NETWORK TOPICS ICT301 ADVANCED NETWORK TOPICS 4 4 ICT301 ADVANCED NETWORK TOPICS ICT301 ADVANCED NETWORK TOPICS Name of the Student Name of the University Author Note: Project Background 2 Network security 3 Access control and authentication 4 Business Continuity 6 Risk management 7 Conclusion 10 Recommendation 11 References 13 Project Background The following report is all about Fencing limited, which is a small organization based in Wollongong, NSW. Network security A firewall can be used for protecting the network so that all the client
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: ICT301 ADVANCED NETWORK TOPICS
ICT301 ADVANCED NETWORK TOPICS
Name of the Student
Name of the University
Author Note:
ICT301 ADVANCED NETWORK TOPICS
Name of the Student
Name of the University
Author Note:
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1ICT301 ADVANCED NETWORK TOPICS
Table of Contents
Project Background.............................................................................................................2
Network security..................................................................................................................3
Access control and authentication.......................................................................................4
Business Continuity.............................................................................................................6
Risk management.................................................................................................................7
Conclusion.........................................................................................................................10
Recommendation...............................................................................................................11
References..........................................................................................................................13
Table of Contents
Project Background.............................................................................................................2
Network security..................................................................................................................3
Access control and authentication.......................................................................................4
Business Continuity.............................................................................................................6
Risk management.................................................................................................................7
Conclusion.........................................................................................................................10
Recommendation...............................................................................................................11
References..........................................................................................................................13
2ICT301 ADVANCED NETWORK TOPICS
Project Background
The following report is all about Fencing limited, which is a small organization based in
Wollongong, NSW. The employee strength of this organization is found to be 250 people. The
main business of this organization is all about selling various fencing materials for the
construction sites, mining and lastly manufacturing industry (Sivaraman et al. 2015). The
organization is found to be nimble which can easily move new market if there are certain number
of opportunities. Fencing limited can easily manage their inventory and allow certain customers
to buy product from the website.
Scope
To improve the network capabilities and certain initiatives for optimizing the IT
capability.
To align with the business needs which will help this organization to understand digital
transformation and providing business value.
Project Goal
The mere focus of this project is all about securing the network in the upcoming days. It
is all about keeping the whole organization information much secure (Pawar and Anuradha
2015). Most of the employees of this organization analyze that their present system is adequate
for their use. But the help of faster and agile secure network will help in facilitating business.
Project Background
The following report is all about Fencing limited, which is a small organization based in
Wollongong, NSW. The employee strength of this organization is found to be 250 people. The
main business of this organization is all about selling various fencing materials for the
construction sites, mining and lastly manufacturing industry (Sivaraman et al. 2015). The
organization is found to be nimble which can easily move new market if there are certain number
of opportunities. Fencing limited can easily manage their inventory and allow certain customers
to buy product from the website.
Scope
To improve the network capabilities and certain initiatives for optimizing the IT
capability.
To align with the business needs which will help this organization to understand digital
transformation and providing business value.
Project Goal
The mere focus of this project is all about securing the network in the upcoming days. It
is all about keeping the whole organization information much secure (Pawar and Anuradha
2015). Most of the employees of this organization analyze that their present system is adequate
for their use. But the help of faster and agile secure network will help in facilitating business.
3ICT301 ADVANCED NETWORK TOPICS
Strategic alignment of Project
It will help the employee to go beyond their sales target which is the main target of
fencing limited management. The project is all about building a secure system which will
comply with the new regulation. The project comes up with high level of organizational interest
of Fencing limited in this project.
In the coming pages of the report, an idea has been provided with respect to the network
security of this organization. The next section deals with access control and authentication of this
new system. An overview has been given with respect to business continuity and risk
management for this project. The last part of the report deals with list of recommendation.
Network security
A firewall can be used for protecting the network so that all the client and organization
information is safe. Firewall is just like a filter in between two that is system and network. There
are large number of ways by which firewall can be used for filtering out information (Acemoglu,
Malekian and Ozdaglar 2016). The methods work aim to work at various layer of the network.
Some of the basic function of a firewall is discussed below like
Packet filtering: All the basic firewall software makes use of earlier-defined security
rules which is needed for creating filters. If the incoming packet data containing information is
anyhow flagged by this filter, then it is not completely allowed through it (Duffield 2017).
Packets which passes through the filter are send to the system and all other packets are
completely discarded.
Strategic alignment of Project
It will help the employee to go beyond their sales target which is the main target of
fencing limited management. The project is all about building a secure system which will
comply with the new regulation. The project comes up with high level of organizational interest
of Fencing limited in this project.
In the coming pages of the report, an idea has been provided with respect to the network
security of this organization. The next section deals with access control and authentication of this
new system. An overview has been given with respect to business continuity and risk
management for this project. The last part of the report deals with list of recommendation.
Network security
A firewall can be used for protecting the network so that all the client and organization
information is safe. Firewall is just like a filter in between two that is system and network. There
are large number of ways by which firewall can be used for filtering out information (Acemoglu,
Malekian and Ozdaglar 2016). The methods work aim to work at various layer of the network.
Some of the basic function of a firewall is discussed below like
Packet filtering: All the basic firewall software makes use of earlier-defined security
rules which is needed for creating filters. If the incoming packet data containing information is
anyhow flagged by this filter, then it is not completely allowed through it (Duffield 2017).
Packets which passes through the filter are send to the system and all other packets are
completely discarded.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
4ICT301 ADVANCED NETWORK TOPICS
Proxy Service: Proxy server of firewall is considered to be an application which works in
between the given system. All the required information is collected from internet are sent to
firewall and sent to required system. It generally operates in the application layer of firewall
where connection in between the two ends is required to conduct session by the help of proxy
(Chen et al. 2015). It merely operates by setting and running a given process on firewall if it is
running on the end host. All the centralized information is transferred for any activity like
firewall scanning.
Stateful inspection: It is the updated method of scanning firewall which does not depend
on intensive examination of packets. It aims to hold certain number of attributes for each
connection for database that has trusted information. The given attributes are defined as state of
connection which includes the detail of IP addresses and Port (Aljuhani and Alharbi 2017). It
merely includes connection and sequence number for packet which is being sent. The firewall
merely compares that information is being sent for copying relevant and transfer of required
information from databases.
Outdoor cameras can be great initiative for keeping a track of person that are visiting the
main office of Fencing limited on Prince Highway. But most of the burglars do not come from
the front door instead of that they make use of blind spot for entering into the building (Yu et al.,
2015). The organization should go for DAT security packages which has been designed for
securing offices. The system provides a wide range of option like basic bells and whistles for
customizing a system which will help in protecting the system. The system aims to provide a
range of benefits like
Monitoring on 24/7 basis.
Equipment’s for security monitoring
Proxy Service: Proxy server of firewall is considered to be an application which works in
between the given system. All the required information is collected from internet are sent to
firewall and sent to required system. It generally operates in the application layer of firewall
where connection in between the two ends is required to conduct session by the help of proxy
(Chen et al. 2015). It merely operates by setting and running a given process on firewall if it is
running on the end host. All the centralized information is transferred for any activity like
firewall scanning.
Stateful inspection: It is the updated method of scanning firewall which does not depend
on intensive examination of packets. It aims to hold certain number of attributes for each
connection for database that has trusted information. The given attributes are defined as state of
connection which includes the detail of IP addresses and Port (Aljuhani and Alharbi 2017). It
merely includes connection and sequence number for packet which is being sent. The firewall
merely compares that information is being sent for copying relevant and transfer of required
information from databases.
Outdoor cameras can be great initiative for keeping a track of person that are visiting the
main office of Fencing limited on Prince Highway. But most of the burglars do not come from
the front door instead of that they make use of blind spot for entering into the building (Yu et al.,
2015). The organization should go for DAT security packages which has been designed for
securing offices. The system provides a wide range of option like basic bells and whistles for
customizing a system which will help in protecting the system. The system aims to provide a
range of benefits like
Monitoring on 24/7 basis.
Equipment’s for security monitoring
5ICT301 ADVANCED NETWORK TOPICS
Installation by professionals
Remote alarm and disarm
Customizable alerts, automation and schedules
Security cameras
Live stream from mobile devices
Recording and saving video clips.
Access control and authentication
Network access control is the way of improving the overall security of Fencing limited
private organization. This is mainly done by limiting the overall availability to network-based
resources which can comply with security policy of Fencing limited (Joshi and Karkade 2015). A
network access control scheme merely consists of two important aspects that is restricted the
access and providing network boundary protection. It is gained by the help of user
authentication and proper authorization control. It is solely responsible for analyzing and
identifying various user of network system. Authorization is just a new a method of providing
access to permission for protected resources (Gupta and Misra 2016). Network boundary
protection aims to provide logical control for establishing connection in and out of the network.
By the help of firewalls any kind of unauthorized access to the network system of fencing limited
can be blocked. In addition, intrusion detection and certain preventive technologies can be
employed for defending the network from any kind of attack.
Restricting the access to certain number of devices on this network is an important step
for providing security to network. Most of the network devices consist of both communication
and computing technologies (Luong et al. 2017). It comes up with the potential of bringing down
Installation by professionals
Remote alarm and disarm
Customizable alerts, automation and schedules
Security cameras
Live stream from mobile devices
Recording and saving video clips.
Access control and authentication
Network access control is the way of improving the overall security of Fencing limited
private organization. This is mainly done by limiting the overall availability to network-based
resources which can comply with security policy of Fencing limited (Joshi and Karkade 2015). A
network access control scheme merely consists of two important aspects that is restricted the
access and providing network boundary protection. It is gained by the help of user
authentication and proper authorization control. It is solely responsible for analyzing and
identifying various user of network system. Authorization is just a new a method of providing
access to permission for protected resources (Gupta and Misra 2016). Network boundary
protection aims to provide logical control for establishing connection in and out of the network.
By the help of firewalls any kind of unauthorized access to the network system of fencing limited
can be blocked. In addition, intrusion detection and certain preventive technologies can be
employed for defending the network from any kind of attack.
Restricting the access to certain number of devices on this network is an important step
for providing security to network. Most of the network devices consist of both communication
and computing technologies (Luong et al. 2017). It comes up with the potential of bringing down
6ICT301 ADVANCED NETWORK TOPICS
the whole network and its resources. One of the major point of network device security is all
about having proper access control and authorization. Various protocols have been design and
developed for addressing each of the two requirement and improving the network security to
next level.
User authentication is important for gaining control on the network system and related
devices. Authentication comes up with two aspects like general access authentication and proper
functional authorization (Satasiya, Raviya and Kumar 2016). Authorization mainly deals with
the individual rights for getting access to the system. User authentication depends on certain
number of factors like password, cryptographic token and lastly biometrics.
Individual device-based authentication aims to provide access control measure.
Authentication method is known to be an effective and efficient way when the network makes
use large number of devices and user for accessing the devices (Adao et al. 2016). Centralized
authentication is mainly used for solving the issues in remote network access. In this, the
administer of user (employees) on network devices are not practical. Keeping all the information
in single device and all the required information updated is considered to be administrative
nightmare. Some of centralized authentication like RADIUS and Kerberos can tackle this
particular issue (ALAmri and Guan 2016). The system will allow the user information to be
easily stored and managed at a single platform. Most of the RADIUS servers can easily
communicate with some of the network devices and after that it can securely access the account
information.
Most of the network devices come up with configured access list which defines both
hostname and IP address. It is generally authorized for access the network. There can be
restriction with respect to network equipment for IP from the administrator end (Khosroshahi
the whole network and its resources. One of the major point of network device security is all
about having proper access control and authorization. Various protocols have been design and
developed for addressing each of the two requirement and improving the network security to
next level.
User authentication is important for gaining control on the network system and related
devices. Authentication comes up with two aspects like general access authentication and proper
functional authorization (Satasiya, Raviya and Kumar 2016). Authorization mainly deals with
the individual rights for getting access to the system. User authentication depends on certain
number of factors like password, cryptographic token and lastly biometrics.
Individual device-based authentication aims to provide access control measure.
Authentication method is known to be an effective and efficient way when the network makes
use large number of devices and user for accessing the devices (Adao et al. 2016). Centralized
authentication is mainly used for solving the issues in remote network access. In this, the
administer of user (employees) on network devices are not practical. Keeping all the information
in single device and all the required information updated is considered to be administrative
nightmare. Some of centralized authentication like RADIUS and Kerberos can tackle this
particular issue (ALAmri and Guan 2016). The system will allow the user information to be
easily stored and managed at a single platform. Most of the RADIUS servers can easily
communicate with some of the network devices and after that it can securely access the account
information.
Most of the network devices come up with configured access list which defines both
hostname and IP address. It is generally authorized for access the network. There can be
restriction with respect to network equipment for IP from the administrator end (Khosroshahi
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
7ICT301 ADVANCED NETWORK TOPICS
and Shahinzadeh 2016). It can be used for protecting the network for any kind of unauthorized
access.
Account Administrator: Employees have complete access to official websites which
provides them the capability of creating new account administration. In addition, it provides
account access for both ad manager and administrator.
Manager: User will have access to the official website and can easily make changes in
the campaign. Manager cannot allow any kind of access to accounts or make modification to
information available on website.
Business Continuity
Business continuity plan (BCP) is a method of creating system for prevention and
recovery form any kind of threat to organization. The plan aims to highlights that both personnel
and assets are completely protected. It is merely highlights quick functioning in case of disaster.
BCP of Fencing limited is completely advanced and requires involvement from various
stakeholders (Sahebjamnia, Torabi and Mansouri 2015). BCP is all about defining various risk
which impact the overall operation of the organization. It is considered to be important aspect for
managing organization risk. BCP is considered to be an important aspect of this organization.
Both threats and disruption can result in loss in revenue and even much higher cost. Fencing
Limited is very much prone to disaster which are catastrophic in nature. Business continuity plan
will help this organization to easily operate even in case of cyber-attacks (Podaras, Antlová and
Motejlek 2016). Considering this organization, BCP is completely put into plan by back up of
important data and client information. If something happens to the main office of fencing
limited, then all the data can be easily retrieved.
and Shahinzadeh 2016). It can be used for protecting the network for any kind of unauthorized
access.
Account Administrator: Employees have complete access to official websites which
provides them the capability of creating new account administration. In addition, it provides
account access for both ad manager and administrator.
Manager: User will have access to the official website and can easily make changes in
the campaign. Manager cannot allow any kind of access to accounts or make modification to
information available on website.
Business Continuity
Business continuity plan (BCP) is a method of creating system for prevention and
recovery form any kind of threat to organization. The plan aims to highlights that both personnel
and assets are completely protected. It is merely highlights quick functioning in case of disaster.
BCP of Fencing limited is completely advanced and requires involvement from various
stakeholders (Sahebjamnia, Torabi and Mansouri 2015). BCP is all about defining various risk
which impact the overall operation of the organization. It is considered to be important aspect for
managing organization risk. BCP is considered to be an important aspect of this organization.
Both threats and disruption can result in loss in revenue and even much higher cost. Fencing
Limited is very much prone to disaster which are catastrophic in nature. Business continuity plan
will help this organization to easily operate even in case of cyber-attacks (Podaras, Antlová and
Motejlek 2016). Considering this organization, BCP is completely put into plan by back up of
important data and client information. If something happens to the main office of fencing
limited, then all the data can be easily retrieved.
8ICT301 ADVANCED NETWORK TOPICS
BCP for fencing limited will be developed by using following steps like:
Business Impact analysis: In this point, the organization will look for function and
related resources which are merely time-sensitive.
Recovery: In this point, the organization will look for identifying and implementing
certain steps for recovery of some important business function.
Organization: There is need of building a continuity team for managing any kind of
disruption.
Training: The continuity team needs to be completely trained and tested. All the
members of this team should be given exercise for going over the plan and strategy.
There is an important aspect for developing a BCP is all about creating a business
continuity impact analysis. It mere identifies any kind of effect of disruption to business function
and related process (Järveläinen 2016). The required information is required for decision making
and recovery of strategy.
Peter Smith the owner of this organization have planned to invest $300 000 in next three
years. The suggested system can easily improve the overall importance of information system in
organization like
It will provide operational efficiencies
Reducing overall cost
Better customer service
Development of community capabilities and methods.
The new system will provide real-time data for any fast action.
BCP for fencing limited will be developed by using following steps like:
Business Impact analysis: In this point, the organization will look for function and
related resources which are merely time-sensitive.
Recovery: In this point, the organization will look for identifying and implementing
certain steps for recovery of some important business function.
Organization: There is need of building a continuity team for managing any kind of
disruption.
Training: The continuity team needs to be completely trained and tested. All the
members of this team should be given exercise for going over the plan and strategy.
There is an important aspect for developing a BCP is all about creating a business
continuity impact analysis. It mere identifies any kind of effect of disruption to business function
and related process (Järveläinen 2016). The required information is required for decision making
and recovery of strategy.
Peter Smith the owner of this organization have planned to invest $300 000 in next three
years. The suggested system can easily improve the overall importance of information system in
organization like
It will provide operational efficiencies
Reducing overall cost
Better customer service
Development of community capabilities and methods.
The new system will provide real-time data for any fast action.
9ICT301 ADVANCED NETWORK TOPICS
Custom of data for decision making
Achieving data for business analysis
Risk management
Information technology risk management merely requires certain organization to easily
plan, monitor, track and manage various security risk. Organization like Fencing limited which
are connected to internet are easily exposed to cyber-crime (Haidzir, Othman and Mammi 2018).
Cyber-criminals come up with variety of methods for get into a system. They can get in through
an employee or any weak link into the system. This is mainly done so that they can steal some of
the vital information. There is a list of steps which should be taken by Fencing limited like
Avoiding risk by removing the possibility of any attack
Reduction of exposure to some of the attacks.
Retaining and managing risk each and every time.
Considering the cyber-crime, there is various kind of risk. Risk management should come
into picture by analyzing the wide picture. Then the mere focus is all about reducing the overall
amount of risk. The overall success of most of the organization is all about analyzing various
kind of risk factors followed by ranking them (Mattos and Duarte 2016). Risk factor can easily
range from hacker getting money transferring system to employee who have lost their mobile
devices. The very next stage is all about creating methods for prioritized task. Some of the
methods will require technical knowledge while other can be handled by the help of training.
Security areas to be considered Potential Security Measures
Physical Safeguards Facilities and other Building an alarm
Custom of data for decision making
Achieving data for business analysis
Risk management
Information technology risk management merely requires certain organization to easily
plan, monitor, track and manage various security risk. Organization like Fencing limited which
are connected to internet are easily exposed to cyber-crime (Haidzir, Othman and Mammi 2018).
Cyber-criminals come up with variety of methods for get into a system. They can get in through
an employee or any weak link into the system. This is mainly done so that they can steal some of
the vital information. There is a list of steps which should be taken by Fencing limited like
Avoiding risk by removing the possibility of any attack
Reduction of exposure to some of the attacks.
Retaining and managing risk each and every time.
Considering the cyber-crime, there is various kind of risk. Risk management should come
into picture by analyzing the wide picture. Then the mere focus is all about reducing the overall
amount of risk. The overall success of most of the organization is all about analyzing various
kind of risk factors followed by ranking them (Mattos and Duarte 2016). Risk factor can easily
range from hacker getting money transferring system to employee who have lost their mobile
devices. The very next stage is all about creating methods for prioritized task. Some of the
methods will require technical knowledge while other can be handled by the help of training.
Security areas to be considered Potential Security Measures
Physical Safeguards Facilities and other Building an alarm
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
10ICT301 ADVANCED NETWORK TOPICS
places when
organization data can
be accessed (Saxena
and Choi 2015).
Portable devices
System equipment’s
system
Locking office
properly
Screen shield from
any secondary view
Administrative safeguards Designated security
officer
Workforce training
and oversight
Having a control over
proper information
access
Prediction of security
reassessment
Training to staff
members of Fencing
limited.
User activity review
on monthly basis
Enforcement of
certain policies
Technical safeguards Making a control over
the access to client
details.
Making use of audit
log for monitoring
user (Satasiya, Raviya
and Kumar 2016).
Measures which keep
Securing passwords
Back up of all
necessary data
Virus check on
monthly or weekly
basis.
Data encryption.
places when
organization data can
be accessed (Saxena
and Choi 2015).
Portable devices
System equipment’s
system
Locking office
properly
Screen shield from
any secondary view
Administrative safeguards Designated security
officer
Workforce training
and oversight
Having a control over
proper information
access
Prediction of security
reassessment
Training to staff
members of Fencing
limited.
User activity review
on monthly basis
Enforcement of
certain policies
Technical safeguards Making a control over
the access to client
details.
Making use of audit
log for monitoring
user (Satasiya, Raviya
and Kumar 2016).
Measures which keep
Securing passwords
Back up of all
necessary data
Virus check on
monthly or weekly
basis.
Data encryption.
11ICT301 ADVANCED NETWORK TOPICS
the client data from
any kind of changes
Securing an
authorized electronic
access of patient
Policies and Procedure Writing all the
policies and
procedures for
ensuring security
compliance (Adao et
al. 2016).
Documentation of
certain security
measures.
Writing certain
number of protocols
for authorized users
Retention of
employee records
Organizational
Requirements
Proper agreement in
between the business
associates.
Proper plan for
identifying and
management of
vendors that can
create access and store
data (ALAmri and
Guan 2016).
Proper review and
updates on agreement.
the client data from
any kind of changes
Securing an
authorized electronic
access of patient
Policies and Procedure Writing all the
policies and
procedures for
ensuring security
compliance (Adao et
al. 2016).
Documentation of
certain security
measures.
Writing certain
number of protocols
for authorized users
Retention of
employee records
Organizational
Requirements
Proper agreement in
between the business
associates.
Proper plan for
identifying and
management of
vendors that can
create access and store
data (ALAmri and
Guan 2016).
Proper review and
updates on agreement.
12ICT301 ADVANCED NETWORK TOPICS
Conclusion
The report is all about Fencing limited which is a small firm based in NSW. The
organization wants to manage their inventory and allow certain customer to purchase good
directly from website and analyze the stock level. In addition, customer will have idea when a
particular stock is arriving. It has become important for top management of fencing limited to
make use of information system so that they can share their information in much better way. The
owner of this organization is very much focused in moving their business model that makes use
of customer data. It has a robust sales data which reduces the need of both sales staff and call
center. In addition, he also wants to have to have real-time reporting for the integrated data. The
owner is ready to make an investment of 100,000 dollars in next three years. In the report, the
project is all about securing the network and keeping their organizational information much
secure and safe in nature. Employee of this organization have realized that their current system is
as per the need but by the help of faster and agile network for better facilities for the
organization. The organization has a fast internet connection with wireless option across the
facilities. The employee of this organization are given BYOD option by network connection can
be established. The organization has a team for patrolling when the organization is closed but
there are some cases of break-in. The project emphasizes on securing the network of this
organization and building a system by which break inns in this organization can be reduced. An
idea has been provided with respect to the fact that how these two system will work together and
it will comply with regulations.
Conclusion
The report is all about Fencing limited which is a small firm based in NSW. The
organization wants to manage their inventory and allow certain customer to purchase good
directly from website and analyze the stock level. In addition, customer will have idea when a
particular stock is arriving. It has become important for top management of fencing limited to
make use of information system so that they can share their information in much better way. The
owner of this organization is very much focused in moving their business model that makes use
of customer data. It has a robust sales data which reduces the need of both sales staff and call
center. In addition, he also wants to have to have real-time reporting for the integrated data. The
owner is ready to make an investment of 100,000 dollars in next three years. In the report, the
project is all about securing the network and keeping their organizational information much
secure and safe in nature. Employee of this organization have realized that their current system is
as per the need but by the help of faster and agile network for better facilities for the
organization. The organization has a fast internet connection with wireless option across the
facilities. The employee of this organization are given BYOD option by network connection can
be established. The organization has a team for patrolling when the organization is closed but
there are some cases of break-in. The project emphasizes on securing the network of this
organization and building a system by which break inns in this organization can be reduced. An
idea has been provided with respect to the fact that how these two system will work together and
it will comply with regulations.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
13ICT301 ADVANCED NETWORK TOPICS
Recommendation
In addition to above, there is list of recommendation for Fencing limited like
Creating a network security policy: There is need of fool-proof network policy which
acts like a business compass for this organization. This kind of network policies highlights the
user policies about the user access and their limitation. The policy focus on identifying some of
the vital datasets. It focuses on risk assessment test and building a disaster recovery plan.
Keeping the network Updated: After securing the network, the mere focus is all about
building strong password. Fencing limited should analyze their network so that it is safe from
any kind of hazardous attack. The organization should update their firmware, software and
device driver.
Blocking employees from installation of any software: It is very much important to
consider this for the business as they do not want lose their important and confidential data. Most
of the organization around the globe faces malware attacks and data loss because employees are
not given privilege to access to safe website.
Recommendation
In addition to above, there is list of recommendation for Fencing limited like
Creating a network security policy: There is need of fool-proof network policy which
acts like a business compass for this organization. This kind of network policies highlights the
user policies about the user access and their limitation. The policy focus on identifying some of
the vital datasets. It focuses on risk assessment test and building a disaster recovery plan.
Keeping the network Updated: After securing the network, the mere focus is all about
building strong password. Fencing limited should analyze their network so that it is safe from
any kind of hazardous attack. The organization should update their firmware, software and
device driver.
Blocking employees from installation of any software: It is very much important to
consider this for the business as they do not want lose their important and confidential data. Most
of the organization around the globe faces malware attacks and data loss because employees are
not given privilege to access to safe website.
14ICT301 ADVANCED NETWORK TOPICS
References
Acemoglu, D., Malekian, A. and Ozdaglar, A., 2016. Network security and contagion. Journal
of Economic Theory, 166, pp.536-585.
Adao, P., Focardi, R., Guttman, J.D. and Luccio, F.L., 2016, June. Localizing firewall security
policies. In 2016 IEEE 29th Computer Security Foundations Symposium (CSF) (pp. 194-209).
IEEE.
ALAmri, S.M. and Guan, L., 2016, July. Exploring the firewall security consistency in cloud
computing during live migration. In Proceedings of the 7th International Conference on
Computing Communication and Networking Technologies (p. 40). ACM.
Aljuhani, A. and Alharbi, T., 2017, January. Virtualized network functions security attacks and
vulnerabilities. In 2017 IEEE 7th Annual Computing and Communication Workshop and
Conference (CCWC) (pp. 1-4). IEEE.
Chen, G., Gong, Y., Xiao, P. and Chambers, J.A., 2015. Physical layer network security in the
full-duplex relay system. IEEE transactions on information forensics and security, 10(3),
pp.574-583.
Duffield, M., 2017. War as a network enterprise: the new security terrain and its implications.
In The Criminology of War (pp. 109-121). Routledge.
Gupta, S. and Misra, S.C., 2016. Compliance, network, security and the people related factors in
cloud ERP implementation. International Journal of Communication Systems, 29(8), pp.1395-
1419.
References
Acemoglu, D., Malekian, A. and Ozdaglar, A., 2016. Network security and contagion. Journal
of Economic Theory, 166, pp.536-585.
Adao, P., Focardi, R., Guttman, J.D. and Luccio, F.L., 2016, June. Localizing firewall security
policies. In 2016 IEEE 29th Computer Security Foundations Symposium (CSF) (pp. 194-209).
IEEE.
ALAmri, S.M. and Guan, L., 2016, July. Exploring the firewall security consistency in cloud
computing during live migration. In Proceedings of the 7th International Conference on
Computing Communication and Networking Technologies (p. 40). ACM.
Aljuhani, A. and Alharbi, T., 2017, January. Virtualized network functions security attacks and
vulnerabilities. In 2017 IEEE 7th Annual Computing and Communication Workshop and
Conference (CCWC) (pp. 1-4). IEEE.
Chen, G., Gong, Y., Xiao, P. and Chambers, J.A., 2015. Physical layer network security in the
full-duplex relay system. IEEE transactions on information forensics and security, 10(3),
pp.574-583.
Duffield, M., 2017. War as a network enterprise: the new security terrain and its implications.
In The Criminology of War (pp. 109-121). Routledge.
Gupta, S. and Misra, S.C., 2016. Compliance, network, security and the people related factors in
cloud ERP implementation. International Journal of Communication Systems, 29(8), pp.1395-
1419.
15ICT301 ADVANCED NETWORK TOPICS
Haidzir, H., Othman, S.H. and Mammi, H.K., 2018. Evaluation of Business Continuity Plan
Maturity Level Using Business Continuity Maturity Model. International Journal of Innovative
Computing, 8(1).
Järveläinen, J., 2016. Integrated Business Continuity Planning and Information Security Policy
Development Approach.
Joshi, M.R. and Karkade, R.A., 2015. Network security with cryptography. International
Journal of Computer Science and Mobile Computing, 4(1), pp.201-204.
Khosroshahi, A.H. and Shahinzadeh, H., 2016. Security technology by using firewall for smart
grid. Bulletin of Electrical Engineering and Informatics, 5(3), pp.366-372.
Luong, N.C., Hoang, D.T., Wang, P., Niyato, D. and Han, Z., 2017. Applications of economic
and pricing models for wireless network security: A survey. IEEE Communications Surveys &
Tutorials, 19(4), pp.2735-2767.
Mattos, D.M.F. and Duarte, O.C.M.B., 2016. AuthFlow: authentication and access control
mechanism for software defined networking. annals of telecommunications, 71(11-12), pp.607-
615.
Pawar, M.V. and Anuradha, J., 2015. Network security and types of attacks in
network. Procedia Computer Science, 48, pp.503-506.
Podaras, A., Antlová, K. and Motejlek, J., 2016. Information management tools for
implementing an effective enterprise business continuity strategy.
Haidzir, H., Othman, S.H. and Mammi, H.K., 2018. Evaluation of Business Continuity Plan
Maturity Level Using Business Continuity Maturity Model. International Journal of Innovative
Computing, 8(1).
Järveläinen, J., 2016. Integrated Business Continuity Planning and Information Security Policy
Development Approach.
Joshi, M.R. and Karkade, R.A., 2015. Network security with cryptography. International
Journal of Computer Science and Mobile Computing, 4(1), pp.201-204.
Khosroshahi, A.H. and Shahinzadeh, H., 2016. Security technology by using firewall for smart
grid. Bulletin of Electrical Engineering and Informatics, 5(3), pp.366-372.
Luong, N.C., Hoang, D.T., Wang, P., Niyato, D. and Han, Z., 2017. Applications of economic
and pricing models for wireless network security: A survey. IEEE Communications Surveys &
Tutorials, 19(4), pp.2735-2767.
Mattos, D.M.F. and Duarte, O.C.M.B., 2016. AuthFlow: authentication and access control
mechanism for software defined networking. annals of telecommunications, 71(11-12), pp.607-
615.
Pawar, M.V. and Anuradha, J., 2015. Network security and types of attacks in
network. Procedia Computer Science, 48, pp.503-506.
Podaras, A., Antlová, K. and Motejlek, J., 2016. Information management tools for
implementing an effective enterprise business continuity strategy.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
16ICT301 ADVANCED NETWORK TOPICS
Sahebjamnia, N., Torabi, S.A. and Mansouri, S.A., 2015. Integrated business continuity and
disaster recovery planning: Towards organizational resilience. European Journal of Operational
Research, 242(1), pp.261-273.
Satasiya, D., Raviya, R. and Kumar, H., 2016, May. Enhanced SDN security using firewall in a
distributed scenario. In 2016 international conference on advanced communication control and
computing technologies (ICACCCT) (pp. 588-592). IEEE.
Saxena, N. and Choi, B., 2015. State of the art authentication, access control, and secure
integration in smart grid. Energies, 8(10), pp.11883-11915.
Sivaraman, V., Gharakheili, H.H., Vishwanath, A., Boreli, R. and Mehani, O., 2015, October.
Network-level security and privacy control for smart-home IoT devices. In 2015 IEEE 11th
International conference on wireless and mobile computing, networking and communications
(WiMob) (pp. 163-167). IEEE.
Yu, T., Sekar, V., Seshan, S., Agarwal, Y. and Xu, C., 2015, November. Handling a trillion
(unfixable) flaws on a billion devices: Rethinking network security for the internet-of-things.
In Proceedings of the 14th ACM Workshop on Hot Topics in Networks (p. 5). ACM.
Sahebjamnia, N., Torabi, S.A. and Mansouri, S.A., 2015. Integrated business continuity and
disaster recovery planning: Towards organizational resilience. European Journal of Operational
Research, 242(1), pp.261-273.
Satasiya, D., Raviya, R. and Kumar, H., 2016, May. Enhanced SDN security using firewall in a
distributed scenario. In 2016 international conference on advanced communication control and
computing technologies (ICACCCT) (pp. 588-592). IEEE.
Saxena, N. and Choi, B., 2015. State of the art authentication, access control, and secure
integration in smart grid. Energies, 8(10), pp.11883-11915.
Sivaraman, V., Gharakheili, H.H., Vishwanath, A., Boreli, R. and Mehani, O., 2015, October.
Network-level security and privacy control for smart-home IoT devices. In 2015 IEEE 11th
International conference on wireless and mobile computing, networking and communications
(WiMob) (pp. 163-167). IEEE.
Yu, T., Sekar, V., Seshan, S., Agarwal, Y. and Xu, C., 2015, November. Handling a trillion
(unfixable) flaws on a billion devices: Rethinking network security for the internet-of-things.
In Proceedings of the 14th ACM Workshop on Hot Topics in Networks (p. 5). ACM.
1 out of 17
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.