Secure Network Access and Data Protection

Verified

Added on  2021/04/24

|12
|3340
|51
AI Summary
This assignment delves into the realm of cybersecurity, focusing on secure network access and data protection. It discusses various aspects such as application-level firewalls, massively parallel firewall circuits, state-aware network access management, and quantum key distribution. The importance of cybersecurity expertise in boardrooms and the impact of data breaches on customer behavior are also highlighted. This comprehensive assignment provides a detailed overview of the current state of cybersecurity, emphasizing the need for robust protection measures to safeguard sensitive information.

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: IT SECURITY
Internet Technology Security
Name of Student-
Name of University-
Author’s Note-

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1IT SECURITY
Answer to Question 1:
Equifax Data Breach 2017
On September 2017, Equifax has declared an incident of one of the largest cyber security
in the history of cyber crime. Equifax is considered to be one of the three nationwide companies
of credit reporting, which rates and track financial history of the consumers of U.S. Equifax
serves the companies with data regarding the loans, payments of loan, and also details of credit
cards and much more (Miller, 2018). Equifax reported that the unauthorized data breach took
place in the mid of May and continued up to July 2017. The data breach was disclosed on 29th
July. The information that was breached was mostly PII (Personally Identifiable Information)
that included names, SSN (Social Security Numbers), Addresses, Birth Dates, and in some of the
cases, the driver license was also access by the attackers. The attackers stole almost about
209,000 numbers of credit card details and almost 182,000 people’s dispute documents were
stolen along with PII. The data breach took place mostly in U.K. and Canada.
The details of the data breach that was released by the company, which had key facts
such as:
The website application of U.S. was mostly exploited by all the criminals so that they can
access the files from their system.
The company also stated that there is no proper evidence of the unauthorized activity on
commercial credit or consumer reporting database.
Recommendations are provided by the company for conduction such assessment in the
following steps.
Document Page
2IT SECURITY
The data breach of Equifax aware all their customers in the company. In other data
breach, people are not aware of the data breach that took place (Hedley & Jacobs, 2017). All the
data like banks, lenders, retailers, credit card companies, and many more reports credit activity of
a particular individual to credit the agencies that are reporting and purchase public records also.
Equifax also pay attention to mail notices to all the people who were victims of the attack and to
those person whose details of credit card and dispute documents were stolen in the data breach.
There are certain rules or principles that the consumers can follow to protect their details
of credit cards (Larcker, Reiss & Tayan, 2017). The customers can protect their credit details
from all identity theft by many ways. Four ways to protect the credit line of the customers are:
credit freezes, credit monitoring, identity theft protection, and fraud alerts.
1. Credit freezes- The work of credit freeze is to freeze the credit report. To make the
customer account credit freeze means that any creditors that are potential cannot get
access to the credit report that makes less likely to be open to identity theft. By credit
freeze, the identity thief cannot open any new accounts by the name of the customer. The
new lines of credit is generally blocked by credit freeze and also protects the attackers to
see the credit reports (O’Brien, 2017). The mortgage leader or the credit card company
known as potential creditors cannot access the credit report if the accounts are in a freeze
state. This helps the customer to keep their accounts safe from identity theft and helps to
keep the account safe.
2. Fraud alerts- Fraud alert is another way to stop the credits from data breach. When some
intruder wants to take credit by the mane of the victim, an alert regarding the credit is
sent to the victim about the credit that is to take place or might have taken place. Fraud
Document Page
3IT SECURITY
alerts shows an individual that the credit is taken by the customer itself, and not by any
other attacker or intruder. Fraud alerts are to be renewed in an interval of 90 days.
3. Credit monitoring- All the changes that are related to credit can be monitored by credit
monitoring (Janakiraman, Lim & Rishika, 2018). The changes that are done with the
credit reports are generally tracked using the credit monitoring that includes a loan or a
new credit card. All the suspicious activities can be detected by credit monitoring.
4. Identity protection- The identity theft protection generally provides monitoring for credit
file at more than one credit agencies reporting as well as credit score from one agency or
more than one agency (Mathews, 2017). The services that are included in theft includes
the alerts that the customers receives on their PII. With identity protection, there is less
possibility of data theft that may arise in a company. Restoration service are provided by
protecting the identity theft that helps the victims to solve the issues that are related to
identity theft.
Answer to Question 2
Quantum Key Distribution
QKD (Quantum Key Distribution) is known for its secure communication process that
implements a protocol for cryptography that involves the components of general quantum
mechanics. QKD helps two parties with a common secret key that is produced and is known only
to both of them. This secret key is used to decrypt and encrypt all the messages that are
transferred between them (Korzh et al., 2015). The secret key that is transferred and is kept
secret in between two parties is known as quantum cryptography. There are many unique
property of quantum key distribution. One of the most unique and important property of QKD is

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
4IT SECURITY
that it has the ability to establish communication in between two user as well as detect if any
other third party intrude in between the communication trying to access the knowledge regarding
the key. The mechanism of quantum key depends on the aspect of the quantum mechanics,
which describes the process of measuring a system disturbs the whole system. When an intruder
tries to eavesdrop the secret key, then it can detect the anomaly has occurred. There are three
processes by which eavesdropping in a communication system can be detected. The processes
are quantum entanglement, quantum superpositions, and transmitting the information through
quantum states. If the eavesdropping level is below of a particular threshold, there will is a
guaranteed key production that is kept secured.
The quantum key distribution has a security that has fundamental characteristics with the
quantum mechanics, which states measuring the quantum system actually disturbs the whole
system (Lo, Curty & Tamaki, 2014). So, the quantum challenge is intercepted with the
eavesdropper that will inevitably keep a trace that is detectable. The exchanging parties has the
ability to decide whether to reduce all the information that are available with the eavesdropper or
to discard the information that are corrupted. The implementation of QKD typically has some
components in it. The components are information leakage that are potential and errors
information leakage are removed by subsequent correction of error, and a post-processing
amplification steps that are generally kept private, with the two parties sharing the secret key
only in between them. A free-space quantum or a fiber quantum channel is generally sent to the
quantum states between both the transmitter and receiver. The channel of fiber quantum is not to
be kept secured. The communication link that is shared in between the two parties so that the
post-processing steps can be performed should be authenticated. The link also should be distilled
and should be kept in secret with the correct information (Comandar et al., 2016). The protocol
Document Page
5IT SECURITY
of key exchange generally exploits the properties of quantum so that they can ensure the security
for detecting the errors or the eavesdropping to take place. The protocol of key exchange also
calculates the required amount of information that can be intercepted or is lost. The potential
information or the erroneous information leakage are usually removed during the subsequent
post processing privacy amplification step or error correction method (Yin et al., 2016). This
enables the transmitter as well as the receiver to share a common key that is known only to them.
The commercial systems that are currently used are generally aimed at corporations and
governments along with security requirements (Tang et al., 2014). The key distribution that are
sent by courier are used in traditional scheme of key distribution that cannot offer sure guarantee.
The advantage of using the protocol of key distribution is that the distance in not limited
intrinsically and irrespective of the long distance travelling time, the rate of transfer is very high
because of the portable devices of storage available having a large capacity space (Leverrier,
2015). The main difference between the quantum distribution of key and the traditional
distribution of key is that QKD has the ability for detecting any type of interception key.
However, the traditional method of key distribution cannot prove or test the interception key
(Vallone et al., 2014). The QKD has the advantage of having an automatic key distribution,
along with some greater reliability and the operating cost is also low as compared to the
traditional key distribution method.
There are some disadvantages as well for using the QKD. In spite of having a high
security with the interception key, QKD has huge equipment cost and also lack in demonstrated
threat to all the protocols of key exchange. The networks of optic fiber those are present in many
of the companies usually shares a infrastructure that is more in use (Takesue et al., 2015). In
order to address the issues that are involved in quantum cryptography, a specification group
Document Page
6IT SECURITY
known as ISG was set up in ETSI (European Telecommunication Standard Institute). European
Metrology Research Programme that measures the characteristics of optical components of the
QKD system developed a research program regarding the metrology of the industrial
communication.
Answer: Question 3
The four types of popular firewalls that are discussed in this section are packet filtering
firewalls, firewall at circuit-level, application level firewall, and firewalls of stateful inspection.
Packet filtering firewalls: Packet filtering is basically a control access to the network in
order to analyze the outgoing packets as well as incoming packets and then let the packets to
pass or halt considering the IP address related to destination and the source of the transfer.
Among many techniques of secure firewalls, packet filtering is one of the filtering, which has
some basic block of security network. Packet filtering is a technique or a tool that has an
instrument for accomplishing a particular task (Ali, Darwish & Guirguis, 2015). Packet filtering
is a original firewall that usually operates as inline at the junction points that has devices as
switches and routers for completing their works. The cost of implementing packet filtering is
very low. The packet filtering does not provide route packets. The packet filtering compares all
the packet of data received, such as packet type, IP address, and port number, that are set to
establish. The firewall of packet filtering is generally flagged as a troublesome firewall filtering.
So, nowadays packet filtering is not used much and are on the way to exist.
Circuit gateways firewall: A firewall of circuit gateway is generally a firewall, which
provides the UDP (User Datagram Protocol) and TCP (Transmission Control Protocol) to
establish a connection security and generally works in between all the layers of OSI (Open

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7IT SECURITY
System Interconnection) network model transport and the entire application layer including the
session layer (Hager et al., 2014). The process of handshaking process usually monitors the TCP
packets of data and all the sessions are fulfilled that satisfies the policies and rules in circuit
gateways. The TCP handshake is a best way to establish a network in between the remote host
and the local host. The TCP handshake protocol helps to determine whether a connection
established is legitimate or not. The packets are not inspected by the TCP themselves. The
Circuit gateway firewall inspects them.
Stateful Inspection: Stateful inspection firewall is also known by another name, dynamic
packet filtering. The firewall of packet filtering is a technology that generally monitors the active
state connections and also uses the information for determining the packets of network so that
they can be allowed through firewall. The older technology of firewall protection is largely
replaced by the stateful inspection (Han et al., 2016). The headers that are included in the packets
are generally checked. The stateful inspection helps to analyze the packets of data to application
layer. Each of the packets are not only examined by the stateful firewall, but also helps to keep
the track whether the packet is a section of the TCP session. The packet filtering offers a great
toll on the performance of the network. This firewall is a multilayer firewall that considers the
transaction flow of processes across different layers in the seven-layer protocol.
Application-level gateway protocol: The application gateway protocol normally provides
a communication of network system with a high level of security. When the sender requests for a
server resource access including the web pages, databases, and files, the sender is firstly
connected to a proxy server and then a connection is established with main server. The gateway
application firewall resides on the server and client firewall (Giannakou et al., 2016). The server
proxy generally hides the IP address and all other information that are on the client side. The
Document Page
8IT SECURITY
internal system of the computer can communicate the external system by the use of firewall
protection. The external system and the application gateway can function the information and
knowledge of the client on IP address of the proxy server. The application server is normally
known as proxy server and can also be referred to as the proxy firewall that combines the
attributes of the packet filtering firewall in the circuit-level gateway. The filter packets are not
according to service they intend to do as specified by destination port, but certain other
characteristics are also server different HTTP request string. The gateways, which helps to filter
application layer can provide the required data security, the network performance can also be
affected.
Document Page
9IT SECURITY
References
Ali, A. A., Darwish, S. M., & Guirguis, S. K. (2015). An approach for improving performance of
a packet filtering firewall based on fuzzy petri net. Journal of Advances in Computer
Networks, 3(1), 67-74.
Comandar, L. C., Lucamarini, M., Fröhlich, B., Dynes, J. F., Sharpe, A. W., Tam, S. B., ... &
Shields, A. J. (2016). Quantum key distribution without detector vulnerabilities using
optically seeded lasers. Nature Photonics, 10(5), 312.
Giannakou, A., Rilling, L., Pazat, J. L., & Morin, C. (2016, December). AL-SAFE: A Secure
Self-Adaptable Application-Level Firewall for IaaS Clouds. In Cloud Computing
Technology and Science (CloudCom), 2016 IEEE International Conference on (pp. 383-
390). IEEE.
Hager, S., Winkler, F., Scheuermann, B., & Reinhardt, K. (2014, September). MPFC: Massively
parallel firewall circuits. In Local Computer Networks (LCN), 2014 IEEE 39th
Conference on (pp. 305-313). IEEE.
Han, W., Hu, H., Zhao, Z., Doupé, A., Ahn, G. J., Wang, K. C., & Deng, J. (2016, June). State-
aware network access management for software-defined networks. In Proceedings of the
21st ACM on Symposium on Access Control Models and Technologies (pp. 1-11). ACM.
Hedley, D., & Jacobs, M. (2017). The shape of things to come: the Equifax breach, the GDPR
and open-source security. Computer Fraud & Security, 2017(11), 5-7.

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
10IT SECURITY
Janakiraman, R., Lim, J. H., & Rishika, R. (2018). The Effect of Data Breach Announcement on
Customer Behavior: Evidence from a Multichannel Retailer. Journal of Marketing.
Korzh, B., Lim, C. C. W., Houlmann, R., Gisin, N., Li, M. J., Nolan, D., ... & Zbinden, H.
(2015). Provably secure and practical quantum key distribution over 307 km of optical
fibre. Nature Photonics, 9(3), 163.
Larcker, D., Reiss, P., & Tayan, B. (2017). Critical Update Needed: Cybersecurity Expertise in
the Boardroom.
Leverrier, A. (2015). Composable security proof for continuous-variable quantum key
distribution with coherent states. Physical review letters, 114(7), 070501.
Lo, H. K., Curty, M., & Tamaki, K. (2014). Secure quantum key distribution. Nature
Photonics, 8(8), 595.
Mathews, L. (2017). Equifax Data Breach Impacts 143 Million Americans. Forbes. Last
modified September, 7.
Miller, L. (2018). Cybersecurity Insurance: Incentive Alignment Solution to Weak Corporate
Data Protection.
O’Brien, S. A. (2017). Giant Equifax data breach: 143 million people could be affected. CNN
Tech.
Takesue, H., Sasaki, T., Tamaki, K., & Koashi, M. (2015). Experimental quantum key
distribution without monitoring signal disturbance. Nature Photonics, 9(12), 827.
Document Page
11IT SECURITY
Tang, Z., Liao, Z., Xu, F., Qi, B., Qian, L., & Lo, H. K. (2014). Experimental demonstration of
polarization encoding measurement-device-independent quantum key
distribution. Physical review letters, 112(19), 190503.
Vallone, G., D’Ambrosio, V., Sponselli, A., Slussarenko, S., Marrucci, L., Sciarrino, F., &
Villoresi, P. (2014). Free-space quantum key distribution by rotation-invariant twisted
photons. Physical review letters, 113(6), 060503.
Yin, H. L., Chen, T. Y., Yu, Z. W., Liu, H., You, L. X., Zhou, Y. H., ... & Chen, H. (2016).
Measurement-device-independent quantum key distribution over a 404 km optical
fiber. Physical review letters, 117(19), 190501.
1 out of 12
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]