logo

Assignment on Network Security in an Organization

   

Added on  2020-04-07

20 Pages4157 Words31 Views
Running Header: IT Security1SEC 410 Web & Data Security PaperSubmitted ByCourseProfessorDate

IT Security2Table of Contents1.Executive Summary.............................................................................................................................22.Introduction........................................................................................................................................32.1 Problem Statement...........................................................................................................................42.2 Purpose.............................................................................................................................................43. Literature Review....................................................................................................................................43.1 Integrating Both Corporate Environments.......................................................................................43.2 Intrusion Detection System (IDS)......................................................................................................63.2.1 Network based IDS -..................................................................................................................73.2.2 Host Based IDS...........................................................................................................................73.3 Web Vulnerability Scanners..............................................................................................................83.3.1 SQL Injection -............................................................................................................................832.3.2 Cross-site Scripting (XSS):........................................................................................................9WAVS by HTTP Method....................................................................................................................10JAVA Tool -........................................................................................................................................113.3 Network Firewall Devices...............................................................................................................113.3.1 Application Level Firewalls -....................................................................................................123.3.2 Multilayer Firewalls -...............................................................................................................134.Comparison between IDS, WFS and Firewall...................................................................................145.Conclusion.........................................................................................................................................146.References.........................................................................................................................................152.Budget...............................................................................................................................................19

IT Security31.Executive SummaryThe network security in an organization is the main line of protection to achieve data affirmation.The system network is at risk without a very much composed and perfect actualized networksecurity strategy. The principle issue is that system managers are not ready to check the systemsecurity arrangement. In spite of the fact that additionally examine has been done, it principallyconcerns some general issue. The network administration of security, operations as well asservices in large scale endeavor systems is getting to be more troublesome because of complexsecurity arrangements of the merged associations and furthermore because of dynamic changesin network topologies. In e-commerce business effectiveness matters for the network application. The transaction ofdata in e-business finds some challenges like database abuses, log information mining andsniffing assaults which can be settled by utilizing distinctive safety effort. Subsequently securityis vital in online business application. The research in this report mainly focused on identifyingvulnerabilities, which comes about because of unreliable data flow in web applications likecross-site scripting and SQL infusion have additionally expanded. Infusion Attacks misusevulnerabilities of sites by embedding’s and executing malignant code like data query, JavaScriptcapacities in susceptible clients, processing environment or on a web server. In this report, WebVulnerability Scanner (WVS) policy which questions the vulnerable segment of applications andthen distinguished and analyzed it offline. Also, firewalls and IDS systems are analyzed for itssuccessful implementation in the merged IT environments.

IT Security42.IntroductionThe process of security management is important in order to refine the existing arrangement andalso to develop new strategies as the risk as well as processing services. The process ofdeveloping IT security process provides the knowledge of existing threats. There is dependablya requirement to keep up the trust of customers for an effective figuring service. The compellingsecurity arrangement development process is the assessment of threats. (Anand, V. & Saniie, J.,2012). The various security efforts in global e commerce business have different techniques andsystems for various purposes. Distinctive techniques are appropriate for particular circumstances.We characterize the probability of a misrepresentation as a threat. Various areas in e-commerce business like networking, storing data, various scanningmethodology and to investigate various threats. The current policies are unable to fulfill all therequirements of users. Implementing security policy is considered as a challenge as well as theprimary issue for web based business. Network security can be considered as the various stepsthat are taken for preventing any type of data loss. Securing the whole networking systemrequires the coordination of a wide assortment of safety efforts from making user records to hirebetter representatives and to keep the server secured in a room. As I am appointed as theconsultant for designing network and IT security for enhancing global site. My responsibility isto design security document for e-commerce website as well as the merged organization byconsidering all facts and figures. (Kaur, K. & Dr. Pathak, A., 2015).2.1 Problem Statement As we know that network e-commerce website are more intense to any type of threat or risk, asall the customer information like their personal information, their banking information etc aresaved online. The main targets of hackers are these online sites through which they can hack allthe important and confidential information of clients.

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Contemporary World Application 2022
|10
|541
|10

Cyber Security: Vulnerabilities, Exploitation, and Security Controls
|10
|2384
|453

Computing Technologies Assignment Report
|7
|1221
|30

Network Security: Protecting the Integrity and Usability of Networking Services and Data
|25
|1420
|50

Cyber Security: Motives of Web Application Attacks and Types of Vulnerabilities
|8
|1561
|362

190 - web developmet
|4
|395
|232