logo

Network Security

   

Added on  2023-04-20

17 Pages9823 Words402 Views
Running head: NETWORK SECURITY
Network security
Name of the Student
Name of the University
Author’s Note
Network Security_1
1
NETWORK SECURITY
Executive Summary
Unified communication is used for integrating the different real time communication system into a
single platform for saving the cost and increasing the efficiency of communication between the user.
Internet protocol is used for allowing the service and application to communicate with each other.
Since the cost of implementation of unified communication model is higher it is not feasible for small
and medium sized business. The implementation of cloud based solution in the business can help in
development of powerful platform and enables the organization to migrate their files and information
in the cloud servers for sharing it with the users in different location. The selection of the cloud
platform helps in reducing the operational expense and eliminate the need of redundant equipment for
integrating the communication model in an unified platform. The performance issues of the network
and the ability of the network for tolerating delay and jitter is needed to be managed for eliminating the
jitter and guaranteeing quality of service. The organizational network is needed to be created with the
application of different protocols and technologies that enables the network to connect the remote
user for accessing the organizational resources and controlling the flow of data traffic in the network.
The network resources are needed to be partitioned and service level agreement is needed to be
created by defining the service policy and client requirement. Integrated service and availability of end
to end bandwidth is depended for elimination of congestion in the network and reach the remote
location in a minimum time frame.
Network Security_2
2
NETWORK SECURITY
Table of Contents
Introduction............................................................................................................................................ 3
UC Threat Modelling.............................................................................................................................. 3
Design Specifications and Ethical Considerations.................................................................................6
Differentiation of services and classes of applications and their requirements..................................6
Security threats:................................................................................................................................. 8
Solution of the security issues:........................................................................................................... 9
Monitoring.......................................................................................................................................... 9
Remote User management.............................................................................................................. 11
Ethical Consideration:...................................................................................................................... 11
Conclusion........................................................................................................................................... 13
Bibliography......................................................................................................................................... 15
Network Security_3
3
NETWORK SECURITY
Introduction
The report is prepared for an international law firm Fenwick Inc for the identification of the
potential of the business opportunity in the greater Newcastle area. In the report a design is proposed
for the implementation of the secure Unified Communication (UC) in the current business process for
meeting the needs of the customer. The development of the unified communication system would
help the organization to eliminate the communication barrier for operating 3 large offices in different
geographical location. For the management of the communication between the three large firms
different services are needed to be provided for the unification of the tools used for communication
and securing the communication between the employees. For interconnecting each of the branches a
distributed network infrastructure should be developed that has the ability to exchange different type
of information. For the development of the network solution an unified threat modelling is created and
the design specification and ethical consideration are evaluated for eliminating the errors and develop
the solution meeting the needs of the organization. There are different approaches that are
implemented for guaranteeing service for the multimedia application and the approaches are divided
into adaptation based schemes, reservation based schemes and network level protocols. The network
level protocols are used for providing QoS support by analysing the network parameters and
interpreting it with the application requirement. It helps in enhancement of the switches connected in
the network and management of the application flow service. The reservation based schemes are
used for reserving the resources of the network following the requirement of the application.
Admission control mechanism are used for matching the request of the application with the availability
of resource. The adaptation based schemes are used for utilizing the adaptive behaviour of the
application that does not have a need of hard service and perform active resource management that
is aware of different application. There are different optimization schemed that are applied for the
development of unified communication network such as integration of the application processing with
the data transport for improvement of the performance of the application and services.
UC Threat Modelling
The unified communication is used for integrating more than one real time communication
system as a single platform and recording the details of the interaction between the user and the
different services provided to the user connected in the network. The model should be developed
such that the user connect with the network from any geographical location. There are different risk
acting on the unified communication network and most of the attacks in the unified communication
network occurs from the internal sources and there is a need to develop a BYOD policy for the
employees for securing the network from malware, data leakage and other types of attacks(Carroll
2014). The poor security practice followed for the development of the network should be identified and
proper security measures should be applied for securing the network from the internal or the external
agents. The following risks are identified and need to be mitigated for the development of unified
communication system such as:
Troll frauds – This risk arise when an attacker forges with the VoIP system by making calls using a
stolen account and automate calls by ringing and generate massive bills for the organization. The
security of the network can be compromised causing different types of attacks such as buffer
overflow, bypass fraud and call transfer.
Eavesdropping – this type of attacks are performed by the attacker for compromising the
network security of the unified communication network with the use of malware and exploiting the
network. The hacker can steal insider information by listening to the board meetings and this type of
attack may not occur at a real time since the hacker can drop in and out of the network for gathering
the data or information captured that are necessary.
Packet Injection – this type of attack occurs for altering the nature of the data traffic in the
network that is intended for a destination address (Inukollu, Arsi and Ravuri 2014). The attacker
injects malformed packets or modifies the RTP packets for intercepting the communication.
Phishing and Vishing – this method is used for attempting and acquiring private or personal
information and is performed by performing fraud attempt for gaining the banking information with the
means of email. The concept of vishing is used as the backbone of phishing and it is done for the
fraud the voice service that takes place using the VoIP and the telephony service of the network.
Network Security_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Network Security Assignment Solution
|10
|2709
|111

Networking Fundamentals : Assignment
|3
|1964
|98

Assignment on Computer Network
|20
|1261
|59

Security Mechanisms and Benefits of Unified Communications
|4
|702
|289

An Interim Report on: Securing a Local Area Network
|14
|2793
|72

COIT20264 Network Design - Desklib
|14
|1847
|162