Products
Study Documents
AI Grader
AI Answer
AI Code Checker
Plagiarism Checker
AI Paraphraser
AI Quiz
AI Detector
Pricing
Blog
About Us
Get 7 Days Free Trial
Login
Developing A Network Security Plan (PDF)
Verified
Added on 2021/05/31
|
14
|
6430
|
23
AI Summary
Contribute Materials
Your contribution can guide someone’s learning journey. Share your documents today.
Contribute Now
Network Security Plan
Introduction
The paper mainly focusses on the organization “The First National University (FNU)
which is one of the education institution. It is found that due to absence of proper network
system, the organization wants to implement proper security related measures so that the
security issues that the organization faces can be properly resolved. The plan of network
security is mainly deployed in order to make sure that wide area network of the university
must be effectively deployed. The organization mainly have 10 campus in the metropolitan
cities and other 5 campuses with other regional areas. Thus, effective communication is quite
essential for the organization. Moreover it is found that due to deployment of WAN
connection
have
creates
more
challenges
for
the
organization
due
to
complex
ICT
infrastructure, exhaustion of resources as well as due to the security challenges. It is found
that the implications of the various security related functions would be quite beneficial for
effective communication network as well as network connection. It is found that would
generally helpful in protecting the entire network from information extraction as well as from
external
infiltration.
The
security
related
challenges
like
authorization,
authentication,
IDS/IPS is quite helpful for easing the entire implications for the security functions which are
generally utilized by the FNU.
Scope
The scope of the project are as follows:
Development of network of the organization for improving the facilities that are
associated with network communication
Effective as well as proper deployment of the entire operation that generally
favours the implications of the security within the university
The
implications
of
security
is
dependent
on
various
types
of
innovative
technologies as well as implementation of number of functional activities within
FNU.
The project implications mainly include proper systematic deployment of various
types of security policies that generally helps in forming appropriate design of the
network
Utilization of various policies of network security implementation
Objectives
The
project is mainly developed in order to improve the fcailities of network
connection
within
the
orgnaization
that
would
generally
form
proper
deployment
of
organizational operations which will mainly favour the proper security related implications
within FNU. The project objectives are listed below:
To improve the communication as well as network connection by utilizing new
network designed that is mainly developed with the help of the concept of engineering
design
To determine the security issues and vulnerabilities that are associated with network
design for ensuring the root causes of the various issues.
To develop proper policies that is quite helpful in improving the security of the entire
network
*
Networks and Information Security Case study - Copyright © Edilson Arenas - CQUniversity
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
💎 Get Pro
To develop plan for network security that must be favourable for the requirements of
FNU
To implement various types of policies
Assumptions
The main aim of the project is to improve the facilities of network communication
within the organization of FNU for proper as well as effective deployment of entire
operations that generally favours the security related implications within the university. The
network design that is created generally involves factors like:
Security assumptions:
The security functions that is mainly implemented is mainly
dependent on the assumptions, which are listed below:
Physical contact with the various devices will not be created
The security plan that would be implemented will be feasible
The network related design that would be developed would be helpful in sustaining
various network security tools
External disturbances will not be present within the network communication
Design assumptions:
The network design development would include number of
assumptions that are listed below:
Effective function implementation including network communication related principle
Needed routers and switches
Area, which is mainly covered by the routers.
Risk Analysis
Asset Identification and Assessment
The
risk
analysis
is
done
with
the
help
of
the
method
which
include
risk
identification,
risk
assessment
and
risk
classification.
The
organization
“FNU”
would
generally require proper risk analysis in order to determine the risks that are associated with
the network by analyzing the fact that whether the risks that are identified would create
negative impact on the organization or not. The risks that are associated with FNU will
generally be classified with the help of challenges, threats as well as vulnerabilities. The risks
that are identified are quite harmful and thus they can create negative impact on the existing
communication of the University.
Identification of the Asset and Identification of the risk
Physical Assets
The physical threats of the FNU include the various hardware of the ICT infrastructure that
had been deployed at the University. The physical asset analysis would be based on the
division of the work structure in the four sites of FNU. The physical assets would involve the
various hardware and tools required for setting the network structure of the organization. The
dual monitors staff 2000 PCs, headsets, webcams, 20 networked Laser Printers, 50 computer
labs with 1200 Desktop PCs and 50 printers, VoIP video phones are present at each of the
Headquarters (main campus) of FNU. Each of the Metro and Regional campuses have
Desktop 250 PCs, 4 networked Laser Printers, 10 computer labs with 240 PCs and 10
printers. The Operation site and backup has desktop 250 PCs, 4 networked Laser Printers, 10
computer labs with 240 PCs and 10 printers. All these acts as the physical assets for the
university as they are the tangible components bought for setting the network infrastructure.
The physical asset would also comprise of the land area for which the campuses of the
*
Networks and Information Security Case study - Copyright © Edilson Arenas - CQUniversity
university
is
spread.
Although
the
location
would
not
be
effected
by
the
network
vulnerabilities and threats.
Non-Physical Assets
The non-physical threats of the FNU include the various software, network, cost, and network
storage of the ICT infrastructure that had been deployed at the University. The nonphysical
asset analysis would be based on the division of the work structure in the four sites of FNU.
The non-assets would involve the various virtual tools and elements required for setting the
network structure of the organization. The nonphysical assets like 500 Windows 7 operating
system,
one network
attachment
storage
for local
storage,
and
100Base-TX
Switched
Ethernet is present at the each of the Metro and Regional campuses. The nonphysical assets
like 1200 Windows 10 operating system, one network attachment storage (NAS) for local
storage, and 100Base-TX Switched Ethernet is present at the each of the Headquarters (main
campus). The Operations site comprises of 500 Combination of Windows and Linux servers
as Operating systems along with tools like file, web, mail, DHCP, DNS, Authentication,
Blackboard, Domain Controllers, Database, SAN, Load Balancing and video streaming
servers as the nonphysical assets. The learning management and student information systems,
ERP services, investments in sites, and networking principles also act as the non-physical
assets of FNU.
Risks
Individual Asset Risk Analysis
: The individual asset risk analysis is based on the development of the effective risk
assessment for the network connection operations of FNU. The individual risk analysis would
be based for the deployment of the activities favouring the identification of the risk factors.
The various risk factors would be analysed based on the implication of the effective
development of the network design and using network monitoring tools for forming the major
glitches in the network. The probable risk factors for the network connection deployment at
FNU are exposure of the key university applications and services to external individuals due
to the cloud deployment, inappropriate access and use of resources, unauthorised and
malicious internal and external network attacks, and network redundancy. All these issues
would
result
in
forming
the
major
problems
for
the
implementation
of
the
network
connection for the FNU. The issues would result in forming the direct and indirect impact on
the physical and nonphysical assets of FNU. The risk factor would form the issues in
management of the communication for the FNU and it would result in forming the major
issues for the management of the various locations on a single network connection.
Risk Summary
The probable risks of the network implementation are exposure of the key university
applications and services to external individuals due to the cloud deployment, inappropriate
access and use of resources, unauthorised and malicious internal and external network
attacks, and network redundancy. The migration of the key applications and operations would
result in making the data and information available on the cloud platform that can be
accessed from any location resulting in possibility of data misuse and modification. The
possibility of unauthorised and malicious internal and external network attacks is another
major factor that would form the issue in the development of the effective network. The
attacks would result in making the system unable to work and process the query. The attacks
not only make the network slow and sluggish, but it also forms the issues of data interception
*
Networks and Information Security Case study - Copyright © Edilson Arenas - CQUniversity
and forgery. Anyone would be able to change the existing data forming the issues in the
alignment of the operations for FNU. The DDoS attacks is an example for the attack on the
network that would result in harming the operations of the activities. Network redundancy is
related to the traffic issues in the network that can be caused from deliberate and accidental
reasons.
Threats, Challenges and Vulnerabilities
Threats
The threats in network connection can result in forming the issues in the deployment of the
network from external factors. The threats in network can be divided into four variants
namely
external
threat,
internal
threat,
structured
threat,
and
unstructured
threat.
The
unstructured threats to the network would include the inexperienced individuals using
password crackers and shell scripts. These two can be used for hacking into the easily
decrypted password protection and extract information. The structured threats involve the
inclusion of the threat of exploitation of the scripts and codes forming the major influence in
the development of the activities. The advanced hackers and cyber criminals would include
the use of advanced hacking methods for forming the major influence in the application
development. The external attacks would result in making the system unable to work and
process the query. The attacks not only make the network slow and sluggish, but it also forms
the issues of data interception and forgery. Anyone would be able to change the existing data
forming the issues in the alignment of the operations for FNU. The DDoS attacks is an
example for the attack on the network that would result in harming the operations of the
activities. The internal attacks are the person specific attacks caused by the person working in
the network gaining the authentication. The individuals might extract the information from
the network by gaining the access to the network and use it for personal use.
Challenges
The challenges of the network are the various issues that would be generated for the
deployment of the network connection. The implementation had been facing the issue of
complex ICT infrastructure, large exhaustion of the resources, and the security issues. The
probable risk factors for the network connection deployment at FNU are exposure of the key
university applications and services to external individuals due to the cloud deployment,
inappropriate access and use of resources, unauthorised and malicious internal and external
network attacks, and network redundancy. All these issues would result in forming the major
problems for the implementation of the network connection for the FNU. The major
challenges of the project are Password attacks, Trust exploitation, Port redirection, Man-in-
the-middle attacks, Social engineering, and Phishing.
Vulnerabilities
The vulnerabilities in the network connection can be identified as the specific ‘soft spots’ or
internal weaknesses that can result in the occurrence of the network risk occurrence. There
are many reasons due to which the network issues can be raised and it includes the probable
factors of the design or implementation errors of FNU. The technological vulnerabilities that
might impact the network development security functions are operating system weaknesses,
TCP/IP protocol weaknesses, and network equipment weaknesses. The configuration that
might impact the network development security functions are use of easy passwords that can
be deciphered easily, Unsecured user accounts, unsecured default settings, and misconfigured
internet services. The security policy weaknesses that might impact the network development
*
Networks and Information Security Case study - Copyright © Edilson Arenas - CQUniversity
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
💎 Try AI Paraphraser
security functions are lack of security policy, lack of continuity, politics, and lack of logical
access controls. These are the major vulnerabilities classification and vulnerabilities that can
form the impact on the development of the network connection for the FNU. The possibility
of unauthorised and malicious internal and external network attacks is another major factor
that would form the issue in the development of the effective network.
Security Policies
Acceptable Use Policies
An acceptable use policy is defined as one of the document that generally stipulates
the practices as well as constraint’s with which the users need to agree for accessing to proper
corporate framework or the internet. The student of the university must sign these policies
before being getting a proper granted network ID. It is found that when a user is signing
within the ISP that is mainly presented with AUP generally agrees to adhere the stipulations
that are generally provided in the below:
The utilization of services does not violates the law
Not engages within hacking
Not posting any type of commercial messages on the groups of Usenet
Not involving in sending any type of junk emails to anyone.
Email and Communications Policy
The requests that is done for the new connection between the parties that provides
internet connection as well as with the organization. The head of the organization including
the sponsor and the president will sign the agreement. The policy is mainly applied to all the
users of the university who generally provides the services of email including the volunteers,
teachers as well as students. The main purpose of the policy is to proper elaborate the
appropriate utilization of university email id for making sure that the compliance is related
with various regulations, rules as well as policies including the person who are generally
concerned for the protection of email.
Internet and Network Access Policy
The security aspect that is mainly included with the policy of internet and network access is
that the entire network is proper secured with the help of the VPN when no one will be able
to access the data due to different types of security challenges that are mainly related with the
internal
working. It
is
found that
the adherence
policy
concept
must
be successfully
considered by the employees are mainly working for the organization though they are not
connected with the organizational premises.
Workstation Policy
The main purpose of the workstation policy is to make sure that proper as well as
secure infrastructure of the staff of the workstations. It is found that the policy mainly aims to
promote various organizational values for ensuring reliability, integrity as well as availability
of the workstations of the staffs. This policy also helps in ensuring that the workstations that
is associated with the organization will remain consistent with different values as well as
principles that generally govern the facilities as well as services of the university.
*
Networks and Information Security Case study - Copyright © Edilson Arenas - CQUniversity
Network Security Policies
Network related policies helps in outlining the rules for accessing computers and
generally helps in identifying the policies, which are generally enforced for laying out proper
architecture of the company with the network security of the entire environment. It is found
that the entire document is mainly written with the help of the committee. The main benefits
of using this policy is that it helps in keeping the malicious users out and also helps in
entering proper control on the various users of the organizations.
Antivirus Policy
The antivirus policy is considered as one of the significant internal policy that generally
helps in illustrating the anti-virus policy that is mainly placed on various computers that
mainly include scanning of the viruses as well as identifying programs that is generally
utilized within the sector of detection and well as assists in removing malware program. The
concept is mainly designed for preventing various types of infections with the network,
computer as well as other technology related systems. This policy is mainly helpful in
preventing the damage of data, files, applications as well as hardware. The organization
utilizes this policy for preventing the spread of malware. The steps that are taken by the
organization include:
It is the task of the library assistant to upgrade the library definition of the antivirus
once in day
The product that is mainly associated with the antivirus must be successful operated
in a very much real time manner
The concept must be utilized once in a week to keep the organization away from the
risks and challenges that generally occurs due to malware and viruses.
DMZ Policy
The policy that is mainly related DMZ are stated below:
The documents that are related with the project must be properly documented within
the management system of the organization. The significant point of phasis would
generally be on the location of the sector as well as hosts contacts, hardware version
It is found that the important function as well as application are mainly prevailed for
specific group of people
The password groups can be successfully maintained by utilizing the concept of
corporate wide password procedure of management system.
The changes that is mainly related with various aspects of deployment as well as
equipment’s can be proper related with the new equipment’s by following appropriate
procedure of change management processes in context to various aspects of project
governances.
Extranet Policy
The new connectivity that is associated with extranet must be successfully passed
with the help of proper security related review that is mainly related with the information
security department. The main aspect that is associated with review is for making sure that
the requirement matching is one of the most important approach of the policy. In addition to
this, the concept that is mainly taken into consideration is the lease access methodology that
is mainly followed.
*
Networks and Information Security Case study - Copyright © Edilson Arenas - CQUniversity
VPN and Remote Access (Work-at-home) Security Policy
The aspect that is associated with remote access as well as VPN must be successfully
considered which is mainly connected with the VPN network of the corporation. The VPN
can be found to be quite cheaper as per the concept of computing. On the other hand, the
considerations that is mainly related with the electrical cost as well as VPN subscription is
considered very much cost-effective.
Most of the
organizations
generally
allocates
various
aspects
of the
resource
allocation in context to BYOD. The organization mainly develops as well as implements the
BYOD procedures however it is found that it is quite helpful for supporting the BYOD. As
the own device for the organization is not effectively implemented and therefore it generally
helps in creating a negative approach in the viewpoint of the various users. This type of
organizations does not include various types of resources that are generally related with the
BYOD. The policies that is associated with thus policies are mainly elaborated below:
The BYOD related employees as well as the organizations can be able to share the
responsibilities that are mainly associated with the information security
The impact of the policy would generally create area of ownership for the corporate
organization that is generally related with BYOD
Different devices associated with BYOD have a screen lock that is mainly attached to
it for increasing the security for storing the data within the entire device.
The software of the antivirus must be proper installed in order to scan the viruses that
would create impact the security of data and information.
Firewall Policy
The firewall policy mainly states that the planning, development of software, policies
as well as architectures can be successfully deployed. The policies, which are mainly related
with firewall, does not remain stagnant, as there are number of types of threats that mainly
affect the firewall and as per the threat, the policy requires amendments. The concept of logs
as well as must be properly considered for effectively determining the facts that are mainly
related with the threat. The concepts can be considered as one of the significant facts that
must be properly included within the security policy of the firewall.
Intrusion Detection Policy
The policy that is mainly incorporated with the various aspects o network detection
policy are generally stated below:
The prevention as well as detection that is mainly associated with data must be
considered to be important for the organization’
Integrity prevention that is mainly associated with the data of the organization that is
mainly stored within the network of the organization
Keeping all the network resources as well as host available for the various users who
are generally authorized.
Vulnerability Scanning Policy
Vulnerability scanning policy is mainly divided into different sectors like the
aspect that is mainly associated with false positive. The policy that is generally related
with the concept of false positive is that proper identification must be done depending on
the emails as well as based on ticketing system of the corporate. The risks that are
related are considered quite acceptable for improvement.
*
Networks and Information Security Case study - Copyright © Edilson Arenas - CQUniversity
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
💎 Get Pro
Internet Policy
The policy of internet is mainly associated with feature access that is mainly
associated with the internet. It is found that for most of the times, the features are generally
made that directly helps in affecting the organization’s functionality. However, it is stated by
that the organizations security is generally compromised with the help of various types of
unethical ways for achieving the desired working standard.
IP Address and Documentation Management Policy
The documentation related policy that is mainly considered generally deals with
various data of the organizations for accessing the data that plays a great role that is mainly
associated
with the work of the organization..
The organizations
document
is mainly
considered as one of the significant aspect as it generally related with the organization’s
security.
Physical Security Policies
External Protection
The policies that are related with external protection are stated below:
The access of the server is only provided to the authorized users
The equipment’s that are mainly logged in and then removed are kept under
record for ensuring proper security
The access must be provided to the user after proper security check.
Internal Protection
The internal protection is found as the policies that are mainly included for the employees of
the organization. The different types of considerations that are generally taken into account
are as follows:
The organization must be remain aware about the activities that are mainly performed
within the organization
The computer system must be properly kept safe from various types of illegal
activities
The policies must be associated with the information system, security that is mainly
disposed as per the equipment’s as well as policies of media disposal.
Personnel Policies
Visitors Policy
The policy is visitors must be properly directed as per the aspect that is mainly
associated with the access of the system within the organization that mainly have data
storage. If some third party accesses the data that are stored with the database of the
organization then it will create a major issue for the user, thus this policy mainly helps in
security the data from providing access of visiting to all.
Employee Hiring and Termination Policy
The employees hiring within the organization must be done based on the education
aspect that would directly help the organization. If any type of the organizational employees
engage in some other type of unethical ways then there would different types of policies for
them.
*
Networks and Information Security Case study - Copyright © Edilson Arenas - CQUniversity
User training Policy
The user training policy must be followed while providing training facility to the
various employees of the organization so that the people who are mainly involved within the
training can be able to get better concept as well as latest technology that is mainly associated
with this aspect.
Data Policies
Information Classification and Sensitivity Policy
The confidential information must be effectively maintained in a very much encrypted
form so that no third person can be able to access the data as well as information.
Encryption Policy
The organizational data as well as information must be successfully encrypted as it
can directly affect the security of the data. This means that the data as well as information
would not go into other persons.
Backup Policy
Data backup is found to be significant because there is number of errors in the data,
which would stops, backup of data and information.
Password Management and Complexity Policy
Password must be properly incorporated in a quite effective way that would secure
the data of the organization and the authorized user must properly access the system.
System and Hardware Policies
Hardware Lifecycle and Disposal Policy
The hardware of the organization must be properly updated on a daily basis, which
helps in stating the efficiency of the sector that is related with the working of the technology.
Workstation Policy
The workstation of the organization must provide proper security of the data
The access must be done in a very much effective way
Switch and Router Policy
The router related activity as well as system legacy must be maintained
The switches must be effectively updated
Server Security Policy
The server needs to be maintained properly
Proper maintenance is needed for successful performance of the server.
Logging Policy
Logging must be generally done from the authorized user by considering both
username as well as passwords that would generally helpful in keeping the entire system
secure.
Disaster Recovery and Business Continuity
Business Impact Analysis
*
Networks and Information Security Case study - Copyright © Edilson Arenas - CQUniversity
If any type of accident occurs within the business then the organization ether by
understand the impact of the risks on the business or by determining ways that would be
helpful in minimizing the impact, the problems related with the entire organization can be
successfully recovered.
Insurance Consideration
Efficient consideration s of insurance must be done within the company that already has a
policy of back is any type of problem occurs within the organization.
Incident Response Team
The incident response team mainly assembles so that they can be able to take proper
actions during the incidents including incident response related procedure. This is considered
as one of the procedure that is competent for the incident response team.
Physical Safeguards
There are number of phyical process that generally involves with the procedures as welll
as policies that is mainly utilized for protecting the electrobinx information system. This
mainly helps in safeguarding the physical equipment’s of various organizations.
Prepared Items
The prepared items are mainly prepared by the organizations for safeguarding the
properties as well as external agents from the business.
Incident Response Procedures
The incident response procedure helps in outlining various activities that will take
within the organization. It is found that the decisions that is generally made before the
incident are quite superior. The procedures can be successfully vetted as this can generally
lead to a robust decision making.
Restoration Procedures
The procedure of restoration is considered as one of the backup preocedure that
would be quite helpful for restoring the satete of the business.
Forensics Considerations
The forensic can be successful applied by the organization for mitigating various
types of risks as well as challenges.
Maintaining the Plan
It is quite important for the organization for successfully following the plan that is
generally developed by them as per the plan.
Security Strategies and Recommended Controls
Security Strategies
Security strategy is for securing the information is data security. Authentication is the top
most priority in this security system. For this network, one of the major security concern is
the information security. All the data must be secure in a proper way. Much different type of
*
Networks and Information Security Case study - Copyright © Edilson Arenas - CQUniversity
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
💎 Try AI Paraphraser
security strategies are present like implementation of firewall, port security, access control.
Access control is one of the major security process for the college network. By the help of the
access control, the network admin can limit the uses of the users. In addition, the network
admin can restrict the unauthorized access. In access control list, all the users restriction
details are given by the admin. On the other hand, firewall is also one of the major security
device for this network. Firewall will protect the unauthorized access from outside. Mainly
two type of firewalls are used in the network security. One is packet filter firewall and
another one-proxy filter firewall. In here, proxy filter firewall is used. The proxy filter
firewall use a proxy filter in the network for bypass the access.
Specific recomended Controls to mitigate the risks uncovered
The risk factors are properly identified so it does not create any type of risks factors
that are generally working within the entire organization. The main factor that is mainly
considered if there is always proper backup that would not be connected with the working of
the organization. Focus must be on risk identification so that the challenges associated with
the organization can be properly identified.
Residual Risks
The residual risk factors for the various network related projects include trust
exploitation, post redirection, social engineering attack and more. This are risk factors, which
would be removed from the policy of security that would generally create impact on the
network connection.
Ref No.
Description
Severity
Probability
Mitigation
Strategies
Residual Plan
#9540021
Attacks
on
password
Major
Likely
Reduce
The risk can be
mitigated
with
the
help
of
biometric
passwords.
#9540022
Exploitation
of trust
Moderate
Possible
Transfer
The
sensitive
data
must
be
properly
managed.
#9540023
Redirection
of port
Minor
Unlikely
Accept
The
hardware
must
be
successfully
handled.
#9540024
Man-In-The-
Middle
Attacks
Moderate
Likely
Avoid
Implementation
of
security
measures
would
be
helpful
in
resolving risks.
#9540025
Social
Engineering
Attack
Minor
Rare
Exploit
Should
be
generally
used
for
system
benefit.
*
Networks and Information Security Case study - Copyright © Edilson Arenas - CQUniversity
Resources
The resources that should be secured from the external agents from being accessed
should be identified for securing the network assets. The platform that should be used for the
development of the network solution and the cloud vendor should be selected for moving the
data in the cloud servers and maintain the security of the data. The data that should be moved
to the cloud servers should be identified for maintaining the security of the data. The routers,
switches and the servers should be secured with the application of different password policy
such that the settings in the network device should be cannot be modified by the illegal users
and the security of the network is maintained. Moreover the human resources such as the staff
policy and the students using the network should be identified for management of the users
using the network solution designed for first national university.
Conclusion
From the above report it can be concluded that with the development of the network
security plan design the vulnerabilities associated with the development of the network
design can be identified and helps in securing the network from external agents. The creation
of the network security policy also helps to implement different network security technology
and reduce the errors in the network. The risk mitigation should be prepared following the
network security plan and it should be removed for enforcing the security measures in the
network. The threats acting on the network should be identified for the preparation of the
network security plan and a research is made on the different network security policy that can
be implemented in the network such as email and communication policy, Internet and
network policy, workstation policy, etc. for enforcing the security in the network. The
application of the antivirus policy, DMZ rules and VPN tunnel for allowing the remote users
to connect with the network can help in improving the security from the external threats
acting on the network resources.
*
Networks and Information Security Case study - Copyright © Edilson Arenas - CQUniversity
References
Acemoglu, D., Malekian, A., & Ozdaglar, A. (2016). Network security and contagion.
Journal of Economic Theory, 166, 536-585.
Bays, L. R., Oliveira, R. R., Barcellos, M. P., Gaspary, L. P., & Madeira, E. R. M. (2015).
Virtual network security: threats, countermeasures, and challenges. Journal of Internet
Services and Applications, 6(1), 1.
Beberlein, L. T., Dias, G., Levitt, K. N., Mukherjee, B., & Wood, J. (2017). Network attacks
and an Ethernet-based network security monitor.
Chen, G., Gong, Y., Xiao, P., & Chambers, J. A. (2015). Physical layer network security in
the full-duplex relay system. IEEE transactions on information forensics and security,
10(3), 574-583.
Jatav, V. K., & Singh, V. (2014, September). Mobile WiMAX network security threats and
solutions: a survey. In Computer and Communication Technology (ICCCT), 2014
International Conference on (pp. 135-140). IEEE.
Jouini, M., Rabai, L. B. A., & Aissa, A. B. (2014). Classification of security threats in
information systems. Procedia Computer Science, 32, 489-496.
Kazim, M., & Zhu, S. Y. (2015). A survey on top security threats in cloud computing.
International Journal of Advanced Computer Science and Applications (IJACSA).
Kizza, J. M. (2017). Guide to computer network security. Springer.
Knapp, E. D., & Langill, J. T. (2014). Industrial Network Security: Securing critical
infrastructure networks for smart grid, SCADA, and other Industrial Control Systems.
Syngress.
Omar, S. (2017). Information system security threats and vulnerabilities: evaluating the
human factor in data protection(Doctoral dissertation).
Perlman, R., Kaufman, C., & Speciner, M. (2016). Network security: private communication
in a public world. Pearson Education India.
Perlman, R., Kaufman, C., & Speciner, M. (2016). Network security: private communication
in a public world. Pearson Education India.
Ranak, M. N., Azad, S., Ruhee, B. K., Nisa, N. N., Kabir, N., Rahman, M. M., & Zamli, K.
Z. (2018). IPTV Network Security: Threats and Countermeasures. IPTV Delivery
Networks: Next Generation Architectures for Live and Video-on-Demand Services,
203.
Roman, R., Lopez, J., & Mambo, M. (2018). Mobile edge computing, fog et al.: A survey and
analysis of security threats and challenges. Future Generation Computer Systems, 78,
680-698.
Sharma, R. K., & Rawat, D. B. (2015). Advances on security threats and countermeasures for
cognitive radio networks: A survey. IEEE Communications Surveys & Tutorials,
17(2), 1023-1043.
Tu, G. H., Li, C. Y., Peng, C., & Lu, S. (2015, September). How voice call technology poses
security threats in 4g lte networks. In Communications and Network Security (CNS),
2015 IEEE Conference on (pp. 442-450). IEEE.
Wang, L., Jajodia, S., Singhal, A., Cheng, P., & Noel, S. (2014). k-zero day safety: A
network security metric for measuring the risk of unknown vulnerabilities. IEEE
Transactions on Dependable and Secure Computing, 11(1), 30-44.
White, G. B., Fisch, E. A., & Pooch, U. W. (2017). Computer system and network security.
CRC press.
Yu, T., Sekar, V., Seshan, S., Agarwal, Y., & Xu, C. (2015, November). Handling a trillion
(unfixable) flaws on a billion devices: Rethinking network security for the Internet-of-
*
Networks and Information Security Case study - Copyright © Edilson Arenas - CQUniversity
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
💎 Get Pro
Things. In Proceedings of the 14th ACM Workshop on Hot Topics in Networks (p. 5).
ACM.
Yu, T., Sekar, V., Seshan, S., Agarwal, Y., & Xu, C. (2015, November). Handling a trillion
(unfixable) flaws on a billion devices: Rethinking network security for the Internet-of-
Things. In Proceedings of the 14th ACM Workshop on Hot Topics in Networks (p. 5).
ACM.
*
Networks and Information Security Case study - Copyright © Edilson Arenas - CQUniversity
1 out of 14
Download
Related Documents
Network security Assignment PDF
|
25
|
1745
|
28
View Document
Network Security: Threats and Countermeasures
|
24
|
6349
|
50
View Document
Development of Network Infrastructure: Project Management
|
17
|
3010
|
336
View Document
DATA COMMUNICATION AND NETWORKS - OVERVIEW
|
10
|
1877
|
18
View Document
Project Management: Implementation of Network System
|
17
|
2412
|
135
View Document
Project Management: Development of a Network Infrastructure
|
18
|
2307
|
104
View Document