Assignment - Network Security
VerifiedAdded on 2022/08/17
|16
|2075
|13
AI Summary
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: NETWORK SECURITY
Network Security
Name of the Student:
Name of the University:
Author Note
Network Security
Name of the Student:
Name of the University:
Author Note
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1
NETWORK SECURITY
Table of Contents
Task 1...............................................................................................................................................2
Setting up a virtual environment..................................................................................................2
Using tools...................................................................................................................................5
List of likely security threats.......................................................................................................8
Task 2.............................................................................................................................................12
Background and purpose...........................................................................................................12
Scope..........................................................................................................................................12
Roles and responsibilities..........................................................................................................12
Policy framework.......................................................................................................................13
Distribution, training and implementation.................................................................................13
Monitoring, feedback and reporting..........................................................................................13
Business continuity....................................................................................................................14
References......................................................................................................................................15
NETWORK SECURITY
Table of Contents
Task 1...............................................................................................................................................2
Setting up a virtual environment..................................................................................................2
Using tools...................................................................................................................................5
List of likely security threats.......................................................................................................8
Task 2.............................................................................................................................................12
Background and purpose...........................................................................................................12
Scope..........................................................................................................................................12
Roles and responsibilities..........................................................................................................12
Policy framework.......................................................................................................................13
Distribution, training and implementation.................................................................................13
Monitoring, feedback and reporting..........................................................................................13
Business continuity....................................................................................................................14
References......................................................................................................................................15
2
NETWORK SECURITY
Task 1
Setting up a virtual environment
For the setup of the virtual machine the Kali Linux virtual box image file has been
downloaded from the internet. The oracle virtual box has been used here for the running and
installation of the virtual box image. All the details required for the installation has been
described in figure number 1.
NETWORK SECURITY
Task 1
Setting up a virtual environment
For the setup of the virtual machine the Kali Linux virtual box image file has been
downloaded from the internet. The oracle virtual box has been used here for the running and
installation of the virtual box image. All the details required for the installation has been
described in figure number 1.
3
NETWORK SECURITY
Figure 1: Virtual VMware settings
Source: (Created by author)
Some additional setting is required to be performed before the virtual machine can be
started easily. The USB controller has been unchecked in the settings. The rest of the default
settings have been maintained.
Figure 2: Virtual VMware USB settings
NETWORK SECURITY
Figure 1: Virtual VMware settings
Source: (Created by author)
Some additional setting is required to be performed before the virtual machine can be
started easily. The USB controller has been unchecked in the settings. The rest of the default
settings have been maintained.
Figure 2: Virtual VMware USB settings
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
4
NETWORK SECURITY
Source: (Created by author)
After all the settings have been applied for the system the welcome screen as per figure
number 4 appears. The terminal in the kali Linux operating is then used for running wire shark.
Figure 3: Virtual VMware additional settings
Source: (Created by author)
NETWORK SECURITY
Source: (Created by author)
After all the settings have been applied for the system the welcome screen as per figure
number 4 appears. The terminal in the kali Linux operating is then used for running wire shark.
Figure 3: Virtual VMware additional settings
Source: (Created by author)
5
NETWORK SECURITY
Figure 4: Kali Linux home screen
Source: (Created by author)
Using tools
The description of the use of the wire shark tool has been done here. Wire shark is one of
the very important network analyzer tool (Whitt and You 2018). It can be used for the analysis of
the network and identification of the vulnerabilities and the level of vulnerabilities identified in
the system. The real time analysis of the network of the can be performed in the system and for
troubleshooting the issues which are taking place currently in the network.
The issues with the packets which are dropped and the malicious activities in the network
can be easily rectified with the analysis and risk mitigations (Haer et al. 2017). This would be
helpful in preventing the network from the hacking.
NETWORK SECURITY
Figure 4: Kali Linux home screen
Source: (Created by author)
Using tools
The description of the use of the wire shark tool has been done here. Wire shark is one of
the very important network analyzer tool (Whitt and You 2018). It can be used for the analysis of
the network and identification of the vulnerabilities and the level of vulnerabilities identified in
the system. The real time analysis of the network of the can be performed in the system and for
troubleshooting the issues which are taking place currently in the network.
The issues with the packets which are dropped and the malicious activities in the network
can be easily rectified with the analysis and risk mitigations (Haer et al. 2017). This would be
helpful in preventing the network from the hacking.
6
NETWORK SECURITY
Figure 5: Getting started with wire shark
Source: (Created by author)
Wireshark inside the Linux operating system is started command sudo wireshak
command and the Wireshark welcome screen is obtained. The eth0 interface has been selected
for capturing the packets from it. The first capture has been done without any broadcasts.
NETWORK SECURITY
Figure 5: Getting started with wire shark
Source: (Created by author)
Wireshark inside the Linux operating system is started command sudo wireshak
command and the Wireshark welcome screen is obtained. The eth0 interface has been selected
for capturing the packets from it. The first capture has been done without any broadcasts.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
7
NETWORK SECURITY
Figure 6: Wireshark home screen
Source: (Created by author)
Figure 7: First Capture
Source: (Created by author)
NETWORK SECURITY
Figure 6: Wireshark home screen
Source: (Created by author)
Figure 7: First Capture
Source: (Created by author)
8
NETWORK SECURITY
Figure 8: Second Capture
Source: (Created by author)
The second capture has been taken with the broadcast within the vm. airmon-ag has been
has been used on the eth0 interface and the packets released during the broadcast has been saved
in the second capture. The security threats likely for the network can be identified using this
method.
List of likely security threats
The list of the most likely security threats for the
Asset Threat Loss Countermeasure
Equipment Theft: There can theft of the
networking peripherals
Output devices,
input devices and
the supporting
Hiring personnel to
guard the networking
peripherals.
NETWORK SECURITY
Figure 8: Second Capture
Source: (Created by author)
The second capture has been taken with the broadcast within the vm. airmon-ag has been
has been used on the eth0 interface and the packets released during the broadcast has been saved
in the second capture. The security threats likely for the network can be identified using this
method.
List of likely security threats
The list of the most likely security threats for the
Asset Threat Loss Countermeasure
Equipment Theft: There can theft of the
networking peripherals
Output devices,
input devices and
the supporting
Hiring personnel to
guard the networking
peripherals.
9
NETWORK SECURITY
devices of the
servers.
Equipment Fire: The equipment would catch
fire in case of short circuit.
Output devices,
input devices and
the supporting
devices of the
servers.
Deployment of fire
extinguishers and
alerting system within
the premises of the
R&D sector of the
organization.
Equipment Electrical connections: There can
be damages in the wires which are
connected to the networking
peripherals.
Cables and wires
which are used for the
connections in the
network can be
damaged.
Authenticatio
n
Malfunctioning of the Biometric
security mechanism: The
biometric device and the algorithm
can be hampered if not maintained
properly over the long run. In
addition to this, there can be issues
with unknown people entering the
premises.
The whole
network can be
subjected to
intrusion.
Use of protective
devices on the
biometric system.
Authenticatio
n
Error in the database of the
biometric system: If there are any
The whole
network can be
Use of protective
devices on the
NETWORK SECURITY
devices of the
servers.
Equipment Fire: The equipment would catch
fire in case of short circuit.
Output devices,
input devices and
the supporting
devices of the
servers.
Deployment of fire
extinguishers and
alerting system within
the premises of the
R&D sector of the
organization.
Equipment Electrical connections: There can
be damages in the wires which are
connected to the networking
peripherals.
Cables and wires
which are used for the
connections in the
network can be
damaged.
Authenticatio
n
Malfunctioning of the Biometric
security mechanism: The
biometric device and the algorithm
can be hampered if not maintained
properly over the long run. In
addition to this, there can be issues
with unknown people entering the
premises.
The whole
network can be
subjected to
intrusion.
Use of protective
devices on the
biometric system.
Authenticatio
n
Error in the database of the
biometric system: If there are any
The whole
network can be
Use of protective
devices on the
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
10
NETWORK SECURITY
error in storing data in the
database that bonds the biometric
system then there would be huge
difficulties regarding the
authentication in the system.
subjected to
intrusion.
biometric system.
Software Computer Virus: A piece of
software which is designed for
spreading from a computer to
another. This type of software are
generally transferred via the email
and use of USB.
The computer
software and
operating
systems maybe
damaged from
this.
As a countermeasure
the anti-viruses can be
installed into the
computer system.
Software Rogue security software: This type
of software leads the users to
thinking that there is virus infected
system that the user is using
currently. Hence, the users might
fall into a trap and cause intrusion
into the system.
The computer
software and
operating
systems maybe
damaged from
this.
As a counter measures
the personnel who are
working in the network
would be advised to
perform actions that
would not be
hampering the security
of the system.
Software Trojan horse: The software is used
for tricking the users to make the
attack easily. The software is often
spread by email and the virus
The computer
software and
operating
systems maybe
As a counter measures
the personnel who are
working in the network
would be advised to
NETWORK SECURITY
error in storing data in the
database that bonds the biometric
system then there would be huge
difficulties regarding the
authentication in the system.
subjected to
intrusion.
biometric system.
Software Computer Virus: A piece of
software which is designed for
spreading from a computer to
another. This type of software are
generally transferred via the email
and use of USB.
The computer
software and
operating
systems maybe
damaged from
this.
As a countermeasure
the anti-viruses can be
installed into the
computer system.
Software Rogue security software: This type
of software leads the users to
thinking that there is virus infected
system that the user is using
currently. Hence, the users might
fall into a trap and cause intrusion
into the system.
The computer
software and
operating
systems maybe
damaged from
this.
As a counter measures
the personnel who are
working in the network
would be advised to
perform actions that
would not be
hampering the security
of the system.
Software Trojan horse: The software is used
for tricking the users to make the
attack easily. The software is often
spread by email and the virus
The computer
software and
operating
systems maybe
As a counter measures
the personnel who are
working in the network
would be advised to
11
NETWORK SECURITY
spreads with advertisement. damaged from
this.
perform actions that
would not be
hampering the security
of the system.
Software Computer worm: A piece of
malware program would be able to
replicate a program in the current
and the spread itself to all parts of
the system.
The computer
software and
operating
systems maybe
damaged from
this.
As a counter measures
the personnel who are
working in the network
would be advised to
perform actions that
would not be
hampering the security
of the system.
Software Rootkit: A group of software
which provide remote control for
the access to the computer network
and these tool comes with the pre-
installed key loggers and password
stealers.
The computer
software and
operating
systems maybe
damaged from
this.
The Firewalls can be
installed into the
network so that they
would be able to stop
the rootkits from
functioning within the
system.
NETWORK SECURITY
spreads with advertisement. damaged from
this.
perform actions that
would not be
hampering the security
of the system.
Software Computer worm: A piece of
malware program would be able to
replicate a program in the current
and the spread itself to all parts of
the system.
The computer
software and
operating
systems maybe
damaged from
this.
As a counter measures
the personnel who are
working in the network
would be advised to
perform actions that
would not be
hampering the security
of the system.
Software Rootkit: A group of software
which provide remote control for
the access to the computer network
and these tool comes with the pre-
installed key loggers and password
stealers.
The computer
software and
operating
systems maybe
damaged from
this.
The Firewalls can be
installed into the
network so that they
would be able to stop
the rootkits from
functioning within the
system.
12
NETWORK SECURITY
Task 2
Background and purpose
A multinational pharmaceutical company in the West Midlands have a readymade
network layout for themselves. One of the department R and D of the organization have a very
efficient security mechanism which are currently, in use for the organization. As a security
manager it is important that security of the department in the organization is maintained
efficiently and the networking security standards for the organization are maintained efficiently.
The main purpose of this report is to analyze the current network of the organization and
formulate a policy for the organization which would be secure (Perlman, Kaufman and Speciner
2016). The confidentiality and the traffic in the network of the organization are required to be
maintained.
Scope
The main purpose of the assessment is to develop a proper network security policy that
will be capable of protecting the data that are transmitted over the network (Acemoglu, Malekian
and Ozdaglar 2016). Network security policy is referred to the formal documents that are used
for the purpose of defining the strict laws that will be capable of safeguarding the network.
Roles and responsibilities
As a security manager it is important to evaluate the different issues that are faced while
working within the West Midlands. It has been observed that there are several issues that are
hampering the security aspect of the organization. Thus there is a need to implement proper
network security policy that will safeguard the data transmission (Cuppens, Cuppens-Boulahia
NETWORK SECURITY
Task 2
Background and purpose
A multinational pharmaceutical company in the West Midlands have a readymade
network layout for themselves. One of the department R and D of the organization have a very
efficient security mechanism which are currently, in use for the organization. As a security
manager it is important that security of the department in the organization is maintained
efficiently and the networking security standards for the organization are maintained efficiently.
The main purpose of this report is to analyze the current network of the organization and
formulate a policy for the organization which would be secure (Perlman, Kaufman and Speciner
2016). The confidentiality and the traffic in the network of the organization are required to be
maintained.
Scope
The main purpose of the assessment is to develop a proper network security policy that
will be capable of protecting the data that are transmitted over the network (Acemoglu, Malekian
and Ozdaglar 2016). Network security policy is referred to the formal documents that are used
for the purpose of defining the strict laws that will be capable of safeguarding the network.
Roles and responsibilities
As a security manager it is important to evaluate the different issues that are faced while
working within the West Midlands. It has been observed that there are several issues that are
hampering the security aspect of the organization. Thus there is a need to implement proper
network security policy that will safeguard the data transmission (Cuppens, Cuppens-Boulahia
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
13
NETWORK SECURITY
abd Garcia-Alfaro 2019). With the help of proper enhancement within the network it will
become easy to protect the network from possible threats.
Policy framework
Network security is considered as the most crucial aspect of an organization. Thus there
is a need to implement proper policy framework that will enhance the business performance
(Bhardwaj et al. 2016). The steps that are associated with successful policy framework are listed
below:
Taking proper physical precautions for protecting the network
Ensuring that proper network security firewalls are embedded within the system
Using firewalls for both hardware and software
Updating and installing all the recent version of software for protecting the data
Implementing strong password
Distribution, training and implementation
The network security policy needs to be developed effectively so that the performance of
the organization can be enhanced (Steele et al. 2018). The company conducts several research for
the purpose of providing medicines and vaccines towards the HIV/AIDS patients. In order to
implement proper security measures within the network of the organization it is important to
train every employees regarding the possible consequences. Every employee needs to be given
proper training for the purpose of implementing proper network security within the organization.
Monitoring, feedback and reporting
The network is required to be monitored regularly by the staffs and the network
administrator. The staffs are to use the network analyzing tools for the monitoring and error
NETWORK SECURITY
abd Garcia-Alfaro 2019). With the help of proper enhancement within the network it will
become easy to protect the network from possible threats.
Policy framework
Network security is considered as the most crucial aspect of an organization. Thus there
is a need to implement proper policy framework that will enhance the business performance
(Bhardwaj et al. 2016). The steps that are associated with successful policy framework are listed
below:
Taking proper physical precautions for protecting the network
Ensuring that proper network security firewalls are embedded within the system
Using firewalls for both hardware and software
Updating and installing all the recent version of software for protecting the data
Implementing strong password
Distribution, training and implementation
The network security policy needs to be developed effectively so that the performance of
the organization can be enhanced (Steele et al. 2018). The company conducts several research for
the purpose of providing medicines and vaccines towards the HIV/AIDS patients. In order to
implement proper security measures within the network of the organization it is important to
train every employees regarding the possible consequences. Every employee needs to be given
proper training for the purpose of implementing proper network security within the organization.
Monitoring, feedback and reporting
The network is required to be monitored regularly by the staffs and the network
administrator. The staffs are to use the network analyzing tools for the monitoring and error
14
NETWORK SECURITY
detections in the network (Woodall et al. 2017). The staffs who would be handling the analyzer
would be gathering the feedback from the analyzer and the reports would be sent to the network
administrator. In addition to this, staffs working in the organization should provide inputs on the
security constraints of the network to the network administrator.
Business continuity
The organization should be having distributed datacenters linked to the main network and
they should be storing the data of the organization at differently levels of accessibility (Rezaei et
al. 2019). This would be helpful in data recovery in time of disaster.
NETWORK SECURITY
detections in the network (Woodall et al. 2017). The staffs who would be handling the analyzer
would be gathering the feedback from the analyzer and the reports would be sent to the network
administrator. In addition to this, staffs working in the organization should provide inputs on the
security constraints of the network to the network administrator.
Business continuity
The organization should be having distributed datacenters linked to the main network and
they should be storing the data of the organization at differently levels of accessibility (Rezaei et
al. 2019). This would be helpful in data recovery in time of disaster.
15
NETWORK SECURITY
References
Whitt, W. and You, W., 2018. A robust queueing network analyzer based on indices of
dispersion. preparation, Columbia University, http://www. columbia. edu/
∼ ww2040/allpapers.
html.
Haer, T., Botzen, W.W., de Moel, H. and Aerts, J.C., 2017. Integrating household risk mitigation
behavior in flood risk analysis: an agent‐based model approach. Risk Analysis, 37(10), pp.1977-
1992.
Perlman, R., Kaufman, C. and Speciner, M., 2016. Network security: private communication in a
public world. Pearson Education India.
Acemoglu, D., Malekian, A. and Ozdaglar, A., 2016. Network security and contagion. Journal
of Economic Theory, 166, pp.536-585.
Cuppens, F., Cuppens-Boulahia, N. and Garcia-Alfaro, J., 2019. Misconfiguration management
of network security components. arXiv preprint arXiv:1912.07283.
Bhardwaj, A., Subrahmanyam, G.V.B., Avasthi, V. and Sastry, H., 2016. Design a Resilient
Network Infrastructure Security Policy Framework. Indian Journal of Science and Technology,
9(19), pp.1-8.
Steele, J.L., Steiner, E.D., Hamilton, L.S. and Education, R.A.N.D., 2018. Distributing
Instructional Leadership.
Woodall, W.H., Zhao, M.J., Paynabar, K., Sparks, R. and Wilson, J.D., 2017. An overview and
perspective on social network monitoring. IISE Transactions, 49(3), pp.354-365.
Rezaei Soufi, H., Torabi, S.A. and Sahebjamnia, N., 2019. Developing a novel quantitative
framework for business continuity planning. International Journal of Production Research,
57(3), pp.779-800.
NETWORK SECURITY
References
Whitt, W. and You, W., 2018. A robust queueing network analyzer based on indices of
dispersion. preparation, Columbia University, http://www. columbia. edu/
∼ ww2040/allpapers.
html.
Haer, T., Botzen, W.W., de Moel, H. and Aerts, J.C., 2017. Integrating household risk mitigation
behavior in flood risk analysis: an agent‐based model approach. Risk Analysis, 37(10), pp.1977-
1992.
Perlman, R., Kaufman, C. and Speciner, M., 2016. Network security: private communication in a
public world. Pearson Education India.
Acemoglu, D., Malekian, A. and Ozdaglar, A., 2016. Network security and contagion. Journal
of Economic Theory, 166, pp.536-585.
Cuppens, F., Cuppens-Boulahia, N. and Garcia-Alfaro, J., 2019. Misconfiguration management
of network security components. arXiv preprint arXiv:1912.07283.
Bhardwaj, A., Subrahmanyam, G.V.B., Avasthi, V. and Sastry, H., 2016. Design a Resilient
Network Infrastructure Security Policy Framework. Indian Journal of Science and Technology,
9(19), pp.1-8.
Steele, J.L., Steiner, E.D., Hamilton, L.S. and Education, R.A.N.D., 2018. Distributing
Instructional Leadership.
Woodall, W.H., Zhao, M.J., Paynabar, K., Sparks, R. and Wilson, J.D., 2017. An overview and
perspective on social network monitoring. IISE Transactions, 49(3), pp.354-365.
Rezaei Soufi, H., Torabi, S.A. and Sahebjamnia, N., 2019. Developing a novel quantitative
framework for business continuity planning. International Journal of Production Research,
57(3), pp.779-800.
1 out of 16
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.