Network Security and Internet Privacy
VerifiedAdded on  2020/05/08
|15
|1894
|53
AI Summary
The assignment delves into the realm of network security, covering essential topics such as firewalls, cryptography (RSA algorithm), and secure communication protocols. It examines the role of private and public keys in authentication and encryption, highlighting the importance of safeguarding private keys for system security. Furthermore, the document explores internet privacy measures including web proxies, VPNs, and the Tor network. These tools are discussed in the context of anonymizing user activity and protecting sensitive data while browsing the internet.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Ruining head: ADVANCED NETWORK SECURITY
Advanced network Security
Name of the Student
Name of the University
Author’s Note
Advanced network Security
Name of the Student
Name of the University
Author’s Note
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1
ADVANCED NETWORK SECURITY
Table of Contents
1. Firewalls..........................................................................................................................2
2. WiFi Security...................................................................................................................3
3. Access Control.................................................................................................................5
4. HTTPS and Certificates...................................................................................................8
5. Internet Privacy..............................................................................................................11
Bibliography......................................................................................................................13
ADVANCED NETWORK SECURITY
Table of Contents
1. Firewalls..........................................................................................................................2
2. WiFi Security...................................................................................................................3
3. Access Control.................................................................................................................5
4. HTTPS and Certificates...................................................................................................8
5. Internet Privacy..............................................................................................................11
Bibliography......................................................................................................................13
2
ADVANCED NETWORK SECURITY
1. Firewalls
(a) The network diagram is created for the deployment of the network infrastructure for the
institution and the diagram is created in cisco packet tracer and labelled with the proper
addressing plan. The interface of the network are labelled with the given name and a dmz
zone is created for connecting the different subnets in the network.
(b) The access control list are created as per the business rules and developed according to
the rules and tables
Rule No. Transport Source IP Source
Port
Destination
Port
Destination
IP
Action
1 TCP Any 1433 1433 142.66.13.30 Allow
2 TCP Any 143 143 142.66.13.10 Deny
ADVANCED NETWORK SECURITY
1. Firewalls
(a) The network diagram is created for the deployment of the network infrastructure for the
institution and the diagram is created in cisco packet tracer and labelled with the proper
addressing plan. The interface of the network are labelled with the given name and a dmz
zone is created for connecting the different subnets in the network.
(b) The access control list are created as per the business rules and developed according to
the rules and tables
Rule No. Transport Source IP Source
Port
Destination
Port
Destination
IP
Action
1 TCP Any 1433 1433 142.66.13.30 Allow
2 TCP Any 143 143 142.66.13.10 Deny
3
ADVANCED NETWORK SECURITY
5 TCP 142.66.13.10 1023 Any 142.66.13.30 Allow
3 TCP Any 1023 Any 142.66.13.20 Deny
4 TCP 10.4.10.0 –
10.4.10.255
143 143 142.66.13.10 Allow
6 TCP 142.66.13.30 1023 Any 142.66.13.20 Allow
7 TCP 10.40.10.2 1234 1234 10.4.10.4 Allow
9 TCP 10.40.10.3 1234 1234 Any Deny
8 TCP 10.40.20.2 1234 1234 10.40.10.3 Allow
(c) Firewall policy is developed using the iptables from the routers and the default routing
policy can be changed using different commands such as –P, –L or –A. The two
examples of the common default policies used for the configuration of the access control
list are as follow:
Dropping of the data packets from unknown hosts outside the dmz zone and allowing
access of the web server for the student subnet with IP address 10.4.20.0/24.
2. WiFi Security
(a) The WPA also known as the Wifi protected Passwords are used in the in the
wireless networks so that the security of the network can be enhanced to a great level. This
would help in restricting the unauthorized access to the network. The other version of the
WPA are also available such as the WPA2. The WPA2 was introduced in the year 2003 and
it was thought to be a suitable replacement for the WEP at that point of time. The encryption
algorithm used for WPA is TKIP. It is basically a 128-bit key generated for the prevention of
different type of attack on the network.
ADVANCED NETWORK SECURITY
5 TCP 142.66.13.10 1023 Any 142.66.13.30 Allow
3 TCP Any 1023 Any 142.66.13.20 Deny
4 TCP 10.4.10.0 –
10.4.10.255
143 143 142.66.13.10 Allow
6 TCP 142.66.13.30 1023 Any 142.66.13.20 Allow
7 TCP 10.40.10.2 1234 1234 10.4.10.4 Allow
9 TCP 10.40.10.3 1234 1234 Any Deny
8 TCP 10.40.20.2 1234 1234 10.40.10.3 Allow
(c) Firewall policy is developed using the iptables from the routers and the default routing
policy can be changed using different commands such as –P, –L or –A. The two
examples of the common default policies used for the configuration of the access control
list are as follow:
Dropping of the data packets from unknown hosts outside the dmz zone and allowing
access of the web server for the student subnet with IP address 10.4.20.0/24.
2. WiFi Security
(a) The WPA also known as the Wifi protected Passwords are used in the in the
wireless networks so that the security of the network can be enhanced to a great level. This
would help in restricting the unauthorized access to the network. The other version of the
WPA are also available such as the WPA2. The WPA2 was introduced in the year 2003 and
it was thought to be a suitable replacement for the WEP at that point of time. The encryption
algorithm used for WPA is TKIP. It is basically a 128-bit key generated for the prevention of
different type of attack on the network.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
4
ADVANCED NETWORK SECURITY
(b) Antennas, transmit power and AP positioning for controlling the radio range
Antennas are very useful in the wireless networks. They are used for the generation of
wireless signals across the whole network. They perform the basic task of extending the network
to a greater range this helps in the extensions of the radios used in the wireless networks. The
range of the antennas depend on the amount of energy that is passing through it. The more
amount of energy entering into the antenna would cause the antenna to increase its range. The
radio energy passes through the network and the transmit power is used for controlling this
energy. The increased control of the network increases the efficiency of the network.
There are a number of factors on which the transmission power depends. The
polarization, gain of antenna and attenuation are the different type of factors in which the
transmission power depends on. In to this, the different types of antenna available to us are Omni
directional antennas, point to point and directional antennas. With increased amount of
attenuation, the transmit power required to meet the loss of signal also increase to a great extent.
The access points within the network have the requirement for placement in the proper
locations so the whole area within the network are covered. The selection of an antenna for the
network is also very important as the security of the network depends on the antenna to a great
extent. Hence, implementation of proper encryption process is required by the network so that
the access points can be prevented from unauthorized access to the network.
(c) RADIUS authentication
The radius authentication is very important for the centralized authentication function
within the wireless network. The AAA protocol within the network is used for the authentication
in the servers. The RADIUS protocol is very important for the network and this is used by the
ADVANCED NETWORK SECURITY
(b) Antennas, transmit power and AP positioning for controlling the radio range
Antennas are very useful in the wireless networks. They are used for the generation of
wireless signals across the whole network. They perform the basic task of extending the network
to a greater range this helps in the extensions of the radios used in the wireless networks. The
range of the antennas depend on the amount of energy that is passing through it. The more
amount of energy entering into the antenna would cause the antenna to increase its range. The
radio energy passes through the network and the transmit power is used for controlling this
energy. The increased control of the network increases the efficiency of the network.
There are a number of factors on which the transmission power depends. The
polarization, gain of antenna and attenuation are the different type of factors in which the
transmission power depends on. In to this, the different types of antenna available to us are Omni
directional antennas, point to point and directional antennas. With increased amount of
attenuation, the transmit power required to meet the loss of signal also increase to a great extent.
The access points within the network have the requirement for placement in the proper
locations so the whole area within the network are covered. The selection of an antenna for the
network is also very important as the security of the network depends on the antenna to a great
extent. Hence, implementation of proper encryption process is required by the network so that
the access points can be prevented from unauthorized access to the network.
(c) RADIUS authentication
The radius authentication is very important for the centralized authentication function
within the wireless network. The AAA protocol within the network is used for the authentication
in the servers. The RADIUS protocol is very important for the network and this is used by the
5
ADVANCED NETWORK SECURITY
ISP so the external and the internal networks can be managed accurately. Two types of packets
are used by the protocol that can manage the authentication, accounting and the access within the
network.
(d) Manual detection of the rogue Aps
For the detection of the rogue access points the risks associated with the wireless network
is are analyzed and the determination of the vulnerability within the network are performed. The
vulnerabilities within the network are also recorded so that it can be avoided in the future. The
evaluation of the security measures implemented within the network are to be done repeatedly as
thee evaluation would help in increasing the flexibility of the network. the access points of the
network are required to be guarded safely so that external interference in the network can be
avoided. This would reduce the risk of attacks on the systems.
3. Access Control
ADVANCED NETWORK SECURITY
ISP so the external and the internal networks can be managed accurately. Two types of packets
are used by the protocol that can manage the authentication, accounting and the access within the
network.
(d) Manual detection of the rogue Aps
For the detection of the rogue access points the risks associated with the wireless network
is are analyzed and the determination of the vulnerability within the network are performed. The
vulnerabilities within the network are also recorded so that it can be avoided in the future. The
evaluation of the security measures implemented within the network are to be done repeatedly as
thee evaluation would help in increasing the flexibility of the network. the access points of the
network are required to be guarded safely so that external interference in the network can be
avoided. This would reduce the risk of attacks on the systems.
3. Access Control
6
ADVANCED NETWORK SECURITY
ADVANCED NETWORK SECURITY
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
7
ADVANCED NETWORK SECURITY
ADVANCED NETWORK SECURITY
8
ADVANCED NETWORK SECURITY
ADVANCED NETWORK SECURITY
9
ADVANCED NETWORK SECURITY
(b) The password information is stored in the shadow.txt file and are in encrypted format.
The shadow file is accessible by the root account and does not have write permission by the
other sub accounts. The fields of the shadow and the password files are separated by a colon and
are case sensitive.
(c) The password cannot be distinguished from each other as it is stored in ciphertext
because the passwords are stored in encrypted format.
(d) The password information are stored securely in passwd.txt file and cannot be
misused by the illegal users. SHA algorithm is used for the encryption.
ADVANCED NETWORK SECURITY
(b) The password information is stored in the shadow.txt file and are in encrypted format.
The shadow file is accessible by the root account and does not have write permission by the
other sub accounts. The fields of the shadow and the password files are separated by a colon and
are case sensitive.
(c) The password cannot be distinguished from each other as it is stored in ciphertext
because the passwords are stored in encrypted format.
(d) The password information are stored securely in passwd.txt file and cannot be
misused by the illegal users. SHA algorithm is used for the encryption.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
10
ADVANCED NETWORK SECURITY
4. HTTPS and Certificates
ADVANCED NETWORK SECURITY
4. HTTPS and Certificates
11
ADVANCED NETWORK SECURITY
(b) The certificate is obtained from the web server and the public key encryption method
is used for obtaining the certificate and for the establishment of the connection the SSL/TLS are
used. The CA certificate Authority is the certification service that is required so that the
certificate can be obtained. It is very important for the verification and identification of the
organization so that the information across the internet can be sent easily. For the establishment
ADVANCED NETWORK SECURITY
(b) The certificate is obtained from the web server and the public key encryption method
is used for obtaining the certificate and for the establishment of the connection the SSL/TLS are
used. The CA certificate Authority is the certification service that is required so that the
certificate can be obtained. It is very important for the verification and identification of the
organization so that the information across the internet can be sent easily. For the establishment
12
ADVANCED NETWORK SECURITY
of the https connection address 192.168.2.21 is used and the port 443 is used using the command
openssl s_client -connect www.myuni.edu:443.
(c) The SSL or the Secure Socket Layer Protocol is being used by the client for the
verification of the corticated that is produced by the web server. The client maintains some
preconditions before the verification procedure. After the acknowledgement is received by the
server and the client a connection is established in between the server and the client.
(d) For the security and data protection the signature method is used so that the certificate
file cannot be hammered or tampered by any kind of eternal agents. The RSA algorithm is used
for the generation of the signature that is to be used in the certificate file. In addition to the
signature key the public key is also added in the certificate file and also private key for the
network is added to the certificate file. The private key is very useful for the generation of the
hash value.
(e) The information obtained from the severs can be encrypted very easily by using the
RSA and SHA algorithms and also both the private and the public key are used for the
authentication procedures in the system. If the mal practitioners get access to the private keys the
security of the system would be hampered. For example, the instance where the secured
connection is established in between two nodes and the certificate generated from MyUni
Website is used.
ADVANCED NETWORK SECURITY
of the https connection address 192.168.2.21 is used and the port 443 is used using the command
openssl s_client -connect www.myuni.edu:443.
(c) The SSL or the Secure Socket Layer Protocol is being used by the client for the
verification of the corticated that is produced by the web server. The client maintains some
preconditions before the verification procedure. After the acknowledgement is received by the
server and the client a connection is established in between the server and the client.
(d) For the security and data protection the signature method is used so that the certificate
file cannot be hammered or tampered by any kind of eternal agents. The RSA algorithm is used
for the generation of the signature that is to be used in the certificate file. In addition to the
signature key the public key is also added in the certificate file and also private key for the
network is added to the certificate file. The private key is very useful for the generation of the
hash value.
(e) The information obtained from the severs can be encrypted very easily by using the
RSA and SHA algorithms and also both the private and the public key are used for the
authentication procedures in the system. If the mal practitioners get access to the private keys the
security of the system would be hampered. For example, the instance where the secured
connection is established in between two nodes and the certificate generated from MyUni
Website is used.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
13
ADVANCED NETWORK SECURITY
5. Internet Privacy
(a) Web Proxies
The web proxies are used for gaining access to the websites and acts as mode of
connection in between the user and the website. It is very useful for maintaining the
privacy of the users and also the data integrity within the network is also maintained. This
process masks the identification of the users and detailed information about the users are
hidden from the web. The users can perform the actions anonymously and keep their
presence hidden from the web. Various type of servers such as the anonymouse.org and
tor are available of the web that can be used by the users for performing their tasks
anonymously on the web.
(b) VPNs
The VPNs are the virtual Private Networks that helps in protecting the data of the
users during a conversation in an open system. The information from the side of the
customer is sent to the server by means of n number of switches and distinctly other
methods can also be utilized for the achievement of goal. The VPN can be utilized to
secure the communication path and increasing the efficiency within the system. The VPN
tunneling protocols are also used within the network so that the access control within the
networks can be defined appropriately. In addition to this the VPNs are used in the
networks where the network is divide into several sub networks. The VPN is very useful
ADVANCED NETWORK SECURITY
5. Internet Privacy
(a) Web Proxies
The web proxies are used for gaining access to the websites and acts as mode of
connection in between the user and the website. It is very useful for maintaining the
privacy of the users and also the data integrity within the network is also maintained. This
process masks the identification of the users and detailed information about the users are
hidden from the web. The users can perform the actions anonymously and keep their
presence hidden from the web. Various type of servers such as the anonymouse.org and
tor are available of the web that can be used by the users for performing their tasks
anonymously on the web.
(b) VPNs
The VPNs are the virtual Private Networks that helps in protecting the data of the
users during a conversation in an open system. The information from the side of the
customer is sent to the server by means of n number of switches and distinctly other
methods can also be utilized for the achievement of goal. The VPN can be utilized to
secure the communication path and increasing the efficiency within the system. The VPN
tunneling protocols are also used within the network so that the access control within the
networks can be defined appropriately. In addition to this the VPNs are used in the
networks where the network is divide into several sub networks. The VPN is very useful
14
ADVANCED NETWORK SECURITY
for the extensions of the WAN connections within the network. They provide the
internet, intranet and the remote access control within the same network.
(c) Tor
The tor network is very important in the network for the users to browse the
network anonymously. The user data are not indexed in this network. Hence, the identity
of the users is not exposed and type of internet authority. This network consists of a huge
part of network and is very useful for deep webs and provides the users with the
information about the deep web and its contents. The tor content is browsed with the
onion routers. The onion websites can be accessed in this network with the help tor
browser.
ADVANCED NETWORK SECURITY
for the extensions of the WAN connections within the network. They provide the
internet, intranet and the remote access control within the same network.
(c) Tor
The tor network is very important in the network for the users to browse the
network anonymously. The user data are not indexed in this network. Hence, the identity
of the users is not exposed and type of internet authority. This network consists of a huge
part of network and is very useful for deep webs and provides the users with the
information about the deep web and its contents. The tor content is browsed with the
onion routers. The onion websites can be accessed in this network with the help tor
browser.
1 out of 15
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
 +13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024  |  Zucol Services PVT LTD  |  All rights reserved.