logo

350ct system security PDF

   

Added on  2021-12-13

15 Pages3514 Words193 Views
Running head: SYSTEM SECURITY
350CT System Security
Name of the Student
Name of the University
Author’s Note

1
SYSTEM SECURITY
Table of Contents
Introduction................................................................................................................................2
Design, implement, evaluate and maintain efficient security systems.......................................2
Analysis of the possible security threat......................................................................................4
Evaluation of the suitable countermeasures for networked systems..........................................6
Approaches to cryptography......................................................................................................9
Conclusion................................................................................................................................11
References................................................................................................................................12

2
SYSTEM SECURITY
Introduction
The report is prepared for the development of a system security system for Wibble
Ltd. and protecting the valuable digital assets after the analysis of the security threats. The
risk associated with the network of the organization is evaluated and the security system that
can be implemented for mitigation of the threat are identified for the development of the
security solution. The business framework is analysed for proposing the suitable
countermeasure and develop the network system. The different approaches of cryptography
that can be applied for the management of the security threat is analysed for its application
and minimize the security risk acting on the organization.
Design, implement, evaluate and maintain efficient security systems
Figure 1: Network Design
(Source: Created by author)
For designing the security system the current business framework of the organization
is analysed and the improvement that can be made in the current framework based on the

3
SYSTEM SECURITY
security perspective is proposed to the board of directors of Wibble Ltd. The main flaws in
the current architecture identified is the firewall configuration that is needed to be
implemented for increasing the security of hosts and the network device installed in the
internal network. The business rules of the organization is needed to be analysed for the
development of the access control list and restrict the unknown users to access the internal
resources.
For designing the security systems the people, process and the technology should be
organized and the key elements of the business is needed to be identified. The current threats
and vulnerabilities acting on the system is also needed to be evaluated for the development of
the security strategy and developing specific security policy and control for the management
of the operation of the people connected with the network (Izhar et al. 2017). The payroll
system is needed to be secured for the management of the transaction between the user and
the business should be secured such that no information is leaked. The VPN and the security
appliance should be compatible with the other network device and a penetration testing
should be done on the current system for the management of the vulnerability and eliminating
the threat associated with the system (Van Tilborg and Jajodia 2014). The error logs should
be maintained and the network traffic should be monitored for the management of the source
of data traffic and eliminate the disk of distributed denial of service attacks.
The implementation of the intrusion detection system would help to increase the
security of the network by mitigating the risks of external attacks and blocking the new
threats. For the implementation of the intrusion detection system a security policy should be
developed and the system detects the violation of the policy. If it is found that the security
policy is violated the user kicks the user violated the policy and generates an alert for the
security personnel (Trappe 2015). There are some drawbacks of the system that is the threats
that are no defines in the security policy cannot be detected and for this the intrusion

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
(PDF) Assignment on Cyber Security
|5
|856
|225

Security in the Internet of Things Assignment PDF
|12
|489
|132

IT Risk Assessment and Cyber Security Lead Consultant for Gigantic Corporation
|10
|3551
|91

ITNE2005R : Network Security Implementation Assignment 2022
|6
|1617
|40

Network Defence and Counter Measures
|3
|529
|308

Network Security: Concepts and Techniques
|11
|718
|27