University: Web and Data Security - Network Defense and Routing Report

Verified

Added on  2023/06/03

|2
|607
|224
Report
AI Summary
This report provides a comprehensive overview of web and data security, focusing on network defense and routing fundamentals. It begins with an analysis of network security threats, including motivations of attackers and the importance of layered defense strategies. The report then delves into TCP/IP protocol, covering its fundamentals, IPv4 and IPv6 packet structures, and the significance of proper configuration. Finally, it explores routing fundamentals, detailing the routing process, Cisco router configuration, router security controls, and access control lists. The report highlights key concepts such as network security policies, authentication, authorization, and accounting, emphasizing the need for proactive measures to protect networks and data. The report is based on the 'Guide to Network Defense and Countermeasures Third Edition' and covers chapters on network defense, TCP/IP, and routing.
Document Page
Running head: WEB AND DATA SECURITY
WEB AND DATA SECURITY
Name of the Student
Name of the University
Author Note
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1
WEB AND DATA SECURITY
Summary of first presentation
In the presentation titled Guide to Network Defense and Countermeasures
Third Edition”, chapter 1 “Network Defense Fundamentals”, the things that have been
covered are principle of network security, the threats of network security, approach for
network defense and its effect on organization. The presentation is very interesting as it
covers things like what particularly motivates hackers to exploit the security of the network
and according to the presentation revenge might be considered as the primary motivation and
it might be executed by anyone including disgruntled, current, or former employees. It even
might be for the financial gain and the hackers get involved in this either for personal purpose
or they might be hired by others.
One of the primary reason that networks get hacked is because of the Always-on
connections that needs to be secured through firewall and VPN solutions. An effective
network security policy according to the presentation should include several layers of
network defense for efficient network security, auditing should also be included as part of the
network security policy as it helps to identify hacks and defend that as well.
As router is one of the essential component of the network, it needs to be secured
through proper strategy and one of these might be the integration of Access control with the
network so that it becomes difficult for the people to access the network who are not
authorized to access the network.
Summary of second presentation:
The second presentation discusses about chapter 2 which includes discussion on
TCP/IP protocol including fundamentals of TCP/IP networking, IPv4 packet structure, packet
fragmentation and the Internet Protocol version 6 (IPv6). TCP/IP provides the protocols for
communication over the network. The overall communication is executed through two spate
layers Transport layer and Network layer. TCP and UDP for the Transport layer and IPv4,
IPv6, ICMP, and ICMPv6 is assigned for the Network layer.
Although the IPv4 is the most common for the internet protocol. Proper configuration
of IP, TCP, and UDP is also important to identify and filter unwanted or malicious traffic. In
order to transfer the IP packets through routers IP packets are fragmented which is known as
IP fragmentation. IPv6, an improvement over Ipv4 allows to address and route the packets
and ICMP is considered for identifying and reporting the errors and diagnostics of the
network. IPv6 uses three types of addresses: unicast, multicast, and anycast and it is
monitored and configured with tolls Ipconfig, Netstat, and Netsh.
Summary of third presentation
The third presentation id about chapter 4, Routing Fundamentals, topics that have
been covered are routing process, process to configure the Cisco router, router security
control process and procedure to create control list.
There are various ways to access the router with administrative control for secure
access such as AUX port, CON port, and VTY ports. However to reserve the network
bandwidth and administrative control static routing is preferred. In order to ensure router
security Authentication, authorization, and accounting should be deployed. However older
tools such as Telnet is not effective for router security. Routers should be hardened in the
same way as servers and other computers.
chevron_up_icon
1 out of 2
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]