Network Security and Data Communications Analysis - Semester 1 Report

Verified

Added on  2023/06/10

|11
|3560
|61
Report
AI Summary
This report provides a comprehensive analysis of network security and data communication. It begins with an introduction to network security and data communication, followed by an analysis of core vulnerabilities in network and online environments, including malware, outdated software, and social engineering attacks. The report then explores the benefits of security thinking and tools, emphasizing their role in protecting information and preventing cyberattacks. It evaluates the link between network architecture and security engineering concepts, including network risk assessment and zero-trust architecture. The report further assesses internal risks and exposures, such as sabotage, unauthorized access, and data breaches, and evaluates available process and physical defenses against malicious network intrusions, including password policies, regular updates, and firewalls. Finally, it explains how key security concepts can be applied in large, distributed organizations, covering cybersecurity and resilience strategies. The report concludes with a summary of the key findings and recommendations.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Network Security and Data
Communications
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Contents
INTRODUCTION...........................................................................................................................3
MAIN BODY...................................................................................................................................3
TASK 1............................................................................................................................................3
1.1: Analyse the core vulnerabilities within a network environment and an online environment.
......................................................................................................................................................3
1.2: Explain how the emergence of security thinking and tools can benefit a network
environment.................................................................................................................................4
TASK 2............................................................................................................................................5
2.1: Evaluate the link between network architecture and security engineering concepts............5
TASK 3............................................................................................................................................5
3.1: Evaluate internal risks and exposure. ..................................................................................5
3.2: Evaluate available process and physical defences against malicious network intrusions....6
TASK 4............................................................................................................................................7
4.1: Explain how key security concepts can be applied in a large and distributed organisation. 7
4.2: Assess how key factors are applied to enhance and embed an holistic approach to network
and systems resilience..................................................................................................................8
CONCLUSION................................................................................................................................9
REFERENCES..............................................................................................................................10
Document Page
INTRODUCTION
Network security is considered as the technologies set which safeguard the integrity and
usability of organisational structures through preventing the entry or proliferation into a network
of board variety of possible threats. Additionally, this is essential for home networks and within
business world both. Most homes along with higher speed internet connections that have one or
above wireless routers that might be exploited if not appropriately secured. Data communication
is described as the procedures of utilising computing and communication technologies for
transferring the information from one area to other or among participating parties. In addition to
this it is vital as it permits business for minimising expenditures and develops effectiveness
through sharing information & common equipments between several different computers.
MAIN BODY
TASK 1
1.1: Analyse the core vulnerabilities within a network environment and an online environment.
Network environment and online environment is a communication system which ties
various users together. There are mainly two core vulnerabilities in network and online
environment such as network and non physical vulnerabilities. Network vulnerability is
undertaken as the weakness or flaw into hardware, software or business procedures that when
included through threat which outcomes within security may breach. Moreover, the non-
physical network vulnerabilities mainly includes information or software. By aspects of
vulnerability, cyber adversaries are become competent for gaining access to their system as well
as gather information. In addition to this, network vulnerabilities continuously evolve, outcomes
into loss of crucial data as well as revenue from businesses. This may be either non-physical or
physical. In addition to this, utilizable weaknesses as well as bugs are always present into
networks but acknowledging how hackers influence them provides business a clarified image of
what management should perform for preventing authorised users from accessing any valuable
assets of digital. Also, network vulnerabilities are comes into various kinds but the much
common forms are: Malware Attacks: Malware attacks are regarded as the common cyber attacks in which
malware implements unauthorised actions upon system of victims. Additionally, the
3
Document Page
malicious software encompasses various particular forms of attacks like spyware, key
loggers and ransom ware.
Outdated software issues: One of the key network security vulnerabilities is regarded as
outdated or unpatched software which exposes system that runs the application as well as
possibilities of whole network. As an outcome, much vulnerable to ransom ware attacks,
data breaches and malware.
Social engineering attacks: It have become a famous method utilised through threats
actors for simply bypass authentication as well as authorization security protocols and
obtain access towards a network. In addition this, these attacks have enhanced critically
into previous 5 years that become a lucrative business for hackers. Additionally, internal
users focus the huge security risk towards firm mainly as they are uneducated or unaware
of threats.
Outdated or unpatched software: With the changing market scenario there are various
companies which is been doing dome new bug fixes and there are various errors which is
been occurred in order to reduce the vulnerabilities. There are multiple patches which is
been analysed and other feature upgrades. The companies use various aspects to ensure
that they are providing maximum security to the customers.
Misconfigured Firewalls and operating systems: This is the threat which is been
affecting the computers and the network environment in a significant manner. The
servers are exposed to the malware software and other types of virus. The individual
needs to ensure that they are using the firewall system which helps them to protect from
various malware software and virus.
1.2: Explain how the emergence of security thinking and tools can benefit a network
environment.
The emergence of security thinking is undertaken as the new manner to understand,
observe and responds towards threats that provides firms the ideal responds to continuously
moving challenges of security. Additionally, the network security tools may be either software or
hardware based that aids in protecting firm’s networks, crucial information from attacks and
critical infrastructures. Currently, business having access to much valuable data than even before
ass well as safeguarding those information is essential to organisational growth. effectual tools of
security act as gatekeeper towards those data, preventing unauthorised access, mis-utilise, change
4
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
or alteration of computer network and their resources. Additionally, the emergence of security
thinking and tools benefits the network environment is described below: Protect information: The security thinking and tools emergence keeps checking upon
unauthorised. As an outcomes that safeguards the confidential information from being
stolen, disrupt or oppressed through unauthorised users.
Prevent cyber attack: The tools of security may minimise the risk of cyber attacks
through safeguarding the computer systems, programmes and networks from being
attacked by digital means.
Network security tools is able to protect the operating systems from specific threats and
other software. There are various network security tools which is been described below:
Access control – This is the tool which is been used to protect the network security in an
effective manner. They can put the ban on the unauthorised access and the individuals
can use this feature to enhance the security concerns about their operating systems.
Anti malware software – This is also been called antivirus which is been used in order
to protect the individual operating system from various software and viruses which could
also affect the data. Anti malware software is specifically designed to fight against these
types of virus and minimise the damage towards the network.
Email security - The email security is one of the major issues which is been faced by
various individuals. There are attackers which persuade towards the recipient of the
individual. Email security helps to block the dangerous email which can affect the
operating systems and the emails in a negative manner.
TASK 2
2.1: Evaluate the link between network architecture and security engineering concepts.
Network architecture as well as security engineering are essential into any firm which
proceeds, transfers and stores information. Moreover, this is undertaken as unified kind of
security design which aids company to address the vital as well as possible risks included when
utilising computer application and infrastructures of networks. In addition to this, network
architectures is defined as the manner network facilities and devices are framed for serving the
connectivity customer service requirements. Also the security engineering is the procedures to
5
Document Page
incorporates security controls in system of information so that controls become an integral part
of system operative abilities.
Network security architect: This also considered towards a set of accountabilities associated
with cloud security architecture. Based upon the organisation size, there could be an individual’s
accountable for every of these domains. Alternatively, en entity could to individuals for
overseeing them all. Regardless of approach , firm required to describes who has the particular
accountability as well as provide them the authority to develop mission critical decisions.
The network architecture and the security engineering concepts have a brief relationship
with each other. There are various factors which is been described below:
Network risk assessment – This is the inventory which is been used in order to connect
various resources in a systematic manner. The network security allows to mitigate the
risks and establish and effective network environment chain. This is the proper chain
between the network architecture and the security options.
Zero Trust Architecture – This is the security concepts which hosts various networking
environment. There are carious entry points which needs to be protected and the security
concepts will help the individual to protect their operation systems and established
enhanced security.
TASK 3
3.1: Evaluate internal risks and exposure.
Internal risk describe as the risk of anything from inside of firm who might exploit a
system into manner for causing damages or steal information. Specialist Sabotage and Theft: Workers have the pleasure of getting to a wide extent of
genuine equipment inside an association, with simply trust to hold them back from
hurting or taking it. This suggests that hardware like hard drives, containing lots of huge
data, can be genuinely taken from the association. Unapproved Access by Employees: As agents at this point approach a system inside an
association, they could have the choice to procure permission to locale of these PCs
individuals shouldn't, for instance, a partner who leaves themselves endorsed in, or a
room passed on opened giving induction to a server.
6
Document Page
Feeble Cyber Security Measures and Unsafe Practice: By not having fitting mechanized
and real security, an association grows the chance of a shortcoming being made the most
of, especially from the issues risen ahead of time like theft.
Accidental Loss or Disclosure of Data: The security shortcomings that license malicious
approach to acting may moreover permit essential incidents to occur and cause a huge
load of damage, for instance, laborers just incidentally deleting data from an envelope or
spilling a drink on a contraption.
3.2: Evaluate available process and physical defences against malicious network intrusions.
To proactively recognize and answer network interferences, affiliations need to have a
thorough cognizance of how network interferences work, execute network interference,
acknowledgment, and response structures that are arranged with attack methods and cover
procedures at the highest point of the need list. A piece of the open cycles and genuine securities
against harmful association interferences are: Extraordinary Password Policy: Maintaining a irregular and complex mystery state is an
epic positive turn of events. Guarantee that clients never reuse passwords and change
them regularly as and when clients are impelled by an expiry alert. Picking a strong
mystery key is itself the best wellbeing exertion of all. Update Regularly: Presumably the best method for defeating break tries is to revive the
functioning system and application programming as the new structures have no doubt
been adjusted to protect against malicious association interferences. These updates fix
security openings that have been found and take out PC bugs. Securing the Router: Cyber criminals could simply includes information setting foot
inside areas. These aggressors can do this by breaking into the association, and it's
undeniably more clear to get it going it is unsound to expect the association. Affiliations
can get all of the contraptions in the association by ensuring that encryption is engaged
on clients' remote traffic. Authentic Backing up of Data: Data is the most regarded asset of any affiliation, and it is
what punks need to exploit. Gathering backing up such assets with private information is
essential. Backing up data can be considered as an alternate line of protect shielding
against dangerous association interferences.
7
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Presenting Centralized Firewalls: Firewalls are the fundamental line of defend in
network security. A suitably organized firewall goes probably as a deterrent between
networks with differing levels of trust. Affiliations truly should keep the local firewall on
all the time as this is the best method for furnishing the association against noxious
attacks.
Encoded Transmission: Taken mixed data is of no impetus for cybercriminals. The
power of cryptography is so much that it can restrict permission to data and can convey it
trivial to the people who don't have the key. Using encryption is a serious step forward
towards reducing the damages of a security break.
TASK 4
4.1: Explain how key security concepts can be applied in a large and distributed organisation.
Cyber security is regarded as the wide term but is depends upon three primary concepts
called The CIA Triad”. This incorporates confidentiality, integrity and availability. In addition to
this, the particular model is developed for guiding the firm with policies of cyber security into
realm of information security.
Every so often protecting data characterization incorporates novel groundwork for those
privies to sensitive files. Planning can help with adjusting endorsed people with risk factors and
how to get ready for attack. Further pieces of getting ready might fuse strong passwords and
mystery state related recommended techniques and information about amicable planning systems
to hold clients back from turning data dealing with rules with good natured objectives and
potentially terrible results. Confidentiality means the unauthorised information can only been
accessed by the owner. They have the permission to use it and if any other individual could use
it could harm the privacy. In the disrupted organisation there are are various workers which is
been using working remote. Every individual needs to get the their own access towards various
things. The organisation needs to ensure full security of the data.
Integrity joins report permissions and client access controls. Structure control may be used
to hinder mistaken changes or unexpected abrogation by supported clients from transforming
into an issue. Besides, affiliations ought to put in specific means to recognize any movements in
data that could happen due to non-human-caused events like an electromagnetic heartbeat (EMP)
or server crash. In relation to the disrupted organisation integriy plays the major role sin
8
Document Page
protecting the valuable data. There are various workers which works from the remote area and
the organisation needs to implemented the ethics and values which enhanced the integrity
towards the valuable data of the customers in an effective manner.
Availability is ensured by completely staying aware of all hardware, performing gear fixes
rapidly when required, and keeping a fittingly working structure (OS) environment that is freed
from programming conflicts. It's also basic to keep current with all fundamental system
refreshes. Giving palatable correspondence information move limit and hindering the occasion of
bottlenecks are also huge techniques. In relation to the disrupted organisation they need to
essentially evaluate all the units and fix the gears. They need to provide the workers the perfect
systems which is working in the remote areas. Through this they are able to provide the services
in an effective manner.
Distributed system
Currently, computers are not stand individually units. Various computers are being networked
together for forming huge system of computers. Moreover, not only are computers being
network, but they are being networked in larger distributed systems in which every singular
computer, node in case they would may develop utilisation of applications distributed across the
system.
4.2: Assess how key factors are applied to enhance and embed an holistic approach to network
and systems resilience.
Online assurance requires a comprehensive system, one that keeps an eye on advancement,
people, and capacities anyway cycles and organization as well. This vision isn't limited to the
praiseworthy security order it requires mix with huge business risk the board, strong IT asset the
chiefs, drew in change the leaders, and a generous method for managing event response as well
as the persevering commitment of front-office employees. Execute Basic Hygiene: Incredibly, various associations really don't have their crucial
security neatness all together. The fundamentals in network security will regularly be
somewhat overlooked. Before placing assets into any organization wellbeing program,
every affiliation should look at three central advances critical to acquire the best result in
watching their structures: carrying out fundamental tidiness on your own premises,
9
Document Page
facilitated exertion inside the natural framework, and continually pressure test past a
standard yearly invasion test. Length the Skill Gap: With the augmenting scale on which associations work and the
associated improvement of security needs, comes the necessity for more data and
capacity. A normal absence of sufficiently pre-arranged people is reachable.
Computerization and splendid use of AI can help with getting over the basic opening
among old and new web-based security needs, regardless, human capacities really make
the difference. Be Bold in Implementing AI: Skilled people from all trades are not the sole game plan.
The advancement utilize their capacities. Accepting you look at a dealt with
transformation of an acknowledgment issue: there are various potential events, different
breaks, and various erratic events that are being represented reliably security work
environments have people noticing these reports.
Keep an eye out for the Business: Looking at security and arranging associations'
security programs, doesn't stop at setting up people, completing advancement, and
diminishing bet. It is related with the value chain of the business. Data and assets are
where the business can be at serious risk and where perils can be recognized. That is a
flat out shift from what security used to be. Ordinary IT people are very well gifted, but
cash supervisors grasp regard chains in the business. Likewise, that needs confirmation.
CONCLUSION
As per the above report, it has been concluded that both network security and data
communication plays essential role within organisations. As, this is essential for home networks
and within business world both. Most homes along with higher speed internet connections that
have one or above wireless routers that might be exploited if not appropriately secured. While
Data communication is the procedures of utilising computing and communication technologies
for transferring the information from one area to other or among participating parties. In addition
to this it is vital as it permits business for minimising expenditures and develops effectiveness
through sharing information & common equipments between several different computers.
10
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
REFERENCES
Books and Journal
Alferidah, D.K. and Jhanjhi, N.Z., 2020. A review on security and privacy issues and challenges
in internet of things. International Journal of Computer Science and Network Security
IJCSNS, 20(4), pp.263-286.
Alkhudhayr, F., Alfarraj, S., Aljameeli, B. and Elkhdiri, S., 2019, May. Information security: A
review of information security issues and techniques. In 2019 2nd International
Conference on Computer Applications & Information Security (ICCAIS) (pp. 1-6). IEEE.
Duppa, G.I.P. and Surantha, N., 2019. Evaluation of network security based on next generation
intrusion prevention system. TELKOMNIKA, 17(1), pp.39-48.
Geetha, R., Suntheya, A.K. and Srikanth, G.U., 2020. Cloud integrated IoT enabled sensor
network security: research issues and solutions. Wireless Personal
Communications, 113(2), pp.747-771.
Giri, S. and Shakya, S., 2019. Cloud computing and data security challenges: A nepal
case. International Journal of Engineering Trends and Technology, 67(3), p.146.
Hou, J., Qu, L. and Shi, W., 2019. A survey on internet of things security from data
perspectives. Computer Networks, 148, pp.295-306.
Hou, R., Ren, G., Zhou, C., Yue, H., Liu, H. and Liu, J., 2020. Analysis and research on network
security and privacy security in ubiquitous electricity Internet of Things. Computer
Communications, 158, pp.64-72.
Kadhim, A.A. and Sadkhan, S.B., 2020, December. Cognitive Radio Network Security
Enhancement Based on Frequency Hopping. In 2020 International Conference on
Advanced Science and Engineering (ICOASE) (pp. 1-6). IEEE.
11
chevron_up_icon
1 out of 11
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]