Assessment 1: Design and Implement ICT Networks Security Perimeter

Verified

Added on  2023/01/06

|28
|6020
|52
Report
AI Summary
Document Page
Design and Implement a
Security Perimeter for
ICT Networks
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Assessment 1
Question 1
1. Computer Viruses
PC infections have been in the news recently for organizational security threats they have posed
this year. These occur in a global range of infectious attacks, but diseases can pose a significant
threat to small groups (Salman, Khalaf, and Abdulsahib, 2019). Diseases can damage your data
and destroy important information, negatively affecting your daily activities. Even under the
most favorable conditions, infections can be eliminated from the hard drive. All in all, it's
important to encourage employees not to open an email or hook up a link they don't see.
2. Software Vulnerabilities Pose Network Security Risks
When a security update comes in the middle of a busy day, it's easy to get out of it and forget to
return it later. However, if your scheduling doesn't update as normally as you should, you could
be putting your organization at risk. It is inevitable that programs can return to an entire
organization where no one can work. It could cause a site to crash and be aware that it is down, it
could lose customers.
3. Hackers
We often think of network security threats as living on our PCs. However, PC programmers can
do terrible damage from anywhere. When programmers break into your framework, they have a
free rein. They can capture records, access specific data, or discover property tactics that your
competitors and the world can see. Programmers can be on the other side of the planet, but with
the chance that they do not value the security of your organization, they should not be deceived.
4. Employees Can Breach Security without Realizing It
In fact, even the most reliable employees can be a safety threat to your organization. It’s not
unintentional, but a lack of training in security best practices can put your organization in a weak
position (Iskandar, Virma and Ahmar, 2019). Make sure your employees see how best to secure
your organization, whether it's through instructions on sharing secure documents or maintaining
a collection of sites they shouldn't visit in the organization aged.
Document Page
5. Abuse of user account privileges
According to information cited by the Harvard Business Review, for the period of 2016 “60% of
all attacks were carried out by professionals”. Whether it's innocent errors (unintentionally
sending information to an inappropriate email address or losing a working device), intentional
harassment and misuse of registration benefits or fraud wholesale as a result of a phishing
attempt or other social planning attacks that contract user account information, people within
your company are talking about one of the biggest security issues you will have.
Question 2
The primary purpose of a network security policy is to educate delegates and employees about
the needs of securing different resources. These assets require different structures, including
passwords, documents, or even servers (Omar and Abdelaziz, 2020). These policies also
establish rules for acquiring, designing and evaluating PC frameworks and networks. What
organizations should consider when formulating an organization security strategy include; what
do you have in the group that other people need? What circles, information or data structures are
critical to your association? What would prevent your organization from functioning? Responses
to these surveys identify a wide range of network resources. These include basic information
basics, basic applications, individual information, mutual group stock collection, personal email,
and web worker. Organizational security provisions must consider all elements that govern your
organization. The staff, however, the final messengers, and whoever has classified information
about your organizations. Employees are seen as a potential threat in security strategies.
However, these policies must be implemented so that employees remain ready to complete their
duties without undue disruption to safety efforts.
Steps in network security policy:
Identifying risks
Make sure the policy conforms to legal requirements
Level of security should be equal to level of risk
Including staff in policy development
Question 3
A. What do you mean by penetration testing techniques?
Document Page
A penetration test, also known as a pen test, is a reconstructed digital attack against your PC
framework to find out for usable vulnerabilities. For web application security, the access test is
usually used to extend a web application firewall (WAF).
Penetration testing is intended to conduct a security check before being attacked by an attacker.
Infiltration test tools generate qualified attack settings to detect and test security holes that may
require acquired records, bargain certificates, authorized innovation, truly identifiable data (PII) ,
cardholder information, personal data, guaranteed welfare, information emancipation or other
harmful business products.
Penetration testing techniques are the methods or ways through which penetration can be
practiced by hackers or backend servers.
B. What is the importance of penetration testing in terms of network security?
Penetration testing is a basic cycle that should be performed regularly in all companies to ensure
the structure of the body. The requirement to conduct an entrance exam changes as directed by
organizations as they all work differently.
One of the most important benefits of a pen testing or penetration testing is that it gives you the
blueprint for working with risk factors in an organized and unique way (Rusere and Ngassam,
2020). In this test, the extent of the weaknesses detected in the target climate and in addition to
the associated risk factors is determined. From the outset, continuity is treated with the highest
risk and then with the lowest risk.
Penetration testing allows security department to think about an organization's current situation
and examine possible current focuses. It gives us a reasonable idea of the whole security
framework and gives us the assurance that the design framework that the leaders followed is
appropriate within the organization.
C. Explain Network Auditing
Networks are dynamic entities; they grow, shrink, change and divide themselves continuously.
Network administrators cannot expect to be fully influenced by this circle. Customers include
tools and sometimes even new equipment for the foundation of the organization. Worse, this is
not the first time a client has installed the programs he needs without contacting the server.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
These exercises can have a significant impact on network security. To explain this, a leader
needs to run a custom group that evaluates and screens for any progress to the pre-determined
mark.
Network auditing is a process in which your organization plans for both programming and
equipment. The circle can be awful when done physically, but fortunately some tools can help
mechanize a large part of the circle. The director must identify the tools and equipment
associated with the organization. A routine security check can identify a robbery; some
customers may choose some affordable storage at their workplace that is more likely to be used
at home.
Question 4
A. Software perimeter solution
Software perimeter solution allows IT managers to deploy on-premises or over-the-cloud
deployments by linking remote access of representatives to cloud and on-premises applications
while maintaining sensitive information within the hierarchical group. It has been shown to block
all types of organizational attacks, including DDoS, Man-in-the-Middle, Server Question and
Advanced Persistent Risk.
Implementing Software perimeter solution allows associations to restrict network access and
access to organized frameworks. Accessibility depends on the usability model, which means that
all devices and characters must be checked before being accepted into the group.
A software-defined perimeter (SDP) is a way to hide Internet-connected infrastructure (servers,
routers, etc.) so that it cannot be seen by external groups and attackers, however whether it is
enabled on premises or in the cloud (Ramadan and Hefnawi, 2019). The goal of the SDP
approach is to bring the organization together in terms of programming rather than equipment.
An organization that basically uses SDP hangs a little bit of instability on its staff and another
framework so that no one can see it from an outside perspective; however, approved customers
can now access the platform.
A software-defined perimeter forms a virtual boundary around organizational resources at the
organizational level, not at the application level. This separates it from accessibility-based
controls that limit user benefits but allow access to a large group. Another key difference is that
Document Page
SDP identifies devices directly as a user character. The Cloud Security Alliance first came up
with the idea of SDP.
B. Hardware Perimeter solution
Because the drawbacks of software-based perimeters are centered on their inefficient network
position, a hardware solution is the safest alternative. The edges of the equipment are located just
behind the switch, so all information packets from the web must go through your monitor before
you reach internal drivers.
Most of these solutions include far more advanced controls than simple web filtering and basic
data scanning. Like most advances in IT, the latest hardware perimeters is based on “visual”
capabilities that analyze big data to detect malware and cyber attacks that rely on sporadic
exercises instead of spyware. be solely dependent on tactical diseases and aggressive vectors.
Another advantage of hardware perimeters is that they are generally functional. There is no
compelling reason to point out whether the response-enabled workstation collapses after these
devices are running for security all day, every day. The main disadvantage of this type of
accommodation is the level of observation and maintenance it requires. Hardware perimeters are
incredibly incredible, and managing them is no easy task.
Question 5
Computers, networks, and other IT processes create documents that track system operations,
called audit trail reports or logs. The review of these documents is log analysis which is used by
organizations to help manage a range of risks which comply with regulatory regulations.
Network computers, software, operating systems, and configurable or smart devices typically
build records. They consist of several messages that are organized and stored sequentially on a
disc, in folders, or like a log collector in a program.
Analysts need to insure that a full set of communications are comprised of the logs and presented
according to meaning. To prevent misunderstanding to have cohesiveness, log components
should be normalized, using the same language or words. For example, "alert" may be used by
one device while another uses "important." Making sure the terminology and data types are
compatible would help to promote interpretation and minimize error (Angelo, 2019).
Document Page
Normalization also guarantees the significance and consistency of figures and information from
multiple sources.
Question 6
The infrastructure of the knowledge management to tools that enable access, communication,
activity, and management of the network. It usually requires devices, applications, and facilities
for networking (Paul, Kumar and Suman, 2019). If your network is not stable, various threats,
such as denial-of - service, ransom ware, spam, and unauthorized access, are severely vulnerable.
MSPs are facing an ever-present management problem as they work to protect their internet
infrastructure stability, as per security professionals. The challenge is to identify essential
network assets, identify in which these assets are stored by organizations and find the right
balance between powerful, complex defenses and usability and access protection.
Question 7
Anti-malware software- Malware is intended to spread across computer systems and
infiltrate networks in the form of viruses, Trojans, worms, key loggers, spyware, etc.
Anti-malware solutions are a kind of applications for network protection intended to
detect and avoid the dissemination of harmful programmers. Anti-malware and antivirus
applications may also assist in the resolution of malware infections, reducing network
harm.
Email security- Email security is based on shortening human-related security
vulnerabilities, as in DLP. Via spam tactics (often very complicated and compelling),
attackers force receivers of emails to exchange sensitive data via a computer or mobile
device, or accidentally transfer malware to the organization's device. Safety in email
helps recognize unsafe communications and could also be used to block threats and avoid
sensitive data from being exchanged.
Endpoint security- The corporate world is gradually bringing your own gadget (BYOD)
to the point that there is virtually no difference between individual and commercial
computing devices. Regrettably, as consumers rely on them to reach business networks,
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
electronic devices often become targets. Protection at the endpoint provides a security
layer for remote computers and enterprise networks.
Firewalls- Firewalls operate just like gateways that can be used to protect barriers
between your network and internet. Firewalls are used for channel traffic control,
enabling allowed traffic to pass through and blocking unauthorized traffic entry
(Wetterwald and Seewald, Cisco Technology Inc, 2019).
Virtual private network- VPN software is used to verify contact between such a secure
system and an endpoint computer. Remote access VPNs typically uses IPSec or Safe
Sockets Layer (SSL) for encryption, providing a protected path to prevent certain parties
from snooping.
Question 8
A. Firewall
The failure to deter threats from inside the structure that it is intended to defend.
It can just block the traffic intrusions that really go into them.
It cannot bypass overly designed compliance procedures or bad management standards.
It cannot bypass overly designed compliance procedures or bad management standards.
For example, if an organization has a very poorly knit security plan and over-permissive
rules, then a firewall cannot protect the information or the network.
As long as a contact or operation is enabled, the firewall has no power to protect the
device it against. For example, if a firewall is built to allow email to move through, it
could not identify a virus or a Trojan inside the email.
B. VPN
A VPN service provider who does not take the protection and privacy of the customer
strictly will typically ignore any issues who users are facing. Moreover, this sort of
treatment is typically unstable and cannot provide consumers the online security and
privacy they require (Nichols, 2019).
Document Page
Many VPN providers do use flat sheet encryption to shield their users online.
The trouble with free VPN providers out there is that they only provide the standard
encryption method, which is the kind of authentication that attackers can easily crack.
Not all authentication schemes have the same encryption standard, and the worrying
thing is that many VPN providers out there do use poor safety procedures as their
primary defense mechanism.
Question 9
Regularly Check and Update the Firewall Configuration Settings- Over time , the
organization will actually have a lot of unique configurations for the different firewalls it
uses on the network perimeter, and it may be an issue if these configurations cause
overlapping guidelines.
Use Defense in Depth- While having several firewalls can be a little more difficult to set
up for your system, doing so will help you develop deeper defenses. This, in essence,
slows down some threats that have found their way through a firewall.
Make Sure There Aren’t ANY Modems in Your Internal Network- Here's the tip of the
SANS Institute. As a basic step in testing the configuration of firewalls, it is advised that '
the investigator ensure that neither modems remain within the corporate network
(Chattopadhyay, Lam and Tavva, 2019).
Using Deep Packet Inspection- One of the challenges when using firewalls is that many
malicious programmers use spoofing to fool firewalls to bring heavy traffic in. These
intermediate nodes would have forged arrival and departure codes, enough to circumvent
simplified firewalls.
Don’t Just Rely on Firewalls- Even with the most sophisticated anti-spoofing technology,
best-managed rule setups, but in-depth security technology, firewalls cannot block any
attack under their own.
Question 10
A three-legged firewall solution can be used where it is not possible to have two mechanically
independent firewall systems splitting traffic from multiple network segments. Usually, a new
Document Page
business does not have or wish to maintain a back-to - back firewall, and that a single computer
is used instead of technically creating the same capability as a back-to - back firewall. In total,
this single firewall system consists of at least three network control connectors or "legs" that are
all subjected to different networks: one from the public Internet, one to the network segment, and
one from the corporate network.
Question 11
Block traffic by default and monitor user access- It is desirable to block all internet traffic
by default. Enable only a certain amount of unique traffic to those established facilities.
This lets you monitor who can enter your system and avoids any security vulnerabilities
from happening.
Establish a firewall configuration change plan- The network firewall would need to be
modified from time to time for a number of reasons. This is important to ensure that now
the firewall remains powerful and ready to defend against new attacks.
Optimize the firewall rules of your network- The firewalls must be well specified and
configured to provide all the required security (Fatima, Rahman and Shompa, 2020).
Cleaning up the firewall rule base with some sort with unwanted cluster will have a
beneficial impact on the network stability.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Update your firewall software regularly- Firewall vendors typically issue security
upgrades on a daily basis. These upgrades fix any current possible security risks by
allowing small technical improvements.
Question 12
Packet level filtering- The internet protocol uses two names: the origin Id number and the
target IP address for navigate and transmit a data packet through the network.
Circuit level filtering- Circuit level filtering reaches above the filtering at the packet
level. Filters traffic depending on the characteristics of the network layer. The network
layer uses the port number to define the target programmed.
Application level filtering- This is the maximum filtering standard. Filters information
centered on an interface layer interface such as HTTP and FTP. It can also record traffic
for further examination or response.
State full inspection- Hardware file system can be designed to capture and store data
about each packet going through it. This knowledge can be used to philter additional
packets
Question 13
Network backup is a device where chosen data from your backup clients (a single device or a
group of computers) is sent over a channel (such as the Internet) and forwarded to your remote
backup (Dzhalladova, Novotna and Babynyuk, 2019). This database may be privately owned and
operated, or openly maintained by a cloud storage service — as is always the case with many
other small companies. There are several reasons to use network backups for your company.
Managerial backups for various machines and networked systems can be a problem when you
use physical storage media, tape drives, or individually back up each computer individually.
Question 14
Identify the tools and security specifications of the network.
Identify identified risks and how to deal with them.
Operating structures, variants, and software paper (Miloslavskaya, 2019).
Establish the workflow of the company for approved interactions, access privileges
depending on employee responsibilities and user specifications.
Document Page
Evaluate the firewall: build a firewall to secure the edge (internet-facing), the centre (big
business-facing) or the DMZ (vestige of the first line of defense)
Plan the firewall for convenience.
In order to secure sensitive information on the network, they can first define what
information (e.g. credit card data or patient data) are.
This traffic would be enabled with the use of firewall rules called access control lists
(ACLs) that are added to each application or body and make on the firewall.
Question 15
Step 1- Sign in to the local browser's web-based functionality and select VPN > Site-to-Site.
Document Page
Step 2 Click the plus icon.
Step 3 Ensure that the Enable check box is checked. It is checked by default.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Step 4 Enter the name of the connection in the Connection Name field.
Step 5 Choose the interface to be used by the local router. The options are:
Step 6 Choose the identifier of the WAN interface of the remote router. The options are:
Document Page
Step 7 Enter the IP address of the WAN interface of the remote router.
Question 16
(A)
o Authentication- Authentication is used to show that a person or individual is allowed
entry and also offers a means of network access. While using a shared key, two
companies that want to establish a VPN connection among them will install and transfer
the very same button on their VPN devices to really be able to verify to each other.
o Data Encryption- VPN encryption is a method of protecting data inside the VPN client-
VPN server network to ensure that no one can use it. Essentially, when you run a VPN
client and attach to a VPN server, the link requests will be authenticated until they are
being sent to the database.
(B)
Document Page
A VPN tunnel (often alluded to as a VPN or a proxy server) is an authenticated link
between the desktop or Smartphone system and the broader internet. Since your link is
secured, no one can decrypt, track or change the messages in the VPN tunnel.
Question 17
(A)
VPNs have gone from obscurity to a popular way of connecting network devices around the
Network. While VPNs were originally common because they freed businesses from the burden
of linking channels with dedicated phone cables, partially the reason why VPNs have been so
embraced is that they seem to be very efficient.
(B)
o Check the firewall- Firewalls secure the traffic going to the computers. Many security
systems don't get as well for the VPNs.
o Check if the VPN is compatible with site or service- There are also some websites and
sites that are not compliant with all VPNs.
o Try utilizing a different VPN Protocol- Procedures are series of specially specified rules
for the safe transmission of information from one location to another (Helali, 2020).
o Regularly updates the VPN- Updates are highly important to the working of the
programmers. They are released to correct the glitches in the previous update or to
change the programmed.
Question 18
Basic VPN tests- This is the exams that can be operated by anybody. Only connect to your VPN
and reach the testing facilities (Shaghaghi, Buyya and Jha, 2020). Regrettably, these simple tests
do not recognize all leaks (such as fast interconnection leakage).
Advance VPN tests- these checks need more technological skills to get it set up right, but they
can recognize any vulnerabilities you-have in your VPN. Ipvanish has put together the strongest
software suite possible for in-depth leak monitoring. These development methods are open
source and can be found here on Git Hub.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Question 19
(A)
o Malware- Malware is something of an overarching word that includes many forms of
cyber security threats. Viruses, Trojans, and parasites are all forms of malware that may
theoretically corrupt the site or records.
o Phishing- The threats on Phishing are almost as prolific. They can vary from shockingly
obvious to incredibly knowledgeable.
o Ransom ware- Ransom ware is a form of ransom ware, but that also requires its own
group of cyber security threats.
o Man-in-the-Middle Attack- Man-in-the-Middle Attack is one of such types of cyber
threats that could happen even without target becoming informed of it.
o Distributed Denial of Service- Distributed Denial of Service, or DDoS, is a concept that
you might have used in reference to governmental agencies or large business websites.
Way to overcome from these issues-
Overall, the trick to avoiding these common forms of cyber attacks is to reduce the
vulnerability and eventually the harm (Kushko and Parotkin, 2019). Developers have briefly
addressed cyber danger above. The security risk control has to be an important part of the
cyber defense plan.
(B)
Step 1: Define the Criteria.
Step 2: Perform the Check
Step 3: Record the Results
Step 4: Share, Discuss and Implement the Changes Required
Step 5: Sign Off and Use the Doc as Intended
Document Page
ASSESSEMENT 2
Task 1
Minutes of Meeting- 90 minutes
Meeting Objective: The objective of meeting is to assure management department that there is
need of designing and implementation of perimeter security. In this meeting IT department will
explain the details about need of security in the operations.
Attendees: IT department head, general manager, member of board of director and network
administrator.
Venue: Head office, Melbourne
Date: 5/10/2019
No Points Discussed Actions Suggested Target Date
1 About perimeter security
overview to other employees
Perimeter defense
applies to natural
walls or constructed
fortifications, either to
hackers from getting
out or to trap
prisoners inside the
boundary range. The
above bank will be
7/10/2019 to
10/10/2019
Document Page
able to manage
different security
problems in more
effective manner.
2 Understanding the need of this
security to staff members
Perimeter protection
is planned for the
primary function of
either holding
intruders out or
prisoners inside the
boundary area
(Kushko and
Parotkin,2019).
Wealthy landowners
and companies of all
types use a range of
man-made equipment
to achieve various
degrees of perimeter
protection. The need
of this security is too
crucial for above
mentioned bank is too
important.
11/10/19 to 15/10/19
3 Giving overview of benefit of this
security
This offers all the
benefits of an elite
standard defense
system-from early
attack notifications to
monitoring and alert
16/10/19-22/10/19
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
confirmation-without
indicating to potential
intruders that such a
robust security
network is in
operation. The benefit
of this security is that
it will prevent frauds
and protection to fund
of customers.
4 Implementation of level of
Security required
The level of this
security is higher in
order to prevent from
attackers. In the
context of above
bank, this can be
useful to prevent users
from fraud.
22/10/19-26/10/19
Signature of attendee 1: Signature of attendee 2:
Signature of attendee 3: Signature of attendee 4:
Task 2
Document Page
Purpose: The purpose of this report is to making plan and design of Firewall solution as
perimeter security.
Department: IT department
Stakeholders: General Manager Operations, Information system manager.
Supervised by: Network Administrator
Network Security Threats:
o Phishing attacks- Phishing attacks are a form of interpersonal manipulation
intended to capture codes, email addresses, credit card numbers, and confidential
data. Such threats impersonate credible websites, commercial banks, and family
contacts that appear authentic in the form of direct messages or spam scams.
o Advanced Persistent Threats- Advanced Persistent Threats (APTs for short) are
cyber-attacks that enable an unwanted intruder to code their way through an
unwitting network of networks, in quite some estimated time unnoticed there. The
APT syphons financial information and other vital security knowledge away from
of the suspect's system, rather than disclosing its location.
Perimeter Security Options: There are different types of perimeter security options and Firewall is one of
them. Originally, the term firewall applied simply to a wall designed to halt the spread of a fire (Repetto,
Carrega and Rapuzzi, 2020). A firewall related to network interface in the field of computer firewall security
that blocks certain forms of network traffic, creating a buffer between a trustworthy network and an
unreliable one. In the way that firewall protection seeks to prevent the propagation of device threats, it is
similar to a physical firewall.
Security Perimeter as per Organisation’s Requirements:
Document Page
In the context of above bank, Firewall security will be suitable and best as this will lead to
manage various kinds of cyber issues. In addition to this, banking is a risky sector therefore
security is must for them. And this security will be provided by firewall.
ASSESSEMENT 3
Task 1
VPN connectivity issues and solutions:
o Non-responding server VPN.
o VPN access is blocked by the ISP (Internet Service Provider).
o When the latest ones are messed with by existing VPN sets.
o The installed firewall interrupts the link.
Solutions:
Firewalls can often obstruct the VPN’s functionality as it keeps testing all the information that
flows in and out of the link. Firewalls safeguard the traffic that gets to the computers. Users are
guided to restart their system which can bring efficiency in process of overcoming the issues that
are explained above.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Task 2
Purpose: The purpose of report is to testing result of implementation of Firewall security system.
Stakeholders: Information Systems Manager, general manager, operational manager.
Roles and Responsibilities:
Document Page
Role Responsibilities Contact Information
Managing a staff team of
designers, consultants and
experts in support
The evaluation of the
quality of programmes
Consulting machine users
to determine specifications
and to ensure the services
fulfil criteria for customers
or programmes
Choosing and buying
suitable hardware and
applications
Offering preparation,
assistance, guidance and
reviews to users
Testing and adjustment of
structures to ensure that
they perform efficiently
Stable Network Access
Control for remote users
Holding emerging systems
up to date
Developing and bringing
into service maintenance
procedures
Jhons25@gmail.com
Handling Budgets for IT
Making sure the
enforcement of software
licence laws
Implementation and
maintenance of protection
or honesty and processes
for backup
Upgrade readiness
Accomplishes the
performance of workers in
information management
by expressing task
expectations; preparing,
recording, and reviewing
job outcomes; coaching,
advising, and disciplining
personnel; designing,
coordinating, and
implementing programmes,
Hussey254@gmail.com
Document Page
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
References
Salman, A.D., Khalaf, O.I. and Abdulsahib, G.M., 2019. An adaptive intelligent alarm system
for wireless sensor network. Indonesian Journal of Electrical Engineering and Computer
Science, 15(1), pp.142-147.
Iskandar, A., Virma, E. and Ahmar, A.S., 2019. Implementing DMZ in improving network
security of web testing in STMIK AKBA. arXiv preprint arXiv:1901.04081.
Omar, R.R. and Abdelaziz, T.M., 2020, September. A Comparative Study of Network Access
Control and Software-Defined Perimeter. In Proceedings of the 6th International
Conference on Engineering & MIS 2020 (pp. 1-5).
Rusere, K. and Ngassam, E.K., 2020, May. Emerging Network Security Issues in Modern
Tertiary Institutions. In 2020 IST-Africa Conference (IST-Africa) (pp. 1-9). IEEE.
Ramadan, A.B. and Hefnawi, M., 2019. An Approach to a New Network Security Architecture
of Nuclear and Research Facilities. Global Journal of Computer Science and Technology.
Angelo, R., 2019. SECURE PROTOCOLS AND VIRTUAL PRIVATE NETWORKS: AN
EVALUATION. Issues in Information Systems, 20(3).
Paul, S., Kumar, S. and Suman, R.R., 2019. A Quantum Secure Entity Authentication Protocol
Design for Network Security. International Journal of Information Security and Privacy
(IJISP), 13(4), pp.1-11.
Wetterwald, P. and Seewald, M., Cisco Technology Inc, 2019. Virtual electronic security
perimeter using deterministic networking. U.S. Patent 10,516,661.
Nichols, K., 2019, September. Lessons learned building a secure network measurement
framework using basic ndn. In Proceedings of the 6th ACM Conference on Information-
Centric Networking (pp. 112-122).
Chattopadhyay, A., Lam, K.Y. and Tavva, Y., 2020. Autonomous vehicle: Security by
design. IEEE Transactions on Intelligent Transportation Systems.
Document Page
Fatima, K., Rahman, M.T. and Shompa, A.A., 2019. Establishing a Secure Network System.
Dzhalladova, I., ŠKAPA, S., Novotna, V. and Babynyuk, A., 2019. DESIGN AND ANALYSIS
OF A MODEL FOR DETECTION OF INFORMATION ATTACKS IN COMPUTER
NETWORKS. Economic Computation & Economic Cybernetics Studies &
Research, 53(3).
Miloslavskaya, N., 2019. Network Security Intelligence Centres for Information Security
Incident Management (Doctoral dissertation, University of Plymouth).
Helali, S., 2020. Systems and Network Infrastructure Integration: Design, Implementation,
Safety and Supervision. John Wiley & Sons.
Shaghaghi, A., Kaafar, M.A., Buyya, R. and Jha, S., 2020. Software-Defined Network (SDN)
Data Plane Security: Issues, Solutions, and Future Directions. In Handbook of Computer
Networks and Cyber Security (pp. 341-387). Springer, Cham.
Kushko, E.A. and Parotkin, N.Y., 2019, December. Software implementation details of the
secure data communication protocols stack based on the dynamic network topology.
In Journal of Physics: Conference Series (Vol. 1399, No. 3, p. 033106). IOP Publishing.
Kushko, E.A. and Parotkin, N.Y., 2019, September. Efficiency Evaluation of Secure Data
Communication Protocols Stack Based on Dynamic Network Topology. In 2019
International Russian Automation Conference (RusAutoCon) (pp. 1-6). IEEE.
Repetto, M., Carrega, A. and Rapuzzi, R., 2020. An architecture to manage security operations
for digital service chains. Future Generation Computer Systems.
Document Page
chevron_up_icon
1 out of 28
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]