WE WRITE CUSTOM ACADEMIC PAPERS

100% Original, Plagiarism Free, Tailored to your instructions

Order Now!

Security

Security
Your duties as Insecure University’s security administrator just got even more interesting because they are now sold on the fact that a proactive approach to security is their only option. They want a multi-layered security approach, but need you to provide a more granular snapshot of what a DID architecture means for them. You are asked to turn the DID diagram from last week into a slideshow/PowerPoint presentation and elaborate on each layer of security in regards to Insecure University.
What solutions will provide Insecure University with a DID architecture. Please go into depth on each layer (types of firewalls, what does OS hardening consist of, definition of strong authentication, user awareness activities, IDS or IPS?, these are just examples to give you an idea of what I am looking for relative to each layer.)
Abstract
A computer network if left unsecure can result in losses like a violation of confidentiality, data manipulation or breakdown of systems and this can increase an organization’s operation cost with regard to ICT infrastructure hence the need to make the network system secure. A secure network system requires a well defined risk assessment plan in which the resources to be protected are first identified plus the vulnerabilities attached to each of the network resources after which a measure is put in place to counteract the identified vulnerabilities.
Introduction
Use of the internet at times provide the hackers with the opportunity to identify the vulnerabilities existing within a network system then plan to exploit such vulnerabilities. Such a step can compromise on the confidentiality of the information stored, result into unauthorized data manipulation and cause infection on computers which can lead to total system breakdown. This paper seeks to identify the information assets of the institution that are vulnerable to attack by hackers then suggests measures which if put in place will prevent the threats from turning into reality.
To succeed in implementing a secure network system, the four step procedure mentioned here below would be useful.
Security:
There is a need to ensure that the software used by the network system is guarded by strict policies and secure authentication for purposes of authorization.
Observe:
Here, there will be continual monitoring of every event which takes within the network. Use of proper tools can help reduce the risk of attack on the network system. Firewall, if properly configured, can effectively serve as a defense of a network system. A network firewall will set rules regarding the ports to be open and the ones to remain closed.
Testing:
There is need to perform regular test on the network system to evaluate the defenses and security access through letting the network be attacked by a security testing tool or some trusted body.
Improve:
After the three stages of attaining network security mentioned above, a regular test should be carried out on the network system. For the network system to remain safe, constant testing should be done and action taken in areas that need improvement.
Some of the identified vulnerabilities existing within the institution are:
Wireless Access Points
These access points are inherently insecure and protocols like wireless encryption protocol have particular vulnerabilities that are easy to compromise using specific attack frameworks like Air crack. Wireless attacks are also likely by the wardrivers in case they manage to find unsecured Wi-Fi networks.
Solution:
It is recommendable that the university introduces WPA2 Enterprise using RADIUS together with an access point with the ability to perform authentication and enforce security measures. Strong passwords containing mixed characters should also be used and the passwords should be changed periodically.
Social engineering:
An employee could for instance borrow a laptop from a colleague and the process compromise the network endpoints. Another employee can request a co-worker for help gaining access areas of the network that he does not really have to access
Solution:
User passwords ought to be regularly changed. Role based authentication will be fundamental for every employee in the university so that different categories of the employees gain access only to the resources that they require to accomplish their daily task.
Internet Surfing:
Students and staff in the institution are never restricted on the web pages to be visited or the internet tools to use. In the process, lots of infections have resulted because some of the visits end up in malicious websites.
Solution:
Use of proxy will help in blocking malicious or useless websites that could be infected or redirect you to malicious websites. The proxy will protect the network system from persons intentionally visiting bad sites.
The benefit of assigning an IP is that when you check your router logs, you’ll know which IP is associated with a specific PC and/or user. With DHCP, the same PC could potentially have different IPs over a period of time as machines are turned on or off. By knowing what’s on your network, you’ll know where problems are coming from when they do arise.
Use of Dynamic Host Configuration Protocol (DHCP)
This scheme make the process of network administration simple in that any new computer added to the network system is automatically assigned an IP address, it has the disadvantage that the attackers can too gain easy access to the network system whenever they wish to exploit it. Again a single PC might have varied IP addresses within different time periods as machines are turned off and on.
Solution
The administrator should physically assign IP addresses to PCs that are in the network. If this is correctly done, then he will be in a position to determine the specific user or PC that is associated with a given IP address and so be able to establish wherever problems are from.
Use of File exchange Services
Lots of infections on the PCs within the institution could result from files downloaded from web pages or those acquired through other file exchange tools. Files getting into the network system could be infected and whenever an infected file gains access to a network, it will open back doors that can trigger additional intrusions.
Solution
There is need to use antivirus software meant for internet security and the software should be regularly updated.
Solutions based on the internet protocols are:
Security Measures for HTTP
Use of S-HTTP, an extension of HTTP, provides a means to ensure that exchange of files over the World Wide Web remains secure. Every S-HTTP file could be contained a digital certificate, be encrypted or feature the two.
Security Measures for DNS
The attacks likely to face Domain Name Service are DNS spoofing, DNS ID hacking and DNS Cache poisoning.
Some of the measures that can be helpful in preventing DNS attack include:
Keeping at minimum the possible queries or hosts permitted to query do not have all the DNS servers put on a single subnet, the same leased line or behind a single router. This helps to avoid having a single point of network failure.
To avoid spoofing, recursive queries should never be allowed.
Security Measures for FTP
Use of SSH’s SFTP enables encryption of a whole login session and this includes password transmission. Any outsider will certainly encounter difficulty to observe or collect passwords from the network system via the SSH/SFTP
Make use of an FTP server logon exit program to log the IP address plus the username of all FTP logon attempts. Regularly review the logs and in a state whereby a profile gets disabled because off password attempts that get to a maximum value, establish who the perpetrator is using the IP address information, then take an appropriate action.
Take advantage of an FTP server logon exit to keep at a minimum the client machines from where a user profile is permitted to gain access to the FTP server.
With the FTP server logon exit program, there are system user profiles and other profiles that you will specify never to be allowed to gain access to the FTP server.
Security Measures for the Mail server
This can be achieved by use of the two firewalls. The dual firewall topology is a scheme which provides a means of protection of the internal Exchange servers whilst filtering every incoming email from possible attacks. The region between these two firewalls is known as perimeter network.
Conclusion
If the vulnerabilities in a network system are identified in time and plans put in place so that the attackers don’t exploit such weakness, the institution is less likely to witness losses that result from breaching network security. This will in the long run help the university minimize the overall operation cost as far as the ICT infrastructure is concerned.

Our Service Charter

  1. Excellent Quality / 100% Plagiarism-Free

    We employ a number of measures to ensure top quality essays. The papers go through a system of quality control prior to delivery. We run plagiarism checks on each paper to ensure that they will be 100% plagiarism-free. So, only clean copies hit customers’ emails. We also never resell the papers completed by our writers. So, once it is checked using a plagiarism checker, the paper will be unique. Speaking of the academic writing standards, we will stick to the assignment brief given by the customer and assign the perfect writer. By saying “the perfect writer” we mean the one having an academic degree in the customer’s study field and positive feedback from other customers.
  2. Free Revisions

    We keep the quality bar of all papers high. But in case you need some extra brilliance to the paper, here’s what to do. First of all, you can choose a top writer. It means that we will assign an expert with a degree in your subject. And secondly, you can rely on our editing services. Our editors will revise your papers, checking whether or not they comply with high standards of academic writing. In addition, editing entails adjusting content if it’s off the topic, adding more sources, refining the language style, and making sure the referencing style is followed.
  3. Confidentiality / 100% No Disclosure

    We make sure that clients’ personal data remains confidential and is not exploited for any purposes beyond those related to our services. We only ask you to provide us with the information that is required to produce the paper according to your writing needs. Please note that the payment info is protected as well. Feel free to refer to the support team for more information about our payment methods. The fact that you used our service is kept secret due to the advanced security standards. So, you can be sure that no one will find out that you got a paper from our writing service.
  4. Money Back Guarantee

    If the writer doesn’t address all the questions on your assignment brief or the delivered paper appears to be off the topic, you can ask for a refund. Or, if it is applicable, you can opt in for free revision within 14-30 days, depending on your paper’s length. The revision or refund request should be sent within 14 days after delivery. The customer gets 100% money-back in case they haven't downloaded the paper. All approved refunds will be returned to the customer’s credit card or Bonus Balance in a form of store credit. Take a note that we will send an extra compensation if the customers goes with a store credit.
  5. 24/7 Customer Support

    We have a support team working 24/7 ready to give your issue concerning the order their immediate attention. If you have any questions about the ordering process, communication with the writer, payment options, feel free to join live chat. Be sure to get a fast response. They can also give you the exact price quote, taking into account the timing, desired academic level of the paper, and the number of pages.

Excellent Quality
Zero Plagiarism
Expert Writers

Custom Writing Service

Instant Quote
Subject:
Type:
Pages/Words:
Single spaced
approx 275 words per page
Urgency (Less urgent, less costly):
Level:
Currency:
Total Cost: NaN

Get 10% Off on your 1st order!