0% found this document useful (0 votes)
73 views16 pages

North Borneo University College: Group Assessment Coversheet

The document is a group assessment cover sheet for a security network assignment submitted by 6 students in the Diploma in Security Management program at North Borneo University College. It includes the student names and IDs, assessment title, program, course, lecturer, submission date, and declarations regarding original work, permission for submission to plagiarism detection software, and signatures. It also includes a table of contents outlining the sections of the assignment.

Uploaded by

Siti Sarah
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
73 views16 pages

North Borneo University College: Group Assessment Coversheet

The document is a group assessment cover sheet for a security network assignment submitted by 6 students in the Diploma in Security Management program at North Borneo University College. It includes the student names and IDs, assessment title, program, course, lecturer, submission date, and declarations regarding original work, permission for submission to plagiarism detection software, and signatures. It also includes a table of contents outlining the sections of the assignment.

Uploaded by

Siti Sarah
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 16

NORTH BORNEO UNIVERSITY COLLEGE

GROUP ASSESSMENT COVERSHEET


SITI SARAH BINTI MOHD AZIM Student 2022.5.SE01.0010
Student Name
EDEUARD ID.
Student Name IRMAH BINTI IBRAHIM Student 2022.5.SE01.0005
ID.
Student Name ARTINAH BINTI ABDULLAH Student 2022.8.SE01.0061
ID.
Student Name WAHSINIE BINTI AMIL Student 2022.8.SE02.0047
ID.
SHARIFAH SHAHIRAH BINTI ALI Student 2022.8.SE01.0025
Student Name
HANAPIA ID.
Student
Student Name
ID.
Assessment Title SECURITY NETWORK

Program DIPLOMA IN SECURITY MANAGEMENT

Course (Code) INFORMATION SECURITY (LSI 230)

Lecturer / Tutor SIR JONATAN JESUS

Date Submitted 2/3/2023

OFFICE USE ONLY

Date Received
KEEP A COPY
Please be sure to make a copy of your work. If you have submitted assessment work electronically make sure you have
a backup copy.

PLAGIARISM AND COLLUSION


Plagiarism: using another person’s ideas, designs, words, or works without appropriate acknowledgement. Collusion:
another person assisting in the production of an assessment submission without the expressed requirement, or
consent or knowledge of the assessor.

CONSEQUENCES OF PLAGIARISM AND COLLUSION


The penalties associated with plagiarism and collusion are designed to impose sanctions on offenders that reflect the
seriousness of the University’s commitment to academic integrity. Penalties may include: the requirement to revise and
resubmit assessment work, receiving a result of zero for the assessment work, failing the course, expulsion and/or
receiving a financial penalty.

1
Page 1 of 2

All group members declare that all material in this assessment is our own work except where there is clear
acknowledgement and reference to the work of others. We have read the university’s statement on cheating and
plagiarism, as described in the Student Handbook.

All group members give permission for our assessment work to be reproduced and submitted to other academic staff
for the purposes of assessment and to be copied, submitted to and retained by the Institution's plagiarism detection
software provider for the purposes of electronic checking of plagiarism.

Student’s signature: ……………………………………… Date: ………………………………………

Student’s signature: ……………………………………… Date: ………………………………………

Student’s signature: ……………………………………… Date: ………………………………………

Student’s signature: ……………………………………… Date: ………………………………………

Student’s signature: ……………………………………… Date: ………………………………………

Student’s signature: ……………………………………… Date: ………………………………………

Note: An examiner or lecturer / tutor has the right to not mark this assignment if the above declaration has not been
signed.

2
PREPARED BY: CONTRIBUTIONS:

-Leader
-Always update and remind group members
-Follow up assignment
-Grammar checker’s

SITI SARAH BINTI MOHD AZIM EDEUARD -Make contributions


-Make table of content
(2022.5.SE01.0010)
-Make question (introduction definition)
-Binding & Print
-Make slide presentations
-Find content for assignment
-Make reference
-Make appendix
- Make APA7 edition
-Combine assignment

-Follow up assignment
-Combine assignment
-Make questions (advantages & disadvantages)
IRMAH BINTI IBRAHIM
-Edit assignment
(2022.5.SE01.0005)
-Give some opinion
-Make appendix
-Spacing

-Follow up assignment

ARTINAH BINTI ABDULLAH -Grammar checker’s


-Edit format
(2022.8.SE01.0061)
-Make APA7 edition
-Make questions (Conclusions)

-Follow up assignment
-Give some opinion

WAHSINIE MOHD FARDIUS -Make in text citation


-Make question (types of networks)
(2022.8.SE01.0047)
-Give some opinion
-Make appendix
-Make reference

SHARIFAH SHAHIRAH BINTI ALI HANAPIA -Follow up assignment

(2022.8.SE01.0025) -Check APA7


-Make APA7 edition
-Give some opinion
-Make question (importance)
-Make appendix

3
TABLE OF CONTENT
INTRODUCTION 4
DEFINITION 5-6
TYPES OF NETWORK SECURITY 7-8
THE IMPORTANCE OF NETWORK 9-10
SECURITY
ADVANTAGES & DISADVANTAGES 10-12
CONCLUSION 13
APPENDIX 14
REFERENCES 15

4
1.0 INTRODUCTION

In the era of information technology, the use of computers and telecommunications is very common. By
computer use, all information is sent electronically from one place to another through Internet through
communication channels. Messages sent in these various forms must be made as a confidential and
confidential notification for the benefit of certain organizations or individuals. The information and
communication technology (ICT) industry has been plagued by various invasions and hacking incident, and
until recently the problem extended to corporate websites and government agency. With the increasing
misuse and intrusion of computer hacking, issues computer security is now getting more and more attention
and should be handled professionally so that the reliability, confidentiality, and integrity of information is
used in telecommunications computer use is guaranteed and safe to use. After this issue, many interested
parties have realize the importance of having a security protection system and protecting their system from
intruders and computer hackers.

In Malaysia, the team responsible for monitoring computer intrusion incidents and provides guidance on
computer security called the Emergency Response Team Computer Malaysia, which was established in
1977. This computer security problem is still a new problem and there is no universally accepted approach
yet to overcome it. The approach taken to compile this paper is based on research and references made to
understand and understand computer security problems and Internet, as well as to identify and explain the
principles to deal with security computers and the Internet. This notification will make users aware of the
importance of paying attention this computer security problem and will help those responsible for security
computers and the Internet deal with this problem more easily.

5
2.0 DEFINITION

Laudon KC and Laudon JP (2000) define security in Information Systems Management refers to the policy
and technical measures used to prevent possession or unauthorized changes, theft, and physical damage to
information systems. Many techniques and devices that protect computer equipment, software,
communication networks, and data increase security. John D. Howard (1977), in his analysis of security
incidents Internet , defines computer security as the act of preventing attackers from achieve their goals
through unauthorized access and use of computer networks without the truth. Garfinkel and Spafford (1996)
provide a definition of computer security in relation to it with computer control, a computer is said to be
safe if the software works properly with the expected. Based on the definition, it can be concluded that
computer security is very important for every systematic study related to computer damage to form a
taxonomy or taxonomies to protect the use of computers and their resources in order to be able to works
well from any interference. and attacks from irresponsible political party’s answer.

6
3.0 TYPES OF NETWORK SECURITY.

Firewalls

Firewalls are services or devices that act as guards responsible for deciding which web page, pop up, and
other services enter and exit a network. These firewalls use a predefined set of rules that assist in blocking
or allowing traffic, depending on the requirements. Firewalls can be for software, hardware, or both,
depending on the needs of the system.

Access Control

Access control allows companies to prevent potential attackers from invading confidential information
and to block unauthorized devices and users from accessing the given network. This allows only those
users to access the network who are permitted to work with the given resources.

Virtual Private Networks (VPNs)

A VPN generally uses the internet to encrypt the connection between an endpoint device and a network.
Further, VPN allows professionals to authenticate the communication between the network and the
device. This results in building an encrypted and secure tunnel via the internet.

Intrusion Prevention Systems

Intrusion prevention systems find and prevent attacks by scanning network traffic. This is done by using
databases of attack techniques that professionals are familiar with and correlating them with network
activities.

Wireless Security

Wired networks are not as secure as wireless networks. It is necessary for you to control the devices and
users that can access your company’s network. Hence, it is important for you to have wireless security,
especially when cybercriminals are rapidly targeting confidential information for extortion.

7
Application Security

Application security involves a set of software, hardware, and processes that track and lock the weak
points of an application to easily be targeted by attackers to infiltrate your network.

Behavioral Analytics

If you want to be able to identify anomalies and various network breaches as and when they occur, you
need to have a clear idea of the normal behavior of your network. There are varied behavioral analytics
tools available that automatically spot abnormal activities.

8
4.0 THE IMPORTANCE OF NETWORK SECURITY

Network security is important because it protects sensitive data from cyberattacks and ensures that the
network is available and reliable. A successful network security strategy uses a variety of security
solutions to protect users and organizations from malware and network attacks, such as distributed denial
of service.

Network security can protect our data. For businesses and individuals, data is something worth cherishing
and protecting. If you’re a business, your data can include marketing materials, financial data, and
anything that makes your business a reality. Personally, you also have financial data and personal
information that you do not want anyone else to have access to. Network security ensures your data stays
yours.

Network security also can protect client data. Governments and businesses store data that doesn’t belong
to them. For organizations such as accounting firms and medical clinics, this data is very sensitive. Data
security is the responsibility of the organization. That includes backing up data properly and making sure
hackers can’t break into your system. Depending on your activity, you will most likely have requirements
to meet. For example, healthcare organizations must comply with regulations such as HIPAA. In
the European Union, organizations that process the data of European Union citizens must comply
with the GDPR. If you want to run a business and manage data, check the cybersecurity requirements that
you need to follow.

Next, network security can improve your networks performance. Good web security doesn't just
protect our network but it is also helps it run better. The key is to get a good system that isn't slowed
down by redundant tools and applications. Look for proven systems. If you're not sure what to look
for, check with your service provider to see what they recommend.

Not only that, but network security are also important because it can protects again ransomware.
Ransomware attacks are common. For many people, it is the worst type of attack. This is malware that
threatens to release or block access to your data unless you pay the ransom. They can affect a single
person or an entire country. More recently, the Darkside group hacked into the Colonial Pipeline in the
United States. To bring the pipeline back online, the group received millions in cryptocurrency. This is
just one example among many others.

In conclusion, the reason why network security is important because people nowadays are dependent on
technology. We use it for just about everything, including communication, production, record keeping

9
and more. We have cameras in our computers, phones, cars, and even some children’s toy. People’s entire
lives can be found online if you know where to look. This dependency will only increase, so that network
security must be followed.

5.0 ADVANTAGES AND DISADVANTAGES OF SECURITY NETWORK

When the internet first started, it wasn't very popular. It can only be used to print documents and send emails
in the office. Therefore, internet security does not get much attention. However, the use of the internet has
grown rapidly to the point where it is now used in banking and trading activities. As a result, internet
security has become an important concern. Cryptography and virtual private networks, often known as
virtual private networks, are two tools that have been developed to protect the security of data and personal
information when accessing the internet (VPN). Data is hidden through cryptography to maintain its
confidentiality. Before being transferred to the intended recipient, the encrypted material (from plaintext to
cyphertext) is transformed from its original meaningless state. The decryption process, which converts
ciphertext back to plaintext using a secret key, can only be carried out by authorized persons. Without the
secret key, plaintext cannot be interpreted by unauthorized parties.

The idea behind cryptographic secrecy is anonymity through obscurity (secrecy through obscurity). There
is no denying the benefits of network monitoring. Still, native protocols are a smart choice when choosing
your tools for network monitoring. Using native protocols may change the way network performance
monitoring is conducted in your organization. This network monitoring technique uses embedded features
supported by the monitored server or device. There is no need to install a proprietary agent on the target
machine, in contrast to conventional techniques for network monitoring. Consequently, this technique is
also known as agentless monitoring. Among the advantages of network security is that it makes monitoring
network management simple, keeps security intact and enables cost efficiency.

Agent-based technologies demand different installation, configuration, and maintenance requirements than
native protocols. When using agent-based monitoring, we must install an agent on each server. To start
using the tool we must monitor network performance and complete additional actions. Therefore, as a
system administrator, not choosing a native protocol for network monitoring effectively adds more tasks to
an endless list. The arithmetic is simple the more servers one has, the longer it takes to install and configure
the agent on the server. Using native protocols allows us to focus on more important tasks while reducing
the time and effort required to complete repetitive tasks. It allows us to eliminate the operational and
maintenance responsibilities associated with setting up and configuring agents. Because the first process to

10
test, verify and deploy the a Bahru agent has been completely eliminated with clear potential in network
performance. Additionally, several native technologies, including Power shell and SNMP, can be used to
monitor a wide variety of IT infrastructure devices. As a result, installing disruptive third-party agent-based
technologies on deployed systems has essentially become unnecessary.

Next, the advantage of network security is to keep the security intact, deep capabilities are used by native
protocols to improve network performance. However, using third-party proprietary agents may pose some
security issues. Most agent-based monitoring tools require certain ports to be opened to communicate with
agents for system monitoring. An open port poses a serious security hazard. The infrastructure is now
vulnerable to data coming through open ports. Agents sometimes successfully bypass network security
measures designed to protect private data such as log files and event log records. Additionally, grant
administrative privileges to the agent to allow it to be installed on remote workstations. Remote machines
are exposed to potential security threats when agents are installed on them. The security standards used to
create third-party agents in these situations will determine how secure the network is.

The release is sometimes one less thing to worry about when you already have a serious threat of malware
and ransomware constantly trying to breach network security. Therefore, play with security requirements
when using native protocols for network performance monitoring and be sure that there is nothing hidden
that can violate security rules in firewalls and other systems. Finally, enabling cost efficiency is to use what
is already available in the IT environment when using native protocols. Because there are no additional
costs, we can maintain the IT department's budget while still using powerful network performance
monitoring tools. On computers used by IT professionals, native protocols such as SNMP are common.
There are other expenses that increase the overall cost of using the instrument in addition to purchasing a
proprietary agent-based solution. Installing agent-based technology requires and estimates the amount of
labor required. There are resource costs associated with that as well.

Although it does not require resources just to install the agent, it does require some work and that effort
could be better used for other IT administration tasks. This way, if a native protocol is already available,
the investment required for a proprietary-based protocol can be used for other important tasks. Additionally,
as a network administrator, it is important to choose a solution that utilizes existing capabilities in the
environment to optimize value while minimizing cost. Other than that, there are several network security
deficiencies, one of which is that the vulnerability is found in the implementation of the system or security
policy weaknesses in hardware, software, and specific agreements that in that situation can allow attackers
to access or disable the system without permission. Computers accidentally dropped parts, software and
other internet resources are not adequately protected when they leave the gateway.

11
The term vulnerability describes the intentional blocking of a computer, hardware, software, or other online
resource through an uncontrolled gateway. Vulnerability is the basis of using hacked or damaged hardware
or software on their computer. The vulnerability is found in system implementation or security policy
weaknesses in hardware, software, and specific agreements which in that situation could allow an attacker
to access or disable the system without authorization. For example, configuration issues when the
administrator service is not appropriate, vulnerabilities in the NFS protocol on authentication and Intel
Pentium chip logic errors occurred in earlier versions of the send mail programming.

Threats to system security can come from Anonymous Unix FTP system attackers. So, this can be seen as
an inherent security flaw in the system. Operating systems and accompanying software, network client and
server software, network routers and security firewalls are just a few examples of vulnerable hardware and
software. In other words, the software and hardware of various devices may have separate security flaws.
Each type of security vulnerability will exist between different types of software, hardware, and multiple
iterations of the same type of equipment between different systems that exist through different devices and
the same system has been placed in different settings.

Time and vulnerabilities are closely related, system software vendors will continue to release patch fixes
for previously identified vulnerabilities, or at least later versions of new versions of the system can be
corrected, according to statements from the system day, with the deep use of users from vulnerabilities in
the system will continue to be exposed. While the outdated system addresses the weaknesses, it also
introduces some new bugs and flaws. As a result, as new vulnerabilities continue to emerge, existing
vulnerabilities will gradually diminish. The downside will still be an issue from a certain moment and
certain system settings are pointless. It is only possible to discuss vulnerabilities and solutions for the
operating system version of the target machine, which depends on the physical environment and the service
running the software version settings. This is comparable to computer viruses that investigate development-
related problems.

12
6.0 CONCLUSIONS

Network security involves preventing unwanted access, misuse, and theft of the underlying networking
infrastructure. For users, apps, devices, and users to work securely, a secure infrastructure must be built.
Network security also has its own advantages and disadvantages and there are different types of network
security protection. Among the types of network security protection are intrusions presentation systems,
firewalls, data loss presentation and others.

Moreover, Network security comprises several levels of defense both inside the network and at the edge.
Policies and controls are implemented by each network security layer. Access to network resources is
granted to authorized users, but bad actors are prevented from using exploits and posing threats.

Network security is crucial for both personal and professional networks. Most houses with high-speed
internet have one or more wireless routers, which can be vulnerable to attacks if they are not adequately
secured. The risk of data loss, theft, and sabotage is decreased with the use of a strong network security
system. As a user of the security network, it should be used wisely so that privacy is not disturbed.

13
7.0 APPENDIX

NETWORK SECURITY DIAGRAM

HIGH LEVEL SECURITY DIAGRAM

14
8.0 REFERENCES

“Kelebihan Memantau Rangkaian Menggunakan Protocol Asli - Metadata.” Metadata, 28 June 2018,
www.motadata.com/ms/blog/advantages-monitoring-network-using-native-protocols.

By Anon, Year 2020, URL : https://intellipaat.com/blog/what-is-network-security/

By Anon, Year 2020 , URL : https://www.careerera.com/blog/advantages-and-disadvantages-of-network-


security

By Ardee, Year 2016, URL: https://asbulhadi.wordpress.com/2016/01/11/lecture-5-pengenalan-kepada-


rangkaian/

By Ardee, Year 2015 , URL : https://asbulhadi.wordpress.com/2015/12/30/network-security-fundamentals/

15
16

You might also like