Unit 17 Network Security
Unit 17 Network Security
Higher Nationals in
Computing
ASSESSMENT BRIEF
Unit:
17 Network Security
Downloaded by Mohamed Atheeb ([email protected])
Downloaded by Mohamed Atheeb ([email protected])
STUDENT ASSESSMENT SUBMISSION AND DECLARATION
When submitting evidence for assessment, each student must sign a declaration confirming that the work is their
own.
A. Afreedi
th th
Programme:
Unit:
Plagiarism
Plagiarism is a particular form of cheating. Plagiarism must be avoided at all costs and students who break the rules, however innocently, may be penalised. It is your responsibility to ensure that you understand correct referencing practices.
As a university level student, you are expected to use appropriate references throughout and keep carefully detailed notes of all your sources of materials for material you have used in your work, including any material downloaded from the
Internet. Please consult the relevant unit lecturer or your course tutor if you need any further advice.
Student Declaration
Student declaration
I certify that the assignment submission is entirely my own work and I fully understand the consequences of plagiarism. I understand that making a false declaration is a form of malpractice.
Page 2 of 8
ID:
2021/22
Academic Year:
A.Afreedi
Unit Assessor:
03 January 2022
Issue Date:
th
28 February 2022
Submission Date:
Sanjeewa Ekanayake
Date:
Submission Format:
The Assignment Should be Created using Microsoft Word Format. The Student Should Insert a Table of Content and Page Numbers as well as Your Name, Student Number and Module Title in the
All Text Should be in the Font Calibri / Arial. All Normal Text Should be in Font Size 11 and Main Headings in Font Size 14 and all Sub Headings in Font Size 12.
The Student Should include all Referencing in Harward Referencing Format and the References Table should be included.
The Student Should include a plaigiarism report using a suggested software. The Final Summary of the Plaigiarism score should be included as an appendix. “Plagiarism Checker X” Software is
Recommended.
You Should Include this Completed and Signed Front Sheet along with your assignmnet during the
Page 2 of 8
The Final Submission must be done to the Google Classroom portal provided by Londontec City Campus
LO1 Examine Network Security principles, protocols and standards LO2 Design a secure network for a corporate environment
LO3 Configure Network Security measures for the corporate Environment LO4 Undertake the testing of a network using a Test Plan
Create a technical report which includes the following information. Your report will be considered as a complete report ONLY if you include all of the following.
Discuss at least 02 Network Security Devices such as Firewalls, Routers etc.. (Word Limit : 400 words
per device)
Examine the following network security protocols (200 words each)
o FTPs
o HTTPs
o POP3
o SMTP
Compare and contrast any two of the above network security protocols.
Discuss different cryptographic types of Network Security
Disscuss what is meant by Quality of Service (QoS) in Relation to Network Security Configuration.
* This Task can be done as groups of 02 or individually. If you grouped, clearly Include the names and student numbers of your group members in your Answer.
You are the Network Security head of the banked named aliki. Aliki is an expanded private bank network which has over 70 branches islandwide and more than 90,000 customers in sri lanka.
The above bank has a huge cloud network for managing data and transactions at the bank with public access for digital banking facilities.
As the network head of the above company, you are required to analyse and create a report to the CEO as a network security proposal. Include the following information in your Network Security Proposal (1500 words)
Discuss why network security is important in general to any network. Include examples as well.
Investigate and understand the security requirements for the above mentioned network. Deeply
discuss the security requirements.
Recommend the software and hardware to be used in this network to make this a secure nework.
Page 2 of 8
After creating the test plan, you are required to test the network. Once tested, Include Screenshots and test cases.
Give some recommendations to improve security of the network. When giving recommendations, critically evaluate the design, planning and configuration also.
P1 Discuss the
different types of
LO1 Examine Network M1 Compare and contrast
Network Security
Security principles, at least two major
devices.
protocols and standards Network Security
protocols.
P2 Examine Network
Security protocols.
LO1 & LO2
P4 Determine which
network.
P5 Configure Network
Network Security.
M4 Provide
P7 Create a Test Plan
scripts/files/
for your network. D3 Critically evaluate
screenshots of the
LO4 Undertake the the design, planning,
testing of your network.
testing of a network P8 Comprehensively configuration and
I would like to express my HND to all those who gave me the possibility to complete this
Assignment. I am deeply indebted to our course Lecture ….. Whose help, stimulating
suggestion, knowledge and encouragement helped me in all
time of study and Analysis of the assignment in the pre and post
that period. Most especially to my classmates and friends, who
made all things possible.
Table 1 IP design..................................................................................................................... 17
Table 2 Software and hardware devices.................................................................................. 21
Table 3 Nmap commands........................................................................................................ 39
The global economy is founded upon data flows. Data as an input in the industry, and this is
not just in terms of information industries but also other manufacturing and traditional
industries, has increased with the present acceleration of digitisation in global enterprises
supported by rapidly taking up evolving technologies like cloud computing and data
analytics. According to McKinsey report, in conventional sectors 75 percent of the value
generated by the Internet. Adoption on the Internet is closely tied to economic growth. The
fact that increased internet penetration is very closely tied to a variety of economic success
metrics shows that obtaining universal access requires reforms not only in the
telecommunications sector but also policies to enable individuals and enterprises benefit
from the internet. The Internet, around a half of the world's 7.7 billion inhabitants, is
connected to four billion individuals. According to the Global Ecommerce Association,
global ecommerce is expanding dramatically, with 1 billion customers planning to shop
beyond national countries in 2020 (compared to 390 million in 2016). (ISACA, 2019)
Cybercrime is one of the biggest and most serious threats for all enterprises worldwide,
according to the 2019 Official Annual Cybercrime Report by the Cyber security
Ventures, sponsored by Herjavec group. Cyber security Ventures forecasts cybercrimes
will cost the globe more than 6 trillion dollars a year by 2021, up from 3 trillion dollars in
2015. ISACA, 2019)
Obviously, network security plays an important role in ensuring the safety and well-
being of global business and its infrastructure, and ensuring the prosperity of the global
economy.
Data protection refers to rules and legislation designed to limit privacy intrusions, which
are mostly due to data collecting, storage and distribution. The person's personal data are
known to all information or data that pertains to a person identifiable with that
information or data. Privacy refers to an individual's right to decide how much
information/data he or she wants to share about him or herself. Some such instances
include passwords, financial information like the bank account or credit card or debit card
or other information on payment instruments, physical, physiological and mental health,
sexual orientation, history and medical recordings, biometric information etc. The High
Court acknowledges the basic right to privacy. (www.ETCISO.in, 2019)
The safety of cyber space depends mostly on the data and the security of the ICTs.
Unintentional accidents or weaknesses and negligence might be the sources of cyber-
threats. Screwdrivers, crackers or terrorists can be attackers. Their on-line presence is
strongly dependent upon banking institutions, energy, state agencies, hospitals,
companies, education and even social affairs. Personal data, cash and assets, as well as
national security, are being increasingly protected. (Al-achkar, n.d.)
In order to secure trust of the information society, cyber security involves creating trust and
security in the usage of ICTs. It offers huge prospects for human progress. It also promotes
broader access to information and training. It leads to policy and strategy creation. It
imposes new forms of business, business and societal paradigms. Many states fear that
ICTs may have a harmful influence on their own populations. Special care is required to
avoid that cyberspace becomes a hazard to nations and citizens. With strong leadership and
vision, the Arab world must seriously confront cyber security concerns.
The soft target for cybercriminals in Sri Lanka can be recognized. Under the Sri Lankan
National Cyber Security Strategy, Sri Lanka proposed the Cyber Security Act. Poor
cyber security standards and inadequate inter-entity partnerships will cause several
cybercrimes. Cyber crime has also been disseminated through the Internet of Things
(IoT) and the exposure to connection, which has enabled cyber assaults to play an
important leading role in global relations. This study provides an overview of the safety
landscape, the lessons gathered from the field and proposed best practices in relation to
the safety occurrences last year. It covers major insights and trends from data collected
from a variety of sources from January 2018 to January 2019. (Perera, 2020)
• The legal framework established for by the Act may allow organisations,
to execute e-commerce.
• The legal validity and sanction of digital signatures was granted in the Law.
• It allows the government to notify e-governance via the web.
• It opened the doors for corporate enterprises that provide certificates of
digital signatures in the field of certification.
• The cyber legislation also covers significant security problems that are so vital
to the success of electronic transactions.
During the last decade, the defence sector has altered rapidly. Worms and virus cyberattack,
including zero-day assaults, Dynamic Trojan Horse Network (DTHN) internet worms and
Stealth Bot. Enhanced tactics. An increasing danger of cyberstrikes by organized criminals
and technical progress in the cyber security market to essential infrastructures remains the
fundamental driver for the expansion of cyber security solutions for the defence sector. The
defence and the homeland security agencies are expected to cover around 40% share of the
global cybersecurity market in 2015. Growth in investments on military programs and
allocation of resources for research and development of cybersecurity solution for the battle
field communication systems is expected to remain as the most upcoming trends. (sharma,
2015)
The Middle East area is predicted to increase dramatically during the next decade, especially in
Saudi Arabia, the UAE and Qatar. Enormous investment in security solutions for cloud
networks. The key factors leading to the growth of the cyber security market in the defence are
the development of network security and cloud security software. (sharma, 2015)
Visit the official website at: www.mailonline.co.uk to purchase more information about this
report. Qatar established in 2015 a National ICT Plan to upgrade its regulatory and
legislative framework. Countries such as the United States and the United Kingdom are also
likely to have a solid expansion in the cyber security industry needing solutions. Growing
dependency on the internet network for management of weapon systems remain as the key
drivers for the growth of cyber security market in these countries. The 2016 fiscal year
budget proposed by the United States highlighted an overall $14 billion fund allocation for
enhancement of cybersecurity systems. (sharma, 2015)
Physical warfare and attacks are less prevalent now as cyber-attacks are increasing. As cyber
threats rise, the defence industry is focused more on cyber safety and network security. But
the defence business in Sri Lanka says that cyber defence capabilities in very low levels is in
fact not effective in defence sector, as are other popular nations.
The Russian government has increased cyber security in international relations with the
attack of the Democratic National Committee. There have also been growing economic and
political motivations to use the network for malice. The head-of-state attention was paid to
cyber security. International relations scholars are increasingly focusing on the consequences
of technology for national and international security, Zhiqun Zhu says. He believes the
evolution is not amazing. (Maurer and Ebert, 2017)
A third of the world's population has access to technology at the beginning of the 21st
century with a further 1.5 billion projected by 2020. He added that the significance of cyber
security and security of information was significantly challenged. Zhu adds that the G20
declaration on cyber security standards in 2015 with precise language is a rare step
forward. Zhu: Cyber security is now a subject of policy handled by the US President, since
few political topics ever increase up to the president's level. Researchers are discussing
whether or not cyberwar will occur. (Maurer and Ebert, 2017)
Cyber security, together with foreign and security policy, has become a key aspect of
government defence. Efforts to create cyber road rules focus on the applicability of
international current law, possible gaps, the establishment of standards, efforts to foster trust
and to postulate dissuasiveness. In the end, the cybersecurity and its influence on
international relations are developing rapidly, and remain at the top of the global leaders'
agendas in recent years, adds Nye. During American elections, the hack-and-leak operation
rekindled the decades-old debate over the link between information and cyber activities.
(Maurer and Ebert, 2017)
The company can assist safeguard the network by using the right equipment and solutions.
The network security devices that help to safeguard the network from external threats are the
most frequent.
Proxy servers operate as negotiators on client program requests requesting other servers'
resources. Proxies may be open or non-transparent. The reverse proxy is an internal server,
which is used as the front end of a private network to monitor (and safeguard) server access.
Proxy servers in businesses are frequently used to filter traffic (web filters) and to increase
performance (load balancers) (Melnick, 2019)
Firewall capabilities and intrusion detection systems together to prevent intrusion. Effective
implementation of an IPS can be costly, so that companies need to evaluate their IT risks
attentively. An IPS must do wire velocity packet inspection and analysis. Detailed packet
inspection systems for intrusion detection, including applications, and zero-day assaults
should be carried out by intrusion detection systems. It's important to have an IPS that can
identify and stop them in the first attempt to defend them from DDoS attacks. (Melnick,
2019)
System or host intrusion protection equipment at the operating system level are also inline.
They can intercept system calls, access to files, memory, processes and other system
activities to thwart assaults. Several technologies for intrusion prevention exist, among them:
• System memory and process protection - The system sits in this sort of intrusion
prevention approach. Memory protection is a way to prevent the memory of an
other process operating on the same system from being corrupted. Process
protection is a process monitoring method that enables processes suspected of being
attacked to be killed.
• Inline network devices - This sort of method for intrusion prevention inserts a
network device on the network communication channel with the capacity to alter and
block attack packets while passing through the device's interfaces. It functions similar
to a router or firewall in combination with the IDS capability to match the signatures.
Detection and reaction occurs before the packet is sent to the target network in real
time.
False positives can create a denial-of-service condition for legitimate traffic. Session sniping
system identification is another concern when deploying active response IPSs. It is always
recommended to run IPS and active response technologies in test mode for a while to
thoroughly understand their behaviour. writer should carefully monitor and tune systems
and be aware of the risks involved. A look at some of the challenges faced by IT security
professionals in the fight against cyber-attacks. (Melnick, 2019)
1.2.2 Firewall
Firewall is one of the network's initial lines of protection, because it separates one of its
networks. Firewalls can either be autonomous or other infrastructure devices might
contain them. Both firewall software and hardware solutions are available. Two types of
firewall policies are typically employed. (Melnick, 2019)
• Whitelisting — All the connections are denied save those specified as permitted
by the firewall.
• Blacklisting — The firewall enables all connections, with the exception of those
which are not expressly designated.
• Packet-filtering firewall - A firewall packet is a main and simple firewall type for
network security. It has filters which compares incoming and outgoing packages
with established criteria to determine if they can pass. In most situations, the ruleset
is specified (also referred to as access lists), depending on a range of metrics. Rules
might contain IP addresses of source/destination, port/destination numbers, and
utilized protocols. Layer 3 and layer 4 of OSI model are used for packet filters.
Host-based IDSs are designed for monitoring, detecting, and reacting to host activities
and assaults. In most situations, attackers target specific systems with secret information
in business networks. Host-based IDS technologies include policy management, analysis
and host data forensics. (Melnick, 2019)
NAC is a network security control device limiting the accessibility of network resources to
security-conforming devices. Some NAC systems may fix unsupported devices
automatically to ensure they are secure before network access is granted. In order to verify
compliance with present safety regulations, NAC verifies the security settings for the device.
For instance, it may check if the host has the latest antivirus software and updates. The
gadget can enter the network if the prerequisites are met. If not, NAC will isolate or connect
to the guest network until the necessary security improvements are performed in order to
conform to the policy. (Melnick, 2019)
1.3.4 Kerberos
Encryption includes a key and an algorithm. Depending on the precise key used in that
moment the algorithm provides a distinct outcome. The algorithm output is altered by
changing the key. RSA (Rivest–Shamir–Adleman) is the most often used public-key crypto-
system. It is the backbone of RSA that it difficult to determine the main elements of a
composite number. (Geeks for Geeks, 2019)
In the knowledge of the cryptographic technique and the encryption key, the decryption key
cannot be determined. For encryption with different decryption keys, either of the two keys
(public and private key) can be utilized. Public keys may be shared freely, making it easy and
convenient for users. (Geeks for Geeks, 2019)
The Internet usage started to grow fast in the late 1980s. There is a greater requirement for
security between colleges, administrations and military facilities. The ARPANET was the
first automated worm in 1988. The Morris Worm, devised by a Cornell student, may
leverage a system for preventing intrusion that is lacking and connect to another computer,
replicate itself with flaws and deliver it to the new place. (Gorti, 2020)
With the Internet growing, it became a platform for business purposes. SSLv3 was safe enough
for the period in the beginning of the 2000s. The safety of web transactions remained an issue.
The lack of IPv4 addresses led to first IPv6 deployments. In the late 2000's, social networking
platforms appeared and consumers sought an experience "always." (Gorti, 2020)
Introducing technologies like DNSSEC such as TLS and TCP adaptive congestion control
and DNS. They are both crucial for continued, Internet-based personal communications and
e-commerce. A number of security procedures and standards have been developed for calls,
security and privacy. Network security protocols are such that the data is preserved through
a network to ensure security and integrity. (Reddy, 2020)
• IPSec protocol - IPSec protocol is a working group of IETF IPSec, which provides
data authentication, integrity and data protection between two entities. Manual or
dynamic combination of cryptographic key management is achieved via the Internet
Key Exchange IETF-specific key management protocol (IKE).
• Secure Shell (SSH) – In the year 1995, a cryptographic security protocol for the secured
transfer of data over the network was created for Secure Shell (SSH). It allows for remote
login to the command line and remotely performance of certain activities. SSH
incorporates some FTP features. The newest of its sort is SSH-1 and SSH-2.
• Hyper Text Transfer Protocol Secure (HTTPS) - A safe protocol for secure data
exchange among two or more computers is HyperText Transfer Protocol Secure
(HTTPS). The Secure Socket Layer (SSL) is now known as Transportation Layer
Security. This link is encrypted (TLS). Because HTTPS transfers are crypted, fraudsters
are stopped from interpreting and altering data while the transferral from the browser to
the website is complete. Even if the cyber thieves seize the data packets, they cannot read
them since the data packets are strongly encrypted.
• Kerberos - Kerberos is another network validation protocol meant to provide the
secret key cryptography to provide a robust authentication between client-server
applications. The protocol for validation of the Kerberos Network states that all of its
services and working sites are a safe and responsible network.
• OSPF (Open Shortest Path First) - Opening shortest path is the first dynamic routing
protocol to allow messages authentication and integrity of OSPF routing messages, using
OSPF MD5 security protocol as stated in RFC2328. OSPF MD5 authentication
guarantees, without detecting OSPF routing messages, that rogue IP resources cannot be
integrated into the network, guaranteeing the integrity of the OSPF rooting network
routing table(Reddy, 2020)
Links from Switches to Router and 192 192.168.1.0/29 Link between core switch
Firewall and firewall
Table 1 IP design
The initial implementers should consider ensuring enough security for a secure
network while building a network in the organization. Accordingly, the ABC
education network has sufficient safety. The network design contains two firewalls;
firewall activated and firewall standing. Assume the standby firewall provides
network security while the active firewall is down. The firewalls are both Firepower
Services and Cisco ASA 5516-X. Cisco Firewalls. This firewall provides:
• Precise application visibility and control (AVC) - With more than
3,000 application levels and risk-based checks, customised IPS threat
detection rules may be used to enhance security effectiveness.
• Industry-leading Cisco ASA with FirePOWER NGIPS - It helps to
identify multi-sector attacks and automate defence actions through
extremely effective threat prevention, and full contextual knowledge of
people, infrastructure, apps and content.
• Reputation - and category-based URL filtering - It delivers extensive
notifications and monitoring of questionable online traffic through URL
filtering setup and applies policies to hundreds of millions of URLs in more
than 80 categories.
• Advanced malware protection - The effective violation with low TCO
delivers protection value in this design. Find, understand, and stop any
malware and other security layers' developing dangers. These are the suitable
security features implemented with FirePOWER Services Friewalls using
Cisco ASA 5516-X. In addition to firewall security, the deployment of the
ABC education network also takes greater account of the security. Writer
has chosen the 2019 Standard Edition for Server OS for Windows Server.
Windows Server 2019 security features as full as possible
• Windows Defender Advanced Threat Protection (ATP) - This is a new set
of host intrusion control capabilities from Windows Defender ATP Exploit
Guard. must enable this option while setting the OS server. Once that
functionality is activated, Windows Defender Exploit Guard's four
components are now preventing devices from various attack channels,
inhibiting common malware attack behaviors, and balancing security risk
and productivity needs. The four components are: ASR, Netsafety, Folder
Access Control and Exploit Protection, Attack Surface Reduction.
• Security with Software Defined Networking (SDN) The new features
of SDN is Windows Server 2019 are; Encrypted networks: The virtual
network encryption enables virtual network traffic to be configured to be
encrypted between virtual machines that communicate within the
"encoded" designated sub-net. It employs the Transport Layer Security
Datagram (DTLS) for encrypting packets on the
In the IT department there are two backup servers, where all ABC education
backup data are saved. In the server farm, the IT staff will be able to retrieve
backups from two back up servers if any server goes down.
With both enterprises and private persons, VPN's become increasingly popular. Use
encryption methods to provide virtual P2P connections for VPNs to access a number of
dedicated links. When a cyber thief tries to access the supplied data, encryption assures they
can't do anything.
Figure 9 IP configuration
Figure 10 QoS
On Router1:
1) Match traffic:
- Voice traffic using NBAR (rtp)
-> Set DSCP to EF
- HTTP using NBAR (http)
-> Set DSCP to AF31
- ICMP using NBAR (icmp)
-> Set DSCP to AF11
On Router2:
1) Match traffic:
- Voice traffic using DSCP EF
-> Set IP Precedence to 5
- HTTP using DSCP AF31
-> Set IP Precedence to 3
- ICMP using DSCP AF11
-> Set IP Precedence to 0
Verification:
1) Open browser on PC1 and PC2 and browse to cisco.com and facebook.com
- Verify matches in policy
2) Ping cisco.com from PC1 and PC2
- Verify matches in policy
3) Use simulation mode to view DSCP and IP Precedence Packet markings
Here are some very easy codes and more complex modern encryption technologies used
on the Internet today
This category is any means to write a message that anybody else has difficulty reading.
In other alphabets, this includes writing something. Here, writer see Icelandic runes and
IPAs as well as alphabets like Deseret Alphabet designed in a different niche. Writer can
utilize code in this language. Writer examined the creation of constructed languages
like Elvish, Esperanto and others. The Code Talker book by Chester Naz and Judith
Schiess Avila discusses why Navajo is used as a code in the Second World War and
never under extreme circumstances. (educba, 2019)
Asymmetric key cryptographic (public key encryption) is the use of a pair of keys as an
algorithm, a public key related to the sender for the encryption of communications and a
private key that can be decoded only by the creator (if it is not exposed or decides to
reveal it). Anyone wishing to send a message will have an available public key, but a
second personal key is kept in secret to decode and comprehend only by the recipient
The private communication from the public to the owner of the unlocking key is possible
with the publicized encryption key. The mechanism functions as the signature check of
documents locked by the owner of the private key if the decryption key is disclosed.
Everyone has a public key to encrypt communications for the receiver and may decode
communications only by the receiver (educba, 2019)
Asymmetric key cryptography includes RSA, commonly used on the Internet; the Bitcoin
used Elliptic Curve Digital Signature Algorithm (ECDSA), the Federal Information
Processing Standard (FIPS) Digital Signature Algorithm (DSA), adopted by NIST as the
Federal Information’s Processing Standard for Digital Signatures 186-4 (educba, 2019)
Hashing is a cryptographic technique which converts data in a single string of all types.
Regardless of the size or nature of the algorithm used, users may havened any data. It takes
random input and transforms it into a fixed hashed value. This algorithm does not use a key.
Message digest is termed or just hash values that are returned by the hash function. In order
to map data to a certain data size, the Hash functions provide a predictable output from an
input value to ensure cryptogram integrity. Hashes may be disguised and the input value for
a hash function from its output should be difficult to determine. Hash functions are collision
free; which means that no two input hashes should map to the same output hash. (educba,
2019)
The Network tested the vulnerability with tools Nmap Security Scanner and Nessus.
4.1.1 Nmap
Nmap is an open-source free utility for scanning and discovering vulnerabilities. It can be
useful for monitoring individual hosts and large networks with hundreds of thousands of
devices. It is a port-scan tool at heart, which collects information through the transmission
of raw packets to system ports. It listens to the answers and decides if the ports are open,
closed or somehow filtered. (Ferranti, 2018)
The following commands are used to test the network through Nmap Security Scanner:
Command Goal
nmap 192.168.1.1 To scan a single target
nmap 192.168.1.0-254 To Scan a range
nmap 192.168.1.0/24 To scan entire subnet
nmap 192.168.1.0 -p- To scan all ports
nmap 192.168.1.0 -F Fast port scan (100 ports)
nmap 192.168.1.1 -O Remote OS detection using TCP/IP stack
fingerprinting
nmap 192.168.1.1 -A Enables OS detection, version detection,
script scanning, and traceroute
nmap 192.168.1.1 -f Requested scan (including ping scans) use
tiny fragmented IP packets. Harder for
packet filters
Table 3 Nmap commands
4.1.2 Nessus
Nessus is a remote tool to scan a computer and warn if any vulnerabilities are detected. This
is done by running more than 1200 cheques on a particular machine to determine whether any
such assaults may be used to break in or otherwise damage the computer. Nessus is merely a
program that scans your systems for weaknesses that hackers use. Nessus doesn't actively
prevent assaults. It is a modest aspect of a smart safety plan rather than a whole security
solution. In order to build a security solution, the system administrator can fix these
vulnerabilities. To test that computer, the utility doesn't have to be installed on a computer.
Only one computer can be installed and the same number of pcs tested to ensure that there are
no vulnerabilities that might be used to conduct a hostile attack by a hacker. Nessus is
available free of charge and can be downloaded from the Google Play store in the UK and in
the USA. (Nessus, 2019)
There are enough security features supplied in accordance with the present network
implementation. However, there are additional means of ensuring network security when it
comes to future developments. In the Colombo branch network, two firewalls are now in
operation; support the firewall and an active firewall. However, at the Maldives branch there
is no firewall. If an attacker wants to crash or steal credentials from the network, an attacker
must enter the network on the Maldives branch. This is the only way to assault by assailants.
The implementation of FirePOWER Services Friewall will thereby enhance network safety
by adopting Cisco ASA 5516-X.
Network should not only be dependent on hardware security for future developments, but
also additional network security should be provided by software-based firewalls. For
custody filtering and alarm sending functions and for cleaning and repair of a PC, software-
based firewalls such as SolarWinds Network Firewall Security Management and System
Mechanic Ultimate Defense.
In addition to firewalls, establishing robust antivirus software ensures that the network
and devices are protected against computer viruses and enhances performance. The
leading antivirus software is Kaspersky anti virus and Bitdefender Antivirus Plus. In the
present network there are just two WAPs. User access to WAPs is limited. In the case of
mobile operators, because of the limited WAPs, it is tough to utilize the personal
devices in the company. Obviously, a greater number of WAPs will be required to
improve network performance and guarantee they are enough.
This network was developed in accordance with the Cisco Campus Principles of Architecture
and Design. In general Campus is recognized as part of an enterprise network, which gives
the end users and devices in a single geographical place with access to network
communication services and resources. Cisco Campus Architecture fundamentally splits the
following access, distribution and core layers into the network or their building parts.
However, this network is not sophisticated, so that the network is created with Access Layer
according to the collapsed distribution and core.
• Distribution layer: Provides policy-based connectivity and regulates the access line and
core layers
The network has been setup in accordance with network and security policies and
standards. Without defects, all configurations were exact.
Some vulnerability tests have been carried out in the Internet to ensure the network
vulnerability.
However, the existing system has several disadvantages. The biggest disadvantage is that
the Maldives branch does not have firewall security. If a security hole target for an
attacker is entering the network, then the attacker can access the main network to violate
the Maldives branch network. The creation in each gadget of antiviral software will
provide a high degree of safety. Increasing the WAPs will enable the job to be carried out
across mobile platforms and boost the organizational network performance. Then, the
present network has disadvantages. These are the significant prospective advancements,
apart from the disadvantages.
Al-achkar, M. (n.d.). Importance of Cyber Security. [online] World Justice Project. Available
at: https://worldjusticeproject.org/news/importance-cyber-security [Accessed 4 Jun. 2021].
Bourque, A. (2017). 5 ways your company can benefit from using a VPN. [online]
Computerworld. Available at: https://www.computerworld.com/article/3184651/5-ways-
your-company-can-benefit-from-using-a-vpn.html [Accessed 8 Jun. 2021].
Ferranti, M. (2018). What is Nmap? Why you need this network mapper. [online] Network
World. Available at: https://www.networkworld.com/article/3296740/what-is-nmap-why-
you-need-this-network-mapper.html [Accessed 7 Jun. 2021].
Geeks for Geeks (2019). Public Key Encryption. [online] GeeksforGeeks. Available
at: https://www.geeksforgeeks.org/public-key-encryption/ [Accessed 5 Jun. 2021].
Geeks for Geeks (2020). Difference between Kerberos and SSL. [online] GeeksforGeeks.
Available at: https://www.geeksforgeeks.org/difference-between-kerberos-and-ssl/ [Accessed
5 Jun. 2021].
Gorti, S. (2020). The Evolution of Web protocols. [online] Open Source For You.
Available at: https://www.opensourceforu.com/2020/03/the-evolution-of-web-protocols/
[Accessed 6 Jun. 2021].
ISACA (2019). Cybersecurity and its Critical Role in Global Economy. [online]
www.isaca.org. Available at: https://www.isaca.org/resources/news-and-trends/isaca-now-
blog/2019/cybersecurity-and-its-critical-role-in-global-economy [Accessed 31 May
2021].
Melnick, J. (2019). Network Security Devices You Need to Know About. [online]
Netwrix.com. Available at: https://blog.netwrix.com/2019/01/22/network-security-devices-
you-need-to-know-about/ [Accessed 5 Jun. 2021].
Perera, N. (2020). Mitigating the Risk of Cyber Crime in Sri Lanka. [online] The Lakshman
Kadirgamar Institute. Available at: https://lki.lk/blog/mitigating-the-risk-of-cyber-crime-in-
sri-lanka/ [Accessed 4 Jun. 2021].
Reddy, P. (2020). Network Protocols and Its Security. [online] Medium. Available at:
https://priya-reddy.medium.com/network-protocols-and-its-security-47d68f356666
[Accessed 6 Jun. 2021].
sharma (2015). CYBER SECURITY FOR THE DEFENCE INDUSTRY | Cyber Security
Review. [online] Cyber Security Review. Available at: https://www.cybersecurity-
review.com/industry-perspective/cyber-security-for-the-defence-industry/ [Accessed 4 Jun.
2021].
Wexler, J. (2004). Security and QoS Unite. [online] Computerworld. Available at:
https://www.computerworld.com/article/2574473/security-and-qos-unite.html [Accessed 6
Jun. 2021].
01
Assignment Number A.Afreedi
Assessor
th
Assessor Feedback:
Page 2 of 8
Downloaded by Mohamed Atheeb ([email protected])
Resubmission Feedback:
** Please note that this Result will be Provisional till the ISV Process & IV Process is Completed.
Page 2 of 8