Skip to content

ICTNWK509

Assessment 1
1.1 The network threats to consider are-
1. Phishing
2. Service attack denial
3. Malware
4. Computer viruses
5. Rogue security software (Jing, et al., 2014).
An enterprise can achieve the right level of security through-
 Malware scanning
 Prevention function of data leakage
 Internet protocol awareness (Jing, et al., 2014).
 AV scanning
 Dynamic URL categorization techniques.
1.2 Security goals that need to be considered are-
 Segmenting and creating the DMZ.
 Enabling secure network access.
 Building security layers around the castle as there is no such defense that is 100% effective.
 Harden security policies, device configuration, and software updates (Dadheech, et al., 2018).
 Perimeter security begins with secure network design by using-
 Authentication of all users access.

Some of the examples of active attacks are Masquerade, service distributed denial, session
replay, etc.
Some of the examples of passive attacks are analysis of traffic, release of a message.
1.3 Windows Defender Firewall with Advanced Security can be defined as a tool that
provides detailed control over the rules applicable by the windows defender firewall. One can
view all the potential rules that are being used by creating new rules, disabling new rules, and
changing their properties. It is an important and crucial part of the security model layer.
Through host-based, windows defender firewall blocks unauthorized network of traffic which
flows in or out of the local device (Ambhore & Wankhade, 2020).
For opening the windows firewall-
 First one has go to the start menu
 Then select Run
 Type WF.msc
 Select OK
Practices used for managing existing windows firewall rules are-
 Blocking by default.
 Allowing only specific traffic.
 Specifying internet protocol sources.
 Specifying the destination port.
1.4 Point to Point Tunneling Protocol (PPTP)- PPTP is created by Microsoft. All windows
operating system has developed PPTP client software. PPTP clients are also available for
Linux. In terms of scalability, PPTP is a good protocol option for remote access.
L2TP- L2TP was introduced as a joint effort among Cisco and Microsoft and joint features of
PPTP and Cisco’s Layer 2 Forwarding protocols. It offers strong security and uses IPSec for
encryption. L2TP has data integrity and also has data confidentiality. L2TP also has certificate-based authentication. L2TP client can be built-in server and XP 2003, Microsoft’s
Windows 2000. Client Software can be installed for free and can be downloaded on Windows
98, NT 4.0, and ME.
IPSec- Doing encryption for L2TP connections IPSec is used to create the connection in
tunnel mode. IPSec VPNs are extensively supported by firewall VPN appliances. IPSec is
the single tunneling protocol that is supported by all the firewall vendors. It includes Check
Point, Netscreen, Cisco PIX, Sonicwall, etc.
1.5 Security Audit- Examination and systematic evaluation of the information system of a
company is called Security Audit. In security audit, the physical configuration of the
system, software used by the company, information handling processes and user practices,
are to be checked or examined. In security audit, the technical experts and professionals
examines the wellness and accuracy of the security protocols. Following are the reasons and
benefits of conducting Security Audits-
It is required to identify the security problems and deviations, and also to know the system
weaknesses. Security Audits help to acknowledge the security policies of internal
organizations.
It helps to determine whether the security training is adequate or not.
It develops a security baseline that helps to conduct future audits.
Security Audits help in the identification of unnecessary resources.
Penetration Test- Penetration Test is a wider term and goes beyond the security audit. The
penetration test or a pen test is an authentic simulated attack that is conducted on the
computer system to check or examine its security. Penetration expert uses the same tools and
techniques which is used by the hackers and attackers to find or identify the weaknesses of
the system. By conducting a Penetration Test, the effectiveness of the computer system can
be improved as because the weak points and deviations can be identified. Following are the
benefits of this test- It helps organizations to eliminate hazardous security flaws (Stiawan,
2017). Helps to identify the defects and faults of the computer system
To analyze the robustness of controls
Helps to detect and prioritize cyber risks
Penetration testing helps to expose the vulnerabilities
1.6 Motion Sensors- Motion Sensors are the sensors that are established outside to detect movements. To sense the motion, these sensors use infrared rays. Motion sensors are of two
types- one is active and the other is passive. If the motion sensor is active, then it uses the
power source to detect the motion. On the other hand, if the motion sensor is passive, then it
only sends an alarm if the movement and temperature change.
CCTV Security- CCTV stands for Closed-Circuit Television. These systems use interior
and exterior cameras that keep a watch on a specific space. CCTV cameras keep an eye on
the activities of the people or the individuals where the cameras are fixed.
Radar System- Radar System is one the important security component. This device helps to
detect vehicles and people who are at short and medium distances. This system helps the
owners who have open field businesses. Radar systems provide protection from the theft of
vehicles.
Electrified Fences- Electrified Fences is a very effective way to stay away the burglars and
invaders. If an intruder tries to climb the fences or try to cut it, the alarm sends the signals
and the system will be activated. Electrified fences can also become a threat because of the
electric shock, which can take the lives of intruder.
Biometric Pattern- With this control system, an organization restricts the entry of unknown
individuals and persons in the business premises. This system uses pin, fingerprint or a
biometric pattern to take entry into the organization. With the help of biometric patterns, an
organization can limit the entry of the unknown persons (Göksel, et al., 2019).
Vibration Sensors- This system uses a wireless alarm to monitor the property. This is a
security device that detects suspicious objects or things. When the device detects something
suspicious, it triggers the alarm and starts to vibrate. These sensors are generally placed on
doorways and windows.
1.7 It is important to back up network configuration or a network backup because backing up
is an integral or important part of a recovery plan. As network configuration contains very
crucial or confidential business information or data, if it is not backed up then the operations
of the business can be adversely affected. If the business’s crucial or confidential data lose
due to a data breach or hacking activities, the backup ensures the recovery of data.
Benefits of network backup include- Decreasing human error, improving the ability of
disaster recovery, automating the backups, etc.
In the backup configuration dialog box, you should first enter the entire path to another folder
or a local folder where all the files can be copied easily. Then, you should provide a path for every data core server. In this, the entries are not case sensitive so we can include spaces
among them like c:\backup configuration. Then you should click on backup.
1.8 Log Analysis refers to interpreting, reviewing, and knowing the computer-generated
records which are called logs. It is the process of inspecting or assessing the computer-
generated logs to identify the security threats and bugs, application performance and other
risks. Log analysis is also used to review the behavior of the user (Svacina, et al., 2020).
The techniques of log analysis include-
Recognition of patterns, classification, and tagging, correlation analysis, and artificial
ignorance.
Purpose- The purpose of log analysis is that it provides a semi-structured data analytics
solution. It helps to mitigate the problem diagnosis and time resolution.
1.9 In the era of digitalization, various sophisticated technologies are becoming popular all
over the world. Business organizations use various technologies to run their business
activities. It is also important for business organizations to protect their confidential and
crucial business data from hacking and other cybercrimes. Security measures perform
following
Critical roles-
It protects the business organization’s ability to function.
It safeguards the technology assessed by the business.
It protects the company’s confidential data from hacking or information leakage.
The security mechanism provides protection against the cybercrimes.
By adopting security mechanisms, the company can protect their data from the misuse.
1.10 The popularity of android phones and smartphones is increasing worldwide. As mobile
devices and tablets become companions, hackers are ready to break the avenue. With the
inexpensive equipment, the hackers seek and gain or assess the nearby mobile devices. This
can leak the mobile data and personal information the individual. Technologies can also be
misused. So it is important to protect your mobile device from these hacking activities
(Karim, et al., 2015). To protect the data and information, the following options are available-
the use of a strong and hard password for mobile devices.

Stick to the official app stores you should backup the data of the mobile from time to time.
Should use VPN

Assessment 2
2.1 Phishing threat – In this threat hackers steal login id and card no via message or email
Cyber attack – in solution tack company network security device is not use for safety so cyber
attack attempt easily in this process steal unauthorized access and data.
Hacking threat – In this threat hack the personal information and discussion by bad websites
and traffic
Malware virus- it is group of viruses that affect your network and it is harmful computer
programs
Spy ware threat – it is most common threat for network and computer user it is installed
computer without your knowledge and hack information of your work.
2.2 Fire wall is use in solution Tech Company for safe use of all network and data or it will give
protection of network against all threat.
Because security is require in this network group of computer work for router and ISP so
hacking is easy and bad traffic occur so use antivirus and firewall for all computer for
maintain safe system.
2.3 Crisco packet tracer is a software use for complicated network and support multi user
network system. In solution tech company model use 3 department this company has 3
department sales, research and management so 3 different local area network VLANs use for
use internet in system if we use Crisco packet tracer means change to topology in network for
security purpose. Different topology from different department like research department has
different VLANs and management department has deferent VLANs and sales department has
own VLANs all network authority in one pace so safe data and communicate and discussion
easy for this change in topology. And add fire wall for data protection and computer
protection and hacking.
2.4 There is need to protect my network and edge router using the ACLs and if sales
department crate problem means block the port of sales department for safety of other department access control lists is control the bad traffic for network and use firewall software
for safety purpose and
SSH means secure socket shell it is protocol that allow to computer to share data it is
process of data transfer in one computer to another computer and because in solution tech
model 3 department work in group so it is important for safe data share.
2.5 For safe use of data and file use virtual private network it is beat solution for data safety
and security
Download the virtual private network firewall software and enter organization public IP
address and enter username or password and connect in network.
Advantage of VPN is secure network and hides private information it is way to secure online
data and web traffic and keep information safe and data secure by use of virtual private
network.
2.6 In this network use 3 department in one line sales department and research department
and management department and security did not use for safety purpose and edge router and
ISP router is use in solution tech network for internet so we add in this network ACLs
software of one port for protect all network device and all department change in deferent
building all department have own local area network for data share and one main VLANs is
for all network for security and this model is best model for protect all computer for hacking
and bad traffic and malicious traffic And virus and easily transfer all information in all
department host and secure data from hacker .
Use firewall in this system for security fire wall is basically use in two form hardware and
software and it is very important device for protect your devices from bad traffic and virus
and keep safe all data and information. Firewall promotes privacy and stops spyware and
virus and prevent from cyber attack and monitor bad traffic and keep safe all information so
this is most important security device that add in this network for safety purpose.

References
Ambhore, P., & Wankhade, A. (2020, January). Firewall for intranet security.
In International Conference on Mobile Computing and Sustainable Informatics (pp. 653-
659). Springer, Cham.
Dadheech, K., Choudhary, A., & Bhatia, G. (2018, April). De-militarized zone: a next level
to network security. In 2018 Second International Conference on Inventive Communication
and Computational Technologies (ICICCT) (pp. 595-600). IEEE.
Göksel, U. Ç. T. U., ALKAN, M., Doğru, İ. A., & Dörterler, M. (2019, October). Perimeter
network security solutions: A survey. In 2019 3rd International Symposium on
Multidisciplinary Studies and Innovative Technologies (ISMSIT) (pp. 1-6). IEEE.
Jing, Q., Vasilakos, A. V., Wan, J., Lu, J., & Qiu, D. (2014). Security of the Internet of
Things: perspectives and challenges. Wireless Networks, 20(8), 2481-2501.
Karim, A., Ali Shah, S. A., Salleh, R. B., Arif, M., Noor, R. M., & Shamshirband, S. (2015).
Mobile botnet attacks-an emerging threat: classification, review and open issues. KSII
Transactions on Internet and Information Systems (TIIS), 9(4), 1471-1492.
Stiawan, D. (2017). Cyber-attack penetration test and vulnerability analysis. International
Journal of Online and Biomedical Engineering.
Svacina, J., Raffety, J., Woodahl, C., Stone, B., Cerny, T., Bures, M., … & Tisnovsky, P.
(2020, October). On vulnerability and security log analysis: A systematic literature review on
recent trends. In Proceedings of the International Conference on Research in Adaptive and
Convergent Systems (pp. 175-180).