Network Security, computer science homework help

Anonymous
timer Asked: May 19th, 2017
account_balance_wallet $15

Question Description

Task 2: This part evaluate students’ perceptive of Security Architecture.

It is becoming increasingly critical that financial institutions ensure their banking customers are able to access their accounts with the highest reasonable security, using a process that is very straightforward and approachable. Technology has made it possible for hackers to extend their reach to vast number of potential victims through a wide variety of attack vectors. Therefore, banks are required to use a secure architecture to provide convenient and secure online services. Secure architecture can be achieved by having layered security. Layered security is a defensive strategy featuring multiple types of security measures, each protecting against a different vector for attack.

Students are required to do the following tasks:

a. Provide a literature review on layered Security Architecture.

(Hint: This should include: the understanding of layered security concept, detailed description of security layers, advantages and disadvantages of using layered security architecture)

b. As a network security consultant, suggest a layered security architecture for a small company’s network.

(Hint: Your architecture should include five levels of IT infrastructure)

c. The concept of layered security is commonly applied by banking system to provide a secure mobile banking services. From user side, Explore and identify what are security controls in your mBanking application. Evaluate the efficiency of these controls.

(Hint: provide screen shoots for all security messages appears in your application)


Task 3:

You are the network administrator for 7colores Company. The company has implemented Microsoft Forefront TMG as the firewall. The company works 5 days a week (Sunday to Thursday) from 8am to 4pm. The company has the following requirements:

1. The Company management wants to implement Network Inspection System (NIS). The goal is to enable NIS to all networks except for servers located in the range 10.20.20.10 to 10.20.20.30. Those servers are considered administration servers, and do not require NIS traffic evaluation. TMG should check for updates every 25 minutes to obtain new signatures. The company wants to follow the default Microsoft policy when network traffic matches one of the active signatures.

2. The TMG intrusion detection should be able to detect Ping of death, UDP bomb and IP half scan attacks and all sorts of DNS attacks. TMG should filter the Time stamp and Loose Source Route during the IP options filtering. The Company management wants to block packets containing IP fragments, but wants to give the default settings for the SIP parameters.

You are required to complete the following configuration

a. Configure network Inspection System (NIS) as following :

Configure an exception named ‘admin’ for the NIS

Configure the address rule Element called ‘administration server’.

Configure the excepted IP addresses range to be 10.20.20.10 to 10.20.20.30. Configure the signature update to be every 25 minutes

b. Configure an intrusion detection System (IDS):

Enable detection for Ping of death, UDP bomb and IP half scan attacks

Enable detection for all types of DNS attack.

Configure Time stamp and Loose Source Route during the IP options filtering. Block packets containing IP fragments.


Evaluation Criteria:

Task 2:

Students are required to write a report, not more than 3,000 words, the report should include:

• Understanding of layered security architecture.

• A layered security architecture for a small company network.

• Listing and evaluating of security controls in an mBanking application

Task 3: TMG configuration

• Configuration of NIS to satisfy the given requirements

• Configuration of IDS to satisfy the given requirements


Guidelines:

Follow the guidelines mentioned below for your assignment:

ØThe document should not be more than 15 to 19 pages in (size A4) paper. ØThe document should be well presented and neatly done.

ØAssignment should be submitted through Moodle (Turnitin).

ØIt should have Table of Contents, references.

ØUse page numbers

ØUse Diagrams and Examples to explain your topic.

ØCopy paste from the Internet is strictly not acceptable.

ØIn-text citation and referencing using CU Harvard referencing Style.

Tutor Answer

benwamonicah
School: Purdue University

Attached.

Layered Security Architecture
1. Introduction
i.

Definition of layered security architecture

ii.

Advantages and disadvantages of using layered security architecture

iii.

Security layers

2. Literature Review
3. Layered Security Architecture for a Small Company
i.

Levels of IT Infrastructure
a. Perimeter layer
b. Network layer
c. Host layer
d. Application layer
e. Data layer

4. Application of Layered Security
5. Conclusion


Surname 1
Table of Content
1. Introduction
i.

Definition of layered security architecture

2

ii.

Advantages and disadvantages of using layered security architecture

2-3

iii.

Security layers

3

2. Literature Review

3-8

3. Layered Security Architecture for a Small Company

8-13

i.

Levels of IT Infrastructure
a. Perimeter layer

8-9

b. Network layer

9-10

c. Host layer

10-11

d. Application layer

11-12

e. Data layer

12-13

4. Application of Layered Security

13-17

5. Conclusion

17

Surname 2
Name:
Professor:
Course:
Date:
Layered Security Architecture
Introduction
In essence, the idea of the layered security is that multiple strategies are utilized to protect
information technology systems from a wide range of attacks. The efforts employed by using
multiple strategies aim to address security issues such as hacking, viruses and malware attacks
among other kinds of cyber threats. Moreover, layered security also addresses problems that can
attack the system like worms, viruses, and malware. Numerous researches have been conducted
to understand the concept of layered security. Some researchers use other names to refer to this
concept such as layered defense and defense in depth. However, some of the researchers
differentiate between the concepts.
Additionally, studies have been done to establish the benefits that layered security offer
to users of technology systems. Some of the advantages identified by scholars include increased
flexibility and maintenance of the systems, components in the system can be measured
independently, and also loosely coupled systems can be developed through the layered
architecture. However, some of the studies criticize the use of layered security stating that they
bring problems to systems rather than benefits. The disadvantages discovered concerning the use
of layered architecture include increased complexities within small applications as a result of

Surname 3
layered security; lower levels interface to get into higher levels when the layered security is
applied; development of the user intensive applications can delay when the layering prevents
users to utilize the user interface components; and lastly, performance of the systems can be
affected since they have to pass through security layers.
The security layers through which technology systems are protected are seven. These
layers allow for users to protect their systems and data from threats and external attacks.
Moreover, the layers allow for easy access to information when a user requires it at any time.
The seven layers commonly known in layered security architecture include information security
policies, physical security, secure networks and systems and vulnerability programs. The
remaining layers are access and control measures, protect and backup data and finally,
monitoring and testing the systems.
Based on research done by various scholars, it comes out that layered security protects
data and technology systems for the users by utilizing multiple strategies. As such, rather than
employing a single measure or approach to protect attacks to systems, the layered architecture
makes use of numerous methods. Also, it helps to improve the security profile of a user.
Nevertheless, it still has some cons that limit its reliability. However, the majority of the
researchers have a similar conclusion pointing out that the layered security is centered on
employing multiple security measures that protect systems against different attacks.
Literature Review
According to (Cole, 2013, pg 723) the security of a computer is considered effective if
multiple layers of security controls are utilized in an institution. Cole further claims that in
making an intrusion detection system (IDS) effective while used in the organization, it should be

Surname 4
implemented using the layered security approach. In his book, he maintains that by using
multiple steps in an organization the data or any information deemed confidential is protected
from external threats. Additionally, Cole claims that using a single element as a security measure
is not effective. He gives an example of the firewall which is deemed an effective security
device.
Based on Cole’s understanding, a firewall is indeed an effective security strategy.
However, he claims that it is only a single element which cannot provide adequate security to the
infrastructure in an organization. Therefore, organizations require using multiple layers of
security to offer effective protection to the technology system from threats such as phishing.
Additionally, in his book (Cole, 2013, pg 723) outlines some of the elements that define
effective layered security architecture. The first elements defined by Cole include the presence of
security policies, procedures, guidelines and standards that ensure the layered security approach
is effective in providing protection to the organization’s systems. Secondly, he mentions that the
layered security requires perimeter security including firewalls, routers and other edge devices.
Furthermore, hardware and software that can host the security products are required to make the
layered security effective. Lastly, the layered security requires the organization to monitor and
audit the system to detect any intrusion and respond to threats fast. Therefore, Cole is a
researcher that advocates for the use of the layered security approach.
(Kölle, Markarian and Tarter, 2011, pg 104), describe layered security as a barrier that
protects systems from external threats. According to these authors layered security is defined as
multiple layers...

flag Report DMCA
Review

Anonymous
Tutor went the extra mile to help me with this essay. Citations were a bit shaky but I appreciated how well he handled APA styles and how ok he was to change them even though I didnt specify. Got a B+ which is believable and acceptable.

Similar Questions
Related Tags

Brown University





1271 Tutors

California Institute of Technology




2131 Tutors

Carnegie Mellon University




982 Tutors

Columbia University





1256 Tutors

Dartmouth University





2113 Tutors

Emory University





2279 Tutors

Harvard University





599 Tutors

Massachusetts Institute of Technology



2319 Tutors

New York University





1645 Tutors

Notre Dam University





1911 Tutors

Oklahoma University





2122 Tutors

Pennsylvania State University





932 Tutors

Princeton University





1211 Tutors

Stanford University





983 Tutors

University of California





1282 Tutors

Oxford University





123 Tutors

Yale University





2325 Tutors