0% found this document useful (0 votes)
189 views9 pages

Rough

Uploaded by

Sadip Bhattarai
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
189 views9 pages

Rough

Uploaded by

Sadip Bhattarai
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd

INTERNATIONAL SCHOOL OF

MANAGEMENT AND TECHNOLOGY

FACULTY OF COMPUTING
ASSIGNMENT COVER SHEET
This form is to be completed by students submitting assignments of level 4 and level 5.
Students are required to complete all sections and attach to your assignment.

STUDENT DETAILS

STUDENT NAME Sadip Bhattarai

STUDENT ID

UNIT AND ASSIGNMENT DETAILS


Unit 17: Network Security
UNIT TITLE
Unit 17
UNIT NUMBER
Nobel College Security
ASSIGNMENT
TITLE
September 18, 2024 November 18, 2024
ISSUE DATE DUE DATE

ASSESSOR Binod Adhikari


NAME

ESTIMATED 5700
WORD LENGTH

SUBMISSION

HAND IN DATE Jan 4, 2025


DECLERATION AND ACKNOWLEDGEMENT
When submitting assignments, each student must sign a declaration confirming
that the work is their own.
Plagiarism and Collusion
Plagiarism: to use or pass off as one’s own, the writings or ideas of another
without acknowledging or crediting the source from which the ideas are taken.
Collusion: submitting an assignment, project or report completed by another
person and passing it off as one’s.
In accordance with the Academic Integrity and Plagiarism Policy:

1. I declare that:
a) this assignment is entirely my own work, except where I have included fully-
documented references to the work of others,
b) the material contained in this assignment has not previously been submitted
for any other subject at the University or any other educational institution,
except as otherwise permitted,
c) no part of this assignment or product has been submitted by me in another
(previous or current) assessment, except where appropriately referenced, and
with prior permission from the Lecturer / Tutor / Unit Coordinator for this unit.

2. I acknowledge that:
a) if required to do so, I will provide an electronic copy of this assignment to the
assessor;
b) the assessor of this assignment may, for the purpose of assessing this
assignment:
I. reproduce this assignment and provide a copy to another member of
academic staff;
II. communicate a copy of this assignment to a plagiarism checking
service such as Plagiarism Check (which may then retain a copy of this
assignment on its database for the purpose of future plagiarism
checking).

I am aware of and understand that any breaches to the Academic Code of Conduct
will be investigated and sanctioned in accordance with the College Policy.

SIGNATURE DATE Jan 4, 2025


The Nobel College
Research and Technology

Network Security

Submitted By: Submitted To:


Sadip Bhattarai Binod Adhikari
Contents
Introduction.....................................................................................................7
Assignment Task – Part 1..............................................................................8
Slide 1: Network Security.............................................................................8
Slide 2: Introduction to Network Security.....................................................9
Slide 3: Types of Network Security Devices................................................10
Slide 4: Cryptographic Types in Network Security......................................11
Slide 5: Comparison of Network Security Protocols....................................12
Slide 6: Conclusion.....................................................................................14
Comparison between IPsec and TLS........................................................15
1. IPsec....................................................................................................15
2. TLS (Transport layer security)..............................................................15
Types of Network Security Devices..........................................................17
Firewall:...................................................................................................17
Intrusion Detection/Prevention System (IDS/IPS):...................................17
Network Access Control (NAC):................................................................17
Antivirus and Anti-Malware:.....................................................................17
Virtual Private Network (VPN):.................................................................17
Data Loss Prevention (DLP):....................................................................17
Most Common Network Security Protocols.................................................18
Transport Layer Security/Secure Sockets Layer (TLS/SSL):......................18
IPSec (Internet Protocol Security):...........................................................18
HTTPS (HyperText Transfer Protocol Secure):..........................................18
802.1X:....................................................................................................18
Requirement Specification Document........................................................19
The Purpose of a Secure Network............................................................19
Requirements for a Securing the Network of The Nobel College.............20
1. Apply Encryption.............................................................................20
2. Set Up Firewall.................................................................................20
3. Consistent Monitoring of the Network................................................20
4. Install Antivirus and Anti-malware...................................................21
5. Educate Employees.........................................................................21
6. Set up 2FA (Two-Factor Authentication)...........................................21
7. Create Strong Password.....................................................................21
8. Update Software..............................................................................22
Network Hardware......................................................................................23
1. Router..............................................................................................23
2. Switch..............................................................................................23
3. Hub..................................................................................................23
4. AP (Access Point).............................................................................24
5. Modem............................................................................................24
6. Firewall............................................................................................24
7. Bridge..............................................................................................25
8. Gateway.............................................................................................25
Network Software.......................................................................................26
1. An Operating System (OS)..................................................................26
2. Network Operating System (NOS).......................................................26
3. Firewall Software.................................................................................26
4. Systems for Intrusion Detection and Prevention (IDS/IPS)...................27
5. VPN Software.......................................................................................27
5. Network Management Software..........................................................27
6. File Transfer Protocol (FTP) Software...................................................27
8. DNS Software......................................................................................28
Design of a Secure Network.......................................................................29
Higher Level Network Architecture..........................................................29
The Importance of Network Security to an Organization............................31
1. Protecting Sensitive Data....................................................................31
2. Preventing Financial Losses.................................................................31
3. Maintaining Customer Trust.................................................................31
4. Ensuring Regulatory Compliance.........................................................31
5. Enhancing Operational Efficiency........................................................31
6. Adapting to Emerging Threats.............................................................31
Assignment Task - Part 2................................................................................33
Configuring Network Security for The Nobel College..................................33
Website Vulnerability Testing......................................................................36
Critical Evaluation of the Network Design, Planning, Configuration, and
Testing for The Nobel College.....................................................................64
1. Network Design...................................................................................64
2. Planning...............................................................................................64
3. Configuration.......................................................................................65
4. Testing.................................................................................................65
Conclusion...............................................................................................65
References.....................................................................................................66
References

Aboba, B., Blunk, L., Vollbrecht, J., Carlson, J., & Levkowetz, H. (2004). Extensible
Authentication Protocol (EAP). RFC 3748. [online] Available at:
[Link] [Accessed 5 Nov. 2024].

Atkinson, R. and Kent, S. (2025). RFC 2401: Security Architecture for the Internet Protocol.
[online] IETF Datatracker. Available at: [Link] [Accessed 4
Jan. 2025].

Baalbaki, F., 2016. The Role of Firewalls in Network Security. 1st ed. New York: McGraw-Hill.
[online] Available at: [Link]
[Accessed 3 Nov. 2024].

Bonneau, J., Herley, C., Van Oorschot, P. and Stajano, F., 2015. The quest to replace passwords:
A framework for comparative evaluation of web authentication schemes. IEEE Symposium on
Security and Privacy, 12(1), pp. 44-57. [online] Available at:
[Link]
[Accessed 3 Nov. 2024].

Chen, T. M., Harper, K., & Desai, D. (2012). Security and Privacy in Digital Era. Springer.
Available at:
[Link]
[Accessed 6 Nov. 2024].

Cisco Systems, Inc., 2020. Cisco Networking Academy. Introduction to Network Security.
[online] Available at: [Link] [Accessed 3 January 2025].

Forouzan, B. A., 2017. Data Communications and Networking. 5th ed. McGraw-Hill Education.
[online] Available at: [Link]
[Link] [Accessed 3 January 2025].

Garcia, L., & Gupta, R. (2015). Network Security Essentials. Pearson. Available at:
[Link]
standards/P200000003333/9780137561650 [Accessed 3 Jan. 2025].

Hadnagy, C., 2018. Social Engineering: The Science of Human Hacking. Wiley. [online]
Available at: [Link] Engineering_ The Science of Human
Hacking ( PDFDrive ).pdf [Accessed 8 Nov. 2024].

jumpfactor (2023). 8 Essential Reasons Why Network Security is Important | Executech. [online]
Executech. Available at: [Link]
important/ [Accessed 3 Jan. 2025].
Kaufman, C., Perlman, R. and Spatscheck, O., 2019. Network Security: Private Communication
in a Public World. 2nd ed. Upper Saddle River, NJ: Prentice Hall. [online] Available at:
[Link]
[Link]
[Accessed 9 Nov. 2024].

Kizza, J. M. (2017). Guide to Computer Network Security. Springer. Available at:


[Link]
[Accessed 4 Nov. 2024].

Kurose, J. and Ross, K., 2017. Computer Networking: A Top-Down Approach. 7th ed. Pearson. .
Available at: [Link]
Networking _ A Top Down Approach, 7th, [Link] [Accessed 3 Nov. 2024].

Parker, D., 2019. Introduction to Cryptography and Network Security. [online] Available at:
[Link] [Accessed 3 January 2025].

Rescorla, E. (2025). RFC 2818: HTTP Over TLS. [online] IETF Datatracker. Available at:
[Link] [Accessed 4 Jan. 2025].

Rescorla, E. and Dierks, T. (2025). RFC 5246: The Transport Layer Security (TLS) Protocol
Version 1.2. [online] IETF Datatracker. Available at:
[Link] [Accessed 4 Jan. 2025].‌

Scarfone, K., & Mell, P. (2007). Guide to Intrusion Detection and Prevention Systems (IDS/IPS).
NIST Special Publication. Available at:
[Link] [Accessed 3 Nov.
2024].

Shinder, D., 2018. The Complete Guide to Firewalls. [online] Available at:
[Link] [Accessed 3 January 2025].

Stallings, W. (2019). Network Security Essentials: Applications and Standards. Pearson.


Available at: [Link]
[Link] [Accessed 3 Nov. 2024].

Sullivan, B., 2019. Mastering Two-Factor Authentication: Secure your Online Accounts. [online]
Available at: [Link] [Accessed 3 January 2025].

Tanenbaum, A.S. and Wetherall, D.J., 2011. Computer Networks. 5th ed. Prentice Hall.
Available at: [Link] S. Tanenbaum - Computer
[Link] [Accessed 5 Nov. 2024].

Zhou, L., 2020. The Importance of Cryptographic Protocols in Network Security. Journal of
Network Security, 18(1), pp. 23-30. [online] Available at:
[Link] [Accessed 3 January 2025].

You might also like