Level of Defenses in Network Security-A Case Study of Geetanjali Institute of Technical Studies, Dabok
Level of Defenses in Network Security-A Case Study of Geetanjali Institute of Technical Studies, Dabok
2, 3 , 4
Department Of Computer Science and Engineering
Geetanjali Institute of Technical Studies, Dabok
2
sonikritika569@ gmail.com, 3shaan01jain@g mail.com , 4ku nal.singhvi. [email protected] om
Abstract A secured network is one which is free of administrative and management policy required to provide
unauthorized access, threats and hackers. This paper an acceptable level of protection for hardware, software,
describes the different levels o f network security. A brief and information in a network.” [1]
overview of the Network Security, its need, different hreats
and related pro tection techniques are presented. The paper A. Need of Network Security at Geetanjali Institute of
presents a general overview of the most common network Technical Studies
security threats and the steps which can be taken to p o tect
an educatio nal institution and to ensure that data travelling
Institute has a difficult network environment to secur .
across the network is safe and secure. The objective of the
Proprietary information must be protected, the network
must be available 24x7, yet hundreds of untrusted student-
paper is to highlight the loopholes in the existing network of
owned computers must be given access. That’s where the
computer science department of Geetanjali Institute of
problem arises. Network administrator cannot control what
Technical Studies. The paper presents the setup of an Ideal
students do, or have done, with their laptops and desktops,
Network Defense System in the institute.
and that puts the entire network at risk.
Keywords Network Security, IP Sec, VLANs, Firewalls,
As an educational organization, the administration strives
Antivirus Packages, MAC Filtering, Access Control Lists,
to facilitate the open exchange of information. Studen s,
Tokens, Security Policies, Intrusion Detection.
faculty me mbers and librarians all need access to Internet.
I. Introduction However, at the same time, the administrator has a
responsibility to protect users from network threats, and
The Internet has undoubtedly become the largest public keep the network up and running. A top security priority is
data network, enabling and facilitating both personal d to establish a private network to keep confidential
educational communications worldwide. The volume of information (student records, scholarships, administrative
traffic moving over the internet, as well as education records, financial information etc.) safe from unauthorized
networks, is expanding exponentially every day. This vast users, hackers, and other threats.
network and its associated technologies have opened the
II. Objective
door to an increasing number of security threats from
which educational institution must protect them. Network Networks in the institution are isolated from each other. It
is desired to have a single backbone network. The paper
security consists of the provisions made in an underlying
will discuss:
computer network infrastructure, policies adopted by the
network administrator to protect the network and the • Users in college.
network-accessible resources from unauthorized access, • Current network plan.
and consistent and continuous monitoring and • Drawbacks in the existing network plan.
measurement of its effectiveness combined together. • Level of defenses in an ideal network system.
Network Security refers to “all hardware and software • Proposed network plan for the college.
functions, characteristics, feature, operational procedures,
accountability measures, access controls, and
• Monitor and alarm power-related parameters at through it, and denies or permits passage based on a s of
the supply and device level. rules[3]. The firewall creates a protective layer between
• Use filtered power and install redundant power the network and the outside world. In effect, the fire all
supplies on mission-critical devices. replicates the network at the point of entry so that it can
receive and transmit authorized data without significa
B. PC Level Security
delay. However, it has built-in filters that can disallow
This level of defense includes technologies as Antivirus unauthorized or potentially dangerous material from
Softw are Packages, IP Sec, host Firewalls, Folder entering the real system. It also logs an attempted intrusion
Guards etc. and reports it to the network administrators.
• Centralized Network
• Redundancy
• Multiple ISPs (Internet Service Provider)
• Netw ork with Load Balancing
A. Centralized Network
We have discussed the mesh network in college so we are
going to propose a centralized network that can be
implemented using UTMs (Unified Threat Management).
Centralized computer netw ork system in which all the
resources are stored and managed at one place.
Centralization is easy for system administrator to keep
all that resources consistent and in accurate form. Wh le in
distributed system all the sites containing the data and
Fig 4: REDUN DANT N ETWORK WITH LOAD BALANCING
resources need to be managed separately. We can easily
back up the data that is stored only at one place. It is also VII. Conclusion
very much easy to protect the system from unauthorized
access because there is only site on the network that needs Network must be secure in order to prevent against threats
protection. to their integrity, otherwise the loss or misuse of
information can be catastrophic. The paper set upon
B. Redundancy defining the role of network security and hoped to explain
Redundancy is the internetworking, the duplication of further how to achieve that role. The changing strategy for
connections, devices or services that can be used as a developing a secure network coincides w ith the creation of
backup in the events like the primary connections or new threats; therefore, it is an evolutionary process
service failure. constantly changing to meet new requirements. In
conclusion, computers and software are now the part of
C. Multiple ISPs (Internet Service Provider) world-wide -network, making them more susceptible to
Multiple ISP solution addresses more than alternate threats and thus demanding Network Security.
pathways and disaster recovery. It can also provide a
solution for network traffic jams or supply network REFERENCES
isolation for specific applications .
[1]. Shaffer, S teven L., and Alan R. S imon, Network S ecurity,
D. Network with Load Balancing Academic Press, 1994.
[2]. C isco Certified N etwo rk Associate, S tud y Guid e, Tod d Lammle, 6 th
Load Balancing, a clustering technology enhances the edition.
[3]. M icrosystems Networking and Security S olutio ns. URL :
scalability and availability of mission-critical, TCP/IP- http ://www.i2 sc.org
based services, such as Web, Terminal Services, virtual [4]. A Beginner’s Guide to Netwo rk S ecurity, C isco S ystem.
[5]. Security Tokens, W ik ipedia. URL :
private networking, and streaming media servers. Network http ://en.wik iped ia.o rg/wiki/Security_tok en.
Load Balancing distributes IP traffic across multiple [6 ]. Alexander, M ichael, The U nderground Guid e to Co mputer
S ecurity, Addison- Wesley P ub lishing Company, 1996.
cluster hosts. It also ensures high availability by detecting [7]. G uide To Intrusio n Detectio n And P reventio n S ystems(IDPS ),
host failures and automatically redistributing traffic to the recommendation o f National Institute Of Standards and Techno logies
surviving hosts. The unique and fully distributed (Special Pub licatio n 800-94) . URL: csrc.nist.go v