Network Security

Prepare a comparison study with various continuous authentication approaches (which supports one factor or more than one factor). You are required to search various papers and websites of these approaches and find out their unique features and write at least four(4) continuous authentication approaches mentioning their features, uniqueness, how the study was conducted, what is the accuracy of this approach. Regarding these approaches, please consider recent two/three years publications (2018-2021) only. You are required to write a paragraph mentioning the above criteria. It is possible to choose some adaptive authentication techniques which published in recent years that support continuous authentication.

Then based on your research, need to prepare a comparison table with these four approaches and mention your criteria to compare these approaches and why you choose these criteria. You are required to provide a reference for each of the chosen Continuous authentication approaches.

Network Security

 

Cyberattacks against major businesses, colleges, and the federal government have dramatically increased in recent years. In most cases, the cyberattack ended in massive breaches and leaks of personal information. Here are a few examples for you to review:

Here’s What Happened to Your Target Data That Was Hacked
Home Depot Hackers Exposed 53 Million Email Addresses
U of Nebraska Data Breach Affects 650,000 Students
Cybersecurity Resource Center
In each of these cases, the organization noted possible causes for its security breach. For your main post, select one of these examples, or find an example of your own noting the same type of security breach, and identify the most probable cause in security that allowed the breach. If you choose a different example, be sure you provide a link to the story at the end of your initial post.

 

Network Security

 

 

The CSO of your organization was originally the organization’s CFO and does not grasp the concepts of Defense in Depth and Layered Security as related to network security strategies. She wants you to create and deliver a report defining and describing Defense in Depth and Layered Security strategies along with an overview about how the strategies should be implemented. In addition, your report must compare the strategies by explaining any similarities and identifying, at least, two advantages and disadvantages of implementing each security strategy.

Required Section Headings:

Introduction
Defense in Depth
Layered Security
Advantages and Disadvantages
Summary/Conclusion

 

Network Security

o Propose an appropriate network infrastructure that offers sound security practices for the existing intranet and the new proposed expansion.
o Create and describe a diagram of the network architecture, discussing how it can meet the goals of the company.
o Describe the access controls and how the company can ensure that devices and topology are effective and working to protect the company infrastructure.
o Review and describe the need for intrusion detection systems (IDS) and intrusion prevention systems (IPS).
o Discuss how they can effectively be used in a network operations setting.
o Ensure that there is an appropriate use of the IDS and IPS in the network diagram.

Network Security

Given the following routing table for IPv4, using longest-prefix-first routing:
IP Address Port
10.180.0.0 / 14 A
10.182.0.0 / 15 B
10.181.192.0 / 18 C
10.181.208.0 / 20 D
10.180.19.128 / 25 E
10.181.192.192 / 25 F
default G
Find and explain the routing for IP packets with destination address
(a) 10.181.9.10
(b) 10.180.20.129
(c) 10.181.198.145
(d) 10.181.192.196
(e) 10.181.192.189
Problem 4:
The transport layer is responsible for providing reliable communication. We look at a long-haul network with a large bandwidth. The maximum transmittable unit (MTU) is assumed to be 1460 bytes of payload. Assume we are transmitting continuously at 10 MB/sec = 107 B/sec from Los Angeles to Miami over a distance of 4000 km. Assume further a processing delay of 100 psec per router and three routers for a total of 300 psec. The bandwidth of the connection is 100 Mb = per second. The medium is optical fiber with a speed of light of 204 m/psec.
(f) What is the size of an IPv4 packet with 1480 B payload when using TCP?
(g) Assuming no queueing delay, what is the total network delay (propagation delay + transmission delay + processing delay) of a message of 1460B payload. (Neglect the frame overhead at the data link layer.)
(h) What is the total network delay of a frame if the payload is a single byte?
(i) How many frames per second of MTU size are needed to send 107 B/sec.
(j) Assuming that every frame is acknowledged and that transmission follows TCP Tahoe rules (after three acknowledgments of the same segment number, a frame is assumed to have failed), how many frames will have to be resent whenever one frame is lost.
Problem 5:
4K Ultra High Definition TV-1 uses 3,840 horizontal pixels and 2.160 vertical pixels. The refresh rate is 60 Hz. The color range is extended to High Dynamic Range (HDR) by using 10 bits per channel for a total of 30b per pixel.
• Calculate the bandwidth (in bits per second) needed to show video in this format.
• Calculate the compression ratio needed so that the bandwidth is limited to 25Mb/sec.

 

Network Security

Given the following routing table for IPv4, using longest-prefix-first routing:
IP Address Port
10.180.0.0 / 14 A
10.182.0.0 / 15 B
10.181.192.0 / 18 C
10.181.208.0 / 20 D
10.180.19.128 / 25 E
10.181.192.192 / 25 F
default G
Find and explain the routing for IP packets with destination address
(a) 10.181.9.10
(b) 10.180.20.129
(c) 10.181.198.145
(d) 10.181.192.196
(e) 10.181.192.189
Problem 4:
The transport layer is responsible for providing reliable communication. We look at a long-haul network with a large bandwidth. The maximum transmittable unit (MTU) is assumed to be 1460 bytes of payload. Assume we are transmitting continuously at 10 MB/sec = 107 B/sec from Los Angeles to Miami over a distance of 4000 km. Assume further a processing delay of 100 psec per router and three routers for a total of 300 psec. The bandwidth of the connection is 100 Mb = per second. The medium is optical fiber with a speed of light of 204 m/psec.
(f) What is the size of an IPv4 packet with 1480 B payload when using TCP?
(g) Assuming no queueing delay, what is the total network delay (propagation delay + transmission delay + processing delay) of a message of 1460B payload. (Neglect the frame overhead at the data link layer.)
(h) What is the total network delay of a frame if the payload is a single byte?
(i) How many frames per second of MTU size are needed to send 107 B/sec.
(j) Assuming that every frame is acknowledged and that transmission follows TCP Tahoe rules (after three acknowledgments of the same segment number, a frame is assumed to have failed), how many frames will have to be resent whenever one frame is lost.
Problem 5:
4K Ultra High Definition TV-1 uses 3,840 horizontal pixels and 2.160 vertical pixels. The refresh rate is 60 Hz. The color range is extended to High Dynamic Range (HDR) by using 10 bits per channel for a total of 30b per pixel.
• Calculate the bandwidth (in bits per second) needed to show video in this format.
• Calculate the compression ratio needed so that the bandwidth is limited to 25Mb/sec.

 

Network Security

 

 

Regardless of the type and size of an organisation, most organisations need a firewall that can improve security and connectivity, stop sophisticated cyberthreats and meet performance demands. Selecting the right firewall is thus extremely important. Research commercial firewall products using online brochures, industry white papers, manufacturers’ websites, industry reports, reputed technology blogs, magazines and other relevant sources. Select and recommend top five firewall products for each of the following: large, medium and small enterprises. Write a report presenting your recommendations. Your report should include the following:

– Executive summary

– Introduction

– Criteria for selecting firewalls, including justification

– Detailed comparison of firewall products based on the chosen criteria

– Future trends in enterprise firewalls

– Conclusion and recommendations
Note:
1. Write minimum 2000 words for this report. Although there is no rigid maximum word limit, around 2500 words maximum will be appropriate.
2. You should provide credible references according to the Faculty guidelines. At least ten (10) high quality references are expected (At least 10, excluding your textbook, readings or other resources available in the study modules).

 

Network security

 

 

 

 

 

You are requested to write review, survey or state-of-art article within the domain of (Network Security). Your article has to give an overview of existing literature in a field, often identifying specific problems or issues and analyzing information from available published work on the topic with a balanced perspective. Review articles can be of four types, broadly speaking opinion, literature reviews, systematic reviews, comparison or fields analyses.

Notes:

1. The template of the article can be found in https://www.ieee.org/conferences/publishing/templates.html
2. Your article is 6 pages including not including references.
3. At least, 10 of your references must be from journal articles published in well publishers’ databases; IEEE, Springer, Elsevier, Wiley and Taylor & Francis. (not old references)

it should have :
1-Abstract
2- introduction
3- identifying the problem
4- discuss the solutions
5- compare the solution
6- your conclusion

 

 

 

Network Security

 

1.What do you think is the best combination of the types of authentication? Is that type of authentication appropriate for all types of access.

2. Some have made the argument that using WEP presents more security issues than if all traffic were in the clear. What do you think?

3. Which is your “favorite” attack? Why? Which is the most dangerous? Which do you think is the hardest to protect against?

4. Have you ever used e-mail or instant messenger to share information that was sensitive in nature? Have you ever gotten spam? Have you ever responded to spam? Have you tried to remove your name from the list? Did it work? Do you have any idea how your e-mail address wound up on the spam list in the first place?