0% found this document useful (0 votes)
88 views

Network Design Security - Project

The document provides a network security plan for It Biz company. It recommends including a firewall to filter traffic and restrict protocols. It also suggests developing an authentication scheme requiring user IDs and passwords for network access. The plan advises protecting against viruses and spyware with malware protection. It recommends creating a demilitarized zone for anonymous access without compromising the network. The plan also includes encrypting sensitive data and threats modeling for malware, phishing attacks and SQL injections. It proposes risk control measures and a concluding security development plan was created to address threats and ensure data security and network performance.

Uploaded by

tilak adhikari
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
88 views

Network Design Security - Project

The document provides a network security plan for It Biz company. It recommends including a firewall to filter traffic and restrict protocols. It also suggests developing an authentication scheme requiring user IDs and passwords for network access. The plan advises protecting against viruses and spyware with malware protection. It recommends creating a demilitarized zone for anonymous access without compromising the network. The plan also includes encrypting sensitive data and threats modeling for malware, phishing attacks and SQL injections. It proposes risk control measures and a concluding security development plan was created to address threats and ensure data security and network performance.

Uploaded by

tilak adhikari
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 8

Network Security Planning

For It Biz company


Prepared by Tilak Adhikari
Network Security Planning
Create a firewall
- Include a firewall in your security policy to filter traffic in and out of the
network. The firewall should restrict data according to the protocol; that it uses and
terminate traffic if the protocol does not match the port that it is to travel through. Your
firewall should also strictly limit open ports to prevent intruders from entering the
corporate network.

Develop an authentication scheme


Authentication is the process of requiring a user ID and password, or some form of
certificate-based authentication, to gain access to a network domain. Any direct access
to the corporate intranet mustrequire authentication. Any direct access through the
firewall should also require authentication.
-
Plan for virus and spyware protection
Viruses and other malicious software, known as malware, disguise themselves as legitimate
business content only to perform malicious activities once inside the corporate network.
Malware is the most common form of network security breach.

Create a Demilitarized Zone


A demilitarized zone is an area outside the firewall where transactions can take place
without compromising the network. All anonymous access to the network must remain in
the demilitarized zone.

Develop an encryption system


Encryption is the process of converting all data into a code that canonly be deciphered by a
system of private and public keys. All sensitive data leaving the corporate network must be
encrypted.
Threats Modeling

Malware
Malware refers to any intrusive software developed by cybercriminals to steal data and damage or destroy computers and
computers systems. Examples of common malware include viruses, worms , Trojan viruses, spyware, adware, and
ransomware.

Phishing attack

Phishing is a type of cybersecurity attack in which malicious actors send messages pretending to be a trusted person or
entity. Phishing messages manipulate a user into taking actions such as installing a malicious file, clicking on a malicious link,
or disclosing sensitive information such as login credentials. Phishing is the most common type of social engineering, a
general term describing attempts to manipulate or deceive computer users.

SQL injection
SQL injection (SQLi) is a web security vulnerability that allows an attacker to interfere with the queries that an application
makes to its database. It generally allows an attacker to view data that they are not normally able to retrieve. This might
include data belonging to other users, or any other data that the application itself is able to access.
Risk management plan
Threats Risk control measures Risk ranking (1-5) where 1= lowest and
5 = highest

Malware Upgrading the system with the latest 5


security patches and using antivirus
software.

Advance persistent threats Utilizing intrusion prevention systems 4


and firewalls
DEVELOPMENT OF SECURITY
1. User identification and passwords
Using proper servers foe authenticating and verifying the users. For this we can use the servers like AAA servers.

2. Email Security measures security


Monitoring the user’s habit of using emails.
Usnig strong password for emails.

3. Auditing procedure
- Testing for any security flaws the company.
- Checking if all the security as per the legislation or not.
CONCLUSION
New security design were created with the implementation of the security development plan taking into account all
potential threats to the system and how to mitigate them with the help of this network security plan data security,
and network performance were both quaranteed. Additionally, it was ensured that no threats or vulnerabilities that
may disrupt the network would enter the system.
Thank You

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy