StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Network Security Research - Coursework Example

Cite this document
Summary
Full Paper Title Name University Authentication Protocols The Challenge handshake authentication protocol is used to validate the identity of a computer, connection or a request on the network. The validation process takes place in the initial stages, when connection ‘A’ request to the connection ‘B’ for establishing a communication channel…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.4% of users find it useful
Network Security Research
Read Text Preview

Extract of sample "Network Security Research"

Full Paper Authentication Protocols The Challenge handshake authentication protocol is used to vali the identity of a computer, connection or a request on the network. The validation process takes place in the initial stages, when connection ‘A’ request to the connection ‘B’ for establishing a communication channel. When the link is established between the two connections, connection A sends a message named a ‘challenge’ to the connection ‘B’. Connection ‘B’ replies to the request by calculating a value with ‘one-way hash’ utility.

It is important for both connections that the hash value connection should be the required one; otherwise, the connection will be terminated. Moreover, these authentication procedures initialize at random intervals (CHAP, challenge handshake authentication protocol). Extensible Markup Protocol is more advanced as compare to CHAP as it supports multiple authentication methods. One more significant advantage EAP has that it executes on the link layer without IP address. Consequently, it is designed to support its own operations for retransmission of authentication request and order delivery.

Moreover, the mechanism of EAP is based on lock step protocol concluding that it will support only a single packet in flight. This directs towards a negative factor for EAP that is not suitable for corporate networks having bulk data transmission (EAP, extensible authentication protocol). Password Authentication Protocol initially sends a LCP packet in order to create communication on a point-to-point connectivity over the network during link establishment. After the establishment of the link, PAP or PPP provides an authentication mechanism, which is optional.

The optional authentication mechanism is provided prior to the network layer protocol stage. Previous two protocols do not have an optional authentication mechanism. Virtual Private Networks and Remote Access Secure Socket Layer secures online transactions and develops trust for websites consisting of integrated electronic commerce services. SSL functions in three vital stages. The first stage involves an SSL certificate that activates encryption of confidential data that is transmitted during online transactions.

The second stage involves an allocated view for each SSL certificate along with unique credentials that identifies the certificate owner. Lastly, the third step includes a certificate authority that authenticates the identification of the certificate owner prior to the issuance (Secure sockets layer (SSL): How it works - SSL Encryption/https from VeriSign, inc.). Internet Protocol Security is “a security protocol from the IETF that provides authentication and encryption over the Internet. Unlike SSL, which provides services at layer 4 and secures two applications, IPsec works at layer 3 and secures everything in the network.

Also unlike SSL, which is typically built into the Web browser, IPsec requires a client installation. IPsec can access both Web and non-Web applications, whereas SSL requires workarounds for non-Web access such as file sharing and backup” (IPsec definition from PC magazine encyclopedia). Layer2 Tunneling Protocol (L2TP) as defined by the RFC 2661 was designed to facilitate dynamic tunneling on layer 2 within the packet data switching networks. L2TP illustrates a standard method for tunneling that enables connections similar to circuit to travel on one or multiple layers.

Moreover, layer three operates on point to point and point to multipoint connectivity channels between locations of customers. L2TP also supports data encapsulation for multiplexing and de-multiplexing data transmission channels via nodes on the network (L2TP (layer 2 tunneling protocol)). Remote access protocols facilitate people to access a computer remotely by viewing the Graphical user interface. Whereas, VPN protocols provide security and encryption along with a dedicated communication channel.

Risk Assessment & Analysis The first step will be to analyze borders of the network and information system resources and exchange of information within the enterprise network. The first step is to gather information, which lays the foundation for conducting risk analysis. The system related information includes hardware, software, data, IT support staff, processes performed on the network, mission critical systems, data sensitivity. The operational environment of the enterprise network includes network design and topology, security architecture, system users, functionality of the network, methodologies for protecting the data in parallel with availability, confidentiality and integrity, input and outputs of the network, management controls, security controls, physical security, and environmental security controls.

The outputs for this stage are system boundaries, System functionality, Criticality of the system and data, Sensitivity of the system and data. The second step is to analyze any potential threats for the network. While analyzing threats, is it essential to consider all possible, potential threats and sources which may disrupt or harm the network and information systems. The common threats related to natural disasters are floods, tornadoes, earthquakes etc. The common threats related to human includes hacking, cyber crime, viruses, malicious software attack, un authorized access to organization’s critical data, and deliberate actions.

The environmental threats include substantial power failure, any chemical leakage, liquid spilled on any computing component etc. The output of this step is the identification of potential threats, which may disrupt the network and information systems in the future. The third step is to analyze any possible vulnerability within the network. This step concludes the weaknesses and flaws, which are currently present in the network security architecture. The assessment of possible vulnerabilities is not an easy task as some previous history is required to perform vulnerability assessment.

If the network is operational, a thorough analysis of the network security features and controls is conducted. It will also include technical and procedural elements for protecting the network. The previous reports of risk assessment, audit reports, system anomaly reports, network evaluation reports, network testing reports are considered. Some support is also considered from the vendor advisories, vulnerability bulletins from military networks and also by reviewing the history of previous security breaches within the network.

Other methods are also used to breach the security infrastructure including penetration testing, which is an attempt to breach the network compromising the current security infrastructure. The method is used to test the current security measured for any possible vulnerability. References CHAP, challenge handshake authentication protocol Retrieved 4/22/2011, 2011, from http://www.networksorcery.com/enp/protocol/chap.htm EAP, extensible authentication protocol Retrieved 4/22/2011, 2011, from http://www.

networksorcery.com/enp/protocol/eap.htm IPsec definition from PC magazine encyclopedia Retrieved 4/22/2011, 2011, from http://www.pcmag.com/encyclopedia_term/0,2542,t=IPsec&i=45408,00.asp Secure sockets layer (SSL): How it works - SSL Encryption/https from VeriSign, inc. Retrieved 4/22/2011, 2011, from http://www.verisign.com/ssl/ssl-information-center/how-ssl-security-works/ L2TP (layer 2 tunneling protocol) Retrieved 4/22/2011, 2011, from http://www.networkworld.com/details/511.html

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Network Security Research Coursework Example | Topics and Well Written Essays - 750 words”, n.d.)
Retrieved from https://studentshare.org/finance-accounting/1417765-network-security-research
(Network Security Research Coursework Example | Topics and Well Written Essays - 750 Words)
https://studentshare.org/finance-accounting/1417765-network-security-research.
“Network Security Research Coursework Example | Topics and Well Written Essays - 750 Words”, n.d. https://studentshare.org/finance-accounting/1417765-network-security-research.
  • Cited: 0 times

CHECK THESE SAMPLES OF Network Security Research

Introduction to Network Security

RUNNING HEAD: network security network security Threats and Vulnerabilities of a network Type your name here 2/28/2011 Contents RUNNING HEAD: network security 1 Threats and Vulnerabilities of a network 1 Type your name here 1 2/28/2011 1 Contents 2 Abstract 4 Problem Statement 4 Research and Analysis 5 Introduction to network security 5 Why network security?... hellip; 5 Threats and Vulnerabilities to a network 6 Threats to a network 6 Types of Vulnerabilities 9 network security Policy 10 Firewall 11 Internet Protocol Security 11 References 13 Abstract Networks from the time of their birth have come a long way....
9 Pages (2250 words) Research Paper

Firewall and Internet Security

The paper "Firewall and Internet Security" highlights that since firewalls as technology are constantly on the rise and constantly innovating, it is important to understand the timeframe in which the research was conducted and they are published according to those timelines or periods.... hellip; The reason behind the choice of the research question has been articulated along with an explanation behind the selection of the objectives.... Based on the research question, the current literature was reviewed to identify the results of the recent research and to understand the concepts better before proceeding with the research....
9 Pages (2250 words) Research Proposal

Data Privacy and Security

hellip; This essay discusses that at the present computer security has become a very critical issue.... security refers to the technique to discover as well as stop illicit utilization of our secret information or computer.... However, at the present computer security has become a very critical issue.... Additionally, security refers to the technique to discover as well as stop illicit utilization of our secret information or computer....
8 Pages (2000 words) Research Paper

Research Paper on iPhone Network or Security

The third part will relate to the security methods and procedures employed by the iPhone in order to provide the best possible network security to its customers.... A general discussion on the different security options will be followed by a discussion on the specific network security method of the iPhone, analyzing both its benefits and drawbacks.... Harris Kamran Telecommunication research Outline 14 July 2011 Outline for the Second and Third Parts of the research Paper The first part of the paper dealt with the historical background and the introduction to the iPhone technology, and pin-pointed two problems with its network that the users of iPhone have been facing....
3 Pages (750 words) Research Paper

Privacy-Enhancing Security Mechanisms

Problem Statement The problem statement for the research paper is: "Design and analysis of privacy-preserving network and cryptographic protocols" Conceptual Framework Aim of the research In realistic networked environments, data security is the main focus of the management.... Cryptographic protocols will also be an important part of the research because they use such algorithms which ensure security of information over the network.... There exist many privacy enhancing security mechanisms that ensure secure delivery of data to the intended location....
3 Pages (750 words) Research Proposal

Network Security setup

… The necessary security measure here is installation of updated anti-spyware and antivirus.... In order to ensure security at this domain, it is recommended to ensure proper addressing schemes, proper protocol selection and enhanced encryption of communication equipments.... security measures necessary at this stage is proper authentication, quality network design, authorization, node security, and accounting are an imperative security considerations at this domain....
7 Pages (1750 words) Research Paper

Network Security

This essay talks about network security.... hellip; According to the report for any given organization, network security involves the introduction of polices that would protect the available network to ensure unauthorized persons do not access or use the organizational information.... As the paper highlights network security guarantees authentication, availability, integrity and confidentiality is important to note that “network security is not absolute”....
10 Pages (2500 words) Research Paper

Securing Data Using IPSEC VPN over Satellite Communication

In order to determine the aforesaid objective of the study, a qualitative approach of research method will be used.... nbsp; In this regard, it can be asserted that the qualitative research method primarily relies on reviewing varied literatures including peer reviewed journals, articles and books among others that will help in gaining broad idea about the respective subject matter of the study.... Based on the research study, it can be stated that internet protocol security is a set of secure networking protocol through which sensitive information can be shared more securely....
18 Pages (4500 words) Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us