Select Currency
Translate this page

NETWORK SECURITY: CASE STUDY: DESIGN AND IMPLEMENTATION OF SOFTWARE SYSTEM IN TACKLING NETWORK VULNERABILITIES OR INCIDENTS

Format: MS WORD  |  Chapter: 1-5  |  Pages: 73  |  929 Users found this project useful  |  Price NGN5,000

  DOWNLOAD THE COMPLETE PROJECT

NETWORK SECURITY: CASE STUDY: DESIGN AND IMPLEMENTATION OF SOFTWARE SYSTEM IN TACKLING NETWORK VULNERABILITIES OR INCIDENTS

 

CHAPTER ONE

INTRODUCTION

1.1   Introduction

The term Network Security and Information Security are used often inter –changeably. Network Security is generally taken as providing protection at the boundaries of an organization by keeping out intruder (or hackers). Information Security however, explicitly focuses on protecting data resources from malware (or malicious computer software) attacks or simple mistake by people within an organization by use of data loss prevention (DLP) techniques. One the techniques are to compartmentalized large network with internal boundaries. Employees have to cross these boundaries and be authenticated when attempting to access protected information. Network Security starts from authenticating the user, commonly by with a user name and a password. Since this requires that just one thing besides user name i.e. the password which is something you know, this is sometimes term one factor authentication. With two factor authentications something you have is also used (e.g. security token or dongle, an Automated Teller Machine (ATM) , or your mobile phone). Or with three factor authentications something you are is also used(e.g. a finger print or a retinal scan)., Once authenticated, a firewall enforces access policies such as; what services are allowed to be access by the network users or clients. Though effective to prevent unauthorized access, this component may fail to check potentially content such as; computer worm or Trojan horses being transmitted over the network. Network Security has an intrusions prevention system (IPS) which helps to detect and inhibit the action of such malware . Any anomaly based intrusions detection system(IDS) may also monitor the network and traffic for unexpected (i.e. suspicious ) contents or behaviors and other anomalies to protect resources from denial of service(DOS) attacks or an employees accessing files, virus attacks, rogue applets, stealing, credit card theft ,theft of identity, and information piracy. Individual event occurring on the network may be logged for audit purposes and for later high level analysis. Communications between two host using networks could be encrypted to maintain privacy. 

The Honey pot which consist of a computer data or a network act as Surveillances or early warning tools. Techniques used by the attackers (or hackers) that attempt to compromise the decoys resources are studied during and after an attack to keep an eye on the new exploitations techniques. Such analysis could be the actual network being protected by the honey pot. Network Security are often times called computer security, which in this aspect is termed as controlling access to hard ware, software and data of a computerized system or machine. A large measure of computer security is simply keeping the computer systems information secure. In broader terms, computer security (or Network security) can be thought as the protection of computer and its resources against accidental or intentional disclosure of confidential data, unlawful modification of data or programs, the destruction of data, software or hardware. It includes the denial of the use of ones computer system or facilities for criminal purposes or activities including; computer or network related fraud and blackmail. Network security involves the elimination of weaknesses or vulnerabilities that might be exploited to cause loss or harm of a particular information on a computer system.

Network Security revolves round three key principles, these principles are : confidentiality, integrity, availability , and sometimes non-repudiation depending on the applications and context.

1. Confidentiality: this is concern with preventing an unauthorized disclosure of sensitive information on the network. This disclosure could be intentional such as breaking a cipher(or an encrypted text) and reading the information or it could be unintentional due to careless or incompetence of individual of user handling the information.

2.Integrity: this comprises of three goals; these three goals are: 

(a) Prevention of a modified information by unauthorized users.

(b) Prevention of an unauthorized or intentional modification of information by authorized uses.

(c) Prevention of the internal and external consistency. The Internal consistency ensures that the internal data is consistent, while the external consistency ensures that the data stored in the database is consistent with the real world.

Availability: this assures that a system authorized user that have timely and interrupted access to an information into system and to the network.

Non Repudiation: this assures that a sender or network user can not deny having sent a particular message. These three principles of Network security above must to evolved from years of practice and experimentation making up network history. Security management for network is different for all kind of situation, while large businesses will require high maintenance and advance software and hard ware to prevent malicious attacks from hacking and spamming. For a small home or an office would only require also basic security.

In the remaining part of this chapter, the following were discussed:

Historical background of the study

Problem of the study

Objective of the study

Significance of the study

Scope of the study

Limitation of the study

In chapter two (2), the related literatures done by some Researchers were reviewed, in chapter three (3), the methodology and design of the system were reviewed, in chapter four(4), the system implementation, documentation and testing were also discussed, and lastly in chapter five(5), a brief write-up on the summary conclusion and recommendation of the study were given.

1.2  HISTORICAL BACKGROUND OF THE STUDY 

Over the past several years, when mainframe computers and minicomputers were purchased, they came with many built-in-security features. Although there were breaches of security, the number of authorized users were generally small in number sign-on ID’s and password were necessary to use the computer system, and the amount and type of usage was logged. Security information across a network sourcehad it root in the late 1960s when network only existed in the sense of huge mainframe and multiple networked terminals. Hundreds of thousand and millions of dumb terminals were connected through hubs and concentrators to the huge central processing unit (c p u). Without the presence of client/ server network models, time sharing/multi-server, multi-tasking processors in network security was not yet a real issue. Network Security did however initially realize its importance as a result of a white-collar crime performed by a programmer for the financial division of a large cooperation. The programmer was able to embezzle money from an account that rounded their financial statements. In 1960s and into 1970s that the environment for network security did evolved.

The internet began 1969 as the APARNET, a project founded by the Advanced Researched Project Agency (ARPA) now Defense Advanced Research Project Agency (DARPA) in United State of America(USA).One of the original goals of the project was to create a network that would continue to function even if major sections of the network failed or were attacked. The ARPANET was designed to reroute network traffic automatically around problems in connecting system or in passing along the necessary information to keep the network functioning. Thus, from the beginning, the internet was design to be robust against the denial-of –service attacks. The true need of network security emerged in 1980s which swathe personal computer followed by the local area network (LAN) and the National Science Foundation Network (NSFNET). The history network security has been delineated, leading now into some of the numerous potential threats to information on a network. The first design on network security to route network traffic automatically around network he was done by the Defense Advance Research Project Agency (DARPA) in 1988. This network was called ARPANET. Transmission control protocol (TCP) and Internet protocol(IP) were developed and communication become more stable.

1.3   PROBLEM OF THE STUDY

Since the emergence of hacking way back in the 1950s when amateur radio enthusiasts would tune into the police or military radio signals to listen to what was going on the United State of America. Most of the time, these “neo-hackers” were simply curious “information junkies” looking for interesting piece of information about government or military activities. The thrill was being privy to information channels others were not and doing so undetected, and since Network Security has become a very important part in the Information communication Technology (ICT), since most network user or client and organization now operate on the Internet or World Wide Web(WWW) technology and with the whole world aiming to be a global village. The problem of security on the network has become more increasing. Network related activities with negative implications that violates security policies like gaining access to a user account, gaining privilege access and using the victims system as a launch platform for attacks on other sites, probe, scan, account compromise, packet sniffers, root compromise, denial of service (DOS) network spoofing e.t.c. An overview of these network vulnerabilities or incidents and how to tackle them is the focus of my project work.

1.4   OBJECTIVE OF THE STUDY

To further tighten security of the actual network being protected.

To expose the importance of understanding the principles of network security.

To make the information on the computer invulnerable.

To avoid snooping by intruders life.

To ensure information integrity and confidentiality on the computer.

To avoid commercial or military espionage.

1.5   SIGNIFICANCE OF THE STUDY

User can maintain privacy.

Awareness about information security to network users or clients.

Availability of information on the network computer to authorize user.

User can avoid prying by non-technical user.

Awareness about networked information availability to users.

To make network security policy to the network users.

1.6    SCOPE OF THE STUDY

Network security comprises of various platforms or approaches, but in this write-up; Design and implementation of software system in tackling network vulnerabilities or incidents was the focus of my project work.

LIMITATION OF THE STUD

During the process of this research, the following Limitations were encountered, these limitations are:

Time to learn new applications.

Getting a computer system to do some editing was really challenging.

Power Holding Company of Nigeria (PHCN) did not make things easy for me either.

Time to go for more research was really challenging due to other academic work.

Money to print some relevant materials.

  DOWNLOAD THE COMPLETE PROJECT

NETWORK SECURITY: CASE STUDY: DESIGN AND IMPLEMENTATION OF SOFTWARE SYSTEM IN TACKLING NETWORK VULNERABILITIES OR INCIDENTS

Not The Topic You Are Looking For?



For Quick Help Chat with Us Now!

+234 813 292 6373

+233 55 397 8005


HOW TO GET THE COMPLETE PROJECT ON NETWORK SECURITY: CASE STUDY: DESIGN AND IMPLEMENTATION OF SOFTWARE SYSTEM IN TACKLING NETWORK VULNERABILITIES OR INCIDENTS INSTANTLY

  • Click on the Download Button above.
  • Select any option to get the complete project immediately.
  • Chat with Our Instant Help Desk on +234 813 292 6373 for further assistance.
  • All projects on our website are well researched by professionals with high level of professionalism.

Here's what our amazing customers are saying

Emmanuel Essential
Kogi state University
I actually took the risk,you know first time stuff But i was suprised i received as requested. I love you guys 🌟 🌟 🌟 🌟
Very Good
Merry From BSU
I am now a graduate because of iprojectmaster.com, God Bless you guys for me.
Excellent
Adam Alhassan Yakubu
UDS
Excellent work and delivery , I promise to share my testimonies everyone in need of this kind of work. You're the best
Excellent
Abubakar Iliyasu Hashim
Federal college of education pankshin affiliated to university of jos
I am highly impressed with your unquantifiable efforts for the leaners, more grace to your elbow.I will inform my colleagues about your website.
Very Good
Gbadamosi Solomon Oluwabunmi
Lasu
Swift delivery within 9 minutes of payment. Thank you project master
Excellent
Musa From Ahmadu Bello University
Thank you iprojectmaster for saving my life, please keep it up and may God continue to bless you people.
Excellent
Joseph M. Yohanna
Thanks a lot, am really grateful and will surely tell my friends about your website.
Excellent
Dau Mohammed Kabiru
Kaduna State College of Education Gidan Waya
This is my first time..Your service is superb. But because I was pressed for time, I became jittery when I did not receive feedbackd. I will do more business with you and I will recommend you to my friends. Thank you.
Very Good
Abdulrahman Jibrin
Nti Abaji
Nice one work prompt delivery tanx
Very Good
MATTHEW NGBEDE
Ahmadu Bello University
I wish I knew you guys when I wrote my first degree project, it took so much time and effort then. Now, with just a click of a button, I got my complete project in less than 15 minutes. You guys are too amazing!
Excellent

FREQUENTLY ASKED QUESTIONS

How do I get this complete project on NETWORK SECURITY: CASE STUDY: DESIGN AND IMPLEMENTATION OF SOFTWARE SYSTEM IN TACKLING NETWORK VULNERABILITIES OR INCIDENTS?

Simply click on the Download button above and follow the procedure stated.

I have a fresh topic that is not on your website. How do I go about it?

How fast can I get this complete project on NETWORK SECURITY: CASE STUDY: DESIGN AND IMPLEMENTATION OF SOFTWARE SYSTEM IN TACKLING NETWORK VULNERABILITIES OR INCIDENTS?

Within 15 minutes if you want this exact project topic without adjustment

Is it a complete research project or just materials?

It is a Complete Research Project i.e Chapters 1-5, Abstract, Table of Contents, Full References, Questionnaires / Secondary Data

What if I want to change the case study for NETWORK SECURITY: CASE STUDY: DESIGN AND IMPLEMENTATION OF SOFTWARE SYSTEM IN TACKLING NETWORK VULNERABILITIES OR INCIDENTS, What do i do?

Chat with Our Instant Help Desk Now: +234 813 292 6373 and you will be responded to immediately

How will I get my complete project?

Your Complete Project Material will be sent to your Email Address in Ms Word document format

Can I get my Complete Project through WhatsApp?

Yes! We can send your Complete Research Project to your WhatsApp Number

What if my Project Supervisor made some changes to a topic i picked from your website?

Call Our Instant Help Desk Now: +234 813 292 6373 and you will be responded to immediately

Do you assist students with Assignment and Project Proposal?

Yes! Call Our Instant Help Desk Now: +234 813 292 6373 and you will be responded to immediately

What if i do not have any project topic idea at all?

Smiles! We've Got You Covered. Chat with us on WhatsApp Now to Get Instant Help: +234 813 292 6373

How can i trust this site?

We are well aware of fraudulent activities that have been happening on the internet. It is regrettable, but hopefully declining. However, we wish to reinstate to our esteemed clients that we are genuine and duly registered with the Corporate Affairs Commission as "PRIMEDGE TECHNOLOGY". This site runs on Secure Sockets Layer (SSL), therefore all transactions on this site are HIGHLY secure and safe!