Friday, December 6, 2019

Intrusion Detection and Cryptography Cisco Technology

Question: Discuss about the Report for Intrusion Detection and Cryptography? Answer: To make the network secure and ease workload, several procedures are to be followed. Encryption module hardware is required. It is a small device that protects data stored in the computer by encoding and securing processes. In sales department machines, it encrypts information about credit cards of customers. It also prevents password sharing (Averbuch et al. 2014). The location and security of data are to be remembered and kept less accessible to the internet. Regular backing up of data and keeping passwords inaccessible to general employees should be ensured. Latest version of firewall is to be installed in every system to ward off possible hacker attacks and entry of malicious files through internet. Firewall also keeps track of every piece of information delivered through the office network (Guo et al. 2015). To ward off the suspected attack immediately, some steps are to be followed (Shingala and Doshi 2015): Password of the account should be changed immediately. Assigning a firmware password is recommended for this particular problem. Remote login option should be turned off immediately. This will prevent access of the account from a remote location. A secure password, consisting of a combination of digits, symbols and alphabets, is always desirable. There are other methods to prevent this attack, for example, disabling IPv6, unnecessary services, Setgid and Setuid Binaries, etc. Now, if the sensor is placed in location 1, it will check all the information coming from and sent to the internet. It will monitor data exchange with the internet and prevent entry of malicious files into the total system (Umar et al. 2014). If the sensor is placed in location 2, it will monitor data transferred between the servers and the connected systems and will prevent any unauthorized access of the web and email servers. If the sensor is placed in location 3, it will monitor information transmission between all the connected systems. This will also ensure security of the connected systems and prevent any unauthorized activity from the users (Grady et al. 2015). If the sensor is placed in location 4, it will detect any unauthorized activity within the database, file and application servers and also prevent any unauthorized access. The mentioned problem happens when a systems software becomes outdated. There are some malicious files that continuously send messages to the mail contacts. By the anti-viruss default protection activity, these malicious mails are prevented from transmission but the anti-virus cannot block the viruses due to outdating (Wang et al. 2016). This problem can be solved by updating or installing latest anti-virus technology which will delete any malicious file that tries to access and use the email account for unauthorized transmission of files and messages (Mishra 2012). In addition, some additional protective measures like use of firewall, secured accounts are to be used to solve this problem. According to the rot13 encoding algorithm, each letter is replaced by the letter which appears after 13 positions of the given one (Pommerening 2014). So, applying rot13 shift, the original alphabet will turn into an order as follows: Original Alphabets After ROT13 Shift A N B O C P D Q E R F S G T H U I V J W K X L Y M Z N A O B P C Q D R E S F T G U H V I W J X K Y L Z M From this table, the given encrypted data can be evaluated as: Neg snve qrohgf urer Fngheqnl Art fair debuts here Saturday Gevcyr pbhcbaf ng Xebtre! - Triple coupons at Kroger! Gel lbhe unaq ng chmmyrf - Try your hand at puzzles To prevent overburden of the network, first of all, the CA structure should be divided into two separate parts: High Assurance Traffic and Low Assurance Traffic. The traffic from large national factories and high-speed connections should be redirected to the high assurance sector having separate managers and the traffic from remote facilities should be redirected to low assurance sector managed by another set of personnel. This way, burden from the overall system can be reduced and treated separately (Grady et al. 2015). During the use of credit cards in dial-in connections, the information of credit cards are sent to a processor to evaluate details of the bank, funds available and other important details, after which a transaction ID is generated. After this authorization cycle of the card, there is a process called settlement cycle, where sales stuff close the credit cards that were used in the system. During this phase, due to generation of information of the credit cards, the transfer of cash can be manipulated. To prevent this, a secure network should be established within the system and need to be established in such a way that the sales personnel or any unauthorized individual are unable to access information of the credit card (Cepeda et al. 2015). References Averbuch, A.H., Davis, D., James, E.W. and Hobbs, C.A., Cisco Technology, Inc., 2014.Configuring a secure network. U.S. Patent 8,724,515. Cepeda, T.P., Gerardo, K.D., Perez, K.T. and Rivera, J.J., 2015. Credit Card Fraud: When Employees Move from Being an Employer's Biggest Asset to Their Biggest Liability.EDITORIAL BOARD MEMBERS,21(3), p.21. Grady, C.A., He, X. and Peeta, S., 2015. Integrating social network analysis with analytic network process for international development project selection.Expert Systems with Applications,42(12), pp.5128-5138. Guo, H., Tang, T. and Wu, D., 2015. The Research of Private Network Secure Interconnection Scheme in Large-Scaled Enterprises. InGenetic and Evolutionary Computing(pp. 419-426). Springer International Publishing. Mishra, U., 2012. Improving Speed of Virus Scanning-Applying TRIZ to Improve Anti-Virus Programs.Available at SSRN 1980638. Pommerening, K., 2014. Monoalphabetic Substitutions. Shingala, M., Patel, C. and Doshi, N., 2015. An Improved Three Factor Remote User Authentication Scheme Using Smart Card. A Review. Umar, H.G.A., Li, C. and Ahmad, Z., 2014. Parallel Component Agent Architecture to Improve the Efficiency of Signature Based NIDS.Journal of Advances in Computer Networks,2(4). Wang, J.H., Lorch, J.R. and Parno, B.J., Microsoft Technology Licensing, Llc, 2016.Securing anti-virus software with virtualization. U.S. Patent 9,230,100.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.