How the database and web services can be protected

Assignment Help Computer Network Security
Reference no: EM13192714

Option 1:

You can are required to research into one of the following topics on data security or computer-network security and to write a report. The report should be of 1500 - 2000 words.

Topics to select from are:
- Cryptanalysis of well-known ciphers (e.g., AES, RSA, SHA, etc.)
- Multi-factor authentication and its applications
- Security in digital content distributing systems
- Digital copyright protection
- Privacy protection in electronic commerce
- Privacy and security issues in eHealth

- Access control and data integrity for hospital databases
- Protection of network-based systems against distributed denial-of-service attacks
- IPsec implementation issues in wireless networks
- Secure wireless routing
- Challenges and solutions for security in mobile ad-hoc networks
- Security in peer-to-peer networks
- Security in on-line network games
- IPv6 security issues

- Digital watermarking and fingerprinting

The report should provide an in-depth analysis of the topic based on your research. It is expected that: (1) The security theories, principles, and techniques covered by the subject are applied to your analysis; and (2) The report should include your research findings.

Please note that every student is welcome to choose this option. If you have completed a research report for your first assignment, you may select a new topic to do or continue your topic for the first assignment.

For those who choose to do research and to write reports for both assignments 1 and 2, please make sure that the two research reports are different in the following aspects.

(1) The second research report should include applications of the security theories, principles, and techniques of the subject.

(2) The second report should include your research findings (such as, improved security techniques, improved protocols, or new security techniques proposed by yourself).

(3) The two reports should not have 20% or more overlap (if you choose the same topic as the first assignment).

Option 2:

Based on the following background information and project requirements, complete a project making use of OPNET:

Background: AusCloud Brisbane is an IT company located in Brisbane. The company has offices in Melbourne and Sydney. They are now planning to extend the businesses to Singapore and Hong Kong. The company has experienced several security attacks in the past, for example, some business data labelled as "sensitive" and "confidential" has been found in a report published on the Internet, and a number of malicious intrusions to the network of the company have been detected. The company has just made a budget to support a plan for improving the security of the network and information system. The plan includes improving the security of the current network and establishing a secure environment for data exchange between the headquarters (Brisbane) and other offices.

Project Description: The objectives of the project include: (1) to study how the database and web services can be protected against unauthorized use while maintaining access for authorized users by using firewall and VPN techniques; and (2) to study how secure data exchange over the Internet can be achieved by using encryption.

For the project, you are required, based on the background information given above, to implement a simulator using the OPNET IT Guru. On completion of the project you are expected to submit a report. (The requirements for the simulator and the report will be given below).

Requirements for the simulator:

(a). The simulator will have at least two servers: database server and web server.

(b). The offices in Melbourne and Sydney can access all the data, web services, and other applications.

(c). The office in Singapore cannot access the database.

(d). The office in Hong Kong cannot access the web services.

(e). The information exchange between the headquarters and authorized offices should be protected by encryption (hints will be given below on simulating the effect of encryption by using OPNET).

(f). The simulator should include the following scenarios for comparison purpose:

- Scenario 1: No firewall, VPN, or encryption is employed, that is, a network without any protection.

- Scenario 2: Only firewall is implemented.

- Scenario 3: Employing both firewall(s) and VPN(s) to meet the requirements (a) - (d) given above.

- Scenario 4: Implementing firewall(s), VPN(s), and encryption to meet the requirements (a)-(e).

Reference no: EM13192714

Questions Cloud

Define sunlight consists of photons : At noon on a clear day, sunlight reaches the earth's surface at Madison, Wisconsin, with an average power of approximately 8.00 kJ·s-1·m-2. If the sunlight consists of photons with an average wavelength of 510.0 nm
What is the consumer surplus enjoyed by the high demand : design two packages for the second-degree price discrimination case so that the first package has quantity 8 for the high demand and the second one has quantity 6 for the lower demand such that the low demand group has consumer surplus at least $5..
Explain what causes the high interest rates in the market : A number of companies exist that specialize in "payday loans." Payday loans are small loans often for a few hundred dollars or less that are made to low-income borrowers. Often these borrowers have poor credit histories and few assets and would ha..
What is expected market price if bond market is efficient : a. If the bond market is efficient, what is the market price of the bond expected to be in one year b. Suppose the bond issuer increases the coupon payment during the year to $30, with the same interest rate and the same current market price, what..
How the database and web services can be protected : Study how the database and web services can be protected against unauthorized use while maintaining access for authorized users by using firewall and VPN techniques
What happens to the investment with annual inflation : If I invested 10,000 in a fund paying 0.2% annual fees and added $100.00 per month for 40 years, receiving 10.4% annual returns what happens to the investment with 3.43% annual inflation What is the value in terms of today's dollars
How many firms will there be in long run equilibrium : Suppose there are n identical firms in a market. Each firm has fixed cost equal to 392, and variable cost given by VC = 2q^2, where q is the amount that an individual firm produces. This means that an individual firm's marginal cost is given by MC..
Which motor should be installed considering pw : An electric motor is 10HP. Motor A costs $800, and is 85% efficient. Motor B costs $1200 and is 90% efficient. Both motors will operate 1,500 hours at an energy rate of 0.07 per kilowatt hour. Both motors have a 15 year life span.
Application screen design and layout function : Design focus is on providing the application screen design and layout function for the purchaser. You do not have to worry about the accounting system for the bookshop

Reviews

Write a Review

Computer Network Security Questions & Answers

  Demonstrate that hash value collides with original value

Show a message that Alice may have spoofed, and demonstrate that its hash value collides with Bob's original hash.

  Mobile wireless networks

3G Safekeeping model, safekeeping architecture standards ITU-T X.805 and ISO/IEC 18028-2, access points (AP), network admission controller (NAC) and authentication server (AS)

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  How will ad organizational units be organized

How will the second site factor into domain controller placement? How will AD sites be configured and how will AD organizational units be organized

  Suggest mitigation strategies for vulnerabilities identified

Risk Management varies in each instance and event. Selecting the various options from home or work may help make or break your network.

  Why one-time password system more secure authentication

Why is one-time password system considered more secure than the basic authentication system? Give at least two reasons.

  Total cost of ownership return on investment

Total Cost of Ownership Return on Investment. Explain each of these approaches, state your preference, and analyze the advantages and disadvantages of each with a focus on IT investments.

  Identify and describe the organizational authentication

Identify and describe the organizational authentication technology and network security issues

  How is biometric method more beneficial than keypad

Those links are just for downloading required files. There is no work needed from any links. How is this biometric method more beneficial than keypad where the employee just presses in Pin number?

  Prepare a trouble ticket to record the problem

Prepare a Trouble Ticket to record the problem

  Explain security model of class using cnss model

suppose that the security model is required for protection of your class. Using CNSS model, examine each of the cells and write a short statement.

  Estimating resources with the budget

Managing a project and I have an $850,000 budget. For the project, the resources include 4-developers and on project manager. A suppose that the average workweek per person is forty hours

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd