SlideShare a Scribd company logo
LD7007 Network Security
Answer:
Introduction
In this report, a secured network has been designed and implemented for an organization
named Super finance Solution Pvt. Ltd. company. Based on the framework model of network
security, the identification process will be discussed by the verification mode. With such a
structure of the model, the users who are authenticated will only get access to the
information and data installed by the service. This system will be useful for the Super
Finance Solutions Pvt. Ltd. situated in London by implementing the network model of Zero
Trust that secures the company’s network. For implementing such a secured network, there
must be a network design and its examination which must go through the three blocks
respectively. These blocks are Communication and Architecture, Secure service delivery and
operation, Research and delivery with Conclusion, and future work.
Block A: Architecture And Communication
Figure: Super Finance Solutions Network topology
Configure IP Connectivity
It is necessary to establish an IP connection and the hardening of the device for securing the
network connectivity. All the devices will get an address with such IP connections to
transfer data and communication. The risk of accessing unwanted threats reduces by
strengthening such network equipment. The advantages of the Device hardening are as
follows:
To enhance the productivity and performance of the network, unused programs and files
are removed.
It provides additional network security by blocking Remote access.
By implementing device hardening, Security risks are also eliminated.
Figure 2: Device Hardening configuration
IP Configuration
Internal Site Router
External site router
Internet router
DHCP, WEB, SYS-LOG, DNS Server Configuration
The network architecture includes various servers which are a DHCP server, A Web Server,
A SYS-LOG server, and a DNS server. These devices must acquire the IP addresses from their
Domain Controller. The chances of errors that occur commonly are reduced by the
implementing DHCP server (Fitzgibbon et al. 2020). It ensures that only a single computer
is assigned with an IP address.
DHCP Server Configuration
The above figure illustrates that the network of the Super financial company comprises a
DHCP server so that the devices of the internal network can get a dynamic IP address. Here,
the default gateway of the DHCP server is 192.168.30.1.
The above figure shows that the PCs of the internal network has been configured with a
dynamic IP address.
DNS Server
In the above figure, the configuration of the DNS server has been shown where the name of
the DNS record is
WebServer
In the above figure, the configuration of the WEB server has been shown. It is mainly has
been configured to store data files on the website.
Syslog Server
In the above figure, the configuration of the Syslog server has been shown where
continuously logs all the changes in the network.
Configuring Dynamic Routing Protocol And Inter VLAN Routing
To facilitate communication between the company's internal and external networks, a
dynamic routing protocol setup is required. The communication network and dynamic
routing will assist the router in forwarding the data packet to the proper location. As a
result, RIP version 2 has been enabled on all devices in the communication network. The
configuration of RIPv2 is provided below:
This configuration enables all the devices on the network to communicate with each other.
Inter-VLAN And Trunking Configuration
Inter-VLAN routing and trunking allow devices to communicate with other devices. For
configuring this, at first, VLAN needed to be created that is shown below:
After that, inter-VLAN has been configured on the router that is shown below:
After that, trunking has been configuration on switches that are shown below:
The above figure shows the switchport mode configuration of switches.
Block B: Secure Service Delivery And Operations
ACL Implementation On Routing Devices
A list of ACLs is established for protecting the network. The authorization and
authentication of packets regulate filtered data transmission packets. The security provided
by the network layer restricts the activity prohibits access for its users and devices. Super
Finance Solutions Pvt. Ltd. sets up the control list to access all the networks. The list is set
up in such a manner that only the users have the access to its network and restricts any
external individual from accessing it (Zheng, Li and Li 2017). To gather content from
desired networks and known technologies, the ACLs are implemented on the connections
with the outer router. The configuration of ACL is shown below:
IPsec VPN Implementation
A VPN connection site-to-site is the connection that provides security to the information
during the transfer of data packets through the network (Guo et al. 2019). In Super Finance
Solutions Pvt. Ltd. this device is installed to encrypt the transmission of data between its
external and internal routers. The configuration of the VPN is shown below:
The above figure shows the configuration of VPN in the External site router. The
configuration develops a secure tunnel between the internal site router and the external
site router.
The above figure shows that the 3 packets have been going through this terminal and all of
these packets are encrypted.
In setting up the network, the VPN has some advantages which are as follows:
Avoid alteration of data: When a user consumes some data quantity the broadband or
network provider slows the speed of the communicating network. If VPN is used along with
it, then one need not worry about such things.
Avoid alternation of bandwidth: The consumers experience several difficulties with the
periodic decrement of the Internet. As a key factor, using VPN may avoid bandwidth throttle
and helps in improving the Internet connection.
Hide Private information: The data collected from the user and its online activity is followed
by the Web applications are observed. Such activities are not observed by the internet if it is
run with a VPN connection which protects the data as well as kept it private.
The advantages mentioned above are considered by the developers of the Super Finance
Solutions Pvt. Ltd. to protect their external and internal network.
NIPS Implementation And Testing
Implementation of Network IPS is the mechanism that assures a protective layer of
guarantee.
The NIPS works with the network traffic monitoring which analyses its protocol’s behavior
(Tharaka et al. 2017). It is necessary to implement NIPS in the company’s network to
protect the company from external threats, various risks, attacks, and vulnerabilities. After
implementing such NIPS within the company, it protects itself against various viruses,
malware, and exploitation (Pawlowski et al. 2017). The below two figures shows the
configuration of IP IPS:
From the above figure, it has been seen that the IP IPS has been configured on the internal
site router. An IOS system along with IPS configuration is configured to the router available
in the internal site for protecting the internal network of the Super Finance Solutions Pvt.
Ltd. company.
Block C: Research And Development
Zero Trust Network Security Framework
As a Network Security Engineer of Super Finance Solutions Pvt. Ltd., London, it is my duty to
establish a model of network security which will be effective and reliable for the company.
The most trusted security framework in recent times based on the verifying mode on the
users’ identification is considered to set up which is Zero Trust Network Security
Framework. It clarifies that users already authenticated or authorized by the framework or
system will be able to gain access to the information and database (Rose et al. 2020).
Further, it also helps the company in improving the performances of the installed networks
in it and protects its security from the external threats that may arise. It can help its user in
protecting its identified surfaces, which is quite helpful in identifying the traffic movement
in view of the company regarding protecting its surface. This framework introduces many
new dependencies among the users, services, DAAS, and Infrastructure which protects the
system’s surface while establishing the micro perimeter environment around itself
(Samaniego and Deters 2018). The perimeter is needed for the protection of the surface.
Firewalls are the segmentation gateway to be employed for creating a micro perimeter. The
company provides the segmentation gateway which is commonly termed as Firewall (Dhar
and Bose 2021).
Zero Trust Framework is the qualitative approach to security that eliminates the implicit
trust which secures the company’s security. The main principle of this framework is that not
to trust any security unless it is verified (Buck et al. 2021). It is designed to enable the
transformation digitally for protecting the environment with strong network segmentation,
authentication methods, policies of least access, and layer for preventing threats. It is based
on realizing that the trust of the user is decreasing by the model of traditional security (Li
2020). It includes the threats and malicious insiders and externals who are in keen waiting
and hampering the user while sharing data and communication which weakens their
security also and takes away the information which results in a negative way for the
company. This lack of security controls can be overcome after implementing such
framework of security which can provide the security strength to its user that their data and
information are safe from any malware and outside attackers which makes them work
freely on the network resulting in the growth of the Network Security (Mehraj and Banday
2020).
Overview Of VPN Reliability
Virtual Private Network which is in short termed as VPN is the connection securing the
private network over a network that is used publically (Das et al. 2020). The private
network could be either any business, its association, or any IT sector, or many others. It
helps Super Finance Solutions Pvt. Ltd. in the improvement of its network security by
investing or funding some cheap and affordable investments which in return provides more
benefits. The IP addresses of the users’ system and devices are masked with the help of VPN
through a remote server that is customized and which runs through a VPN host that helps
its user in making the browsing of Web which origins at the server of VPN itself (Hauser et
al. 2020). It is quite impossible to trace the users’ footprint for any threats which are from
outside or in short for external threats.
The hackers who observe and track the users for understanding them are just wasting their
time as the users perform on the server which is secured and safe from the outside attacks
of any external means. VPN also works as the filter for its use by converting it in the form of
gibberish (Kim and Lee 2018). Any hacker can find this data but all in vain as it is
considered to be useless because the data collected by the hacker is in gibberish form which
is of no use. The VPN can perform many more tasks until its major priority is to secure the
system first which is securing or protecting the server of the VPN (Hoenig 2018). The
benefits of VPN are as follows:
VPN connects easily with the network which exists before in any organization, company,
business, or association.
VPN’s task is in masking the IP address from the threats which evoke from external means
and also from the provider who supplies or provides internet services or from any third
party (Surasak and Huang 2019). It will help its users to do the work freely and in the way
which they want to do it as the data and the information sent and collected by them are fully
secured and no one can trace the users’ footprints.
The VPN which is ideal for working can ensure in detecting the threats coming from
external affairs or means by an individual who is trying to log in without any authentication
or by any other means of the range which is diverse. VPN uses the OTP method for its
authorized and authenticated users to log into the server for their work or job roles. While
login, an OTP is sent to the authenticated user’s contact number by the VPN as provided by
them. The VPN creates and establishes another origin for its users when it is at work and
ask to provide a password that can be strong and cannot be broken or cracked by any other
person easily and after that, the four-digit or six-digit code or OTP is sent to the contact
number which is provided by the user to the company.
The VPN allows its user to hide and wear the shawl which is invisible to any other party or
outsider. It also helps the user not to accept any cookies from outside which is very much
useful and important for preventing the attacks of cyber or from the hackers and external
threats or cyber-crime.
VPN is cost-effective as it returns many supplies and provides much more to the Super
Finance Solutions Pvt. Ltd then the company bears the cost of implementing such VPN as
the network for their performance.
VPN joins quite easily with other devices and services and evolves easily with them which
improves the performances of such devices, as well as the service provided by them, also
improves and results in a positive manner for the Super Finance Solutions Pvt. Ltd.
VPN several times depends upon the traffic type which is sent through its tunnel and can be
also classified by the means of OSI layer. The layer is received from the packets.
Classification of VPN by the Topology terms is Peer to peer VPN, Client to server VPN, and
Site to site VPN. The development of the security and the network facility of the Super
Finance Solutions Pvt. Ltd can be enhanced by the use of the overview discussion of the
reliability of the VPN.
The model of VPN security provides:
Confidentiality to its user as if there is a deep inspection of packet level, an attacker or
outsider can only see the encrypted data.
Sends authentication to its user for preventing unauthorized users who trying to access the
VPN (Guo et al. 2020).
It sends message integrity to its end users for detecting the instances of tampering through
the transferred messages.
Before the establishment of the secure VPN, Tunnel endpoints must be authorized. The
remote-access VPNs created by users use biometrics, two-factor authentication,
cryptographic methods, or passwords. Network–to–network tunnels use digital certificates
or passwords. It stores the key permanently that allows the tunnel for the establishment
without any interference of the administrator automatically.
Secure VPN protocols include:
Internet Protocol Security
Transport Layer Security
Datagram Transport Layer Security
Microsoft Point-to-Point Encryption
Microsoft Secure Socket Tunneling Protocol
Multi-Path Virtual Private Network
Secure Shell VPN
Wire Guard
IKEv2
Cryptographic Mechanism Of IPsec
In considering the Super Finance Solutions Pvt. Ltd Company, IPsec is helpful in terms of its
working ways. IP security or IPsec is the forced protocol of the engineering task provided by
the internet which is held among the two points connected with another one for providing
the authentication. It works by following some steps which mean to determine the traffic
type, tunnel termination, and IKE phase one or two. By implementing IPsec components,
this method can be helpful in providing suitable integrity and authentication to the Super
Finance Solutions Pvt. Ltd. IPsec architecture is used or implemented by most of the
company, businesses, or organizations in order that protect the enabled VPN connections.
IPsec also enables a topmost security layer for organizing the network architecture at its
best by the implementation of some solid protocols and critical features. These security
protocols are executed between system to system, host to host, and among the several
connections. So, the cryptographic method which is implemented in such mode of
communication can be either the Transportation method or Tunneling method. In this
procedure, the data transfer by using the Tunneling method is made by L2TP.
IPsec Tunnel acts as communication along with a tunnel between the two different systems.
As a result of which, it is not necessary to break the circuit which may be costlier than the
tunneling used by IPsec. With the establishment of IPsec, it doesn’t mean that there is
network security which is established overall as its remote users can easily get access with
the network. The IPsec configuration implementation cannot restrict the users’ detailed
services and level opportunities provided by the network to them. The system providers or
developers must consider the several difficulties which are available there or are associated
with the configuration of IPsec. The administration and maintenance of the protocol’s
security are difficult and need some additional features which are to be installed. As a
result, the configuration of VPN is to be implemented to the system established or
developed for providing internet access that is secure to its remote users. However, in
addition to the cryptographic mechanism of IPsec, some specific information and system
techniques are used for providing security to remote users. These techniques can allow
them to work smoothly without any hassle disturbance or problems which generally evokes
before implementing such methods and techniques from the external threats, hackers,
outside attacks from cyber due to its security reasons.
Conclusion And Future Work
With the report, a broad concept on the implementation and the network security is
developed by the Super Finance Solutions Pvt. Ltd network architecture. The
communication network architecture has been judged and many security measures are also
found which relate to the Wide Area Network. Network architecture is designed for the
Super Finance Solutions Pvt. Ltd which can fulfill the requirements and needs of the
company. In the simulation tool of the network, a network connection is developed by the
packet tracer termed as Cisco Packet Tracer. The main task is to provide privacy and
security, for which the VPN and IPsec connections are established and implemented in the
design. The Super Finance Solutions Pvt. Ltd can provide secured services to their remote
users and customers through the various protocols which are added with the security in the
network architecture.
In the future, if the company wants to configure additional devices to the network
architecture, it can be expanded. Super Finance Solutions Pvt. Ltd. must protect itself from
the potential threats for its benefits, which will be costly to be recover after being hacked or
attacked. With the technology used that is Cutting-edge, the connection is secured and
protected. It allows its users to work in a safe environment where they perform their
organizational activities. In the upcoming time, the link may be upgraded in such a manner
that it allows connections that are distant which will make it more usable than before after
such additional features. It may deploy the network devices in the Super Finance Solutions
Pvt. Ltd. to provide wireless connectivity for its remote users. It establishes a suitable
working environment for its users as the mobility of work is provided to them.
References
Buck, C., Olenberger, C., Schweizer, A., Völter, F. and Eymann, T., 2021. Never trust, always
verify: A multivocal literature review on current knowledge and research gaps of zero-
trust. Computers & Security, 110, p.102436.
Das, S., Sharma, S., Dai, R., Bremond, F. and Thonnat, M., 2020, August. Vpn: Learning video-
pose embedding for activities of daily living. In European Conference on Computer
Vision (pp. 72-90). Springer, Cham.
Dhar, S. and Bose, I., 2021. Securing IoT Devices Using Zero Trust and Blockchain. Journal of
Organizational Computing and Electronic Commerce, 31(1), pp.18-34.
Fitzgibbon, S.P., Harrison, S.J., Jenkinson, M., Baxter, L., Robinson, E.C., Bastiani, M., Bozek, J.,
Karolis, V., Grande, L.C., Price, A.N. and Hughes, E., 2020. The developing Human
Connectome Project (dHCP) automated resting-state functional processing framework for
newborn infants. NeuroImage, 223, p.117303.
Guo, J., Gu, C., Chen, X. and Wei, F., 2019. Model learning and model checking of ipsec
implementations for internet of things. IEEE Access, 7, pp.171322-171332.
Hai, P.N.P., Hong, H.N., Quoc, B.B. and Hoang, T., 2021, October. A Comparative Research on
VPN Technologies on Operating System for Routers. In 2021 International Conference on
Advanced Technologies for Communications (ATC) (pp. 89-93). IEEE.
Hauser, F., Häberle, M., Schmidt, M. and Menth, M., 2020. P4-IPsec: Site-to-Site and Host-to-
Site VPN with IPsec in P4-Based SDN. IEEE Access, 8, pp.139567-139586.
Hoenig, G.J., 2018. Data Security on the Internet.
Khelf, R. and Ghoualmi-Zine, N., 2018, November. Ipsec/firewall security policy analysis: A
survey. In 2018 International Conference on Signal, Image, Vision and their Applications
(SIVA) (pp. 1-7). IEEE.
Kim, S.H. and Lee, K.H., 2018. VPN-Filter Malware Techniques and Countermeasures in IoT
Environment. Journal of Convergence for Information Technology, 8(6), pp.231-236.
Li, S., 2020. Zero trust based internet of things. EAI Endorsed Transactions on Internet of
Things, 5(20).
Mehraj, S. and Banday, M.T., 2020, January. Establishing a Zero Trust Strategy in Cloud
Computing Environment. In 2020 International Conference on Computer Communication
and Informatics (ICCCI) (pp. 1-6). IEEE.
Pawlowski, N., Ktena, S.I., Lee, M.C., Kainz, B., Rueckert, D., Glocker, B. and Rajchl, M., 2017.
Dltk: State of the art reference implementations for deep learning on medical images. arXiv
preprint arXiv:1711.06853.
Rose, S.W., Borchert, O., Mitchell, S. and Connelly, S., 2020. Zero trust architecture.
Samaniego, M. and Deters, R., 2018, July. Zero-trust hierarchical management in iot. In 2018
IEEE international congress on Internet of Things (ICIOT) (pp. 88-95). IEEE.
Surasak, T. and Huang, S.C.H., 2019, February. Enhancing VoIP Security and Efficiency using
VPN. In 2019 International Conference on Computing, Networking Guo and
Communications (ICNC) (pp. 180-184). IEEE.
Tharaka, P.M.K., Wijerathne, D.M.D., Perera, N., Vishwajith, D. and Pasqual, A., 2017,
December. Runtime rule-reconfigurable high throughput NIPS on FPGA. In 2017
International Conference on Field Programmable Technology (ICFPT) (pp. 251-254). IEEE.
Tiller, J.S., 2017. A technical guide to IPSec virtual private networks. CRC Press.
Ullah, S., Choi, J. and Oh, H., 2020. IPsec for high speed network links: Performance analysis
and enhancements. Future Generation Computer Systems, 107, pp.112-125.
Xi, W., Suo, S., Cai, T., Jian, G., Yao, H. and Fan, L., 2019, March. A Design and Implementation
Method of IPSec Security Chip for Power Distribution Network System Based on National
Cryptographic Algorithms. In 2019 IEEE 3rd Information Technology, Networking,
Electronic and Automation Control Conference (ITNEC) (pp. 2307-2310). IEEE.
Zheng, S., Li, Z. and Li, B., 2017, March. Implementation and application of ACL in campus
network. In AIP Conference Proceedings (Vol. 1820, No. 1, p. 090014). AIP Publishing LLC.

More Related Content

Similar to LD7007 Network Security.docx

Lis 4482 final report
Lis 4482 final reportLis 4482 final report
Lis 4482 final report
PeterCummingsIII
 
DEFENSE IN DEPTH6IntroductionThe objective of this pap
DEFENSE IN DEPTH6IntroductionThe objective of this papDEFENSE IN DEPTH6IntroductionThe objective of this pap
DEFENSE IN DEPTH6IntroductionThe objective of this pap
LinaCovington707
 
Practical Enterprise Security Architecture
Practical Enterprise Security Architecture  Practical Enterprise Security Architecture
Practical Enterprise Security Architecture
Priyanka Aash
 
CompTIA Security Plus Mini Bootcamp Session
CompTIA Security Plus Mini Bootcamp Session  CompTIA Security Plus Mini Bootcamp Session
CompTIA Security Plus Mini Bootcamp Session
Joseph Holbrook, Chief Learning Officer (CLO)
 
CompTIA Security Plus Overview
CompTIA Security Plus OverviewCompTIA Security Plus Overview
CompTIA Security Plus Overview
Joseph Holbrook, Chief Learning Officer (CLO)
 
Nt1310 Unit 1 Assignment 1
Nt1310 Unit 1 Assignment 1Nt1310 Unit 1 Assignment 1
Nt1310 Unit 1 Assignment 1
Lisa Brown
 
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud SystemsIRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
IRJET Journal
 
Ijirsm ashok-kumar-h-problems-and-solutions-infrastructure-as-service-securit...
Ijirsm ashok-kumar-h-problems-and-solutions-infrastructure-as-service-securit...Ijirsm ashok-kumar-h-problems-and-solutions-infrastructure-as-service-securit...
Ijirsm ashok-kumar-h-problems-and-solutions-infrastructure-as-service-securit...
IJIR JOURNALS IJIRUSA
 
Network assignment on project design
Network assignment on project designNetwork assignment on project design
Network assignment on project design
Total Assignment Help
 
Computer Networking for Small & Medium Businesses - Boney Maundu.pdf
Computer Networking for Small & Medium Businesses - Boney Maundu.pdfComputer Networking for Small & Medium Businesses - Boney Maundu.pdf
Computer Networking for Small & Medium Businesses - Boney Maundu.pdf
Boney Maundu Slim
 
IRJET - Cloud based Datacenter in Virtual Private Network
IRJET - Cloud based Datacenter in Virtual Private NetworkIRJET - Cloud based Datacenter in Virtual Private Network
IRJET - Cloud based Datacenter in Virtual Private Network
IRJET Journal
 
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...
eSAT Journals
 
Implementing vpn using direct access technology
Implementing vpn using direct access technologyImplementing vpn using direct access technology
Implementing vpn using direct access technology
ferasfarag
 
Enhanced security framework to ensure data security
Enhanced security framework to ensure data securityEnhanced security framework to ensure data security
Enhanced security framework to ensure data security
eSAT Publishing House
 
Cyber security and cyber law
Cyber security and cyber lawCyber security and cyber law
Cyber security and cyber law
Divyank Jindal
 
Running head NETWORK INFRASTRUCTURE AND SECURITY 1NETWOR.docx
Running head NETWORK INFRASTRUCTURE AND SECURITY  1NETWOR.docxRunning head NETWORK INFRASTRUCTURE AND SECURITY  1NETWOR.docx
Running head NETWORK INFRASTRUCTURE AND SECURITY 1NETWOR.docx
todd581
 
Running head NETWORK INFRASTRUCTURE AND SECURITY 1NETWOR.docx
Running head NETWORK INFRASTRUCTURE AND SECURITY  1NETWOR.docxRunning head NETWORK INFRASTRUCTURE AND SECURITY  1NETWOR.docx
Running head NETWORK INFRASTRUCTURE AND SECURITY 1NETWOR.docx
glendar3
 
Addressing Security Issues and Challenges in Mobile Cloud Computing
Addressing Security Issues and Challenges in Mobile Cloud ComputingAddressing Security Issues and Challenges in Mobile Cloud Computing
Addressing Security Issues and Challenges in Mobile Cloud Computing
Editor IJCATR
 

Similar to LD7007 Network Security.docx (18)

Lis 4482 final report
Lis 4482 final reportLis 4482 final report
Lis 4482 final report
 
DEFENSE IN DEPTH6IntroductionThe objective of this pap
DEFENSE IN DEPTH6IntroductionThe objective of this papDEFENSE IN DEPTH6IntroductionThe objective of this pap
DEFENSE IN DEPTH6IntroductionThe objective of this pap
 
Practical Enterprise Security Architecture
Practical Enterprise Security Architecture  Practical Enterprise Security Architecture
Practical Enterprise Security Architecture
 
CompTIA Security Plus Mini Bootcamp Session
CompTIA Security Plus Mini Bootcamp Session  CompTIA Security Plus Mini Bootcamp Session
CompTIA Security Plus Mini Bootcamp Session
 
CompTIA Security Plus Overview
CompTIA Security Plus OverviewCompTIA Security Plus Overview
CompTIA Security Plus Overview
 
Nt1310 Unit 1 Assignment 1
Nt1310 Unit 1 Assignment 1Nt1310 Unit 1 Assignment 1
Nt1310 Unit 1 Assignment 1
 
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud SystemsIRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
 
Ijirsm ashok-kumar-h-problems-and-solutions-infrastructure-as-service-securit...
Ijirsm ashok-kumar-h-problems-and-solutions-infrastructure-as-service-securit...Ijirsm ashok-kumar-h-problems-and-solutions-infrastructure-as-service-securit...
Ijirsm ashok-kumar-h-problems-and-solutions-infrastructure-as-service-securit...
 
Network assignment on project design
Network assignment on project designNetwork assignment on project design
Network assignment on project design
 
Computer Networking for Small & Medium Businesses - Boney Maundu.pdf
Computer Networking for Small & Medium Businesses - Boney Maundu.pdfComputer Networking for Small & Medium Businesses - Boney Maundu.pdf
Computer Networking for Small & Medium Businesses - Boney Maundu.pdf
 
IRJET - Cloud based Datacenter in Virtual Private Network
IRJET - Cloud based Datacenter in Virtual Private NetworkIRJET - Cloud based Datacenter in Virtual Private Network
IRJET - Cloud based Datacenter in Virtual Private Network
 
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...
 
Implementing vpn using direct access technology
Implementing vpn using direct access technologyImplementing vpn using direct access technology
Implementing vpn using direct access technology
 
Enhanced security framework to ensure data security
Enhanced security framework to ensure data securityEnhanced security framework to ensure data security
Enhanced security framework to ensure data security
 
Cyber security and cyber law
Cyber security and cyber lawCyber security and cyber law
Cyber security and cyber law
 
Running head NETWORK INFRASTRUCTURE AND SECURITY 1NETWOR.docx
Running head NETWORK INFRASTRUCTURE AND SECURITY  1NETWOR.docxRunning head NETWORK INFRASTRUCTURE AND SECURITY  1NETWOR.docx
Running head NETWORK INFRASTRUCTURE AND SECURITY 1NETWOR.docx
 
Running head NETWORK INFRASTRUCTURE AND SECURITY 1NETWOR.docx
Running head NETWORK INFRASTRUCTURE AND SECURITY  1NETWOR.docxRunning head NETWORK INFRASTRUCTURE AND SECURITY  1NETWOR.docx
Running head NETWORK INFRASTRUCTURE AND SECURITY 1NETWOR.docx
 
Addressing Security Issues and Challenges in Mobile Cloud Computing
Addressing Security Issues and Challenges in Mobile Cloud ComputingAddressing Security Issues and Challenges in Mobile Cloud Computing
Addressing Security Issues and Challenges in Mobile Cloud Computing
 

More from stirlingvwriters

Speak to the idea of feminism from your perspective and.docx
Speak to the idea of feminism from your perspective and.docxSpeak to the idea of feminism from your perspective and.docx
Speak to the idea of feminism from your perspective and.docx
stirlingvwriters
 
What is the logic behind How.docx
What is the logic behind How.docxWhat is the logic behind How.docx
What is the logic behind How.docx
stirlingvwriters
 
Thinking about password identify two that you believe are.docx
Thinking about password identify two that you believe are.docxThinking about password identify two that you believe are.docx
Thinking about password identify two that you believe are.docx
stirlingvwriters
 
The student will demonstrate and articulate proficiency in.docx
The student will demonstrate and articulate proficiency in.docxThe student will demonstrate and articulate proficiency in.docx
The student will demonstrate and articulate proficiency in.docx
stirlingvwriters
 
To help lay the foundation for your study of postmodern.docx
To help lay the foundation for your study of postmodern.docxTo help lay the foundation for your study of postmodern.docx
To help lay the foundation for your study of postmodern.docx
stirlingvwriters
 
TITLE Digital marketing before and after pandemic Sections that.docx
TITLE Digital marketing before and after pandemic Sections that.docxTITLE Digital marketing before and after pandemic Sections that.docx
TITLE Digital marketing before and after pandemic Sections that.docx
stirlingvwriters
 
This assignment focuses on Marxist students will educate.docx
This assignment focuses on Marxist students will educate.docxThis assignment focuses on Marxist students will educate.docx
This assignment focuses on Marxist students will educate.docx
stirlingvwriters
 
Upton Souls of Black.docx
Upton Souls of Black.docxUpton Souls of Black.docx
Upton Souls of Black.docx
stirlingvwriters
 
What is a In this.docx
What is a In this.docxWhat is a In this.docx
What is a In this.docx
stirlingvwriters
 
There are many possible sources of literature for.docx
There are many possible sources of literature for.docxThere are many possible sources of literature for.docx
There are many possible sources of literature for.docx
stirlingvwriters
 
You enter your project team meeting with Mike and Tiffany.docx
You enter your project team meeting with Mike and Tiffany.docxYou enter your project team meeting with Mike and Tiffany.docx
You enter your project team meeting with Mike and Tiffany.docx
stirlingvwriters
 
Write a minimum of 200 words response to each post.docx
Write a minimum of 200 words response to each post.docxWrite a minimum of 200 words response to each post.docx
Write a minimum of 200 words response to each post.docx
stirlingvwriters
 
View the video on Law at Discuss various.docx
View the video on Law at Discuss various.docxView the video on Law at Discuss various.docx
View the video on Law at Discuss various.docx
stirlingvwriters
 
Your software has gone live and is in the production.docx
Your software has gone live and is in the production.docxYour software has gone live and is in the production.docx
Your software has gone live and is in the production.docx
stirlingvwriters
 
This learning was a cornucopia of enrichment with regard.docx
This learning was a cornucopia of enrichment with regard.docxThis learning was a cornucopia of enrichment with regard.docx
This learning was a cornucopia of enrichment with regard.docx
stirlingvwriters
 
This is a school community relations My chosen school.docx
This is a school community relations My chosen school.docxThis is a school community relations My chosen school.docx
This is a school community relations My chosen school.docx
stirlingvwriters
 
Write 3 Only one resource is I.docx
Write 3 Only one resource is I.docxWrite 3 Only one resource is I.docx
Write 3 Only one resource is I.docx
stirlingvwriters
 
Sociology researches social issues through the use of theoretical.docx
Sociology researches social issues through the use of theoretical.docxSociology researches social issues through the use of theoretical.docx
Sociology researches social issues through the use of theoretical.docx
stirlingvwriters
 
Step Listen to the Trail of Tears.docx
Step Listen to the Trail of Tears.docxStep Listen to the Trail of Tears.docx
Step Listen to the Trail of Tears.docx
stirlingvwriters
 
You are the newly hired Director of Risk Management for.docx
You are the newly hired Director of Risk Management for.docxYou are the newly hired Director of Risk Management for.docx
You are the newly hired Director of Risk Management for.docx
stirlingvwriters
 

More from stirlingvwriters (20)

Speak to the idea of feminism from your perspective and.docx
Speak to the idea of feminism from your perspective and.docxSpeak to the idea of feminism from your perspective and.docx
Speak to the idea of feminism from your perspective and.docx
 
What is the logic behind How.docx
What is the logic behind How.docxWhat is the logic behind How.docx
What is the logic behind How.docx
 
Thinking about password identify two that you believe are.docx
Thinking about password identify two that you believe are.docxThinking about password identify two that you believe are.docx
Thinking about password identify two that you believe are.docx
 
The student will demonstrate and articulate proficiency in.docx
The student will demonstrate and articulate proficiency in.docxThe student will demonstrate and articulate proficiency in.docx
The student will demonstrate and articulate proficiency in.docx
 
To help lay the foundation for your study of postmodern.docx
To help lay the foundation for your study of postmodern.docxTo help lay the foundation for your study of postmodern.docx
To help lay the foundation for your study of postmodern.docx
 
TITLE Digital marketing before and after pandemic Sections that.docx
TITLE Digital marketing before and after pandemic Sections that.docxTITLE Digital marketing before and after pandemic Sections that.docx
TITLE Digital marketing before and after pandemic Sections that.docx
 
This assignment focuses on Marxist students will educate.docx
This assignment focuses on Marxist students will educate.docxThis assignment focuses on Marxist students will educate.docx
This assignment focuses on Marxist students will educate.docx
 
Upton Souls of Black.docx
Upton Souls of Black.docxUpton Souls of Black.docx
Upton Souls of Black.docx
 
What is a In this.docx
What is a In this.docxWhat is a In this.docx
What is a In this.docx
 
There are many possible sources of literature for.docx
There are many possible sources of literature for.docxThere are many possible sources of literature for.docx
There are many possible sources of literature for.docx
 
You enter your project team meeting with Mike and Tiffany.docx
You enter your project team meeting with Mike and Tiffany.docxYou enter your project team meeting with Mike and Tiffany.docx
You enter your project team meeting with Mike and Tiffany.docx
 
Write a minimum of 200 words response to each post.docx
Write a minimum of 200 words response to each post.docxWrite a minimum of 200 words response to each post.docx
Write a minimum of 200 words response to each post.docx
 
View the video on Law at Discuss various.docx
View the video on Law at Discuss various.docxView the video on Law at Discuss various.docx
View the video on Law at Discuss various.docx
 
Your software has gone live and is in the production.docx
Your software has gone live and is in the production.docxYour software has gone live and is in the production.docx
Your software has gone live and is in the production.docx
 
This learning was a cornucopia of enrichment with regard.docx
This learning was a cornucopia of enrichment with regard.docxThis learning was a cornucopia of enrichment with regard.docx
This learning was a cornucopia of enrichment with regard.docx
 
This is a school community relations My chosen school.docx
This is a school community relations My chosen school.docxThis is a school community relations My chosen school.docx
This is a school community relations My chosen school.docx
 
Write 3 Only one resource is I.docx
Write 3 Only one resource is I.docxWrite 3 Only one resource is I.docx
Write 3 Only one resource is I.docx
 
Sociology researches social issues through the use of theoretical.docx
Sociology researches social issues through the use of theoretical.docxSociology researches social issues through the use of theoretical.docx
Sociology researches social issues through the use of theoretical.docx
 
Step Listen to the Trail of Tears.docx
Step Listen to the Trail of Tears.docxStep Listen to the Trail of Tears.docx
Step Listen to the Trail of Tears.docx
 
You are the newly hired Director of Risk Management for.docx
You are the newly hired Director of Risk Management for.docxYou are the newly hired Director of Risk Management for.docx
You are the newly hired Director of Risk Management for.docx
 

Recently uploaded

PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
Dr. Shivangi Singh Parihar
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
Israel Genealogy Research Association
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
WaniBasim
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
amberjdewit93
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
Celine George
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
David Douglas School District
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
IreneSebastianRueco1
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
PECB
 
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Fajar Baskoro
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
Jean Carlos Nunes Paixão
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
Academy of Science of South Africa
 
Cognitive Development Adolescence Psychology
Cognitive Development Adolescence PsychologyCognitive Development Adolescence Psychology
Cognitive Development Adolescence Psychology
paigestewart1632
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
chanes7
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
Celine George
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
ak6969907
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
Priyankaranawat4
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
TechSoup
 

Recently uploaded (20)

PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
 
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
 
Cognitive Development Adolescence Psychology
Cognitive Development Adolescence PsychologyCognitive Development Adolescence Psychology
Cognitive Development Adolescence Psychology
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
 

LD7007 Network Security.docx

  • 1. LD7007 Network Security Answer: Introduction In this report, a secured network has been designed and implemented for an organization named Super finance Solution Pvt. Ltd. company. Based on the framework model of network security, the identification process will be discussed by the verification mode. With such a structure of the model, the users who are authenticated will only get access to the information and data installed by the service. This system will be useful for the Super Finance Solutions Pvt. Ltd. situated in London by implementing the network model of Zero Trust that secures the company’s network. For implementing such a secured network, there must be a network design and its examination which must go through the three blocks respectively. These blocks are Communication and Architecture, Secure service delivery and operation, Research and delivery with Conclusion, and future work. Block A: Architecture And Communication Figure: Super Finance Solutions Network topology Configure IP Connectivity It is necessary to establish an IP connection and the hardening of the device for securing the network connectivity. All the devices will get an address with such IP connections to transfer data and communication. The risk of accessing unwanted threats reduces by strengthening such network equipment. The advantages of the Device hardening are as follows: To enhance the productivity and performance of the network, unused programs and files are removed. It provides additional network security by blocking Remote access. By implementing device hardening, Security risks are also eliminated. Figure 2: Device Hardening configuration
  • 2. IP Configuration Internal Site Router External site router Internet router DHCP, WEB, SYS-LOG, DNS Server Configuration The network architecture includes various servers which are a DHCP server, A Web Server, A SYS-LOG server, and a DNS server. These devices must acquire the IP addresses from their Domain Controller. The chances of errors that occur commonly are reduced by the implementing DHCP server (Fitzgibbon et al. 2020). It ensures that only a single computer is assigned with an IP address. DHCP Server Configuration The above figure illustrates that the network of the Super financial company comprises a DHCP server so that the devices of the internal network can get a dynamic IP address. Here, the default gateway of the DHCP server is 192.168.30.1. The above figure shows that the PCs of the internal network has been configured with a dynamic IP address. DNS Server In the above figure, the configuration of the DNS server has been shown where the name of the DNS record is WebServer In the above figure, the configuration of the WEB server has been shown. It is mainly has been configured to store data files on the website. Syslog Server In the above figure, the configuration of the Syslog server has been shown where continuously logs all the changes in the network. Configuring Dynamic Routing Protocol And Inter VLAN Routing To facilitate communication between the company's internal and external networks, a
  • 3. dynamic routing protocol setup is required. The communication network and dynamic routing will assist the router in forwarding the data packet to the proper location. As a result, RIP version 2 has been enabled on all devices in the communication network. The configuration of RIPv2 is provided below: This configuration enables all the devices on the network to communicate with each other. Inter-VLAN And Trunking Configuration Inter-VLAN routing and trunking allow devices to communicate with other devices. For configuring this, at first, VLAN needed to be created that is shown below: After that, inter-VLAN has been configured on the router that is shown below: After that, trunking has been configuration on switches that are shown below: The above figure shows the switchport mode configuration of switches. Block B: Secure Service Delivery And Operations ACL Implementation On Routing Devices A list of ACLs is established for protecting the network. The authorization and authentication of packets regulate filtered data transmission packets. The security provided by the network layer restricts the activity prohibits access for its users and devices. Super Finance Solutions Pvt. Ltd. sets up the control list to access all the networks. The list is set up in such a manner that only the users have the access to its network and restricts any external individual from accessing it (Zheng, Li and Li 2017). To gather content from desired networks and known technologies, the ACLs are implemented on the connections with the outer router. The configuration of ACL is shown below: IPsec VPN Implementation A VPN connection site-to-site is the connection that provides security to the information during the transfer of data packets through the network (Guo et al. 2019). In Super Finance Solutions Pvt. Ltd. this device is installed to encrypt the transmission of data between its external and internal routers. The configuration of the VPN is shown below: The above figure shows the configuration of VPN in the External site router. The configuration develops a secure tunnel between the internal site router and the external site router. The above figure shows that the 3 packets have been going through this terminal and all of these packets are encrypted.
  • 4. In setting up the network, the VPN has some advantages which are as follows: Avoid alteration of data: When a user consumes some data quantity the broadband or network provider slows the speed of the communicating network. If VPN is used along with it, then one need not worry about such things. Avoid alternation of bandwidth: The consumers experience several difficulties with the periodic decrement of the Internet. As a key factor, using VPN may avoid bandwidth throttle and helps in improving the Internet connection. Hide Private information: The data collected from the user and its online activity is followed by the Web applications are observed. Such activities are not observed by the internet if it is run with a VPN connection which protects the data as well as kept it private. The advantages mentioned above are considered by the developers of the Super Finance Solutions Pvt. Ltd. to protect their external and internal network. NIPS Implementation And Testing Implementation of Network IPS is the mechanism that assures a protective layer of guarantee. The NIPS works with the network traffic monitoring which analyses its protocol’s behavior (Tharaka et al. 2017). It is necessary to implement NIPS in the company’s network to protect the company from external threats, various risks, attacks, and vulnerabilities. After implementing such NIPS within the company, it protects itself against various viruses, malware, and exploitation (Pawlowski et al. 2017). The below two figures shows the configuration of IP IPS: From the above figure, it has been seen that the IP IPS has been configured on the internal site router. An IOS system along with IPS configuration is configured to the router available in the internal site for protecting the internal network of the Super Finance Solutions Pvt. Ltd. company. Block C: Research And Development Zero Trust Network Security Framework As a Network Security Engineer of Super Finance Solutions Pvt. Ltd., London, it is my duty to establish a model of network security which will be effective and reliable for the company. The most trusted security framework in recent times based on the verifying mode on the users’ identification is considered to set up which is Zero Trust Network Security Framework. It clarifies that users already authenticated or authorized by the framework or system will be able to gain access to the information and database (Rose et al. 2020). Further, it also helps the company in improving the performances of the installed networks
  • 5. in it and protects its security from the external threats that may arise. It can help its user in protecting its identified surfaces, which is quite helpful in identifying the traffic movement in view of the company regarding protecting its surface. This framework introduces many new dependencies among the users, services, DAAS, and Infrastructure which protects the system’s surface while establishing the micro perimeter environment around itself (Samaniego and Deters 2018). The perimeter is needed for the protection of the surface. Firewalls are the segmentation gateway to be employed for creating a micro perimeter. The company provides the segmentation gateway which is commonly termed as Firewall (Dhar and Bose 2021). Zero Trust Framework is the qualitative approach to security that eliminates the implicit trust which secures the company’s security. The main principle of this framework is that not to trust any security unless it is verified (Buck et al. 2021). It is designed to enable the transformation digitally for protecting the environment with strong network segmentation, authentication methods, policies of least access, and layer for preventing threats. It is based on realizing that the trust of the user is decreasing by the model of traditional security (Li 2020). It includes the threats and malicious insiders and externals who are in keen waiting and hampering the user while sharing data and communication which weakens their security also and takes away the information which results in a negative way for the company. This lack of security controls can be overcome after implementing such framework of security which can provide the security strength to its user that their data and information are safe from any malware and outside attackers which makes them work freely on the network resulting in the growth of the Network Security (Mehraj and Banday 2020). Overview Of VPN Reliability Virtual Private Network which is in short termed as VPN is the connection securing the private network over a network that is used publically (Das et al. 2020). The private network could be either any business, its association, or any IT sector, or many others. It helps Super Finance Solutions Pvt. Ltd. in the improvement of its network security by investing or funding some cheap and affordable investments which in return provides more benefits. The IP addresses of the users’ system and devices are masked with the help of VPN through a remote server that is customized and which runs through a VPN host that helps its user in making the browsing of Web which origins at the server of VPN itself (Hauser et al. 2020). It is quite impossible to trace the users’ footprint for any threats which are from outside or in short for external threats. The hackers who observe and track the users for understanding them are just wasting their time as the users perform on the server which is secured and safe from the outside attacks of any external means. VPN also works as the filter for its use by converting it in the form of gibberish (Kim and Lee 2018). Any hacker can find this data but all in vain as it is considered to be useless because the data collected by the hacker is in gibberish form which
  • 6. is of no use. The VPN can perform many more tasks until its major priority is to secure the system first which is securing or protecting the server of the VPN (Hoenig 2018). The benefits of VPN are as follows: VPN connects easily with the network which exists before in any organization, company, business, or association. VPN’s task is in masking the IP address from the threats which evoke from external means and also from the provider who supplies or provides internet services or from any third party (Surasak and Huang 2019). It will help its users to do the work freely and in the way which they want to do it as the data and the information sent and collected by them are fully secured and no one can trace the users’ footprints. The VPN which is ideal for working can ensure in detecting the threats coming from external affairs or means by an individual who is trying to log in without any authentication or by any other means of the range which is diverse. VPN uses the OTP method for its authorized and authenticated users to log into the server for their work or job roles. While login, an OTP is sent to the authenticated user’s contact number by the VPN as provided by them. The VPN creates and establishes another origin for its users when it is at work and ask to provide a password that can be strong and cannot be broken or cracked by any other person easily and after that, the four-digit or six-digit code or OTP is sent to the contact number which is provided by the user to the company. The VPN allows its user to hide and wear the shawl which is invisible to any other party or outsider. It also helps the user not to accept any cookies from outside which is very much useful and important for preventing the attacks of cyber or from the hackers and external threats or cyber-crime. VPN is cost-effective as it returns many supplies and provides much more to the Super Finance Solutions Pvt. Ltd then the company bears the cost of implementing such VPN as the network for their performance. VPN joins quite easily with other devices and services and evolves easily with them which improves the performances of such devices, as well as the service provided by them, also improves and results in a positive manner for the Super Finance Solutions Pvt. Ltd. VPN several times depends upon the traffic type which is sent through its tunnel and can be also classified by the means of OSI layer. The layer is received from the packets. Classification of VPN by the Topology terms is Peer to peer VPN, Client to server VPN, and Site to site VPN. The development of the security and the network facility of the Super Finance Solutions Pvt. Ltd can be enhanced by the use of the overview discussion of the reliability of the VPN. The model of VPN security provides: Confidentiality to its user as if there is a deep inspection of packet level, an attacker or outsider can only see the encrypted data. Sends authentication to its user for preventing unauthorized users who trying to access the
  • 7. VPN (Guo et al. 2020). It sends message integrity to its end users for detecting the instances of tampering through the transferred messages. Before the establishment of the secure VPN, Tunnel endpoints must be authorized. The remote-access VPNs created by users use biometrics, two-factor authentication, cryptographic methods, or passwords. Network–to–network tunnels use digital certificates or passwords. It stores the key permanently that allows the tunnel for the establishment without any interference of the administrator automatically. Secure VPN protocols include: Internet Protocol Security Transport Layer Security Datagram Transport Layer Security Microsoft Point-to-Point Encryption Microsoft Secure Socket Tunneling Protocol Multi-Path Virtual Private Network Secure Shell VPN Wire Guard IKEv2 Cryptographic Mechanism Of IPsec In considering the Super Finance Solutions Pvt. Ltd Company, IPsec is helpful in terms of its working ways. IP security or IPsec is the forced protocol of the engineering task provided by the internet which is held among the two points connected with another one for providing the authentication. It works by following some steps which mean to determine the traffic type, tunnel termination, and IKE phase one or two. By implementing IPsec components, this method can be helpful in providing suitable integrity and authentication to the Super Finance Solutions Pvt. Ltd. IPsec architecture is used or implemented by most of the company, businesses, or organizations in order that protect the enabled VPN connections. IPsec also enables a topmost security layer for organizing the network architecture at its best by the implementation of some solid protocols and critical features. These security protocols are executed between system to system, host to host, and among the several connections. So, the cryptographic method which is implemented in such mode of communication can be either the Transportation method or Tunneling method. In this procedure, the data transfer by using the Tunneling method is made by L2TP. IPsec Tunnel acts as communication along with a tunnel between the two different systems. As a result of which, it is not necessary to break the circuit which may be costlier than the tunneling used by IPsec. With the establishment of IPsec, it doesn’t mean that there is network security which is established overall as its remote users can easily get access with
  • 8. the network. The IPsec configuration implementation cannot restrict the users’ detailed services and level opportunities provided by the network to them. The system providers or developers must consider the several difficulties which are available there or are associated with the configuration of IPsec. The administration and maintenance of the protocol’s security are difficult and need some additional features which are to be installed. As a result, the configuration of VPN is to be implemented to the system established or developed for providing internet access that is secure to its remote users. However, in addition to the cryptographic mechanism of IPsec, some specific information and system techniques are used for providing security to remote users. These techniques can allow them to work smoothly without any hassle disturbance or problems which generally evokes before implementing such methods and techniques from the external threats, hackers, outside attacks from cyber due to its security reasons. Conclusion And Future Work With the report, a broad concept on the implementation and the network security is developed by the Super Finance Solutions Pvt. Ltd network architecture. The communication network architecture has been judged and many security measures are also found which relate to the Wide Area Network. Network architecture is designed for the Super Finance Solutions Pvt. Ltd which can fulfill the requirements and needs of the company. In the simulation tool of the network, a network connection is developed by the packet tracer termed as Cisco Packet Tracer. The main task is to provide privacy and security, for which the VPN and IPsec connections are established and implemented in the design. The Super Finance Solutions Pvt. Ltd can provide secured services to their remote users and customers through the various protocols which are added with the security in the network architecture. In the future, if the company wants to configure additional devices to the network architecture, it can be expanded. Super Finance Solutions Pvt. Ltd. must protect itself from the potential threats for its benefits, which will be costly to be recover after being hacked or attacked. With the technology used that is Cutting-edge, the connection is secured and protected. It allows its users to work in a safe environment where they perform their organizational activities. In the upcoming time, the link may be upgraded in such a manner that it allows connections that are distant which will make it more usable than before after such additional features. It may deploy the network devices in the Super Finance Solutions Pvt. Ltd. to provide wireless connectivity for its remote users. It establishes a suitable working environment for its users as the mobility of work is provided to them. References Buck, C., Olenberger, C., Schweizer, A., Völter, F. and Eymann, T., 2021. Never trust, always verify: A multivocal literature review on current knowledge and research gaps of zero- trust. Computers & Security, 110, p.102436.
  • 9. Das, S., Sharma, S., Dai, R., Bremond, F. and Thonnat, M., 2020, August. Vpn: Learning video- pose embedding for activities of daily living. In European Conference on Computer Vision (pp. 72-90). Springer, Cham. Dhar, S. and Bose, I., 2021. Securing IoT Devices Using Zero Trust and Blockchain. Journal of Organizational Computing and Electronic Commerce, 31(1), pp.18-34. Fitzgibbon, S.P., Harrison, S.J., Jenkinson, M., Baxter, L., Robinson, E.C., Bastiani, M., Bozek, J., Karolis, V., Grande, L.C., Price, A.N. and Hughes, E., 2020. The developing Human Connectome Project (dHCP) automated resting-state functional processing framework for newborn infants. NeuroImage, 223, p.117303. Guo, J., Gu, C., Chen, X. and Wei, F., 2019. Model learning and model checking of ipsec implementations for internet of things. IEEE Access, 7, pp.171322-171332. Hai, P.N.P., Hong, H.N., Quoc, B.B. and Hoang, T., 2021, October. A Comparative Research on VPN Technologies on Operating System for Routers. In 2021 International Conference on Advanced Technologies for Communications (ATC) (pp. 89-93). IEEE. Hauser, F., Häberle, M., Schmidt, M. and Menth, M., 2020. P4-IPsec: Site-to-Site and Host-to- Site VPN with IPsec in P4-Based SDN. IEEE Access, 8, pp.139567-139586. Hoenig, G.J., 2018. Data Security on the Internet. Khelf, R. and Ghoualmi-Zine, N., 2018, November. Ipsec/firewall security policy analysis: A survey. In 2018 International Conference on Signal, Image, Vision and their Applications (SIVA) (pp. 1-7). IEEE. Kim, S.H. and Lee, K.H., 2018. VPN-Filter Malware Techniques and Countermeasures in IoT Environment. Journal of Convergence for Information Technology, 8(6), pp.231-236. Li, S., 2020. Zero trust based internet of things. EAI Endorsed Transactions on Internet of Things, 5(20). Mehraj, S. and Banday, M.T., 2020, January. Establishing a Zero Trust Strategy in Cloud Computing Environment. In 2020 International Conference on Computer Communication and Informatics (ICCCI) (pp. 1-6). IEEE. Pawlowski, N., Ktena, S.I., Lee, M.C., Kainz, B., Rueckert, D., Glocker, B. and Rajchl, M., 2017. Dltk: State of the art reference implementations for deep learning on medical images. arXiv preprint arXiv:1711.06853.
  • 10. Rose, S.W., Borchert, O., Mitchell, S. and Connelly, S., 2020. Zero trust architecture. Samaniego, M. and Deters, R., 2018, July. Zero-trust hierarchical management in iot. In 2018 IEEE international congress on Internet of Things (ICIOT) (pp. 88-95). IEEE. Surasak, T. and Huang, S.C.H., 2019, February. Enhancing VoIP Security and Efficiency using VPN. In 2019 International Conference on Computing, Networking Guo and Communications (ICNC) (pp. 180-184). IEEE. Tharaka, P.M.K., Wijerathne, D.M.D., Perera, N., Vishwajith, D. and Pasqual, A., 2017, December. Runtime rule-reconfigurable high throughput NIPS on FPGA. In 2017 International Conference on Field Programmable Technology (ICFPT) (pp. 251-254). IEEE. Tiller, J.S., 2017. A technical guide to IPSec virtual private networks. CRC Press. Ullah, S., Choi, J. and Oh, H., 2020. IPsec for high speed network links: Performance analysis and enhancements. Future Generation Computer Systems, 107, pp.112-125. Xi, W., Suo, S., Cai, T., Jian, G., Yao, H. and Fan, L., 2019, March. A Design and Implementation Method of IPSec Security Chip for Power Distribution Network System Based on National Cryptographic Algorithms. In 2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC) (pp. 2307-2310). IEEE. Zheng, S., Li, Z. and Li, B., 2017, March. Implementation and application of ACL in campus network. In AIP Conference Proceedings (Vol. 1820, No. 1, p. 090014). AIP Publishing LLC.