APPLICATION OF SECURED NETWORK ON INTERNAL CONTROL OF AN ORGANIZATION

  • 0 Review(s)

Product Category: Projects

Product Code: 00002929

No of Pages: 69

No of Chapters: 5

File Format: Microsoft Word

Price :

$12

ABSTRACT

 

The main objective of this project is to find a way of improving data and voice communication over Lagos State University network and to ensure the integrity of data that is sent across the network during communication and transmission of data.

Finally, there is no doubt that an overview of the whole project has achieved its aim and objectives. I believe that proper implementation of this project will improve data integrity and communication security within Lagos State University network.


TABLE OF CONTENT

Title page                                                                                          i

Certification                                                                                                ii

Dedication                                                                                         iii

Acknowledgement                                                                                      iv

Abstract                                                                                            v

Table of Content                                                                               iv

 

CHAPTER ONE

1.0     INTRODUCTION                                                                             1

1.1     STATEMENT OF THE PROBLEM                                       2

1.2     AIM AND OBJECTIVES OF THE STUDY                                    3

1.3     SIGNIFICANCE OF THE STUDY                                         4

1.4     SCOPE OF THE STUDY                                                       4

1.5     METHODOLOGY                                                                  5

1.6     DEFINITION OF TERMS                                                      5

 

CHAPTER TWO 

LITERATURE REVIEW

2.0     OVERVIEW OFCOMPUTER NETWORK SECURITY                 7

2.1     NETWORK OVERVIEW                                                       12

2.2     ORGANIZATIONS IMPLEMENTING LOCAL

AREA NETWORK INFRASTRUCTURE                                       16

 

2.2.1  IMPLEMENTATION OF METROPOLITAN

NETWORK AND WIDE AREA NETWORK                        17

 

2.3     NETWORKING MEDIUM AND DEVICES                          18

2.4     NETWORK PROTOCOL                                                       19

2.5     COMPUTER SECURITY                                                       19

2.6     PHYSICAL COMPUTER THREAT AND SECURITY

          MEASURES ENFORCED                                                      22

 

2.7     NETWORK SECURITY ISSUES AND REVIEW                           24

2.8     NETWORK SECURITY AND DATA

TRANSMISSION REQUIREMENT                                      25

 

2.8.1  NETWORK SPECIFIC COMMUNICATION

THREAT AND ATTACK                                                      26

 

2.9     DATA ENCRYPTION AND DECRYPTION ANALYSIS     29

2.10   TYPES OF CRYPTOGRAPHIC ALGORITHMS

THAT CAN BE IMPLEMENTED                                          30

 

CHAPTER THREE

SYSTEMS ANALYSIS AND DESIGN

3.0     INTRODUCTION                                                                            32

3.1     SYSTEM DESCRIPTION                                                      32

3.1.1  HISTORICAL BACKGROUND                                             33

3.1.2  NETWORK RESOURCES SHARED

AT LASUCOM GROUP                                                                  35

 

3.1.3  NETWORKING WHAT AND HOW                                               35

3.2     DESIGN APPROACH                                                            38

3.3     PROGRAM LAYOUT AND DESIGN                                   38

3.3.1  OUTPUT DESIGN                                                                 38

3.3.2  INPUT DESIGN                                                                     39

3.3.3  ALGORITHM FOR SHA-1 BITWISE PROCESS                           41

 

CHAPTER FOUR

SYSTEMS IMPLEMENTATION AND DOCUMENTATION

4.1     SYSTEM IMPLEMENTATION                                             44

4.2     SITE PREPARATION                                                            44

4.3     HARDWARE SPECIFICATION                                            45

4.4     SOFTWARE SPECIFICATION                                             45

4.5     PROTOCOL SPECIFICATION                                              46

4.6     HARDWARE MAINTENANCE                                            47

4.7     PROGRAM DOCUMENTATION                                          48

4.8     CHOICE OF PROGRAMMING LANGUAGE                       49

 

 

CHAPTER FIVE

SUMMARY, CONCLUSION AND RECOMMENDATIONS

5.0     SUMMARY                                                                            58

5.1     LIMITATIONS                                                                       58

5.2     CONCLUSION                                                                       58

5.3     RECOMMENDATION                                                           58

REFERENCES                                                                                59

APENDIX 1        FLOW CHART                                                    60

APENDIX 2        PROGRAM LISTING                                          61

 

 

 

 

 

CHAPTER ONE

 

1.0     INTRODUCTION

The use of the internet for electronic transfer of both business and personal information has been on the increase in the past decade. As a result, Internet has become a key resource of information. But the same Internet can be and has been used by terrorists, criminals and others to communicate information about unlawful activities. Organizations such as LASUCOM must adopt effective and practical security solution assets.

Information is been shared using various mediums and means in most organizations both to control its activities and to ensure that organization goals and objectives are met. This project will be looking into the Application of Secured Network on Internal Control of an Organization; with more attention placed on the need of making sure that the network is secured. The internet has improved tremendous technology advancements for organizations, resulting in improved business efficiencies and productivity gains. Security threats such as hacking, viruses and remote technologies are threating. A recent trend is the shift to financially motivated attacks and exploits: The 2009 Computer Crime and Security Survey shows that the most expensive computer security incidents were those involving financial fraud.

Increased collaboration and globalization introduce further security challenges. Mobile users bring their laptops and handheld devices in and out of the school’s network. Remote-access users connect from their offices and from public locations. Students who are business outsourcing require direct partner access into the internal network. Onsite visitors, vendors, and contractors may need access to the internal network to accomplish their work. Even “in the-office” workers are subject to threats coming through internet access, and e-mail use. Traditional security products designed to protect closed environments with well-defined security boundaries are no longer effective in securing a network.

Most IT and security departments also face budgetary and personnel resource constraint. Adding to the challenge are the growing complexity and sophistication of new security threats, often, less-than-efficient operations. The college must streamline work processes, improve operational efficiency, and reduce security incidents and financial losses to remain competitive.

 

1.1      STATEMENT OF THE PROBLEM

There are many problems facing network security generally, but to mention few;

v Network infrastructure problem i.e problem with the network model and Architecture implemented.

v Problem of the nature of medium used for communication.

v Physical limitation of equipment used for communication (cable type, data transmission method and computer equipment used)

v OSI model security infrastructure

v Hacking and cracking infrastructure

To effectively protect the college network, the college as an organization need to address several key security questions, including:

v Does the college have full control over who is accessing the network and where each user is permitted to go?

v Does the college have the ability to implement security policies on endpoints-before they connect? Other problems are:

 

1.2     AIM AND OBJECTIVES OF THE STUDY

The purpose of this study is to ensure that LASUCOM implement the right type of network infrastructure and to ensure maximum security of LASUCOM network through implementation of security infrastructure that cannot be easily breached i.e using Cryptographic Hash Function to achieve these goals.

This project explains how the college can use Cryptographic Hash Function to strengthen their security. It discusses how Cryptographic Hash Function is integrated into the college’s lifecycle in terms of supporting role b assed access control Cryptographic Hash Function helps reduce the potential loss of the college’s sensitive information. This helps prevent unauthorized access via the wired, wireless, or remote-access network for better running of the college.

 

1.3     SIGNIFICANCE OF THE STUDY

The project is basically on how to proffer a better means of securing the organization’s data over the network and to better serve the college while using the internet facility.

 

1.4     SCOPE OF THE STUDY

The scope of the project is limited to network model and secure information sharing within LASUCOM using computer hardware and software network infrastructure.

Majority of communication medium, system and technology this day stands the risk of been broken into by unscrupulous individual who either use the opportunity to steal data, back information, crack company security or to seek revenge by attacking network with virus. Having seen these problem posed on network communication, there will be a serious need for secure information infrastructure to be put in place for organization information security. 


 

1.5     METHODOLOGY

The following steps will be followed in carrying out this project:

v Detailed study of the network type and Architecture use in Communication.

v An oral interview will also be carried out to get necessary information about LASUCOM network problem types and its associated security issues.

v Review of different security infrastructure used in transferring information from one location to another.

v Design of different kind of level of network model for secure and non-secure information sharing.

v Creating a security procedure and data originality check procedure for network i.e (cryptographic, Authentication, variation, secrecy rules). 

v Enabling security on Equipment used for a network.

 

1.6     DEFINITION OF TERMS

Cryptography: Art of secret communication and writing.

Security: Act of save keeping, protecting data and information from unauthorized users.

Networking: This is an interconnectivity of two or more systems for communication purposes.

 

Sneaker net: is not informal term describing the transfer of electronic information especially computer files, by physically moving removable media such as magnetic tape, floppy disks, compact discs, USB flash drives, or external hard drives from one computer to another.

Network Security: consists of the provisions and policies adopted by a network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources.

Information Security: means protecting information and information systems from authorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction.

Intrusion Prevention System (IPS): also known as Intrusion Detection and Prevention System (IDPS), they are network security appliances that monitor network and/or system activities for malicious activity. The main functions of intrusion prevention systems are to identify malicious activity, log information about said activity, attempt to block/stop activity, and report activity.

Security Management: is a broad field of management related to asset identification of an organization’s information assets and the development, documentation and implementation of policies, standards, procedures and guidelines.

Click “DOWNLOAD NOW” below to get the complete Projects

FOR QUICK HELP CHAT WITH US NOW!

+(234) 0814 780 1594

Buyers has the right to create dispute within seven (7) days of purchase for 100% refund request when you experience issue with the file received. 

Dispute can only be created when you receive a corrupt file, a wrong file or irregularities in the table of contents and content of the file you received. 

ProjectShelve.com shall either provide the appropriate file within 48hrs or send refund excluding your bank transaction charges. Term and Conditions are applied.

Buyers are expected to confirm that the material you are paying for is available on our website ProjectShelve.com and you have selected the right material, you have also gone through the preliminary pages and it interests you before payment. DO NOT MAKE BANK PAYMENT IF YOUR TOPIC IS NOT ON THE WEBSITE.

In case of payment for a material not available on ProjectShelve.com, the management of ProjectShelve.com has the right to keep your money until you send a topic that is available on our website within 48 hours.

You cannot change topic after receiving material of the topic you ordered and paid for.

Ratings & Reviews

0.0

No Review Found.


To Review


To Comment