Join the Premium Student Club @Zero Cost!
Get Assignment Done by MAS Certified Experts
Flat 50% Off on Assignment Bookings
Today, network security is an important issue for all organizations. Throughout the years, the term network protection has acquired an enormous significance and becomes a core component of every other individual’s life, involved with a website or mobile system. It becomes vulnerable to cyber-attacks or data theft as users send their information online. An entity must focus on specific safety requirements to decide which sort of firewall, or a fusion of all types, will fulfill their business requirements. Also, cyber-attacks may exist on an open network DNS server or an inbuilt firewall. Firewall offers a device that can be employed to limit data transfers between a selected network and an exterior platform.
The key purpose of this report is to analyze the significance of the firewall, the characteristics of Nmap and Ufw, and the potential threats that Express Print Services Pty Ltd. may encounter.
Table of Contents
Outline
Risk Mitigation Plan
Analysis
Firewall Setup
Conclusion
With early roots, Express Print Services Pty Ltd. has expanded into the leading full-service marketing printer and email marketing platform for the customers. Express Print Services Pty Ltd. including its departments centered at Sydney, Melbourne, and Perth. The company manufactures and offers offset, online and large template printing, molding, packaging, executing, die-cutting, web development, marketing goods, and email marketing facilities from large multinationals to smaller industries.
They oversee the setup of the public network with sufficient network service to meet its market criteria by suitable WAN connectivity. The machine and network manager of Express Print Services Pty Ltd. recognizes that network protection has to be resolved, and strongly suggested that a certain degree of authentication is needed for the network to be safe to withstand against threats and challenges. For that, it is important to address possible threats to the company.
The main aim of this case study is to identify the possible threats and the modification of firewall configuration to overcome such threats to Express Print Services Pty Ltd. Using Nmap application tool from Kali Linux platform and diverse knowledge regarding the same is challenging and complex. It requires the concept of Nmap scanning procedures and the use of firewall to know how it can be modified by introducing commands to restrict and authorizing the products to operate centered on the security context of the network.
This report will provide a significant understanding of the various possible threats involved while working on an internet along with the characteristics of the Nmap and Ufw.
The features of Nmap and Ufw:
Nmap is network scanning software that has appeared as one of the most successful, accessible network exploration software on the market. It employs IP addresses to define all network-connected users as well as give details about the products and operating systems they operate. Example: Firewall.
Uncomplicated Firewall (UFW) is an application configured to operate a convenient to access net filter firewall.
Some of the features of Nmap are:
Some of the features of UFW are:
It is a technique for designing and introducing the multiple threats experienced by Express Print Services Pty Ltd. Along with limiting the threats to the network.
Koduah, Skouby, and Tadayoni (2017) analyze the classification of multiple inbuilt threats of the model that disclose IoT architecture and tools to numerous network security threats. They highlight unstable IoT devices (being a portable device, hardware, software, or firmware) and exploited by multiple threat entities through constructed channels.
Some of the threats of secure communication over the network are:
It is a "huge network of servers" in social interaction and digital world. Its target is to use the high processing power accessible from each malicious software computer to carry out unethical activities (Svoboda, & Lukas, 2019).
(Source: https://www.roboticstomorrow.com/article/2018/01/what-is-a-botnet/11266/)
A system and its internet service undergo DOS attack by loading a network with bytes and creating it complicated for authorized users to navigate the information of the overloaded site.
A distributed denial-of-service threat is equivalent to DOS but is more powerful. Because the threat arises from numerous distinct IP addresses instantly, the victim considers it much difficult to detect and recover against a DDOS attack.
There are numerous challenges that an intruder could use to extract delicate information from a person's multimedia files that they communicate on a public networking channel. The networking sites platform enables their clients to upload high-resolution images and clips. Moreover, progress in graphic detection methods, such as position detection, facial recognition, online searches, and barcode scanning, can raise the risks of fraudulent use of such things (Rathore, et al., 2017).
It can typically be characterized as uninvited mail that is distributed to the user through channels such as email provider, video chat, Messenger via an interface network.
The biggest threats are loading the inboxes with spam email, accessing a fake website, corrupting your machine using malware, loss of system control, failure of system efficiency, computer virus enlistment, or loss of personal or confidential information.
There are other multiple threats available in the network security such as ransom ware, phishing, sniffing, etc.
Here are a few of Linux's quite effective Nmap instructions:
It provides more extensive details about a specific server or a set of IP addresses.
nmap 192.168.0.1 192.168.0.2 192.168.0.3
Based about how many spots you have to investigate, it will search numerous sites simultaneously.
So, if you'd like to scan a hostname just overwrite the IP for the host, as you can find below:
nmap cloudflare.com
It will revert details on any active IP to your network.
It's among the essential services that Nmap provides and subsequently, there are several options to configure this command.
nmap -p 443 192.168.0.1
You can check for details regarding a particular port on a server with the "-p" symbol accompanied by a port.
The most popularly used commands are:
The UDP scan is very important for the given case study. It uses UDP packets to scan DNS, SNMP, and DHCP ports for identifying multiple attacks.
Firewall Setup
Configuring up a firewall for your system is a perfect approach to establish an essential security for the resources. Here are few mentioned commands for the same:
UFW state can be tested at any moment using this instruction:
To enable firewall, use this instruction:
You will get an alert saying the command may break established connection requests. We have already installed a firewall guideline that makes connectivity so continuing should be perfect. Reply back with y to the prompt, and press ENTER.
Whenever you decide to allow both HTTP and HTTPS traffic, a common code could be generated that enables certain ports.
This command is used to block all network connections originating from a specific IP address.
Working using Nmap with the varied command is quite complex and challenging; however, with right directions and implementations, overcoming such challenges is possible and effective. However, there is still a need for improvement is the areas where competency fell short. It has been comprehended that security of the network along with firewall setting can be used to minimize the threats to Express Print Services Pty Ltd.
Alnakhalny, Redhwan & Anbar, Mohammed & Manickam, Selvakumar & Alomari, Esraa. (2015). An intelligent ICMPv6 DDoS flooding-attack detection framework (V6IIDS) using back-propagation neural network. IETE Technical Review. 1. 10.1080/02564602.2015.1098576.
Koduah, S. T., Skouby, K. E., & Tadayoni, R. (2017). Cyber Security Threats to IoT Applications and Service Domains. Wireless Personal Communication, 95, 169-185. 10.1007/s11277-017-4434-6.
Rathore, S., Sharma, P. K., Loia, V., Jeong, Y. S., & Park, J. H. (2017). Social network security: Issues, challenges, threats, and solutions. Information Sciences, 421, 43-69. https://doi.org/10.1016/j.ins.2017.08.063
Remember, at the center of any academic work, lies clarity and evidence. Should you need further assistance, do look up to our Computer Science Assignment Help
1,212,718Orders
4.9/5Rating
5,063Experts
Turnitin Report
$10.00Proofreading and Editing
$9.00Per PageConsultation with Expert
$35.00Per HourLive Session 1-on-1
$40.00Per 30 min.Quality Check
$25.00Total
FreeGet
500 Words Free
on your assignment today
Get
500 Words Free
on your assignment today
Doing your Assignment with our resources is simple, take Expert assistance to ensure HD Grades. Here you Go....
Min Wordcount should be 2000 Min deadline should be 3 days Min Order Cost will be USD 10 User Type is All Users Coupon can use Multiple