You are on page 1of 64

Question 1 – B

For securing a network there are various requirements needs to be fulfilled. These network
security measures and parameters have been discussed below.
Network Security Parameters- The security parameters are in a network are very much essential
and in every organization, that has wide network with numerous number of devices. But firstly
the organizations need to effectively follow the networking standards and security policies. The
security parameter provides only authentication system within the network for keeping away the
unauthorized users of the network. For this purposes, in most of the cases Firewalls are very
much effective and widely used concept. The firewalls are the network security devices used for
eliminating the chances of unauthorized access to a organization’s privet network that is
connected between the Internet and the primary network devices. Firewalls helps to define
network clients by addressing their IP and default gateway and allow only the authorized traffic
in the network such as registered users within the firewall Policies and block other unauthorized
traffic/ users.
Encryption and digitally signature
The encryption is the process of securing any particular data packet through set of security codes.
At the time of opening the data packet the receiver needs to give exactly the same code given by
the sender. Therefore in case of encrypted data packet transferring process, the receiver needs to
have the accurate password for the opening the data packet. This also happens for email and
other data transferring process. Whereas the Digital signatures are very much effectives in
storing relevant users’ data in a organization previously. This in terns helps to reduce the risks of
external attacks. There are three different options for securing the email which is widely used in
almost every organization. These are implementation of “End-to-End encryption” (uses public
key in order to secure email and senders encrypts data packet or information). By using the
privet key receiver can check the message or data packet. Another method can be implemented is
the PGP and S/MIME method. The PGP is basically a software that’s objective is to receive or
send data packet with proper encryption.
Fault Tolerance
The Fault tolerance process in the network are used for defining the capability of the network to
be performed properly in case of any issues occurs in the network that can be failure of any
components. This process often describes as Redundancy of the network. In order to understand
simply, the fault tolerance can be achieved by making a network that has alternate devices for
performing the data transfer in a wide area networks. For this reason the network must have an
option for alternate power and different voltage controlling mechanisms.

Question2

Threat Impact Level Likelihood Risk Level

Malware Critical certain High

Unauthorized access Critical Almost Certain Extreme


from an external
source

Unauthorized access Critical Moderate High


from internal
Source

Blended Threat Extremely High Moderate Medium

Worm Very high Moderate High

Adware Low Almost certain Medium

Spyware High Likely High

Virus High Almost certain Medium

SPAM Low Almost certain Medium

Trojan Horse Very High Moderate Medium


Malicious Code High Moderate Medium

DoS Very High High High

DDOS Critical High Extreme

IP Spoofing Critical Certain High

Question3

Threat Defense

Blended threat
It has a huge use to protect the system from
viruses. There should not be any
unauthenticated way for a virus attack.

Worm Save the system to open unauthorized emails


and run. Create firewalls and antivirus
files

Unauthorized access from helped in MAC limiting and create IP source


internal device guard

Malware Made by big bang system made firewalls to


protect the information and create antivirus
walls

Unauthorized access from an Organize IDP setting in the system and create
external source firewalls
Adware It implements the solution of anti-malware and
disables the pop-up messages

SPAM Include anti-spamming features in the system

Virus Enhance the antivirus software in the system to


keep the information safe and also manages the
firewalls

Spyware It includes anti-spyware software and the


capability to preserve the anti-malware
packages

Trojan Horse Create antivirus software can be included by


removing some files

Malicious Code
The main function of that is the providence
process of statistical analysis with a white box
test.

IP Spoofing The network is required to be monitored


properly to check the presence of any intruder
and then the network firewall is activated to
protect the IP address.

DoS An appropriate threat managing system is


required to be developed by using antivirus,
VPN, effective firewalls, and several other
defending techniques.

DDoS Though it is a bit difficult to prevent it as the


attack comes from many sources. But if the
system is protected with complex security
techniques it can be prevented.

Question4

Internal zone: organizational Staff or departmental computers (Company LAN / Trust Network).

The concept of internal zone is related to different systems from the internal users of an
organization such as different computers from the internal departments of the system or other
systems of different company staff. The systems of internal zones are generally connected
through trust networks or LAN services within the system.

Internet/External Zone: the most trusted network which is internet (outside Company’s LAN)

The external zone comprises different systems from multiple external users of the industry.

Related external users can be vendors, consultants or other third party systems for the industry.
The external zone is based on internet connectivity and the systems are connected through a
strong internet connection. A proper maintenance of the external zone is crucial to protect the
system from other external threats.

DMZ zone: Demilitarized zone is a most popular sub network that connects physical or logical
sub networks which helps to enlarge the external and internal services of the organization. It also
maintains the services of the organization like Services like Web server, Mail Server and VoIP.

In context with internal and external connections an adequate maintenance process for the DMZ
zone presents a smooth platform for data flow without significant lags for the system.

• Inter zone policy objectives

Policy Name Action


Internet-to-web The policy includes http and http
traffics

Internet-to-mail Through this process the


organization can include SMTP
and POP3 traffic

Internet-to-VoIP It help to imply SIP traffic

Policy Name Action

web server-to-mail server It includes SMTP traffic

web server-to-VoIP server The process allows SIP traffic

VoIP server-to-mail server The policy provides SMTP traffic

VoIP server-to-web server The policy implies http and https


traffic

mail server-to-web server It provides http and https traffic

mail server-to-VoIP server The policy Allow SIP traffic

Internal-to-Web server It includes http and https traffic

Internal-to-Voip server It provides SIP traffic

Traffic allowed between the zones

Policy Name Action

Internet to Internal zone It rejects all traffic


Web server to Internal zone It provides all Traffic

Mail Server to Internal zone The policy includes all traffic

VoIP to Internal Zone The policy Allows all traffic

Internal zone to Internet The policy provides all traffic

Internal zone to Web server It implies all traffic

Internal zone to Mail server Provide all traffic

Internal zone to VoIP The policy Allows all traffic

Internet to DMZ The policy implies http, https, SMTP and

SIP

Internal zone to DMZ Provide all traffic

It implements all traffic


DMZ to internet

DMZ to Internal zone The policy provides all traffic

• Securing traffic from site to site

Based on study I will use different methods like firewalls security, authentication
security and encryption policies to save the information of the organization. Site to site
trafficking of security modules helps in website based data movements within the
system. The phenomenon of site to site data transfer is susceptible to many security
threats in terms of external attacks from malicious sites. The data becomes more
vulnerable when it flows through data traffic of different websites of the internet.
• Securing traffic from the public internet
For this purpose I will use VPN (Virtual private network) as I know that It creates an
encrypted system and saves the database. I will utilize VPN in order to share public
infrastructure through maintaining privacy in the organization and the system provides
tunneling protocols to the organization.
There are a few effective processes of data protection from public internet access.
Through the internet, a general public body can easily access sensitive company data. In
order to protect third parties to access sensitive data, companies can operate within a
virtual private network that is only accessible from the internal computers of the
industry.

Question5

Zone Dev Address Interf


ice Book ace
na
me

Trust vr1 172.20.106.0 fe-


06 /24 0/0/4.1
06

Web vr2 172.20.206.0 fe-


06 /24 0/0/4.2
06

Mail vr2 172.20.207.0 fe-


07 /24 0/0/4.2
07

UC vr2 172.20.208.0 fe-


08 /24 0/0/4.2
08

Untru vr1 172.20.105.0 fe-


sty 05 /24 0/0/3.0

vr2 172.20.215.
05 0/24

srx 172.18.1.0/3
C-1 0

interfaces { fe-0/0/0 { description "MGMT Interface

- DO NOT DELETE";

unit 0 { familyinet

{ address

10.10.40.66/24;

fe-0/0/3 { unit 0

{ familyinet { address

172.18.2.2/30;

}
}

fe-0/0/4 { vlan-tagging;

unit 106 { vlan-id 106;

familyinet { address

172.20.106.1/24;

unit 206 { vlan-id 206;

familyinet { address

172.20.206.1/24;

unit 207 { vlan-id

207; familyinet

{ address

172.20.207.1/24;

}
}

unit 208 { vlan-id 208;

familyinet { address

172.20.208.1/24;

} lo0

{ unit 0 { familyinet

{ address

192.168.2.1/32;

} routing-options { static { route

0.0.0.0/0 next-hop 172.18.2.1; route

10.0.0.0/8 { next-hop 10.10.40.1;

no-readvertise;

}
}

} security { policies { from-

zone Trust to-zone Trust

{ policyintrazone-Trust { match

{ source-address any;

destination-address any;

application any;

then

{ permit;

from-zone Web to-zone Web

{ policyintrazone-Web

{ match { source-address any;

destination-address any;

application any;
}

then

{ permit;

from-zone Mail to-zone Mail { policyintrazone-

Mail {

match { source-address

any; destination-

address any;

applicationjunos-ftp;

then

{ permit;

}
}

from-zone UC to-zone UC

{ policyintrazone-UC

{ match { source-address

any; destination-address

any; applicationjunos-ftp;

then

{ permit;

from-zone Trust to-zone Web {

policy Trust-to-Web { match

{ source-address vr106;

destination-address vr206;

application web-apps;

}
then

{ permit;

from-zone Trust to-zone Mail {

policy Trust-to-Mail { match

{ source-address vr106;

destination-address vr207;

application mail-apps;

then

{ permit;

from-zone Trust to-zone UC {

policy Trust-to-UC { match

{ source-address vr106;
destination-address vr208;

applicationuc-apps;

then { permit

from-zone Trust to-zone Untrust

{ policy deny-ftp-Trust { match

{ source-address any; destination-

address any; applicationjunos-ftp;

then

{ reject;

}
policy internet-Trust

{ match { source-

address vr106;

destination-address

any; application any;

then

{ permit;

from-zone Web to-zone Untrust {

policy internet-Web { match

{ source-address vr206;

destination-address any;

application any;
}

then

{ permit;

from-zone Mail to-zone Untrust {

policy internet-Mail { match

{ source-address vr207;

destination-address any;

application any;

then

{ permit;

}
}

from-zone UC to-zone Untrust {

policy internet-UC { match {

source-address vr208; destination-

address any; application any;

then

{ permit;

from-zoneUntrust to-zone Trust

{ policy VPN-Trust { match

{ source-address vr105;

destination-address vr106;

application internal-apps;
}

then {

permit; log

{ session-init;

session-close;

scheduler-name internal-apps-scheduler;

from-zoneUntrust to-zone Web

{ policyUntrust-to-Web { match

{ source-address any;

destination-address vr206;

application web-apps;

then {
permit ;

from-zoneUntrust to-zone Mail

{ policyUntrust-to-Mail { match

{ source-address any;

destination-address vr207;

application mail-apps;

then { permit

}
from-zoneUntrust to-zone UC { policyUntrust-to-UC { match { source-address any; destination-

address vr208; applicationuc-apps;

then { permit

zones { functional-zone

management { interfaces {

fe-0/0/0.0;

host-inbound-traffic {

system-services

{ ssh; telnet; ping;

traceroute; http;
snmp;

security-zone Trust { address-

book { address vr106

172.20.106.0/24;

interfaces {

fe-0/0/4.106;

security-zone Web { address-

book { address vr206

172.20.206.0/24;

}
interfaces {

fe-0/0/4.206;

security-zone Mail { address-

book { address vr207

172.20.207.0/24;

interfaces { fe-

0/0/4.207;

security-zone UC { address-

book { address vr208

172.20.208.0/24;

}
interfaces { fe-

0/0/4.208;

security-zoneuntrust { address-

book { address vr105

172.20.105.0/24; address vr205

172.20.205.0/24; address srxC-

1 172.18.1.0/30;

interfaces {

fe-0/0/3.0;

} applications { application

Juniper-gizmo
{ protocoludp; source-port

50000; destination-port

50001;

application-set internal-apps { application

Juniper-gizmo; applicationjunos-telnet;

applicationjunos-ping;

schedulers {

scheduler internal-apps-scheduler

{ daily { start-time 03:00:00 stop-time

23:00:00;

sunday exclude;

saturday exclude;

}
}

Question 6

The operating system that has been used in the research is Junos with high ability that provides
the huge failure in the entire research. The function ability of the system has been used in some
seasons like the TCP and the UDP seasons before is in that case both the networks helped in the
address translation of the current network and the IP security has been provided to the feature of
the organization that will help in the authentication of their network. The Junos implementation
has helped in the higher availability for the information that has helped in removing the activity
plan and the clusters. To provide the beautiful design the user has used the active and the passive
design as per the help and in order to underpin the signal point which is having the high
availability. And the user had thought in the project that the SRX service can be used in the
research and probably this is the best service network. The firewalls like the NAT, and the VPN
have managed the clusters and the capability of the system in order to control the passive and the
active devices.
With the use of this clustering, operating systems are gaining greater access to the security of
Junos. Some node redundancy is provided by the cluster system. And if any interface fails,
grouping inactivity is considered. And for one node of the system, the whole system fails. On
this current note all traffic reaches the link to a cluster system in any type of processing period.
And consider that this is a fault of the entire hardware system and consider because it is a failure
of the entire hardware system.
The SRX5800 is for services that have the same configuration of software, the other is the
MX240 router and the last one is the Ethernet switch which is the EX8208 (Dadheech et al.
2018). And the user has been managing the control ports and managing every device that assists
in device assignment and managing cluster IDs. Also the boot system is managed by clusters.
MySQL is used in the cloud platform to update the dataset of primary and secondary zone codes.
All data is stored primarily in the cloud-based platforms of some cloud-based applications.
Configuration of two node like node 0 and node 1 are required to connect two device of same
model. The dedicated control ports of the devices are connected with the node 0 and node 1
respectively. After connecting the two nodes of the device it is required to set the devices into the
cluster mode and after setting the devices into the cluster mode reboot of the devices are
required. This is the whole process of configuration of two nodes like node 0 and node 1.

Figure 1: Redundancy Diagram

(Source: draw.io)

Question7

Configure the port of each device, and commit the configuration. Select FPC 1/13 (slot 0). Place

the control ports on a separate SPC from the central point (slot 1)

• Set chassis cluster control-ports fpc 1 port 0 (on node 0)

• Set chassis cluster control-ports fpc 13 port 0 (on node 0)

• Set chassis cluster control-ports fpc 1 port 0 (on node 1)


• Set chassis cluster control-ports fpc 13 port 0 (on node 1)

Set the two devices to cluster mode.

• Set chassis cluster cluster-id 1 node 0 reboot

• Set chassis cluster cluster-id 1 node 1 reboot

The cluster ID is the same on both devices, but the node ID must be different because one device

is node 0 and the other device is node 1.

• set chassis cluster redundancy-group 0 node 0 priority 110

• set chassis cluster redundancy-group 0 node 1 priority 100

• set chassis cluster redundancy-group 1 node 0 priority 110

• set chassis cluster redundancy-group 1 node 1 priority 100

• set chassis cluster redundancy-group 1 preempt

• set chassis cluster redundancy-group 1 gratuitous-arp-count 4

• set chassis cluster control-link-recovery

Results.

From show configuration command.


groups { node0 { system { host-name

SRX58001; backup-router 10.3.5.254

destination 0.0.0.0/16;

interfaces {

fxp0 { unit

0 { familyinet

{ address

10.3.5.1/24;

} node1 { system { host-name

SRX58002; backup-router 10.3.5.254

destination 0.0.0.0/16;

interfaces {

fxp0 { unit

0 { familyinet
{ address

10.3.5.2/24;

} apply-groups "$

{node}"; system { root-

authentication {

encrypted-password "$ABC1234EFGH5678IJKL9101"; }

name-server {

4.2.2.2;

services { ssh {

root-login allow;

netconf { ssh;

web-management {
http { interface

fxp0.0;

} chassis { cluster

{ control-link-

recovery; reth-count

2; control-ports {

fpc 1 port 0;

fpc 13 port 0;

redundancy-group 0

{ node 0 priority 110;

node 1 priority 100;

redundancy-group 1

{ node 0 priority 110;

node 1 priority 100;

interface-monitor { xe–

6/0/0 weight 255; xe–


6/1/0 weight 255; xe–

18/0/0 weight 255; xe–

18/1/0 weight 255;

} interfaces { xe–6/0/0

{ gigether–options

{ redundant–parent

reth0; }

xe–6/1/0 { gigether–options

{ redundant–parent reth1;

xe–18/0/0 { gigether–options

{ redundant–parent reth0;

}
xe–18/1/0 { gigether–options

{ redundant–parent reth1;

} }

fab0 { fabric–

options { member–

interfaces { ge–

11/3/0;

} fab1

{ fabric–options

{ member–interfaces

{ ge–23/3/0;

} } reth0

{ redundant–ether–

options { redundancy–

group 1;

unit 0 { familyinet

{ address

1.1.1.1/24;
}

} } reth1

{ redundant–ether–

options { redundancy–

group 1;

unit 0 {

familyinet

{ address

2.2.2.1/24;

} routing–options {

static { route

0.0.0.0/0 { next–

hop 1.1.1.254;

route 2.0.0.0/8 { next–hop

2.2.2.254;

}
}

} security { zones

{ security–zone trust {

host–inbound–traffic {

system–services {

all;

interfaces {

reth0.0;

security–zoneuntrust

{ interfaces {

reth1.0;

policies { from–zone trust to–

zone untrust { policy 1 { match


{ source–address any;

destination–address any;

application any;

then

{ permit;

default–policy { deny–all;

Question 9:

In order to verify the VPN connection “Show security ikesa” can be used that will show all the
index, state initiator cookie, responder cookie mode and remote address.
“Show security ipsecsa” command can be used for viewing the total number of active tunnels.
In recent times science and technology have been improved very much. There are various kinds
of computing tools that have been discovered to increase the ease of doing different kinds of
work. Now here in doing various types of online work there is a huge chance of having
cybercrime like having hacked any kind of private and official data or money. Now all these
different kinds of difficulties can lead the company to have a loss of their business. So in doing
different kinds of official work through the help of the internet one of the most recent discoveries
is various kinds of VPN technologies. Now VPN is mainly known as a "virtual private network"
which means here in this survey one single company or a group of companies do their work of
sharing data and money very privately without opening that in the public. This makes the whole
process very secure and reduces the chance of hacking the data and money (Wang, X., Zhu, X.,
& Zhang, (2018))
IPSec is mainly known as the "internet protocol security". This is one of the most used VPN in
recent times. Here the main working formula of this process is it mainly connects selected two
computers with very high internet security systems with verified authentication and encryption.
Now here the main objective is this network helps to share various kinds of secret manages and
very important data and money protected ways without getting hacked by an unknown third
party. The IPSEC VPN traversed by the network traffic is encrypted using symmetric encryption.
Two different types of encryption
There are mainly two different types of encryption in all the various kinds of VPN systems. Now
here these are Asymmetric encryption and the other one is Symmetric encryption. Now the
difference between these two types of encryption is as follows:
Asymmetric encryption
This type of encryption is mainly worked by two different types of keys for the encryption and
the description process. Now different kinds of keys are used. For the encryption, the private
keys are used and for the decryption, the public keys are used. Generally, this type of encryption
process is very highly secured compared to the Symmetric types. But in various types of urgent
and secured secret work thus types of encryption are used. Generally, this is a very complicated
process compared to the other and here in general the length of the keys used is more than 2048
bits (Aljazaery, I., Alrikabi, H., & Aziz, 2020). In general, this type of encryption is mainly used
in sharing various types of small amounts and very highly secret data. So here at the first various
kinds of authentication are created in the communication channel and completed of the transfer
very securely. Generally, here the private key is not shared with many people, only a small
amount of people know about it, so here the whole process becomes very safe and secure
compared to Symmetric encryption. Here the most used algorithmic examples of this process are
ECC, RSA, Differ-Hellman, and so on.
Symmetric encryption
In this type of encryption, only one type of key is used for both the encrypt and the decrypt
process. Here this process is mainly used for the faster delivery of data and messages and money.
Compared to the Asymmetric process this process is not that safe but a very faster process. Now
here both of the processes are used in different kinds of situations. Generally, the lengths of the
keys which are used in this process are nearly 128 to 256 bits based on the variety of the
requirement of the security. Whenever various types of large amounts of data are needed to be
transferred this process is used. As in this process, the secret keys are shared repeatedly to the
various kinds of people so here the whole risk factor increases and it becomes a very highly
risked process compared to the Asymmetric encryption. This process is mainly used in the
algorithms RC4, AES, DES, etc (Kusuma et al. 2017).
Although both processes are very different and used in different principles and different types of
cost and uses, still both of the processes are highly used and used in various kinds of situations.
Sometimes this process is used altogether and sometimes they are used one at a time. Generally
in the devices like WhatsApp and the other massaging devices both the two types of encryption
is used mainly to make is secure and also make it available to visible to all the people all together
while in different types of works of secret agencies only the Asymmetric process is used and in
the websites where there is a very low chance of hacking the major objective to make it visible to
most of the people and it is very important to share the most amounts of data as soon as possible
there only the Symmetric process is used.

In the encryption method, there is a certain process of checking that is called the transverse then
is checking process. Similar sites of advantages are generated through the VPN method of
analysis where the US free models and the encryption models have generated in phase 2 method
of analysis to maintain a certain force that VPN can be organized under the to request after one
future return process of analysis. There should be a systematic process of verification and also
there should be a certain amount of available letter of system attributes for all the network-based
project management and their fundamental proceedings are denoted to a certain point of the
determination of the welding process and also the verify June security Management process also
there to generate the face to system line (Abdullah et al. 2018). After the entering parts in a
network, the packages are generated through a fundamental current meeting system generation
where the first in production and the checking package methodology are developed through its
final view and the observation in malware to be idealized under the current packet system
methodology with a total upbringing of final analysis and their food production and way to
support the method to emphasize the organizational corporation of transfer control protocol and
also encryption method. The process of encoding the unrealistic messages and their system
advanced method of assembling receiving process generation is called the encryption process,
basically a network graphics system analysis generalized to a particular method to increase the
variation of security fundamental management and the ongoing up being used towards it. All the
process-based system partners are manufactured through a particular will generating method that
the encrypted possibilities are generated to a particular development by a consolation of random
cyber Hacking system with a random complex number of production. Encryption processes are
generally organized to a particular set of variants, their total fundamental organization and the
modern scientific set of systems are generalized to the particular method that compromise under
a systematic advancing Technology-based system analysis throughout its presenting parts is
generally in the organizational capability of this interaction (Zhang, 2018).

In the process of this t encryption system, the system given analysis is developed to generate
every bit software system interface. The main system is being produced under a phase of
software system analysis in a very highly generative computer-based programming model
compiler.

juniper@SRX5800>show security policies

Default policy: deny-all

From zone: trust, To zone: trust

Policy: default-permit, State: enabled, Index: 4, Sequence number: 1

Source addresses: any

Destination addresses: any

Applications: any

Action: permit
From zone: trust, To zone: Internet

Policy: default-permit, State: enabled, Index: 5, Sequence number: 1

Source addresses: any

Destination addresses: any

Applications: any

Action: permit

Policy: protect_inside_users, State: enabled, Index: 7, Sequence number: 2

Source addresses: inside-users

Destination addresses: bad_hosts

Applications: any

Action: deny

From zone: Internet, To zone: trust

Policy: default-deny, State: enabled, Index: 6, Sequence number: 1

Source addresses: any

Destination addresses: any

Applications: any

Action: deny

juniper@SRX5800>show security policies detail


Default policy: deny-all

Policy: default-permit, action-type: permit, State: enabled, Index: 4

Sequence number: 1

From zone: trust, To zone: trust

Source addresses:

any: 0.0.0.0/0

Destination addresses:

any: 0.0.0.0/0

Application: any

IP protocol: 0, ALG: 0, Inactivity timeout: 0

Source port range: [0-0]

Destination port range: [0-0]

Policy: default-permit, action-type: permit, State: enabled, Index: 5

Sequence number: 1

From zone: trust, To zone: Internet

Source addresses:

any: 0.0.0.0/0

Destination addresses:

any: 0.0.0.0/0
Application: any

IP protocol: 0, ALG: 0, Inactivity timeout: 0

Source port range: [0-0]

Destination port range: [0-0]

Question 10

Email encryption is one of the most useful and most valuable parts of the company's data
security management. This process can be used in various encryption methods due to some
extent it is the most advanced AI policy that the company must take to ensure the company's
privacy policy and its effectiveness towards the beneficiary system of the technology-based
operation. Produce software implementation through some particular and extension of methods
that system can be produced and organized throughout the whole organizational compilation. In
this particular research study PGP, email encryption process can be used In the ongoing
Technology-based system finding machines (Leszczyna, (2018)). The data in the database are
encrypted with the particular point of approach where the user can be dependent on the particular
PGP operation for all the factors that need to be contributed. In modern scientific Technology
PGP is one of the most advanced and important email configuration and email encryption
processes. It is invented to denote the main factorial parameter that can be used by the overall
address and permanent advancing of scientific functional approach and towards is a next-
generation system process and Outsourcing towards Software balancing method of technology.
Email can be Set by the next target system operation. The email processing function will be used
by the higher grade System Management process and by invented by the top software
development tool is the measure that can be contributed towards the security encryption process.
There are several parameters to denote the main factor: dual advancement for all the emails
regarding the users and the organization can be supported towards the beneficiary process of
development. A final enlisted process can have the same Outlook with all the factors equal to the
same interface and the organization capability can be used in terms of generating system function
with the PGP encryption model. PGP encryption processes for all their factorial determination
can have the same Outlook towards its view regarding every factorial process in terms of a
compilation through software methods.
GnuPG is a standard for encryption that can be utilized by the company for encrypting and
decrypting emails or text messages. If the file or data transmitted is encrypted using a key then
the receiver will only one who can encrypt the file by using his public key. GnuPG or “Gnu
Privacy Guard” is nearly impossible to hack in reality. Thus it is used by the company to encrypt
the valuable information so that it can only be accessed by the specific receivers. The security
and the safety of GnuPG depend on the strength of the passwords used for accessing it.

S/MIME is basically a standard for encrypting public keys in order to sign the data regarding
MIME for security purposes. It is used for verification regarding the email sender. The
operations regarding S/MIME depend on the asymmetric type encryption process. It works in a
certain manner like there are the keys present for encrypting and decrypting purposes. The
sender while sending an email encrypts it by utilizing the public key sent by the receiver. The
specific receiver then decrypts the sent email by utilizing the private key provided by the sender.
Features of GnuPG or S/MIME
● It permits to encrypt as well as sign the specific information and communication.
● It has a very flexible key managing system and allows the modules for the directories of
various public keys.
● GnuPG supports S/MIME.
● S/MIME helps in maintaining the security of the emails by authenticating, encrypting,
and integrating messages.
● It also ensures that both the sender of the email is legal and thus encrypts both the sent
and received emails.
● In the case of S/MIME, the need for digital signature is necessary for validating the
identity of the sender and the messages are encrypted and decrypted by the public key.
Both GnuPG and S/MIME are capable of maintaining authentication and integrity with the use
of the "Command-Line Interface".
The encryption algorithms used are “ Diffie- Hellman”, “DSS” and “DES”.
Question 11

The process to maintain the integrity of Email can be assured by several algorithmic functions. It
is one of the most important and highly advanced full system technologies in software system
analysis. There are several digital communication processes where all the email encryption
processes can be elements into it by digital communication process. One of the most useful in
highly advanced technology where the fingerprint sensor module generation and also the face
detection process also can be developed into this (Tanwar et al. (2018)). In several processes of
security management techniques all these several factors can have the same Outlook Where the
engineering system technology and their software implementation are the same as the algorithm
in process of technology. In this particular integrity maintenance system the algorithm message
digest algorithm and Secure hash algorithm can be used. Message digests and treats them as a
cryptographic hash algorithm where the generation of network system mesh topology is under
the route details certificate of System administration accepted by the system accounting process
of management. Md5 algorithm has a higher chance of acceptance among the user verification
system and all the beneficiary Technology oriented software implementations can have the same
process where the interface will be as easy as the user can access the vulnerability according to
their system. The secure hash algorithm has a function where the method of cascade value and its
parameter have the same balancing method where the output value will be similar in the security
Agency basis of Technology oriented methods. In any type of organization there is a process of
security check in their software implementing the process of data source element so it is
important to maintain the security throughout the every software product elimination. In the
recent time all the organizational process is hampered due to every unsecured elemental data
passing out so it is important to maintain integrity of the process for all the sectional input can be
verified. Email encryption and maintenance of email security is on the biggest tape that every
company must take to protect their users from any type of unwanted hazards and unwanted
access in their system. Md5 and SHA algorithms can be used in all of this working process of
email encryption in email integrity maintenance.
Question 17

There are some factors that contribute to the encryption stain used factors can be explained as
private keys configuration scheme of the service system access system into it is a process of
software system elimination these are some few examples of the software in and contribute to the
encryption stain process. Private keys are dependent on the process of where all the system
factors and their ingredients are dependent on the ECC pauses and there are variations related to
the order system software encrypted methods had all the forces of software generating terms.
The private key can be idealized by the proper way of user credential and their elimination
process is also dependent upon the system verification and knowledge providing system
guidance of software system implementation. There are various ways where the private key
system functions with the ideal addition process of all the user requirements and their
personalized information must be encrypted and with this, they can get the benefit to secure their
data and their final security forces also have been in element by the overall system function
(Zhang et al. (2019)). RSA system access configuration can be provided at the certain part of the
encryption Regulation and their particular process of System administration depending on the
particular server system modulation where all the users can get access to the certain server where
to where it is encrypted and high-security providers access also can be depended upon three of
the process system allocation. There are various where all the file and system providers can be
managed and encrypted by the system function, the private keys, and the server configuration
system modulation of all the encrypted cryptographic systems. The modulation cannot access the
advantage system because all the factors are dependent upon all the needed software input
methodology and the implementation process is also similar by the overall access point of
implementation.
Two factors contributing to encryption strength are:

● The private key of the Digital Certificate

● Configuration of the Server

The strength of the encryption depends on the keys' size. The keys having a longer length
which is generally calculated in bits, provide more sturdy encryption. Various kinds of
ciphers need various lights of keys for obtaining the strength of encryption.

Question 18

When delivering an email, the originator looks for the recipient's public key. If no matching is
detected for the master password, the transmitter notifies the destination knowing the
communication would be sent unencrypted encryption. As a result, the confidentiality of the
message included was jeopardized. As a result, such issues could be resolved by completing the
methods outlined beneath:

● The essential actions must be taken in attempt to encrypted incoming emails: - Hardly

messages that have been electronically authenticated must be accessed by recipients.

● Because the correspondent is frequently unrecognized, appropriate on the recipient's

identity must be conducted to validate it.

● Because guarantee the confidentiality of the relationships saved for subsequent usage, the

Save connections checkbox must be chosen.

● As a result, if the recipient's information also isn't saved, a connection message would

display on the display.

● After that, it really should be updated and deleted. That will include the electronic

certificate for the particular recipient.


● If the correspondent is now in the relationships, the modal conversation would declare

that almost all identical correspondences have been erased.

● This polygon signatures could be utilized to solve the problem of secure communications.

When delivering a message, the originator looks again for recipient's public key. Unless nothing
compatibility was detected using such public key, this same transmitter notifies the destination
that perhaps the message should be sent unencrypted encryption.

Question 19

The category or some network attack that happens in a group. The projection of the network
actually tries to enervate by the attackers with some fraudulent measurements. And the reply of
the attack is some more counter attacks to get the control over the objects that are manipulated
and also in the attacked networks. And the security network is a threat in the object that is
manipulated.
In order to the reply attack a simple idea occurs in the program and the entities are based on the
system that actually forces the system to delay in the program (Wang et al. 2019). The external
sources are helped to do the counter attacks of the system and the system identifiers are lagged
by the response of the causing system that is unnecessary in the delays of the system.
The method that helps in the prevention:
The messages that are needed in the encryption in an appropriate process. And there are some
encrypted message keys. In the time of the message decoration the datas get the accessibility in
the recipient. And the attacker will not get into the decode key, but it will capture the elements
and the benefit and in the convenience.
The counter action that helps the receiver and the sender to make the random used season keys of
the code and the code will be unused from the next time.
1. In the prevention of the other methods it is implemented in different types of
implementation in the firewall that is helpful for the system and also helps the breakers
that are unwanted for the system. The system gets the help form the external breach
which is fully automated (Zhu et al. 2018). And besides the using of the firewall the users
are introduced by the full version of the anti-malware and the anti-spyware functions are
prevented from the external sources to connect with the server of the company.
2. In the purpose of preventing both the receiver and the sender from establishing the
session key, this type of code is only accessible for only one transaction. And it cannot be
used again.
The function to provide the timestamp the use of the function to return some specific date or
some value of the time and the data of the Timestamp. And it is having some formality to check
the first name and the last name and the year and the hour and the month from that particular
person (dl.acm.org, 2021).

Question 22

This same permission procedures could be considered as a method for identifying authorised
consumers at any and absolutist consumer beneficiaries and there own individual content
knowledge that could really be validated but also accused via an unique platform of advancement
assessment for every one of the substantiated procedure framework methodology that could
indeed be ascertained with account name passcode. The perimeter servers were integrated into
the existing application procedure. Just following computer has been authenticated in, customers
constantly attempt to execute instructions. The authorisation procedure merely checks to see if
the customer is authorised to do just that.
This same identification procedures was indeed defined as a technique by which those
corresponding input statistics are evaluated to something like a specific diameter database
technique, but still the ticketed component specifications could be made accessible via the with a
overall augmentation of this specific framework authenticated legislative power towards it
rejects the recipient approach (Lounis, (2018)). Verification is the practice of authenticating a
person prior providing permission by utilizing an accurate and relevant login as well as
passcodes.
The financial reporting procedures in the network device could be ascertained by an overall
discrete moment of period in which all framework authenticated components could have the
identical Viewpoint towards that and the individual component at the procedure structure
ascertained certification where access control could both be validated within such a.
Accountancy was utilized to calculate the amount of information or content sent or received by
the computer during a given encounter.
Question 23

IPSC is indeed an abbreviation for Secure Connections, which it refers to how each on that
internet backbone platforms' offered activities may be supplied with a high manufacturing
technique utilizing the networking comments as well as the geographical distances pressures
could be mucked up that degrees combat with the officials.
MPLS VPN order to further understand could be described as routing badge swapping secure
vpn scheme that those procedures seem to be qualified for numerous paragraph manner of
information as well as their going to interconnect components of the VPN were also splitted into
position range system of course at system of course corresponding of their position as well as
proximity initiatives of assessment of the infrastructure network as well as the private blockchain
can be validated with the all the procedure framework and the made manifest framework
interconnects toward this it (Beghin et al. (2017)).
The main differences between the two are that IP has that private access system address with the
IP address is verified by different.

VPN QoS Guaranteed Security


Bandwidth

MPLS VPN It supports QoS Multipoint. It has Encryption is not


high guaranteed needed during data
bandwidth compared transferring. It allows
to IPSEC VPN the security of voice
and video.

IPSEC VPN It does not support Multipoint and Point Tunnels used for data
QoS to Point. It has trafficking need to be
comparatively lower secured. This does
guaranteed not provide security
bandwidth. regarding video or
voice.
Question 25

Introduction
Sahil Singh
Executive manager
Spyon Technology
Adelaide Australia

Dear Mr. Singh,


Thank you for reviewing the proposal. I am the current employee of the organization and
working in the post of the associate software engineer. And also seeing the design of the
corporation in each sector. And having over ten years in the organization. And the network
models are desired in the development of the security of the organization. Hence I am sure this
model of network can serve the company and just maintaining the security is needed for the
current industry.
Sincerely
AVTAR BHANGRA
Associate software Engineer
company.pspyontechnology@yahoo.in
---------------------------------------------------------- Description:
As an engineer of the organization of the Spyon technology, I hereby like to take the proposal of
the presentation to make the business plan better. And also want to make the work plan better.
There are some new work plans that will help to increase the business and will help to make the
work plan better (Dadheech et al. 2018). Some new systems have been developed to make the
project heavier. And some new models have been presented in order to make the project more
relevant. Multiple software’s can be implemented with the current scenario of the plan. And that
will be simple to operate the different company staffs.
Business that is required to design the security system:
1. The communication among the employee and the third party will happen in the electronic
medium and the sign will be in the digital platform.
2. Each of the links that are connected in the WAN will be encrypted and will be more secured.
3. The security parameter will give the protection from unauthorized access and the data of the
company (iopscience.iop.org, 2021).
Security plan Implementation:
To archive the security parameter of the high accessed network and in some different types of
policies the procedures are incorporated and the VPN and the IP sections are individual. And
there are some individual objects that occur like the integrity of the message and the privacy and
some data security are available and the authentication and the non-repudiation of the origin.
There are some uses of the firewall of the security parameter. And the WAN links are secure and
encrypted (Carli et al. 2020). Also having protection against cyber security like the DOS the
DDOS and so on.

Cyber security is very essential regarding Spy as they are responsible for the manufacturing of
weapons for military services. Cybercrime is very common these days where the other enemy
countries try to hack into the network of this company in order to receive the entire information
about the manufacturing of the weapon. This can prove to be very harmful to the company and
for the government and people of several countries. Therefore network safety and security are
very necessary. Thus the network needs to be properly encrypted so that it can be less vulnerable
to cyber-attacks. The proper software is required to be utilized to develop this network so that it
can be used to identify if any cybercrime is suspected and prevent it from further damage. The
system developed needs to be inexpensive and effective at the same time so that the company
employees can successfully perform their security operations with the help of this system. The
basic requirements that are required to be done in order to get a secured network are that the data
related to weapon manufacturing and supply needs to be protected from hackers or other
intruders. Secondly strong antivirus or firewalls should be installed to protect the network from
malware or viruses which can be an adverse threat (Liu et al. 2021). And network connections
over which the data are transferred and received are required to be encrypted. As per the need of
the client, it is very essential to maintain the following factors to provide the client with the best-
secured network. Firstly all the WAN links need to be properly encrypted and thoroughly
secured. Secondly, all computer-based systems are required to be encrypted for protecting them
from any intruder. Thirdly, a security perimeter is required to secure sensitive information
regarding the company's weapon manufacturing processes. Next there is a need for digital
signatures for protecting the network from all kinds of cyberattacks like DDoS, DoS, etc.
Finally, all the essential points regarding the network design should be carefully taken into
account and should be ensured that no loopholes must be present in the network design.

Name of the Policy Action that needs to be taken

Internet-to-mail Make permission for the traffic of


SMTP, POP3, IMAP

Internet-to-VoIP Permit the traffic for SIP

Internet-to-web Give proper permission for


HTTPS and HTTP traffic

Policy Name Proper Action Taken

server from “web-to-mail” Permit for the SMTP traffic

server from “mail-to-web” server Permit HTTP and HTTP traffic

server for "Internal-to-VoIP" traffic that permits for SIP

the server connects "Internal-to-Web" Allow traffic for the HTTP and
HTTPS server (Gambi et al. 2018)
“web-to-VoIP” server Permit for the traffic of SIP

server connects “VoIP-to-web” Permits for the HTTPS and HTTP


traffic
server for “VoIP-to-mail” Make permission for the SMTP
traffic
“mail-to-VoIP” server connected Permits for the traffic server of SIP

Name of each policy Action taken

Internet to “Internal zone” Rejected all sorts of traffic

"Internal zone to the Internet" Grant all the servers of traffic

“Web to Internal zone” Make permits for all Traffic of the server

“Internal zone to Web server” Accept all sorts of traffic

Mail Server to “Internal zone” Make permission for every traffic

“Internal zone” to “Mail server” Permit all the server traffic

“VoIP to Internal Zone” Grant permission for all server traffic

“Internal zone to VoIP” Make authorization for all traffic

“Internet to DMZ” Make permission for HTTPS, HTTP, STP,


and SMTP
DMZ to internet Permit all traffic

“Internal zone to DMZ” Empower all kinds of traffic

“DMZ to Internal zone” Grant permission for all server traffic

There are some uses of the firewall of the security parameter. And the WAN links are secure and
encrypted (Carli et al. 2020). Also having protection against cyber security like the DOS the
DDOS and so on.
The inter zone objectives of the policy

Name of the Policy The Action

From the Internet-to the Allow the http and the https
web traffic

From the internet to the Allows the SMTP, IMAP, POP3


mail
traffic

From Internet-to-the VoIP Allow the SIP of traffic

Name of the Policy The Actions

mail server form the web server Allows the SMTP traffic

VoIP server from the web server Allows the SIP traffic

mail server from VoIP server Allows the SMTP traffic

web server from VoIP server Allow the http

web server from mail server Allow the http and traffic

VoIP server from mail server Allows the SIP traffic

Web server from internet Allows the http and the https traffic

VoIP server from internet Allows the SIP traffic


Phase Different week
sort of
Task
Make definition of the Objectives must be stated properly. 1
Client
Collect data in terms of needs and risks about 2
Resources or the needs
requirements and

Design Understanding the design requirements 3

Project Execution Installation of the cabling for security 4


access.
Installation for the system of CCTV 5
security.
There should be a system for the process of 6
backup.
6
Configuration of the antivirus and firewall
rules 7
Project evaluation Examine all the servers that are combined into
7
the system.
Scrutinize VLANs are on the “correct trunk”
8

Inspect the “balance” in the load


8

Survey about the redundancy of failover “on


8
the 2 firewalls”
Plan for the Week for
project executing
each task

1 2 3 4 5 6 7 8

Deployment of $5500
site maps and
the scheme of
IP network

Make $5400
Configuration
for the system
of switch
features and
Routing
Cabling for the $650
process of
Electricity

Cabling for the $550


Network system

Installation of $840
CCTV cameras
Configure the $7900
protocols for
the purpose of
Monitoring the
system

Insurance for $1220


each and every
Equipment

Cost of the $1400 $1400 $1400 $1400 $1400 $1400 $1400 $1400
Labour
Weekly total $2600 $2240 $6900 $6800 $2400 $10520 $1400 $1400

Total $34260
Figure: Logical Diagram of Spy on Technologies
(Source: Draw.io)
Traffic that are allowed in between the zones

Name of the Policy The Action

Internal zone from Internet Deny all the traffic

Internal zone from Web server Allow all the Traffic

Internal zone from Mail Server Allow all the traffic

Internal Zone from VoIP Allow all the traffic

Internet from Internal zone Allow all the traffic

Web server from Internal zone Allows all the traffic


Mail server from Internal zone Allows all the traffic

VoIP from Internal zone Allows all the traffic

DMZ from internet Allows http, and SMTP and SIP

Internal zone to DMZ Allows all the traffic

Internet from DMZ Allows all the traffic

Internal zone from DMZ Allows all the traffic

Simple Mail Transfer Protocol


Communication Process
The process of tampering with all productive SMTP protocols can be validated so as to disrupt
the particular cycle of evolution and have a verified address of a process in the particulate
system.Transfer protocol and their IP address spoofing as several systems that are called other
system that is called biometrics fitting and All the emails grouping all these processes are
verified by advocates are generated through a particular method that that developed throughout a
common interface and their variation of process system study and its analysis to out towards a
particular method to communicate with it. The communication process is developed under a
certain system that compromise wrote a particular aviation system that compromises with the
transfer protocol and system a verified advancing protocol for all of the mechanisms and their
perfectly produced study input method mechanism can be suppressed under the particular
combination of producing study system analysis through it.
Advantages
Personal records and Internet protocols are accessible to outsiders when they are on a mission to
set up the entire network management and analysis mesh topology verification process.Physical
layer portions of the network can be hampered under the unauthorized attack in recent years it
has shown in various ways (Shen et al. 2018). The personal records and internet protocols are
accessed by the outsider when they are on the mission to be compiled throughout the network
management and mesh topology verification process of analysis. The network designed can be
very beneficial for maintaining the security and confidentiality of the information regarding the
weapon manufacturing processes. It can very advantageous for securing the sensitive information
from cyber-attacks. The information regarding the weapon manufacturing process is highly
confidential and should not reach in wrong hand. It otherwise can be misused by the possible
enemies which can be very harmful for the country. So it’s the responsibility of the company to
develop this network so as to develop their business and protect their country from any kind of
harm.
Hardware and Software system analysis
Mesh topology functions
Functional presence can be created in a developed sectional way where key functional strategies
can be uniform within the sectional phase of software module development.The wide area
network is a configuration process that can be produced to intercept the ongoing system
providence to generate the hypertext transfer protocol within it. The fundamental proceedings
are created in a hardware function to be implemented towards a certain era that communicates
between the two mesh topology functions. The functional presence can be generated through a
produced sectional way where the main functional strategy can be similar in its sectional era of
software module upbringings within it. The various security management procedures are created
under an open interface that could cover up every security measurement of the centralized
communication network.
Internet Protocol
Every part of the network and the associated system are connected during the specific process of
internet assignment but all the packet related data is transferred between the processes of arrival
of the required system function.IP is a process for rules in routing and addressing the packet data
formation can be explained as the internet protocol system. There are various ways to reduce this
particular internet protocol system like smaller pieces, larger pieces, and cal packet system and
analysis. Each and every portion and related systems of the network are connected throughout
the particular process of internet assignment but all the packet-related data are transferred
between the arrival processes of the system needed function. In this regard, there is a certain
point called centralized system network where the zip code is provided by the users and the
admin site gives all the documents and important related process system analysis towards it.
Router configuration
Transmission Control Protocol
The domain name system has a unique function where human readable domain names add
transfers to the IP address when users are able to access each destination and the productivity of
packet processing can be created within it. Can Include generated methods are run through a
specific IP address system function where the system authentication process is generated by the
hidden length and packet live system activity.Particular network systems at risk methodology
have the standardization format word; all the agreed protocol return addresses can be generated
through a particular process of domain name system methodology. The Domain name system has
a unique function where the human-readable domain names add transfer into IP address when the
users are able to access every bit of national destination and the packet processing productivity
also can be produced within this. Add generated methods are operated through a particular IP
address system function where the system verification process is generated through a hidden
length and packet live system activity. Applications are generated through a particular internet-
producing system methodology where the TCP IP protocol methods can access all the positive
producing functions of the network.
Web region process
This process of computer vision is also called the method of sending an ICMP request where the
request for access to a private system of data can be verified through a special function of the
function and a common trend of all attack system production analysis. Are born under Special
network management process.The certain system attacks which are called us and did you a
systematic but all the network service management are targeted by the particular system function
where the internet of traffic cannot be managed properties. Basically, this attack belongs to a
process of disruption by sending misc system traffic from a single machine with a system
producing a computer vision process. This computer vision process is also called the ICMP
process of request sending method where the request of accessing the private system of data can
be verified through a particular process of producing function and all the attacks are generated
under a common phenomenon of system production analysis throughout a particular network
management process (Garoffolo, Kaidalov, & Oliynykov, 2020).
VoIP region system process
IP spoofing
There is also a special process for system authentication called IP spoofing. The main strengths
of IP spoofing are the development of packet control internet protocols for all internal system
malfunctions that are developed under the general trend based on the topics where the targeted
device has a particular file sectional forgotten system procedures. Basically, all of these are
produced on a low scale to let acquired application level based on the waste model of techniques
in this regard both hardware and software process used to analyze the actual process of the
system making analysis by their enhancement system technologically Variants. There is also a
particular work process for the system verification is called IP spoofing. fundamental forces of
IP spoofing is to generate the packet Control internet protocol for all the internal system error
that is developed under the common phenomenon based on the topics where the targeted device
is generated through a particular file sectional way with forgotten system methodology analysis.
In this figure, this portion of shooting can be verified by a particular did you system attacks that
the all over producing a generation and their attention to all forces are accessed throughout their
reading and read-write memory system allocation to verify the matter of network.
Peer to Peer network
It can be generated through the Internet layer through a peer-to-peer network transformation
process, and the advantages of the IP address and link layer production system depend on certain
forces where the protocol suite is relevant for the ongoing transmission of Internet layer data.
Meanwhile, the physical layer of currency and network management.
Internet protocol developed under some network topology and some data flow system
mechanics. All the transfer protocols are presented under encapsulation. Very high graded
transfer protocol in the selection protocol can be used under obstruction of protocols and service
system management; the encapsulated season is generally aligned with the Divisional way where
the shoot system functionality can be addressed through the application network. This can be
generated under Peer to Peer network transformation process via the internet layer and the IP
address and link-layer producing system advantages are dependent upon certain forces where the
protocol Suite is relatable towards the ongoing transmission of internet layer datagram’s
following the link-layer posture and network management physical layer throughout it (Chartrain
et al. 2017).
Domain name system allocation process
Domain name system
An inspection of a data tax system affected by bandwidth routing and applications can be created
for the development purpose of software system implementation and procedures. A modern
special layer of comparison between OSI models of system advantages can be developed under a
common element where the best topology and marriage system method lining process particle
and system analysis and methodology detected can go.The DNS has a huge role in sending data
from the source network destination network resource network process are generated with the
internet control message protocol and also with the internet group management protocol where
the 128 bit at this system production are generated through a particular appointed producing
factors and their networking system analysis throughout the transportation layer. Multihoming
system support is a process of system support where the connections can be represented by the
particulate high-level data link control procedure. The variation of studies system import a
generalized particular file transfer protocol system-wide the simple mail transfer also using
general with ZIP is supported protocols. The bandwidth routing and also the application affected
data tax system inspection can be generated by the software system implementation and
development purpose of methodology. A modern particular layer of comparison between the OSI
model of system advantages can be developed under a common factor where the best topology
and the lining process of wedding system methodology can be detected through the particle and
method of system analysis and producing system generating function.
Cybersecurity
Cybersecurity is a process that detects the computer system mechanism from unlawful acts and
unlawful access from outside. There are various ways that can be compromised with the and
system burner liberty and process making system approaches can develop Undertaker and
security flaws and identify where the ongoing system exposure and their management can be
produced under a particular cyber in system attack damage equipment Technology.
Conclusion
The final process of my assessment is developed under the proper rule of internet control
protocol. All the sectional ways are explained by us in detail. The verified network analysis is
driven to enroll the fact-based system function to be established. Our main goal for the study is
to achieve an overall generating transformation under a rules-based process analysis in cyber
security performances.

You might also like