28
NCC Education NETWORK SECURITY AND CRYPTOGRAPHY Nursing Home for Old People PRESENTED BY AUNG PYAE MCC TRAINING INSTITUTE, MANDALAY CAMPUS (ID - 00148187)

Network Security and Cryptography (Sept 2015)

Embed Size (px)

Citation preview

NCC Education

NETWORK SECURITY

AND CRYPTOGRAPHY

Nursing Home for Old People

PRESENTED BY AUNG PYAE

MCC TRAINING INSTITUTE, MANDALAY CAMPUS

(ID - 00148187)

AUNG PYAE NETWORK SECURITY AND CRYPTOGRAPHY

PAGE - 1

NCC Education

Level (5) Diploma in Computing

Network Security and Cryptography

Module Title Network Security and Cryptography

Assignment Title Nursing Home for Old People

Candidate name AUNG PYAE

Candidate no 00148187

Exam cycle September 2015

Word count

Marker’s Comments

Moderator’s Comments

Marks

Moderated Marks

Final Marks

AUNG PYAE NETWORK SECURITY AND CRYPTOGRAPHY

PAGE - 2

STATEMENT AND CONFIRMATION OF OWN WORK

Programmed qualification name: Level (5) Diploma in Computing

Name: Network Security and Cryptography

Each NCC Education assessed assignment submitted by you must have this statement

attached to the assignment as the cover page or it will not be accepted for making. Please

ensure that this statement is either firmly attached to the cover of the assignment or

electronically inserted NUMBER the front of the assignment.

All submitted work must have this form as the cover / first page. Please include this form as

part of a standard format when submitting an assignment.

STUDENT DECALARATION

I have read and understood NCC Education’s policy and Academic Dishonesty and

Plagiarism. I can confirm the following details;

Student ID 00148187

Name AUNG PYAE

Centre Name MCC Training Institute (Mandalay Campus), Myanmar

Module name NETWORK SECURITY AND CRYPTOGRAPHY

Title of work Nursing Home for Old People

Module leader Dr. Htet Ne Oo

Number of words

I can confirm that is my own work that I have not plagiarized any part of it. I have also noted

the grading criteria and pass mark for assignment.

Due date

Student signature AP

Submitted date

AUNG PYAE NETWORK SECURITY AND CRYPTOGRAPHY

PAGE - 3

Table of contents

Network Security and Cryptography Table of contents .................................................................................................................................... 3

INTRODUCTION ................................................................................................................................. 4

ACKNOWLEDGEMENT .................................................................................................................... 5

TASK 3 A ............................................................................................................................................... 6

Data protection issues in a care home environment .................................................................. 6

The Data Protection Plans for Nursing Home .............................................................................. 8

Alternative Methods that could be used...................................................................................... 14

TASK 3 B ............................................................................................................................................. 16

An Explanation for the User Authentication Methods ............................................................... 16

Other User Authentication Methods ............................................................................................ 18

Methods Planned to Ensure Privacy and Security .................................................................... 20

Rejected Methods .......................................................................................................................... 21

How to Monitor Security Vulnerabilities and How to Remove These Vulnerabilities ........... 22

TASK 3 C ............................................................................................................................................. 24

Reflective Commentary ................................................................................................................. 24

TASK 3 D ............................................................................................................................................. 25

Summary Report ............................................................................................................................ 25

CONCLUSION ................................................................................................................................... 26

REFERENCES .................................................................................................................................... 27

Network Security and Cryptography presented by Aung Pyae (September 2015)

♦ ♦ ♦ ♦ ♦ ♦ ♦

AUNG PYAE NETWORK SECURITY AND CRYPTOGRAPHY

PAGE - 4

INTRODUCTION

Hello!

My name is Aung Pyae and I study business information technology from NCC Education

Level 5 Diploma in computing course at MCC Training Institute, Mandalay Campus in

Myanmar. I am attending this computer course because information technology (IT) is

essential today and most of business process use computerized systems. As I am interest in

IT and I want to improve my knowledge and creation skills, I attended to MCC Training

Institute (Mandalay Campus) since 2013. MCC Training Institute (Myanmar) is recognized by

NCC Education and University of Greenwich in UK. So I am attending this course which is

offered by NCC Education Center.

There are FOUR main subjects in our First Semester course;

Network Security and Cryptography

Information Systems Analysis

Analysis, Design and Implementation

Dynamic websites

The first two are Global subjects and the other two are local subjects. This assignment is

aimed for the Global subject, Network Security and Cryptography.

The Subject, Network Security and Cryptography is about all techniques of computer system

and network in IT technology. The subject includes the most common types of cryptographic

algorithms and algorithms for a particular purpose. It also includes Access Controls,

Firewalls, VPN, Remote Access and Wireless Security. Network security provides with the

theory knowledge and practical skills require to create secure network and to send the data

safely and securely all over the internet.

The subject include all technologies to create a secure network. It is designed to create with

the knowledge form fundamental principles and techniques in securing information and

networks. Also gives the techniques to allow access for security risks and inherent computer

networks and the technologies to counter the risks. It covers with cryptographic algorithms

from mathematical point of view, including practical examples of breaking codes.

Once we have of knowledge of different algorithm types, cryptographic protocols are

introduced for accomplishing a varied set of tasks, including authentication, secure message

exchange, digital signatures, etc. Other aspects of networks are then dealt with, such as

access control devices, firewalls, VPN, NAT, malware, vulnerability assessment, Intrusion

Detection Systems (IDS) and etc.

From this subject, we learn all logic structures and authentication, multifactor authentication,

biometric and mathematical calculations. I’m so enjoying in doing of this network tests and

plans for this assignment and enjoy of finding the some references on internet.

AUNG PYAE

(MCC TRAINING INSTITUTE, MANDALAY CAMPUS)

♦ ♦ ♦ ♦ ♦ ♦ ♦

AUNG PYAE NETWORK SECURITY AND CRYPTOGRAPHY

PAGE - 5

ACKNOWLEDGEMENT

The knowledge is most valuable prize of world and the teacher who gives this knowledge are

also valuable and grand persons. When I arrived in MCC (Myanmar Computer Company

Limited) Training Institute, everything was difficult for me and I learned many subjects about

computer and information technology. Some are easy but some are difficult. There are many

teachers and officers in our school. The teacher who teaches our subjects teaches me kindly.

I thank our teachers with best wishes.

This global subject is very important for me because we cannot reach the third year without

passing this subjects. So I need to study hard and practice for tasks and topics. This

assignment is done under the guidance of our NSC teacher, Dr. Htet Ne Oo. I great thank to

my teacher and all other teachers in our Level 5 subjects and they give me some great

advices and logical thinking. I also thank to our class tutor, Daw Zin Thandar. She gives me

strength for my mind and teach us to become well professional technicians.

Next, I thank to my friends who help me in solving the difficulties of this assignemt and help

to become a complete assignment. They also help to complete and add some knowledge for

this assignment and give more useful advices. I also thank my MCC Training Institute, NCC

Education and University of Greenwich. I can study BIT course because of them. Finally, I

also thank all the teachers and friends who help me to finish and to become a complete

assignment.

I great thank to MCC and NCC since it services me to get more ways for my living and guide

me to become professional IT technician.

AUNG PYAE

(MCC TRAINING INSTITUTE, MANDALAY CAMPUS)

♦ ♦ ♦ ♦ ♦ ♦ ♦

AUNG PYAE NETWORK SECURITY AND CRYPTOGRAPHY

PAGE - 6

TASK 3 A

Data protection issues in a care home environment

Every network is at risk from unauthorized users gaining access to data stored and

transmitted on that network. The network system form Nursing Home may be have some

risks and network problems with data security and data protection. As the care home uses

computerized system, the personal data for each old person are important to secure. Their

some important data such as what person need to take what type of medicine, what person

need to take what kind of activities, food, physical activities. So the personal data need to

secure and data protection systems are need.

The Hackers from outside may try to access the data from care home system and they can

hack the system with active attack and passive attack systems. If they edit or modify they

important personal data of user database, taking wrong type of medicine or time can lead to

some body false and even dead. So, data protection is important and the internet service

used by the old people in care home are also need to be protected with administrator

permissions. To secure the data and other security cases, network system in care home

need to be protected with security and data protection systems such as user authentication,

CIA Triad, backup systems, VPN, Antivirus Software, data encryption and decryption system,

staff training and cryptography fundamentals.

Preventing from unauthorized access are need in care home system. The methods for data

protection give the best protection against unauthorized users. There need to create a plan

and this includes to divide the security case as Administrator and Staff with key

responsibilities, policies for system use and control the internet access of old people with

administrator permissions. Staff training for data protection such as software, hardware are

need and use the policies.

Data system need to prevent from security attacks such as passive attacks and active

attacks. Passive attacks cannot affect the system resources but active attacks can affect the

affect the data in database system. Personal data in care home are important and all are

private information.

For data, a collection of mathematical techniques for protecting this information

(Cryptography) is need to data protection. The most important cryptography techniques are

Symmetric Encryption that encrypt/decrypt the message using the same key and

AUNG PYAE NETWORK SECURITY AND CRYPTOGRAPHY

PAGE - 7

Asymmetric Encryption that used one key for encryption (public key) and another for

decryption (private key).

Authentication s require for old people in care home system. User authentication is the first

line of defense of a network and it prevent unauthorized access to a network. User

authentication is the basic setting access controls and used to provide user accountability.

CIA Traid is the requirements, confidentiality, integrity and availability. There are many

critiques that suggest that is not provide a complete security requirements. Two commonly

cited extra requirements are Authenticity and Accountability.

There are many packages that allow for automated backup for data. Enterprise databases

include back up facilities as part of DBMS. To protect data of care home, backup system

need to take for data safe and stored securely at offline.

The private network in care home uses public telecommunication, such as internet, instead

of lead lines to communicate. Virtual Private Network (VPN) is remote network

communication and used to comprise who want to communicate confidentially. There are

two parts, inside and outside network.

Staff will need to train the program of system. First, they need to learn the program of the

whole care home system and after training the staff, they use the program of system.

Antivirus software are essential for computers and networks in Old Nursing care home

system. Virus can enter from various places such as memory sticks, email, SD card and

other spam mails from internet. Trojan, worms and spyware can enter from network and

affect the computer and network system. So antivirus software are essential for computers in

care home need to update the virus database when a new code or virus is appear on the

network.

The vulnerability scanner are important because they scan and test the system and network

for weakness. In Nursing Home system, ports, networks, databases and computers need to

be scanned by vulnerability scanner for data protection.

In network security, Firewall is the first line of defense for the network. Common types of

firewalls are Software firewalls and Hardware firewalls. In nursing care home hardware

firewalls are used in routers, switch, server and software firewalls are used in computers and

electronic devices.

AUNG PYAE NETWORK SECURITY AND CRYPTOGRAPHY

PAGE - 8

The Data Protection Plans for Nursing Home

The data protection plans are need to secure storage and transmission of data. In care

home, personal and medical records, transmitted data between care home and government

medical centers are need to secure. They need to protect with powerful data protection plans.

The data protection plans in Nursing Home are;

Virus Protection

Virus are very sophisticated and often appear to be harmless correspondence. Virus are

malicious programs that attacks the computers and networks. Most viruses require recipients

to download attachments to spread. Some virus destroy the system and other steal the

information and send to hackers. To protect from virus, computers and devices of care home

need to install the antivirus software. The most popular antivirus software are Kaspersky,

Microsoft Security Essentials, Norton AVG antivirus and Mac Fee antivirus. All computers

and devices need to protect from virus by using this antivirus software. New virus definitions

and types are occur every day and also new virus protection definitions are updated every

day. So computers and devices keep the antivirus up to date.

To protect spam from email, email system in care home need to use key words and phrases,

use format size, or ration of graphics to text, delete the spam mail and also block the spam

mail addresses.

AUNG PYAE NETWORK SECURITY AND CRYPTOGRAPHY

PAGE - 9

Firewall

Firewall is essential need for computer network and it is the first defense of the network.

Firewall is usually placed at the perimeter of network to act as a gatekeeper for incoming

and out coming data. In computers, firewall protects from internet threads by erecting a

virtual barrier between the Nursing Home network, computers and government medical

centers. In general, hardware firewalls are used in routers, access points and software

firewalls are used in computers and network devices. Firewall protects from virus, worms

and have a friendly user interface. Firewall have flexible configuration. Firewall is cheap,

flexible and have greater security.

Internet

ADSL modem

Phone Line

Firewall

Switch

Server

SwitchAccess Point

VPN Server

Virtual Private Networks (VPN)

Virtual Private Network (VPN) is a private network that uses a public telecommunication

instead of leased lines to communicate. The Nursing Home should use the VPN to comprise

the networks and control the network access. In care home network, two connections are

used, one to internet and other to VPN. VPN contains data, destination, and source

information and allow data to pass through the firewall. By using VPN in care home,

networks can prevent from unauthorized users from accessing the network, protect the data

from hackers, ensure that the data is being transported and ensuring that the data has not

been altered.

AUNG PYAE NETWORK SECURITY AND CRYPTOGRAPHY

PAGE - 10

Internet (VPN tunnel)

VPN device VPN device

Business

Remote user

Wi-Fi protected access (WPA)

In wireless access points for old people and staff of Nursing Home, WPA security is need to

secure data and to become a private network. Without WPA, everyone around the care

home environment can use the Internet from care home’s wireless access point. So WPA is

used to protect present and future wireless devices for authentication and encryption. WPA

implements most of the IEEE 802.11i standard and brought in as an improvement on Wired

Equivalent Privacy (WEP). WPA is more secure than WEP and it uses password keys to

access network and secure for Nursing Home’s authentication server for networks.

IP Security (IPsec)

IP Security provides security at the IP layer for other TCP/IP protocols and applications to

use. It provides the tools that devices on a TCP/IP network need in order to communicate

securely between care home and medical centers, hospitals. IPsec is an open standard

protocol suite and provides privacy and authentication services. IPsec has two modes of

operation, Transport Mode to encrypt data but not the header and Tunnel Mode for both data

and header. Each connection is a security association. By using IPsec, data and network in

Nursing Home have greater scalability, mobility, cost effective and prevent data from other

AUNG PYAE NETWORK SECURITY AND CRYPTOGRAPHY

PAGE - 11

networks or sites. IPsec is not only transparent to applications but also transparent to end

users. It can provide security for users and networks of Nursing Home.

Protected networkMalware, Vulnerabilities

Exploits

SecurityInternet

External network

Database server

Server

AUNG PYAE NETWORK SECURITY AND CRYPTOGRAPHY

PAGE - 12

Backup and Recovery

For user data and other important data such as medical records, system private information,

data backup plan is need for protection. Data can be lost by many cases such as hackers,

viruses, system errors and hardware errors. So the system of care home needs to apply the

backup system every week or month and restore the backup data when the system devices

are in errors, virus or break down position. By using backup process, data are secure and

even lost, they can be easily restore.

Cryptography

Cryptography is the collection of mathematical techniques for protecting information. Data in

Nursing Home need to be secure and cryptography is need to protect data. The most

important techniques are encryption and decryption. Symmetric encryption (symmetric key

encryption) encrypt/decrypt the message using the same key but Asymmetric encryption

(asymmetric key encryption) uses one key for encryption (public key) and another key for

decryption (private key). The Nursing care home have advantages in sending message to

medical centers, government offices by using cryptography. The important information

messages are encrypt before sending to government medical centers and have high security

in sending way.

AUNG PYAE NETWORK SECURITY AND CRYPTOGRAPHY

PAGE - 13

Staff training

Staff will need to train the program of system. First staff will need to learn the program of

whole system and after training the staff, we start to use the program of system. The staff in

Nursing Home need training for process. Computers, servers, routers, web server and other

security systems need to be controlled by staff. Advantages of staff training are that staff can

get experience on job and system is more secure and protected with staff and protection

system.

AUNG PYAE NETWORK SECURITY AND CRYPTOGRAPHY

PAGE - 14

Alternative Methods that could be used

There methods are not used in data protection system of Nursing Care Home

Secure Socket Layer (SSL)

Secure Socket Layer (SSL) uses TCP to provide a reliable and secure end-to-end service. It

is not a single protocol but two layers of protocols. SSL encrypts data and each SSL

certificates uses public key encryption techniques. But for nursing care home system, SSL is

not compatible for some reasons. The extra security comes with extra processing overhead

and this overhead is largely at the server end. Means communications using SSL/TLS are a

slower than those without it.

Access Control List or Mechanisms

Access control list with respect to a computer file system is a list of permissions attached to

an object. The mechanisms can be set permissions for folders, sub-folders and individual

files. Access control list is used to set access permissions to group of network computers,

individual network computers and other machines on the network. In nursing care home,

computers are not individual and internet access is used by both old people and staff.

Access control list is not require for care home system and mechanisms require large

network and controls.

Disk Encryption

There are packages that allow the encryption of an entire disk. This locks the entire contents

of a disk drive or disk partition. Automatic encryption of data occurs when it is written to the

hard disk. A software or hardware is used to encrypt all data that is written to a disk or disk

volume. It prevents unauthorized access to data storage areas. The disk encryption system

is not used in care home because disk encryption encrypt the temporary files on disk and all

individual files in disk that are not require to encrypt are also automatically encrypted.

AUNG PYAE NETWORK SECURITY AND CRYPTOGRAPHY

PAGE - 15

Demilitarized Zones (DMZ)

A demilitarized zone (DMZ) is part of the internal network but separated from the rest of the

internal network. Data traffic moving between DMZ and other interfaces on the protected

side of the firewall still goes through the firewall. DMZ is commonly used in public servers

such as web servers and email servers. The disadvantages from DMZ are that DMZ is

difficult to hide internal structure, may have a single weak point in network and cost more

electricity power. So DMZ is rejected in data protection system of nursing home.

Password Protecting Documents

Many software applications allow the user to password protect individual documents.

(Example; Microsoft Office, Adobe Acrobat). They are usually not sufficient to deter serious

hackers and will protect from the casual snooper. As the care home system not commonly

use data on documents, the password protecting documents are not essential.

Peer-to-peer Networks

Peer-to-peer networks work in small networks. Every user acts as a network administrator

and security can be a major concern. Computers can be grouped into workgroups. Peer-to-

peer has disadvantages and not compatible with care home system. Security applied

resource by resource and PC performance is reduced when a shared network is accessed.

AUNG PYAE NETWORK SECURITY AND CRYPTOGRAPHY

PAGE - 16

TASK 3 B

An Explanation for the User Authentication Methods

Username and Password

Username and password are need to login for users and staff. They are the most common

means of authentication and require no special software. To enter servers and official

websites to Nursing Home, staff and admin need to login with their username and password.

By protecting with username and password, servers, computers, websites cannot be login

everyone. Only staff and admin can enter the important parts of systems such as servers,

websites, and data center.

Fingerprints

Fingerprints have ridges and valleys that are unique to that fingertip and this system has

been used by police for a long time. Fingerprint is the most common biometric method and

can be used with PCs, laptops and other electronic devices. This access the system with

touch technology. Today, many business centers keep fingerprints for staff and the nursing

home also should keep the fingerprint system for staff. By using fingerprint, managers can

easily know who is absent or not include in process, network or working place.

AUNG PYAE NETWORK SECURITY AND CRYPTOGRAPHY

PAGE - 17

Barcode Scanner

Barcode scans a square region and line up the scanner so the barcode is completely inside

the viewfinder rectangle. 1D barcodes are traditional barcodes such as those printed on

product packing. 2D barcodes are two dimensional barcodes, like QR codes and data matrix

codes. These codes are link to phone numbers, websites, email address, etc. The nursing

home needs for secret data information and link to private websites to transmit data.

AUNG PYAE NETWORK SECURITY AND CRYPTOGRAPHY

PAGE - 18

Other User Authentication Methods

These authentication methods are not include (reject) in the planned for methods.

Smartcards

Smartcards are tamper-resistant devices and they have a small amount of memory.

Smartcard has a small processor the card body is difficult to duplicate. They can be easily

transferable and can be used with PIN and password. Smartcards are commonly used in

ATM cards, credit cards, travel cards and pass cards. But Nursing Home does not need

smartcards because the system process of care home is not huge.

Face Recognition

Face recognition capture the facial image in the visible spectrum. Face recognition use a

standard camera, capture the central portion of face and avoid changing features, e.g. hair.

Face recognition system uses infra-red image of the heat emitted by a face. In nursing home,

face recognition is not used for some staff and security reasons, some problems can be

cause by lighting, masks, etc.

AUNG PYAE NETWORK SECURITY AND CRYPTOGRAPHY

PAGE - 19

Typing Patterns

Typing patterns are similar to the recognition of written signatures and uses a standard

keyboard. It recognize the typed password. And also recognize the way of the password is

typed such as intervals between characters and typing speed. This typing pattern is not used

in Nursing home because security system is poor and other person or hackers can be easily

enter to system.

AUNG PYAE NETWORK SECURITY AND CRYPTOGRAPHY

PAGE - 20

Methods Planned to Ensure Privacy and Security

Intrusion Detection System (IDS)

Intrusion Detection System (IDS) monitors network traffic for suspicious activity and alerts

the network administrator if suspicious activity is discovered. It may also respond to

suspicious traffic by blocking user from accessing the network and blocking the IP address

from accessing the network. There are different IDS types that use different methods to

detect suspicious activity. Network administrators and users in care home must understand

the alerts and know the most effective course of action upon receiving an alert.

WPA2

WPA2 is a new type of wireless security and creates a new session key with every

association. The encryption key for each client is unique and specifies to that client. Every

packet is encrypted with a unique key and never reusing keys is good security practice. The

internet user in care home have the access point password and they can be easily use the

internet access. Any person who doesn’t have the password key cannot use the internet

access of Nursing Care Home because the access points are protected with WPA2.

Screening Router

Usually deployed at the perimeter of the network and may be used to control access to a

Demilitarized Zone (DMZ). More often used in conjunction with other firewall technologies.

By screening router, networks in care home are more secure and the network system may

become a private network.

Firewall

Firewall is essential need for computer networks and software firewall which helps to prevent

the outside computer to control the user's computer. In broadband routers, hardware firewall

can be found as stand-alone products and used in packet filtering to check the header of a

packet’s destination and source. The networks of care home need to be prevented with

firewall for security and other protection reasons such as virus and hacckers.

AUNG PYAE NETWORK SECURITY AND CRYPTOGRAPHY

PAGE - 21

Rejected Methods

Wired Equivalent Privacy (WEP)

WEP is the first major attempt to make wireless networks as secure as wired networks. WEP

has been deprecated by IEEE as it does not meet its security goals nut it is still in widely use.

WEP uses encryption to protect data traffic and designed as an efficient and reasonably

strong security. WEP has weakness that are the packets can be replayed so that the access

point broadcast levels and WEP can be cracked in a few minutes with the right equipment.

WEP is not more secure than WPA and WPA2. So the WEP is rejected to plan for the

security system of Nursing Care Home.

Application Layer Firewall

Application Layer Firewalls can understand the traffic flowing through them and allow or

deny traffic based on the content. Host based firewalls designed to block objectionable Web

content and application layer firewall can inspect packets bound for an internal Web server

to ensure the request isn’t really an attack in disguise. The application layer firewalls are not

use in care home because they need to know how to handle data traffic to and from

applications and the application firewalls are generally much slower than packet-filtering or

packet-inspection firewalls.

Hash Function

Hash function is a mathematical function that covers a large, possibly variably sized amount

of data into small datum. Hashing is a method of binding the file contents together to ensure

integrity. The hash function is not used in Nursing Care Home for security reasons. Only by

the breaking the seal can the contents be accessed and any tampering is readily apparent in

hash function.

AUNG PYAE NETWORK SECURITY AND CRYPTOGRAPHY

PAGE - 22

How to Monitor Security Vulnerabilities and How to Remove These

Vulnerabilities

Vulnerability Scanner

Vulnerability scanner can be used in penetration test and it is a software that tests a system

or network for weakness. Different types of vulnerability scanners are available and ports,

networks, databases, web applications and computers are available for scanning. However,

because both administrators of care home and attackers can use the same tool for fixing or

exploiting a system, administrators and staff need to conduct a scan and fix problems before

an attacker can do the same scan and exploit any vulnerability found.

Port Scanner

Port scanner is software application designed to probes for open ports. It is used by network

administrators to test the network and also used by attackers to look for vulnerabilities.

There are 65536 different ports numbers available and most services use only a very limited

number of ports. Network administrators in care home need to scan the ports and fix if they

are in some security problem.

Untrained users

By entraining users, there can have some security problems in network system of care home

such as Wi-Fi passwords, server login passwords and have some software and hardware

errors because user are not understand the system.

AUNG PYAE NETWORK SECURITY AND CRYPTOGRAPHY

PAGE - 23

Virus

Virus are very sophisticated and often appear to be harmless correspondence. Most virus

require recipients to download attachments to spread. Some are programmed to run

automatically with no user action. Virus can enter the devices of Nursing care home network

with various methods. So antivirus software are needed to protect from virus. Antivirus

software prevents virus from attacking system. Antivirus software need to update their virus

database when a new code or virus appears in the network.

AUNG PYAE NETWORK SECURITY AND CRYPTOGRAPHY

PAGE - 24

TASK 3 C

Reflective Commentary

In Nursing Care Home system, many types of data protection plans and techniques are used

to create a secure data network. For the data protection plans, alternative methods and

authentication methods, many types of tools, software and techniques are used to prevent

from various attacks such as hackers and viruses.

First, to protect the data of care home, data protection issues such as CIA Traid, back and

restore, authentication, VPN, firewall and antivirus are used to protect the data. I designed

with the antivirus software, firewall, VPN, WPA, IPsec, backup, recovery, cryptography and

staff training for data protection of care home. In testing of networks security with scanners,

authentication and techniques, username and password, fingerprint, barcode scanner such

technologies are used for authentication. I designed to protect data with the above security

and authentication methods and I have success in testing of such security process in

practical.

From this assignment, I understand the techniques and data protection methods. With

practical skills, I tested the networks and send data safely over secure network

communication. I learned many network security and cryptography from this assignment and

get more knowledge and practice skills. I learned about data protection, methods and

techniques for protection, creating a secure network by using techniques, user

authentication, and most commonly used techniques to ensure privacy and security, email

security and cryptography fundamentals.

AUNG PYAE NETWORK SECURITY AND CRYPTOGRAPHY

PAGE - 25

TASK 3 D

Summary Report

The Subject, Network Security and Cryptography is about all techniques of computer system

and network in IT technology. The subject includes the most common types of cryptographic

algorithms and algorithms for a particular purpose. It also includes Access Controls,

Firewalls, VPN, Remote Access and Wireless Security. Network security provides with the

theory knowledge and practical skills require to create secure network and to send the data

safely and securely all over the internet.

The NSC module includes 12 main topics and consists of many theories, techniques,

knowledge and professional technology techniques such as cryptography, web, data

protection, authentication, security and many other knowledge.

From this subject, I learn all logic structures and authentication, multifactor authentication,

biometric and mathematical calculations, data protection and network security, cryptography

fundamentals and network control techniques. I’m so enjoying in doing of this network tests

and plans for this assignment and enjoy of finding the some references on internet.

AUNG PYAE NETWORK SECURITY AND CRYPTOGRAPHY

PAGE - 26

CONCLUSION

I have learned practical and knowledge from this NSC subject in the NCC Education’s

Diploma in Computing. When I do the assignment of NSC module, I have done all tasks well

my assignment by applying these practical and knowledge.

Before this time, I understand about all techniques of computer system and network in IT

technology. Data protection and security methods are important for business system in

practical. I knew about the network plans and other network technologies from this

assignment and I got the knowledge how to apply this system with computer in finding

suitable element.

AUNG PYAE NETWORK SECURITY AND CRYPTOGRAPHY

PAGE - 27

REFERENCES

NSC Textbook

NSC Student Guide

Level 4 Computer Networks Textbook

http://www.answer.com

http://www.avira.com

Tanenbaun, A.S. (2003). Computer Networks. 4th Edition. Prentice Hall