Ict205 Firewall Setup And Configuration Answers


  • Internal Code :
  • Subject Code : ICT205
  • University : Kings Own Institute
  • Subject Name : IT Computer Science

Cyber Security

Executive Summary of Firewall Setup and Configuration

Today, network security is an important issue for all organizations. Throughout the years, the term network protection has acquired an enormous significance and becomes a core component of every other individual’s life, involved with a website or mobile system. It becomes vulnerable to cyber-attacks or data theft as users send their information online. An entity must focus on specific safety requirements to decide which sort of firewall, or a fusion of all types, will fulfill their business requirements. Also, cyber-attacks may exist on an open network DNS server or an inbuilt firewall. Firewall offers a device that can be employed to limit data transfers between a selected network and an exterior platform.

The key purpose of this report is to analyze the significance of the firewall, the characteristics of Nmap and Ufw, and the potential threats that Express Print Services Pty Ltd. may encounter.

Table of Contents

Outline

Risk Mitigation Plan

Analysis

Firewall Setup

Conclusion

Outline of Firewall Setup and Configuration

With early roots, Express Print Services Pty Ltd. has expanded into the leading full-service marketing printer and email marketing platform for the customers. Express Print Services Pty Ltd. including its departments centered at Sydney, Melbourne, and Perth. The company manufactures and offers offset, online and large template printing, molding, packaging, executing, die-cutting, web development, marketing goods, and email marketing facilities from large multinationals to smaller industries. 

They oversee the setup of the public network with sufficient network service to meet its market criteria by suitable WAN connectivity. The machine and network manager of Express Print Services Pty Ltd. recognizes that network protection has to be resolved, and strongly suggested that a certain degree of authentication is needed for the network to be safe to withstand against threats and challenges. For that, it is important to address possible threats to the company.

The main aim of this case study is to identify the possible threats and the modification of firewall configuration to overcome such threats to Express Print Services Pty Ltd. Using Nmap application tool from Kali Linux platform and diverse knowledge regarding the same is challenging and complex. It requires the concept of Nmap scanning procedures and the use of firewall to know how it can be modified by introducing commands to restrict and authorizing the products to operate centered on the security context of the network.

This report will provide a significant understanding of the various possible threats involved while working on an internet along with the characteristics of the Nmap and Ufw.

The features of Nmap and Ufw:

Nmap is network scanning software that has appeared as one of the most successful, accessible network exploration software on the market. It employs IP addresses to define all network-connected users as well as give details about the products and operating systems they operate. Example: Firewall.

Uncomplicated Firewall (UFW) is an application configured to operate a convenient to access net filter firewall.

Some of the features of Nmap are:

  • Defining visitors within a system.
  • Listing the connections accessible on intended servers.
  • Trial of network infrastructure on virtual machines to identify the name and version number of the software.
  • Determination of operating system and device features of the network device. 
  • Monitoring the security of a system or router by finding the network links that can be linked to or through it.

Some of the features of UFW are:

  • It utilizes a command-line interface composed of small set of common commands, and iptables for installation.
  • Restrict guidelines on arrivals
  • Escape sorting (on a line with arriving)

Risk Mitigation Plan

It is a technique for designing and introducing the multiple threats experienced by Express Print Services Pty Ltd. Along with limiting the threats to the network.

Koduah, Skouby, and Tadayoni (2017) analyze the classification of multiple inbuilt threats of the model that disclose IoT architecture and tools to numerous network security threats. They highlight unstable IoT devices (being a portable device, hardware, software, or firmware) and exploited by multiple threat entities through constructed channels.

Some of the threats of secure communication over the network are:

  1. Botnet

It is a "huge network of servers" in social interaction and digital world. Its target is to use the high processing power accessible from each malicious software computer to carry out unethical activities (Svoboda, & Lukas, 2019).

(Source: https://www.roboticstomorrow.com/article/2018/01/what-is-a-botnet/11266/)

  1. Attacking DOS and DDOS

A system and its internet service undergo DOS attack by loading a network with bytes and creating it complicated for authorized users to navigate the information of the overloaded site.

A distributed denial-of-service threat is equivalent to DOS but is more powerful. Because the threat arises from numerous distinct IP addresses instantly, the victim considers it much difficult to detect and recover against a DDOS attack.

  1. Multimedia files

There are numerous challenges that an intruder could use to extract delicate information from a person's multimedia files that they communicate on a public networking channel. The networking sites platform enables their clients to upload high-resolution images and clips. Moreover, progress in graphic detection methods, such as position detection, facial recognition, online searches, and barcode scanning, can raise the risks of fraudulent use of such things (Rathore, et al., 2017).

  1. Spam

It can typically be characterized as uninvited mail that is distributed to the user through channels such as email provider, video chat, Messenger via an interface network.

The biggest threats are loading the inboxes with spam email, accessing a fake website, corrupting your machine using malware, loss of system control, failure of system efficiency, computer virus enlistment, or loss of personal or confidential information.

There are other multiple threats available in the network security such as ransom ware, phishing, sniffing, etc.

Analysis of Firewall Setup and Configuration

Here are a few of Linux's quite effective Nmap instructions:

  • Host Detection

It provides more extensive details about a specific server or a set of IP addresses.

nmap 192.168.0.1 192.168.0.2 192.168.0.3

Based about how many spots you have to investigate, it will search numerous sites simultaneously.

So, if you'd like to scan a hostname just overwrite the IP for the host, as you can find below:

nmap cloudflare.com

  • Ping Detection

It will revert details on any active IP to your network.

  • Port Detection

It's among the essential services that Nmap provides and subsequently, there are several options to configure this command.

nmap -p 443 192.168.0.1

You can check for details regarding a particular port on a server with the "-p" symbol accompanied by a port.

The most popularly used commands are:

The UDP scan is very important for the given case study. It uses UDP packets to scan DNS, SNMP, and DHCP ports for identifying multiple attacks.

Firewall Setup

Configuring up a firewall for your system is a perfect approach to establish an essential security for the resources. Here are few mentioned commands for the same:

  • Ufw status

UFW state can be tested at any moment using this instruction:

  • Ufw enable

To enable firewall, use this instruction:

You will get an alert saying the command may break established connection requests. We have already installed a firewall guideline that makes connectivity so continuing should be perfect. Reply back with y to the prompt, and press ENTER.

  • Ufw allow

Whenever you decide to allow both HTTP and HTTPS traffic, a common code could be generated that enables certain ports.

  • Ufw deny

This command is used to block all network connections originating from a specific IP address.

Conclusion on Firewall Setup and Configuration

Working using Nmap with the varied command is quite complex and challenging; however, with right directions and implementations, overcoming such challenges is possible and effective. However, there is still a need for improvement is the areas where competency fell short. It has been comprehended that security of the network along with firewall setting can be used to minimize the threats to Express Print Services Pty Ltd.

References for Firewall Setup and Configuration

Alnakhalny, Redhwan & Anbar, Mohammed & Manickam, Selvakumar & Alomari, Esraa. (2015). An intelligent ICMPv6 DDoS flooding-attack detection framework (V6IIDS) using back-propagation neural network. IETE Technical Review. 1. 10.1080/02564602.2015.1098576.

Koduah, S. T., Skouby, K. E., & Tadayoni, R. (2017). Cyber Security Threats to IoT Applications and Service Domains. Wireless Personal Communication, 95, 169-185. 10.1007/s11277-017-4434-6.

Rathore, S., Sharma, P. K., Loia, V., Jeong, Y. S., & Park, J. H. (2017). Social network security: Issues, challenges, threats, and solutions. Information Sciences, 421, 43-69. https://doi.org/10.1016/j.ins.2017.08.063

Remember, at the center of any academic work, lies clarity and evidence. Should you need further assistance, do look up to our Computer Science Assignment Help


Book Online Sessions for Ict205 Firewall Setup And Configuration Answers Online

Submit Your Assignment Here