Assignment Sample on 7131COMP Computer Security

Introduction

The security of computer systems is called cyber security or the computer security which are connected via computer networks. Security of computers mainly concerns the preventative measures of damage, theft of data and illegal use of computer systems and data of the network. It protects and detects the illegal use of the computer system. This project is based on the securing of the computer network.  The project was carried out using the IoT or the “Internet of Things” for this purpose. It is not a new idea. The Internet changed our world in several ways. Unfortunately, this extensive network and the technologies which are related to this have also increased security vulnerabilities. Computer security risks are potential dangers that can prevent the normal regular operation of the computer of the user. Cyber threats are constantly growing as the world is now completely digital. The most effective strategy to protect the data of the computer from threats and assaults is aware of standard cyber security procedures. The technological skills of the civilization have tremendously increased and that also increased the use of computers. These numerous devices that are enabled by the internet are used enormously in the daily routines of the people, including medical care, the automation of the work of different days, analysis of data, data intelligence and wearable technologies. Almost every “internet to things’ ‘device is connected to the Internet at all times or something else, people often create their problems by themselves, a wider attack surface with basic safety problems. The owners of the project introduced the newest smart device in their network, but also ensure that the existing network is safeguarded and not exposed to others. The developer of the project will develop and build a safe application of the computer to protect the important and personal data of the user. it will also develop a security policy to safeguard the computer from hackers. the security of the device, the security of the network and the future things are to be considered.

Aim and objective

The project aims to be integrated into Java programming and is based on IoT or the Web of Things. It is a security programme, which is connected to a port and is encrypted so that it can only be opened by the authorized user. The authorized user will have the encrypted text decryption key (Surantha, et al. 2018).

The project aims to secure information that is vulnerable to IoT-system attackers in a network. It aims to connect and merge the physical world with the internet. It marks the way to the future and leads the third wave of the IT revolution. The following is a summary of the goals.

Get Assignment Help from Industry Expert Writers (1)

The main objective of the project is to safeguard the information of the user in a network that is vulnerable to the hand of attackers using IoT systems. The goal of the project is to connect cyberspace internally and integrate the physical world. It marks the way to the future and leads the third wave of the Information Technology sector revolution (Othman, et al. 2017).

The objective of the following project is summarized below,

  1. Identify the information of the port and the information of the socket.
  2. Allowing the user of the device to scan for the other devices of the network.
  3. Describing all the possible techniques of implementing the security of the computer.
  4. Saving all the information on the computer with the help of the encryption of data and with the help of a strong password.

Implementation

During the process of implementation, the application is capable of scanning devices that are connected to a specific network (Saifuzzaman, et al. 2017). Suppose the equipment is either authorized or not authorized. So, it is important to scan the network. The app will display the IP addresses of the connected devices, the number of ports and the number of sockets by which the devices are connected is shown in the input port. The app will save all the information of the network which is encrypted and then the app will decrypt that information with a specific password that is strong. The information can be decrypted only by the users who have authorization. The following application compares the IP addresses which are already saved in the database with the IP addresses of the device which is connected. The application will show the new IP address if the previously entered IP address does not match (Albak, et al. 2020). When a user of the computer network transfers a packet to another network, once the packet is returned the packet which was sent contains either the acknowledgement or request time out or the failure of transmitting of the packet. The application can be used by the user as it is simple and easy to use.

Rationale

This part of the following project sec is based entirely on the design choices and the implementations of the application. Future work is also described in this section in addition to the selection of the execution of the project (Alrehily, et al. 2018).

Design and implementation choices

The implementation of the following project is executed with Java programming. For the development of the project, any type of application can be used. The Apache NetBeans is used to develop the environment of the project. The project is designed to detect the devices that are connected to a network and the ports which are connected and the IP addresses of the devices that can be traced. The “graphical user interface” or the GUI of the app built with the help of java swing and JavaFX (Buch, et al. 2017). When the authorized receiver gets the information from the packet which contains data it in, the IP address of the data packet is encrypted, the receiver of the packet will only have the key of decryption for the deciphering of the text or the data that are sent to the receiver. For encoding and decoding the data, the developer of the project used encryption algorithms (Amosov, et al. 2019). Therefore, Java cryptography is used for encryption as Java programming is used to implement the application. In the beginning, an object called “KeyPairGenerator” is created to generate keys with key algorithms. Then the “key pair generator” is initialized with the isReachable() method. Then the public key is generated with the help of the Getty name() method. The return of the cypher object is done with the help of the getInstance() method. The isReachable() process initialises the object of the cypher and the update() method updates the object of the cipher in the form of a byte array. The Data Method is finally encrypted by doFinal(). The data that are encrypted can also be decoded or decrypted with the final() method. It decrypts and prints the encoded text. To better understand the application process, all of the design output was displayed below (Kotenko, et al. 2017).

There are four options for this local area network scanner device. In the beginning, the device will scan all the IP addresses which are added to the LAN connection of the network. The network will show all the IP addresses of the systems that are present in the network. In the section of the output of this part, it will show if the IP addresses are present in the network or not. If the IP addresses are present, the device will show reachable against this IP address and if the IP address is not present, then it will show as unreachable.

Get Assignment Help from Industry Expert Writers (1)

The second option is “scan and show”. Here the device will scan all the IP addresses and save them without showing. The device will scan 256 systems at a time and save them. The IP addresses will be saved in the output folder. It will take three hundred seconds to save the IP addresses.

The software will decode the IP address from the saved folder and show the IP addresses. The software will scan the saved folder where all the IP addresses are saved. The software will search the IP address and show this to the user. Once the task is complete, the user can exit from the software (Chandramohan, et al. 2017).

Here, all the IP addresses which are scanned by the website will be stored without showing. It will take almost 256 seconds to save all the IP addresses

All the IP addresses which are scanned will be saved in a file. The software can scan 256 IP addresses and save them.

When the scan and save button is clicked, it will scan the local network for searching connected devices and save the data in a file.

When the Scan and Save button is clicked, the last IP address is shown in the console output, which is proof that the operation is running.

After the file is created successfully, it will show the above window.

This is the data file that was saved in the operation. The file contains some texts which are encrypted form of the IP addresses of the connected devices.

This is the location of the data which is opened while the decode operation.

This is the output result after the decode operation takes place. The decode operation decrypts the encrypted texts into IP addresses shown above.

Future work

As the number of cyber assaults increased rapidly it became very costly for the business to protect the networks of the computer from the hacking of data. In addition to the increasing number of cyber attacks, it causes the victims as the financial damage is also increased. This project is created to add some new frameworks. The application will be implemented with advanced Java programming to detect more significant threats in future. Encryption of data is one of the most important technical security tools of data. Data may be hidden; fidelity and personal identification of data may be established by encryption of data (Samsudin, et al. 2017). Several people are now looking to adjust encryption of data in the future, where users have many interconnected devices with limited capability of computation, storage and electrical capabilities. It is an enormous job, but many people did it, and the technique will also be finished soon. It is thus a fact that outmoded networks will not be able to meet changing market conditions and customer requirements quickly enough. The demand for the 10G and 100G connectivity services has declined, although annual demand increases by around 20 per cent. Many organizations, since traditional network architectures require additional equipment to provide increased capacity, could no longer meet the demand. You can boost available bandwidth across locations or data centers on request by providing a few simple instructions without replacing any software or hardware in the given network (Bhojane, et al. 2018).

Security policy

The security policy of the application created is explained in this particular section. The security policy is dependent entirely on the security of the network and device. Furthermore, the future also is mentioned in the section.

Device security

Device security is essential to the protection of information but when you set up virtual networks out of the box, it is easily ignored. It is common for organizations to purchase and deploy network equipment without changing the settings to meet their unique needs, which might expose them to security threats and security violations. No attention should be paid to the significance of the network security settings device, and particularly to the risk tolerance of network devices (Sayem, et al. 2018). The easiest and effective way to do so is to use a professional solution to handle network security devices as well as their configurations. The use of a tool relieves the IT admin from part of the load on the network setup and security tasks, which can require a certain amount of time and resources to spend elsewhere. Reviewing security logs manually takes time and it may be wrong if abnormal behavior patterns are absent or if issue occurrences are overlooked. It is cheaper to use software, which can more precisely automate significant parts of the operation and can analyze large amounts of data quickly with the support of pattern recognition.

Network security

Due to network security, the network and data are secure against violations, invasions or other assaults. It covers software and hardware, as well as processes, rules and settings for the use of the Network, connectivity and the prevention of threats overall (Punjabi, et al. 2018).

The security system includes access control, antivirus, network analysis, security apps, firewalls, VPN encryption, and more. Securing users and data, safeguarding the security of shared information, providing reliable access and administration of the network, and defending against cyber assaults all demand for network security. Due to network security, the network and data are secure against violations, invasions or other assaults. It covers software and hardware, as well as processes, rules and settings for the use of the Network, connectivity and the prevention of threats overall. The security system includes access control, antivirus, network analysis, security apps, firewalls, VPN encryption, and more. Securing users and data, safeguarding the security of shared information, providing reliable access and administration of the network, and defending against cyber assaults all demand for network security (Patil, et al. 2017).

For network stability and protection, WPA2 is utilized.

  • Restricted or disabled DHCP or “Dynamical Host Configuration Protocol.”
  • The program is used for VPN or “Virtual Private Network.”
  • The sharing of files is disabled.
  • Update the router firmware.
  • IDS and IPS are used in network threat prevention.
  • For the prevention of various sensitive information, the WAF or “Web Application Firewall” is implemented.

Future things

The traditional network architecture is inefficient and uncompromising on many levels. Most networks are intended to support certain uses such as residential broadband, regulated hosting or mobile broadband. This indicates that when an IT, connectivity, a cloud provider or an operator wants to provide another service to the sector, a new network is necessary, which leads to unusually long delays on the market and the lack of substantial income potential (Richardson, et al. 2020)

Testing

It is necessary to test the software produced in the project. The testing of the project utilises a range of techniques to assess how successful the cyber safety strategy is against a potential assault. It reveals significant deficiencies in the industry that are aggressively used for cyber-attacks. Organizations may avert exploitation by quickly addressing these vulnerabilities and else lead to a preventable safety disaster. It is important to assess what type of application is being tested by the testing team.

  • The testing is based on the exploitation of network services.
  • The testing is associated with online application penetration (Semerci, et al. 2018).
  • The testing of wireless network penetration.
  • The testing of detection of Social engineering.
  • The testing of mobile penetration.

Conclusion

It can be concluded from the project that the application requires the usage of network security and device security. Unauthorized persons and appliances should not be able to communicate with other appliances. Users granted access to the network should only access the resources to which they have access. Viruses, trojans and worms are designed to spread over a network and can stay sleeping for days or even weeks at infected workstations. The protection effort should be concentrated on the prevention of infection and removal of malware already entered into the network.

 Reference list

Journals

Albak, L.H., Hamed, A. and Al-Nima, R.R.O., 2020. Design security system based on Arduino. TEST Engineering & Management, TheMattingley Publishing Co., Inc, 82, pp.3341-3346.

Alrehily, A. and Thayananthan, V., 2018. Computer Security and Software Watermarking Based on Return-oriented Programming. International Journal of Computer Network & Information Security, 10(5).

Amosov, O.S., Amosova, S.G., Ivanov, Y.S. and Zhiganov, S.V., 2019. Using the ensemble of deep neural networks for normal and abnormal situations detection and recognition in the continuous video stream of the security system. Procedia computer science, 150, pp.532-539.

Bhojane, K.J. and Thorat, S.S., 2018. Face Recognition Based Car Ignition and Security System. International Research Journal of Engineering and Technology (IRJET), 5(05), pp.3565-3668.

Buch, R., Ganda, D., Kalola, P. and Borad, N., 2017. World of Cyber Security and Cybercrime.

Chandramohan, J., Nagarajan, R., Satheeshkumar, K., Ajithkumar, N., Gopinath, P.A. and Ranjithkumar, S., 2017. Intelligent smart home automation and security system using Arduino and Wi-fi. International Journal of Engineering And Computer Science (IJECS), 6(3), pp.20694-20698.

Kotenko, I.V., Saenko, I. and Kushnerevich, A., 2017. Parallel big data processing system for security monitoring in Internet of Things networks. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 8(4), pp.60-74.

Othman, N.A. and Aydin, I., 2017, September. A new IoT combined body detection of people by using computer vision for security application. In 2017 9th International Conference on Computational Intelligence and Communication Networks (CICN) (pp. 108-112). IEEE.

Patil, N., Ambatkar, S. and Kakde, S., 2017, April. IoT based smart surveillance security system using raspberry Pi. In 2017 International Conference on Communication and Signal Processing (ICCSP) (pp. 0344-0348). IEEE.

Punjabi, S.K., Chaure, S., Ravale, U. and Reddy, D., 2018, November. Smart intelligent system for women and child security. In 2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON) (pp. 451-454). IEEE.

Richardson, M.D., Lemoine, P.A., Stephens, W.E. and Waller, R.E., 2020. Planning for Cyber Security in Schools: The Human Factor. Educational Planning, 27(2), pp.23-39.

Saifuzzaman, M., Khan, A.H., Moon, N.N. and Nur, F.N., 2017. Smart Security for an Organization based on IoT. International Journal of Computer Applications, 165(10), pp.33-38.

Samsudin, N.F. and Zaaba, Z.F., 2017. Security warning life cycle: challenges and panacea. Journal of Telecommunication, Electronic and Computer Engineering (JTEC), 9(2-5), pp.53-57.

Sayem, I.M. and Chowdhury, M.S., 2018, December. Integrating face recognition security system with the internet of things. In 2018 International Conference on Machine Learning and Data Engineering (iCMLDE) (pp. 14-18). IEEE.

Semerci, M., Cemgil, A.T. and Sankur, B., 2018. An intelligent cyber security system against DDoS attacks in SIP networks. Computer Networks, 136, pp.137-154.

Surantha, N. and Wicaksono, W.R., 2018. Design of smart home security system using object recognition and PIR sensor. Procedia computer science, 135, pp.465-472.

Know more about UniqueSubmission’s other writing services:

Assignment Writing Help

Essay Writing Help

Dissertation Writing Help

Case Studies Writing Help

MYOB Perdisco Assignment Help

Presentation Assignment Help

Leave a Comment