NEVER LOSE YOUR CHANCE TO EXCEL IN BN200 NETWORK SECURITY FUNDAMENTALS ASSIGNMENT - HIRE BEST QUALITY TUTOR FOR ASSIGNMENT HELP!
BN200 Network Security Fundamentals - Melbourne Institute Of Technology
Security in Networked Systems
LO1: Explain the major methodologies for secure networks and what threats they address;
LO2: Identify and report network threats, select and implement appropriate countermeasures for network security.
Solution:
ORDER NEW BN200 NETWORK SECURITY FUNDAMENTALS ASSIGNMENT & GET 100% ORIGINAL SOLUTION AND QUALITY WRITTEN CONTENTS IN WELL FORMATS AND PROPER REFERENCING.
Introduction
In the following report, it will be exemplified about the ransomware, along with the information security in healthcare sector, later analyzing the protocol needed for operating types of message analyzer or software applications. The application will be created for the company Zenith consulting services(ZCS), which provides wide variety of services to more than 1000 clients across Australia especially in place like Sydney and Melbourne. The company is hiring new candidate therefore, the theoretical analysis will be done to understand their knowledge and hold in the cyber security department, so that they can provide better performance for the company.
A. Ransomware
B. Introduction about ransomware and their impacts on networked systems
Ransomware is a type of virus, that the computer gets affected with due to malicious activities and clicking on some unwanted sites and it can cause in loss of data until and unless a ransom is paid. The ransomware is a type of malware, which affects the system by the download of unwanted file or software. The ransom ware was generated first in the year 2013, and it has thus affected many systems. Therefore, to stop this type of malicious events, there are various companies who have launched many antivirus and can be successfully fought to keep the system clear and operate smoothly.
The impact which the ransomware has on the affected system are it affects the files of the system and locks down many necessary files, which generates a unique decryption key and gets stored automatically on ten hacker system. The ransomware is also used in theft and forgery as well as banking accounts. In the process of hacking the files, the ransomware demands a certain amount to be paid, which helps in decrypting the file and stops hacker from getting the information stored in other system. A ransomware affected system can be operated but there can be loss of valuable data which will eventually affect the organization productivity.
C. Five variants of ransomware with taxonomy
There are mainly two main types of taxonomy they are Crypto ransomware and Locker
Ransomware. The crypto ransomware affects the most important files in a system, so that the main user cannot access them. The locker ransomware locks the system completely so that the user cannot operate the system and prevent the system from getting damaged further. The other three types of ransomware which will be describes here are given below:
CrytoLocker: ransom ware has been affecting system from quite a time, but it has been dominant from the year 2013 which is called the Crytolocker. By the use of Crytolocker, there were hackers who earned more than $3million from the users. This has made the type of ransom ware popular and many acquire this approach to get money.
CTB-Locker- the use of CTB Locker become dominant after the downfall of CryptoLocker, which increases the spread of malware in voluminous process.
WannaCry: It has sported a popular malware campaign in all over the world, and has affected a lot of business organization in years. It has collectively attacked 125000 organizations in more than 150 countries. The computer operating on Microsoft are generally gets affected by this type of malware.
D. Potential threats posed by ransomware
The following threats are faced by the installation of malware; they are given as follows:
• The computer systems can lose files due to the attack of malware
• It also results in economical loss in many companies are ransoms are not recovered until and unless it is paid
• Loss of efficiency and flow of functionalities in a smooth manner
• Increased costs in information technology
• There is a sudden need in modifying the whole system
E. Recommendations about one mitigation tool
There are many mitigation tool that have been applied in rendering the good services in making the malware attack less. The most prominent one are by the usage of virtual environments and installing vet and monitor third parties which helps in giving and ensuring correct strategies of cybersecurity. The use of CMS(Content management systems helps in managing the contents), and helping in develop virtual environment which helps in developing networks and data.
F. A recent study about ransomware attack in a networked system
In a recent study of Vectra, it has been stated that the attack of the ransomware has been motivated by the evolvement of network. The computer gets affected by malware every day and thus the documents attached to it, is also affected hugely. It is devastating when the files are stored in cloud storage, and it gets attacked by the ransomware. This is the most prevalent type of network which gets affected by a single virus operated by a single host and the whole organization gets affected. The study by Vectra has shown a similar kind of attack which affected 23 towns and various organization in Texas. The most affected industries who are dependent on cloud infrastructures are the one most affected, they are healthcare, government, financial as well as corporate sectors.
GET GUARANTEED SATISFACTION OR MONEY BACK UNDER BN200 NETWORK SECURITY FUNDAMENTALS ASSIGNMENT HELP SERVICES OF EXPERTSMINDS.COM - ORDER TODAY NEW COPY OF THIS ASSIGNMENT!
B. Information System in Health care sector
1. Healthcare network architecture (consider networking devices such as routers, switches, firewalls, servers etc)
The healthcare sectors are the one which can exchange data with the users and providers. It can be transferred through the network directly or through an intermediary[7]. This can be done by connecting through devices and this networks are connected through the setting up of networks with switches, servers and firewalls. The server helps the transmission of data and therefore it successfully sends the data through their cached data. The below diagram will show the requirement of data from the main place and then data pushing the data will be provided to the host.
Figure 1: The data flow network through the data push method
(Source: [1])
2. Recent development in healthcare networks. Also discuss the importance of information security in healthcare network architecture.
The recent technological invention has taken out a huge effect on the evolvement of the health and social care sectors[6]. There have been many developments in the network and the data transmission in health care sectors which includes the development of network. Some of the recent development in network have provided medical practitioners develop without reaching the spot for training. The tool is 3D4Medical which helps in providing information from the medical institute to the students learning anatomy. Secondly the clinical patient access solutions have helped in treating patients through networking devices, and this also helps in keeping records of the patients and their medical history. Through this particular platform, care providers help the patients with high quality treatment along with keeping tracks and records related to their medical history as well as their treatment procedures.
3. Analysis of any two current or possible future security issues in Healthcare Networks.
Due to the random attack of malware and the most dominant malware that is ransomware has been affected hugely the security options of health care sectors. Therefore, cyber security has become an essential part in this type of organizations as it helps in keeping records of the hospital. The two most prevalent threats in the healthcaresectorsare as follows:
MHealth: There has been many wellness programs in the healthcare sectors which are available on networks, that is accessible by the usersthrough their mobile phonesas a well as computers. The users are varied as hospital staffs, doctors as well as users access this networks so that they can get along with the hospital criteria[3]. This increase the risk of breaching in security issues.
Insider Misuse: In a review done by the Becker's Hospital, it has been stated that 15% of security issues has been done by the insider Who are working for the organization by the end of year 2013. The employees tend to steal the information form a particularorganization and share it with outsider which have made their operations and functionalitiestransparent and this affects the profit of the organization as well.
4. A possible solution for one threat identified in point 3
In case of mHealth security issues, Network access controls( NAC) solutions has been provided to keep the health and social care organizations. It helps in identifying the user and device and automatically checks out for threats at the time of operating. This helps in keeping out security issues at par.
5. A recent attack related to healthcare network.
In a recent study, it has been stated about the attacks in 2017 in many health care sectors in Minnesota, as the ransomware attacked have developed themselves to become a weaponized ransomware, and the misconfiguration of cloud storage buckets and phishing emails. This has been hugely affected in the healthcare sectors. It has also been stated that the dominance of this kind of malware will be there in the year 2018-2019, even though there has many security installed , as the hackers are getting more creative[5].
DO WANT TO HIRE TUTOR FOR ORIGINAL BN200 NETWORK SECURITY FUNDAMENTALS ASSIGNMENT SOLUTION? AVAIL QUALITY BN200 NETWORK SECURITY FUNDAMENTALS ASSIGNMENT WRITING SERVICE AT BEST RATES!
C.Compare Protocol Analyzers
1. Research any two protocol analyzers (such as Wireshark, ColasoftCapsa, Mirosoft message Analyzer) and compare their features
Wireshark has been used by many operators from a long time, and it has also operated through the procedure of pcap capture and DNS filtering[2]. The pcap capture and the DNS filtering are different in Message analyzer which has been recently substituted in place of Wireshark. The difference has been clearly given in the table below:
Wireshark
|
Microsoft Message Analyzer
|
It is a primitive tool which has used for many years[8]
|
It is recent message analyzer tool developed by Microsoft and its rapidly taking place
|
It helps in acquiring PCAP and have DNS filtering
|
It does not support this operations, which created problem in trouble shooting
|
It cannot track the operations of the applications
|
Message analyzer can track the activities and trace network operations, which is an added advantage.
|
Table 1: the difference between Wireshark and Microsoft Message analyzer
(Source: Created by the learner)
2. Download and install each selected product on your personal computer and perform protocol analysis.
Wireshark can be installed in various platforms like UNIX, MS, Linux, Mac OS. The installation procedure goes in this way
The pcap library is an essential feature in acquiring low network messages, the latest Win Pcap release is in 4.1.3.
This can be referred as the menu toolbar and the filter field along with the packet list pane. There will be packet details after the packet line pane[4].
3. Which Analyzer would you recommend? Justify your recommendations.
The usage of Wireshark analyzer is most preferable as it has the DNS filter and the PCAP facility which is not available in the Microsoft message analyzer. The usage of Wireshark can help the beginners in understanding network security issues and defining the capability of the network development.
Conclusion
In the report, there has been explanation regarding the usage of the security protocols to prevent ransomware in attacking the systems, and that has affected many organizations. The report has described the various studies related to Ransomware and many other malwares. The description related to network securities and the options to defeat this type of attacks has been the sole topic of the report. In the later part of the report, it has mentioned about the protocol analysis of Wireshark and the difference between it and the message analyzer has been given.
GETTING STUCK WITH SIMILAR BN200 NETWORK SECURITY FUNDAMENTALS ASSIGNMENT? ENROL WITH EXPERTSMINDS'S BN200 NETWORK SECURITY FUNDAMENTALS ASSIGNMENT HELP SERVICES AND GET DISTRESSED WITH YOUR ASSIGNMENT WORRIES!
Below are the related courses in which ExpertsMinds precisely deal with:
- BN108 Programming for Networking Assignment Help
- BB101 Business Communications Assignment Help
- BN200 Network Security Fundamentals Assignment Help
- BN104 Operating Systems Assignment Help
- BN110 Information Systems Fundamentals Assignment Help
- BN208 Networked Applications Assignment Help
- BN103 Platform Technologies Assignment Help
- BN106 Networking Fundamentals Assignment Help
- BN206 System Administration and Management Assignment Help
- BN109 Web and Multimedia Systems Assignment Help