NCC Education
NETWORK SECURITY
AND CRYPTOGRAPHY
Nursing Home for Old People
PRESENTED BY AUNG PYAE
MCC TRAINING INSTITUTE, MANDALAY CAMPUS
(ID - 00148187)
AUNG PYAE NETWORK SECURITY AND CRYPTOGRAPHY
PAGE - 1
NCC Education
Level (5) Diploma in Computing
Network Security and Cryptography
Module Title Network Security and Cryptography
Assignment Title Nursing Home for Old People
Candidate name AUNG PYAE
Candidate no 00148187
Exam cycle September 2015
Word count
Marker’s Comments
Moderator’s Comments
Marks
Moderated Marks
Final Marks
AUNG PYAE NETWORK SECURITY AND CRYPTOGRAPHY
PAGE - 2
STATEMENT AND CONFIRMATION OF OWN WORK
Programmed qualification name: Level (5) Diploma in Computing
Name: Network Security and Cryptography
Each NCC Education assessed assignment submitted by you must have this statement
attached to the assignment as the cover page or it will not be accepted for making. Please
ensure that this statement is either firmly attached to the cover of the assignment or
electronically inserted NUMBER the front of the assignment.
All submitted work must have this form as the cover / first page. Please include this form as
part of a standard format when submitting an assignment.
STUDENT DECALARATION
I have read and understood NCC Education’s policy and Academic Dishonesty and
Plagiarism. I can confirm the following details;
Student ID 00148187
Name AUNG PYAE
Centre Name MCC Training Institute (Mandalay Campus), Myanmar
Module name NETWORK SECURITY AND CRYPTOGRAPHY
Title of work Nursing Home for Old People
Module leader Dr. Htet Ne Oo
Number of words
I can confirm that is my own work that I have not plagiarized any part of it. I have also noted
the grading criteria and pass mark for assignment.
Due date
Student signature AP
Submitted date
AUNG PYAE NETWORK SECURITY AND CRYPTOGRAPHY
PAGE - 3
Table of contents
Network Security and Cryptography Table of contents .................................................................................................................................... 3
INTRODUCTION ................................................................................................................................. 4
ACKNOWLEDGEMENT .................................................................................................................... 5
TASK 3 A ............................................................................................................................................... 6
Data protection issues in a care home environment .................................................................. 6
The Data Protection Plans for Nursing Home .............................................................................. 8
Alternative Methods that could be used...................................................................................... 14
TASK 3 B ............................................................................................................................................. 16
An Explanation for the User Authentication Methods ............................................................... 16
Other User Authentication Methods ............................................................................................ 18
Methods Planned to Ensure Privacy and Security .................................................................... 20
Rejected Methods .......................................................................................................................... 21
How to Monitor Security Vulnerabilities and How to Remove These Vulnerabilities ........... 22
TASK 3 C ............................................................................................................................................. 24
Reflective Commentary ................................................................................................................. 24
TASK 3 D ............................................................................................................................................. 25
Summary Report ............................................................................................................................ 25
CONCLUSION ................................................................................................................................... 26
REFERENCES .................................................................................................................................... 27
Network Security and Cryptography presented by Aung Pyae (September 2015)
♦ ♦ ♦ ♦ ♦ ♦ ♦
AUNG PYAE NETWORK SECURITY AND CRYPTOGRAPHY
PAGE - 4
INTRODUCTION
Hello!
My name is Aung Pyae and I study business information technology from NCC Education
Level 5 Diploma in computing course at MCC Training Institute, Mandalay Campus in
Myanmar. I am attending this computer course because information technology (IT) is
essential today and most of business process use computerized systems. As I am interest in
IT and I want to improve my knowledge and creation skills, I attended to MCC Training
Institute (Mandalay Campus) since 2013. MCC Training Institute (Myanmar) is recognized by
NCC Education and University of Greenwich in UK. So I am attending this course which is
offered by NCC Education Center.
There are FOUR main subjects in our First Semester course;
Network Security and Cryptography
Information Systems Analysis
Analysis, Design and Implementation
Dynamic websites
The first two are Global subjects and the other two are local subjects. This assignment is
aimed for the Global subject, Network Security and Cryptography.
The Subject, Network Security and Cryptography is about all techniques of computer system
and network in IT technology. The subject includes the most common types of cryptographic
algorithms and algorithms for a particular purpose. It also includes Access Controls,
Firewalls, VPN, Remote Access and Wireless Security. Network security provides with the
theory knowledge and practical skills require to create secure network and to send the data
safely and securely all over the internet.
The subject include all technologies to create a secure network. It is designed to create with
the knowledge form fundamental principles and techniques in securing information and
networks. Also gives the techniques to allow access for security risks and inherent computer
networks and the technologies to counter the risks. It covers with cryptographic algorithms
from mathematical point of view, including practical examples of breaking codes.
Once we have of knowledge of different algorithm types, cryptographic protocols are
introduced for accomplishing a varied set of tasks, including authentication, secure message
exchange, digital signatures, etc. Other aspects of networks are then dealt with, such as
access control devices, firewalls, VPN, NAT, malware, vulnerability assessment, Intrusion
Detection Systems (IDS) and etc.
From this subject, we learn all logic structures and authentication, multifactor authentication,
biometric and mathematical calculations. I’m so enjoying in doing of this network tests and
plans for this assignment and enjoy of finding the some references on internet.
AUNG PYAE
(MCC TRAINING INSTITUTE, MANDALAY CAMPUS)
♦ ♦ ♦ ♦ ♦ ♦ ♦
AUNG PYAE NETWORK SECURITY AND CRYPTOGRAPHY
PAGE - 5
ACKNOWLEDGEMENT
The knowledge is most valuable prize of world and the teacher who gives this knowledge are
also valuable and grand persons. When I arrived in MCC (Myanmar Computer Company
Limited) Training Institute, everything was difficult for me and I learned many subjects about
computer and information technology. Some are easy but some are difficult. There are many
teachers and officers in our school. The teacher who teaches our subjects teaches me kindly.
I thank our teachers with best wishes.
This global subject is very important for me because we cannot reach the third year without
passing this subjects. So I need to study hard and practice for tasks and topics. This
assignment is done under the guidance of our NSC teacher, Dr. Htet Ne Oo. I great thank to
my teacher and all other teachers in our Level 5 subjects and they give me some great
advices and logical thinking. I also thank to our class tutor, Daw Zin Thandar. She gives me
strength for my mind and teach us to become well professional technicians.
Next, I thank to my friends who help me in solving the difficulties of this assignemt and help
to become a complete assignment. They also help to complete and add some knowledge for
this assignment and give more useful advices. I also thank my MCC Training Institute, NCC
Education and University of Greenwich. I can study BIT course because of them. Finally, I
also thank all the teachers and friends who help me to finish and to become a complete
assignment.
I great thank to MCC and NCC since it services me to get more ways for my living and guide
me to become professional IT technician.
AUNG PYAE
(MCC TRAINING INSTITUTE, MANDALAY CAMPUS)
♦ ♦ ♦ ♦ ♦ ♦ ♦
AUNG PYAE NETWORK SECURITY AND CRYPTOGRAPHY
PAGE - 6
TASK 3 A
Data protection issues in a care home environment
Every network is at risk from unauthorized users gaining access to data stored and
transmitted on that network. The network system form Nursing Home may be have some
risks and network problems with data security and data protection. As the care home uses
computerized system, the personal data for each old person are important to secure. Their
some important data such as what person need to take what type of medicine, what person
need to take what kind of activities, food, physical activities. So the personal data need to
secure and data protection systems are need.
The Hackers from outside may try to access the data from care home system and they can
hack the system with active attack and passive attack systems. If they edit or modify they
important personal data of user database, taking wrong type of medicine or time can lead to
some body false and even dead. So, data protection is important and the internet service
used by the old people in care home are also need to be protected with administrator
permissions. To secure the data and other security cases, network system in care home
need to be protected with security and data protection systems such as user authentication,
CIA Triad, backup systems, VPN, Antivirus Software, data encryption and decryption system,
staff training and cryptography fundamentals.
Preventing from unauthorized access are need in care home system. The methods for data
protection give the best protection against unauthorized users. There need to create a plan
and this includes to divide the security case as Administrator and Staff with key
responsibilities, policies for system use and control the internet access of old people with
administrator permissions. Staff training for data protection such as software, hardware are
need and use the policies.
Data system need to prevent from security attacks such as passive attacks and active
attacks. Passive attacks cannot affect the system resources but active attacks can affect the
affect the data in database system. Personal data in care home are important and all are
private information.
For data, a collection of mathematical techniques for protecting this information
(Cryptography) is need to data protection. The most important cryptography techniques are
Symmetric Encryption that encrypt/decrypt the message using the same key and
AUNG PYAE NETWORK SECURITY AND CRYPTOGRAPHY
PAGE - 7
Asymmetric Encryption that used one key for encryption (public key) and another for
decryption (private key).
Authentication s require for old people in care home system. User authentication is the first
line of defense of a network and it prevent unauthorized access to a network. User
authentication is the basic setting access controls and used to provide user accountability.
CIA Traid is the requirements, confidentiality, integrity and availability. There are many
critiques that suggest that is not provide a complete security requirements. Two commonly
cited extra requirements are Authenticity and Accountability.
There are many packages that allow for automated backup for data. Enterprise databases
include back up facilities as part of DBMS. To protect data of care home, backup system
need to take for data safe and stored securely at offline.
The private network in care home uses public telecommunication, such as internet, instead
of lead lines to communicate. Virtual Private Network (VPN) is remote network
communication and used to comprise who want to communicate confidentially. There are
two parts, inside and outside network.
Staff will need to train the program of system. First, they need to learn the program of the
whole care home system and after training the staff, they use the program of system.
Antivirus software are essential for computers and networks in Old Nursing care home
system. Virus can enter from various places such as memory sticks, email, SD card and
other spam mails from internet. Trojan, worms and spyware can enter from network and
affect the computer and network system. So antivirus software are essential for computers in
care home need to update the virus database when a new code or virus is appear on the
network.
The vulnerability scanner are important because they scan and test the system and network
for weakness. In Nursing Home system, ports, networks, databases and computers need to
be scanned by vulnerability scanner for data protection.
In network security, Firewall is the first line of defense for the network. Common types of
firewalls are Software firewalls and Hardware firewalls. In nursing care home hardware
firewalls are used in routers, switch, server and software firewalls are used in computers and
electronic devices.
AUNG PYAE NETWORK SECURITY AND CRYPTOGRAPHY
PAGE - 8
The Data Protection Plans for Nursing Home
The data protection plans are need to secure storage and transmission of data. In care
home, personal and medical records, transmitted data between care home and government
medical centers are need to secure. They need to protect with powerful data protection plans.
The data protection plans in Nursing Home are;
Virus Protection
Virus are very sophisticated and often appear to be harmless correspondence. Virus are
malicious programs that attacks the computers and networks. Most viruses require recipients
to download attachments to spread. Some virus destroy the system and other steal the
information and send to hackers. To protect from virus, computers and devices of care home
need to install the antivirus software. The most popular antivirus software are Kaspersky,
Microsoft Security Essentials, Norton AVG antivirus and Mac Fee antivirus. All computers
and devices need to protect from virus by using this antivirus software. New virus definitions
and types are occur every day and also new virus protection definitions are updated every
day. So computers and devices keep the antivirus up to date.
To protect spam from email, email system in care home need to use key words and phrases,
use format size, or ration of graphics to text, delete the spam mail and also block the spam
mail addresses.
AUNG PYAE NETWORK SECURITY AND CRYPTOGRAPHY
PAGE - 9
Firewall
Firewall is essential need for computer network and it is the first defense of the network.
Firewall is usually placed at the perimeter of network to act as a gatekeeper for incoming
and out coming data. In computers, firewall protects from internet threads by erecting a
virtual barrier between the Nursing Home network, computers and government medical
centers. In general, hardware firewalls are used in routers, access points and software
firewalls are used in computers and network devices. Firewall protects from virus, worms
and have a friendly user interface. Firewall have flexible configuration. Firewall is cheap,
flexible and have greater security.
Internet
ADSL modem
Phone Line
Firewall
Switch
Server
SwitchAccess Point
VPN Server
Virtual Private Networks (VPN)
Virtual Private Network (VPN) is a private network that uses a public telecommunication
instead of leased lines to communicate. The Nursing Home should use the VPN to comprise
the networks and control the network access. In care home network, two connections are
used, one to internet and other to VPN. VPN contains data, destination, and source
information and allow data to pass through the firewall. By using VPN in care home,
networks can prevent from unauthorized users from accessing the network, protect the data
from hackers, ensure that the data is being transported and ensuring that the data has not
been altered.
AUNG PYAE NETWORK SECURITY AND CRYPTOGRAPHY
PAGE - 10
Internet (VPN tunnel)
VPN device VPN device
Business
Remote user
Wi-Fi protected access (WPA)
In wireless access points for old people and staff of Nursing Home, WPA security is need to
secure data and to become a private network. Without WPA, everyone around the care
home environment can use the Internet from care home’s wireless access point. So WPA is
used to protect present and future wireless devices for authentication and encryption. WPA
implements most of the IEEE 802.11i standard and brought in as an improvement on Wired
Equivalent Privacy (WEP). WPA is more secure than WEP and it uses password keys to
access network and secure for Nursing Home’s authentication server for networks.
IP Security (IPsec)
IP Security provides security at the IP layer for other TCP/IP protocols and applications to
use. It provides the tools that devices on a TCP/IP network need in order to communicate
securely between care home and medical centers, hospitals. IPsec is an open standard
protocol suite and provides privacy and authentication services. IPsec has two modes of
operation, Transport Mode to encrypt data but not the header and Tunnel Mode for both data
and header. Each connection is a security association. By using IPsec, data and network in
Nursing Home have greater scalability, mobility, cost effective and prevent data from other
AUNG PYAE NETWORK SECURITY AND CRYPTOGRAPHY
PAGE - 11
networks or sites. IPsec is not only transparent to applications but also transparent to end
users. It can provide security for users and networks of Nursing Home.
Protected networkMalware, Vulnerabilities
Exploits
SecurityInternet
External network
Database server
Server
AUNG PYAE NETWORK SECURITY AND CRYPTOGRAPHY
PAGE - 12
Backup and Recovery
For user data and other important data such as medical records, system private information,
data backup plan is need for protection. Data can be lost by many cases such as hackers,
viruses, system errors and hardware errors. So the system of care home needs to apply the
backup system every week or month and restore the backup data when the system devices
are in errors, virus or break down position. By using backup process, data are secure and
even lost, they can be easily restore.
Cryptography
Cryptography is the collection of mathematical techniques for protecting information. Data in
Nursing Home need to be secure and cryptography is need to protect data. The most
important techniques are encryption and decryption. Symmetric encryption (symmetric key
encryption) encrypt/decrypt the message using the same key but Asymmetric encryption
(asymmetric key encryption) uses one key for encryption (public key) and another key for
decryption (private key). The Nursing care home have advantages in sending message to
medical centers, government offices by using cryptography. The important information
messages are encrypt before sending to government medical centers and have high security
in sending way.
AUNG PYAE NETWORK SECURITY AND CRYPTOGRAPHY
PAGE - 13
Staff training
Staff will need to train the program of system. First staff will need to learn the program of
whole system and after training the staff, we start to use the program of system. The staff in
Nursing Home need training for process. Computers, servers, routers, web server and other
security systems need to be controlled by staff. Advantages of staff training are that staff can
get experience on job and system is more secure and protected with staff and protection
system.
AUNG PYAE NETWORK SECURITY AND CRYPTOGRAPHY
PAGE - 14
Alternative Methods that could be used
There methods are not used in data protection system of Nursing Care Home
Secure Socket Layer (SSL)
Secure Socket Layer (SSL) uses TCP to provide a reliable and secure end-to-end service. It
is not a single protocol but two layers of protocols. SSL encrypts data and each SSL
certificates uses public key encryption techniques. But for nursing care home system, SSL is
not compatible for some reasons. The extra security comes with extra processing overhead
and this overhead is largely at the server end. Means communications using SSL/TLS are a
slower than those without it.
Access Control List or Mechanisms
Access control list with respect to a computer file system is a list of permissions attached to
an object. The mechanisms can be set permissions for folders, sub-folders and individual
files. Access control list is used to set access permissions to group of network computers,
individual network computers and other machines on the network. In nursing care home,
computers are not individual and internet access is used by both old people and staff.
Access control list is not require for care home system and mechanisms require large
network and controls.
Disk Encryption
There are packages that allow the encryption of an entire disk. This locks the entire contents
of a disk drive or disk partition. Automatic encryption of data occurs when it is written to the
hard disk. A software or hardware is used to encrypt all data that is written to a disk or disk
volume. It prevents unauthorized access to data storage areas. The disk encryption system
is not used in care home because disk encryption encrypt the temporary files on disk and all
individual files in disk that are not require to encrypt are also automatically encrypted.
AUNG PYAE NETWORK SECURITY AND CRYPTOGRAPHY
PAGE - 15
Demilitarized Zones (DMZ)
A demilitarized zone (DMZ) is part of the internal network but separated from the rest of the
internal network. Data traffic moving between DMZ and other interfaces on the protected
side of the firewall still goes through the firewall. DMZ is commonly used in public servers
such as web servers and email servers. The disadvantages from DMZ are that DMZ is
difficult to hide internal structure, may have a single weak point in network and cost more
electricity power. So DMZ is rejected in data protection system of nursing home.
Password Protecting Documents
Many software applications allow the user to password protect individual documents.
(Example; Microsoft Office, Adobe Acrobat). They are usually not sufficient to deter serious
hackers and will protect from the casual snooper. As the care home system not commonly
use data on documents, the password protecting documents are not essential.
Peer-to-peer Networks
Peer-to-peer networks work in small networks. Every user acts as a network administrator
and security can be a major concern. Computers can be grouped into workgroups. Peer-to-
peer has disadvantages and not compatible with care home system. Security applied
resource by resource and PC performance is reduced when a shared network is accessed.
AUNG PYAE NETWORK SECURITY AND CRYPTOGRAPHY
PAGE - 16
TASK 3 B
An Explanation for the User Authentication Methods
Username and Password
Username and password are need to login for users and staff. They are the most common
means of authentication and require no special software. To enter servers and official
websites to Nursing Home, staff and admin need to login with their username and password.
By protecting with username and password, servers, computers, websites cannot be login
everyone. Only staff and admin can enter the important parts of systems such as servers,
websites, and data center.
Fingerprints
Fingerprints have ridges and valleys that are unique to that fingertip and this system has
been used by police for a long time. Fingerprint is the most common biometric method and
can be used with PCs, laptops and other electronic devices. This access the system with
touch technology. Today, many business centers keep fingerprints for staff and the nursing
home also should keep the fingerprint system for staff. By using fingerprint, managers can
easily know who is absent or not include in process, network or working place.
AUNG PYAE NETWORK SECURITY AND CRYPTOGRAPHY
PAGE - 17
Barcode Scanner
Barcode scans a square region and line up the scanner so the barcode is completely inside
the viewfinder rectangle. 1D barcodes are traditional barcodes such as those printed on
product packing. 2D barcodes are two dimensional barcodes, like QR codes and data matrix
codes. These codes are link to phone numbers, websites, email address, etc. The nursing
home needs for secret data information and link to private websites to transmit data.
AUNG PYAE NETWORK SECURITY AND CRYPTOGRAPHY
PAGE - 18
Other User Authentication Methods
These authentication methods are not include (reject) in the planned for methods.
Smartcards
Smartcards are tamper-resistant devices and they have a small amount of memory.
Smartcard has a small processor the card body is difficult to duplicate. They can be easily
transferable and can be used with PIN and password. Smartcards are commonly used in
ATM cards, credit cards, travel cards and pass cards. But Nursing Home does not need
smartcards because the system process of care home is not huge.
Face Recognition
Face recognition capture the facial image in the visible spectrum. Face recognition use a
standard camera, capture the central portion of face and avoid changing features, e.g. hair.
Face recognition system uses infra-red image of the heat emitted by a face. In nursing home,
face recognition is not used for some staff and security reasons, some problems can be
cause by lighting, masks, etc.
AUNG PYAE NETWORK SECURITY AND CRYPTOGRAPHY
PAGE - 19
Typing Patterns
Typing patterns are similar to the recognition of written signatures and uses a standard
keyboard. It recognize the typed password. And also recognize the way of the password is
typed such as intervals between characters and typing speed. This typing pattern is not used
in Nursing home because security system is poor and other person or hackers can be easily
enter to system.
AUNG PYAE NETWORK SECURITY AND CRYPTOGRAPHY
PAGE - 20
Methods Planned to Ensure Privacy and Security
Intrusion Detection System (IDS)
Intrusion Detection System (IDS) monitors network traffic for suspicious activity and alerts
the network administrator if suspicious activity is discovered. It may also respond to
suspicious traffic by blocking user from accessing the network and blocking the IP address
from accessing the network. There are different IDS types that use different methods to
detect suspicious activity. Network administrators and users in care home must understand
the alerts and know the most effective course of action upon receiving an alert.
WPA2
WPA2 is a new type of wireless security and creates a new session key with every
association. The encryption key for each client is unique and specifies to that client. Every
packet is encrypted with a unique key and never reusing keys is good security practice. The
internet user in care home have the access point password and they can be easily use the
internet access. Any person who doesn’t have the password key cannot use the internet
access of Nursing Care Home because the access points are protected with WPA2.
Screening Router
Usually deployed at the perimeter of the network and may be used to control access to a
Demilitarized Zone (DMZ). More often used in conjunction with other firewall technologies.
By screening router, networks in care home are more secure and the network system may
become a private network.
Firewall
Firewall is essential need for computer networks and software firewall which helps to prevent
the outside computer to control the user's computer. In broadband routers, hardware firewall
can be found as stand-alone products and used in packet filtering to check the header of a
packet’s destination and source. The networks of care home need to be prevented with
firewall for security and other protection reasons such as virus and hacckers.
AUNG PYAE NETWORK SECURITY AND CRYPTOGRAPHY
PAGE - 21
Rejected Methods
Wired Equivalent Privacy (WEP)
WEP is the first major attempt to make wireless networks as secure as wired networks. WEP
has been deprecated by IEEE as it does not meet its security goals nut it is still in widely use.
WEP uses encryption to protect data traffic and designed as an efficient and reasonably
strong security. WEP has weakness that are the packets can be replayed so that the access
point broadcast levels and WEP can be cracked in a few minutes with the right equipment.
WEP is not more secure than WPA and WPA2. So the WEP is rejected to plan for the
security system of Nursing Care Home.
Application Layer Firewall
Application Layer Firewalls can understand the traffic flowing through them and allow or
deny traffic based on the content. Host based firewalls designed to block objectionable Web
content and application layer firewall can inspect packets bound for an internal Web server
to ensure the request isn’t really an attack in disguise. The application layer firewalls are not
use in care home because they need to know how to handle data traffic to and from
applications and the application firewalls are generally much slower than packet-filtering or
packet-inspection firewalls.
Hash Function
Hash function is a mathematical function that covers a large, possibly variably sized amount
of data into small datum. Hashing is a method of binding the file contents together to ensure
integrity. The hash function is not used in Nursing Care Home for security reasons. Only by
the breaking the seal can the contents be accessed and any tampering is readily apparent in
hash function.
AUNG PYAE NETWORK SECURITY AND CRYPTOGRAPHY
PAGE - 22
How to Monitor Security Vulnerabilities and How to Remove These
Vulnerabilities
Vulnerability Scanner
Vulnerability scanner can be used in penetration test and it is a software that tests a system
or network for weakness. Different types of vulnerability scanners are available and ports,
networks, databases, web applications and computers are available for scanning. However,
because both administrators of care home and attackers can use the same tool for fixing or
exploiting a system, administrators and staff need to conduct a scan and fix problems before
an attacker can do the same scan and exploit any vulnerability found.
Port Scanner
Port scanner is software application designed to probes for open ports. It is used by network
administrators to test the network and also used by attackers to look for vulnerabilities.
There are 65536 different ports numbers available and most services use only a very limited
number of ports. Network administrators in care home need to scan the ports and fix if they
are in some security problem.
Untrained users
By entraining users, there can have some security problems in network system of care home
such as Wi-Fi passwords, server login passwords and have some software and hardware
errors because user are not understand the system.
AUNG PYAE NETWORK SECURITY AND CRYPTOGRAPHY
PAGE - 23
Virus
Virus are very sophisticated and often appear to be harmless correspondence. Most virus
require recipients to download attachments to spread. Some are programmed to run
automatically with no user action. Virus can enter the devices of Nursing care home network
with various methods. So antivirus software are needed to protect from virus. Antivirus
software prevents virus from attacking system. Antivirus software need to update their virus
database when a new code or virus appears in the network.
AUNG PYAE NETWORK SECURITY AND CRYPTOGRAPHY
PAGE - 24
TASK 3 C
Reflective Commentary
In Nursing Care Home system, many types of data protection plans and techniques are used
to create a secure data network. For the data protection plans, alternative methods and
authentication methods, many types of tools, software and techniques are used to prevent
from various attacks such as hackers and viruses.
First, to protect the data of care home, data protection issues such as CIA Traid, back and
restore, authentication, VPN, firewall and antivirus are used to protect the data. I designed
with the antivirus software, firewall, VPN, WPA, IPsec, backup, recovery, cryptography and
staff training for data protection of care home. In testing of networks security with scanners,
authentication and techniques, username and password, fingerprint, barcode scanner such
technologies are used for authentication. I designed to protect data with the above security
and authentication methods and I have success in testing of such security process in
practical.
From this assignment, I understand the techniques and data protection methods. With
practical skills, I tested the networks and send data safely over secure network
communication. I learned many network security and cryptography from this assignment and
get more knowledge and practice skills. I learned about data protection, methods and
techniques for protection, creating a secure network by using techniques, user
authentication, and most commonly used techniques to ensure privacy and security, email
security and cryptography fundamentals.
AUNG PYAE NETWORK SECURITY AND CRYPTOGRAPHY
PAGE - 25
TASK 3 D
Summary Report
The Subject, Network Security and Cryptography is about all techniques of computer system
and network in IT technology. The subject includes the most common types of cryptographic
algorithms and algorithms for a particular purpose. It also includes Access Controls,
Firewalls, VPN, Remote Access and Wireless Security. Network security provides with the
theory knowledge and practical skills require to create secure network and to send the data
safely and securely all over the internet.
The NSC module includes 12 main topics and consists of many theories, techniques,
knowledge and professional technology techniques such as cryptography, web, data
protection, authentication, security and many other knowledge.
From this subject, I learn all logic structures and authentication, multifactor authentication,
biometric and mathematical calculations, data protection and network security, cryptography
fundamentals and network control techniques. I’m so enjoying in doing of this network tests
and plans for this assignment and enjoy of finding the some references on internet.
AUNG PYAE NETWORK SECURITY AND CRYPTOGRAPHY
PAGE - 26
CONCLUSION
I have learned practical and knowledge from this NSC subject in the NCC Education’s
Diploma in Computing. When I do the assignment of NSC module, I have done all tasks well
my assignment by applying these practical and knowledge.
Before this time, I understand about all techniques of computer system and network in IT
technology. Data protection and security methods are important for business system in
practical. I knew about the network plans and other network technologies from this
assignment and I got the knowledge how to apply this system with computer in finding
suitable element.
AUNG PYAE NETWORK SECURITY AND CRYPTOGRAPHY
PAGE - 27
REFERENCES
NSC Textbook
NSC Student Guide
Level 4 Computer Networks Textbook
http://www.answer.com
http://www.avira.com
Tanenbaun, A.S. (2003). Computer Networks. 4th Edition. Prentice Hall