Please email me for any question

1 answer below »
Please email me for any question
Answered Same DaySep 11, 2020

Answer To: Please email me for any question

Meenakshi answered on Sep 19 2020
156 Votes
Introduction
In this paper we study and analysis the FNU university network security problem .The present FNU network hackers can easily access the network .They would be try to steal, manipulate and destroy the information over the network. Our main is finding solution of service to user and FNU’s is open wireless network co
uld easily be accessed by anyone on or near the campus. The main challenges are FNU require solution to existing infrastructure and will be cost effective and terminate the evil wishes of any potential hackers. The main FNU university requirement as they have more than 45000 students and FNU university students accessing the system .The student can do unauthorized access but in present network FNU have no solution to find out user information about who is utilize the system. The university will need a system that will store the information about login in and login out time and they need network will provide the information about time zone and download time. The FNU main goal IT team will provide the cost effective secure network with present resource. Our proposal is to implement 802.1 x authentications for FNU’s wireless network. In this paper our first step we study and analysis the given FNU University and find out the solution. Our next step will be design and implement the solution
Identification:
Problem that we find out this case study is
1. INVASION & RESOURCE STEALING
2. TRAFFIC REDIRECTION:
3. DENIAL OF SERVICE
Analysis Identify issues
In this project we analysis the problem unauthorized access on server and workstation by the student /anyone as FNU campus having the problem authentication, authorization and accounting. The FNU campus network traffic easily redirect by the modification of MAC. Due to traffic redirection student/anyone can be steal the information.
Evaluation
In this paper after study and analysis the problem we have find out lots of solutions as gives below:
1. Cisco Leap Control Protocol,
2. Virtual network
3. SSL network
CISCO LEAP (LIGHT WEIGHT AUTHENTICATION PROTOCOL)
1. The CISCO LEAP is authentication protocol Knows as EAP CISCO wireless that is strongly supported to Wireless LAN for the authentication key issues. The functionality of CISCO LEAP is mutual authentication between the client and RADIUS server. The Cisco Wireless Security suite provides the authentication security with the help of CISCO LEAP. The CISCO LEAP solves the wireless LAN authentication security issue using EAP.
2. In this proposed solution implement for more security we use SSL (SECURE SOCKET LAYER) protocol that is more securely transmitting the data. The SSL working is at the time of transmitting the data relies upon the public/private key and digital certificate.
3. We can define VIRTUAL PRIVATE NETWORK VPN that helps to securely transmit data on to two network devices over an insecure data transport channel
4. VPN in Wireless Networks provides us authentication, encryption and Data authentication is very secure manner. We should follow at the time of implementation see and follow all the ethical values. We need to use original version of software.
Plan of implementation
The main requirement for AAA implementation
The AAA requires 802.1X Authentication Server.
The EUD success full...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here