Hardening CISCO Devices based on Cryptography and Security Protocols - Part II: Implementation and Evaluation
Journal Title: Annals of Emerging Technologies in Computing - Year 2018, Vol 2, Issue 4
Abstract
This second part covers the implementation, testing, critical evaluation, conclusion and further study. It concentrates on the actual implementation details of hardening of network devices by referring to the hardware and software components, device operating system’s features, management controls, access-list restrictions, operational configurations and critically making sure that the data and credentials are not stored or transferred in ‘plaintext’ over the network by detailed testing and evaluation. It investigates the commands used to enable cryptography and network protocols based on encryption, in order to meet the need for essential security requirements. Substantial work is devoted to the command line details and testing of a router based on Cryptography and Security Protocols in the border router. A step-by-step hardening approach is detailed using the commands used to secure the proposed network framework’s border router. Encrypted services coupled with best practice configurations are explained and tested in an emulated environment. The use of protocol analysers, CISCO Configuration Professional’s Audit and penetration testing tools corroborated the success of the project.
Authors and Affiliations
Faisal Waheed, Maaruf Ali
Autism Children’s App using PECS
Since autistic children suffers from learning disabilities and communication barriers, this research aim to design, develop and evaluate an Android based mobile application (app) providing better learning environment wit...
Analysis of Home Energy Consumption by K-Mean
The smart meter offered exceptional chances to well comprehend energy consumption manners in which quantity of data being generated. One request was the separation of energy load-profiles into clusters of related conduct...
A Diabetic Disease Prediction Model Based on Classification Algorithms
Diabetes is one of the chronic diseases in the world, 246 million people are inflicted by this disease and according to a World Health Organisation (WHO) report, this figure will increase to 380 million sufferers by 2025...
Comparing the Complexity of Two Network Architectures
A Service Provider has different methods to provide a VPN service to its customers. But which method is the least complex to implement? In this paper, two architectures are described and analysed. Based on the analyses,...
Conceptual User Interface Design Process for Healthcare App for Primary Care Level Services in India
Combining healthcare services on a primary care level, at a basic rather than specialised extent, for elementary treatment seeking people, can be challenging but yet useful. In fact, there are many different healthcare a...