Hardening CISCO Devices based on Cryptography and Security Protocols - Part II: Implementation and Evaluation
Journal Title: Annals of Emerging Technologies in Computing - Year 2018, Vol 2, Issue 4
Abstract
This second part covers the implementation, testing, critical evaluation, conclusion and further study. It concentrates on the actual implementation details of hardening of network devices by referring to the hardware and software components, device operating system’s features, management controls, access-list restrictions, operational configurations and critically making sure that the data and credentials are not stored or transferred in ‘plaintext’ over the network by detailed testing and evaluation. It investigates the commands used to enable cryptography and network protocols based on encryption, in order to meet the need for essential security requirements. Substantial work is devoted to the command line details and testing of a router based on Cryptography and Security Protocols in the border router. A step-by-step hardening approach is detailed using the commands used to secure the proposed network framework’s border router. Encrypted services coupled with best practice configurations are explained and tested in an emulated environment. The use of protocol analysers, CISCO Configuration Professional’s Audit and penetration testing tools corroborated the success of the project.
Authors and Affiliations
Faisal Waheed, Maaruf Ali
Audio Networking in the Music Industry
This paper surveys the rôle of computer networking technologies in the music industry. A comparison of their relevant technologies, their defining advantages and disadvantages; analyses and discussion of the situation in...
Pattern Recognition using a Neural Network on a Microcontroller with I2C Ultrasonic Sensors
Ultrasonic sensors have been used in a variety of applications to measure ranges to objects. Hand gestures via ultrasonic sensors form unique motion patterns for controls. In this research, patterns formed by placing a s...
Filling Factors of Sunspots in SODISM Images
The calculated filling factors (FFs) for a feature reflect the fraction of the solar disc covered by that feature, and the assignment of reference synthetic spectra. In this paper, the FFs, specified as a function of rad...
Towards a Quantum Field Theory for Optical Artificial Intelligence
Today, several socio-techno-economic drivers are steering the evolution of Telecommunications and Internet towards a growing exploitation of ultra-broadband infrastructures (e.g., 5G) and Artificial Intelligence (AI) sys...
Big Data Analytics and Its Applications
The term, Big Data, has been authored to refer to the extensive heave of data that can't be managed by traditional data handling methods or techniques. The field of Big Data plays an indispensable role in various fields,...