Secure University Network Architecture, Vulnerabilities, Risk Priority Level Classification and Countermeasures

Idris Ismaila*, Muhammad Umar Majigi**, Shafi’i Muhammad Abdulhamid***, Morufu Olalere****, Muhammad Bashir Abdullahi*****, Vivian O. Nwaocha******
*_****Department of Cyber Security Science, Federal University of Technology, Minna, Nigeria.
***** Department of Computer Science, Federal University of Technology, Minna, Nigeria.
******Department of Computer Science, National Open University of Nigeria, Nigeria.
Periodicity:July - September'2018
DOI : https://doi.org/10.26634/jwcn.7.2.15604

Abstract

In order to safeguard a University’s networked assets, a network administrator must decide how to harden the network. To aid the decision-making process, network administrators may use network hardening suggestions. A critical drawback of currently available analyses is the lack of consideration for the network administrator on identified vulnerabilities, risk figure, risk priority level classification and network security mechanism. Nessus and Nmap are network vulnerability scanner used for this research. Internal and external scan results tabulated. The result shows that firewall constitute 81 on scale of 1-100 risk priority level classification of university information and technology service (ITS) network with high risk security level and open email relay constitute 2 with low risk level. Thus, the research establish a university secure network architecture model that contributed towards understanding risk priority level and also overcome shortcoming in choosing appropriate security measures.

Keywords

Vulnerability, Campus Network, risk; security; network attacks

How to Cite this Article?

Ismaila, I.,Majigi,M.U.,Abdulhamid,S.M.,Olalere,M.,Abdullahi.M.B.,and Nwaocha,V.O.(2018). Secure University Network Architecture, Vulnerabilities, Risk Priority Level Classification and Counter measures. i-manager's Journal on Wireless Communication Networks,7(2), 42-51. https://doi.org/10.26634/jwcn.7.2.15604

References

[1]. Al Maskari, S., Saini, D. K., Raut, S. Y., & Hadimani, L. A. (2011). Security and vulnerability issues in university networks. In Proceedings of the World Congress on Engineering (Vol. 1).
[2]. Ali, M. N. B., Hossain, M. E., & Parvez, M. M. (2015). Design and implementation of a secure campus network. International Journal of Emerging Technology and Advanced Engineering, 5(7), 370-374.
[3]. Awodele, O., Onuiri, E. E., & Okolie, S. O. (2012). Vulnerabilities in network infrastructures and prevention/ containment measures. In Proceedings of Informing Science & IT Education Conference (InSITE).
[4]. Hoo, K. J. S. (2000). A risk-management approach to computer security. Consortium for Research on Information Security and Policy (CRISP) (pp.1-88).
[5]. Idris, I., Majigi, M. U., Abdulhamid, S., Olalere, M., & Rambo, S. I. (2017). Vulnerability assessment of some key Nigeria government websites. International Journal of Digital Information and Wireless Communications, 7(3), 143-153.
[6]. Jagli, M., & Temkar, M. (2013). The unified approach for organizational network vulnerability assessment. arXiv preprint arXiv:1310.2365.
[7]. Kak. A. (2016). Port and vulnerability scanning, packet sniffing, intrusion detection, and penetration testing. Lecture Notes on Computer and Network Security.
[8]. Maistry, T. N., Ramkurrun, N., Cootignan. M., & Catherine, P. C. (2015). Cyber security: Threats, vulnerabilities and countermeasures - A perspective on the state of affairs in Mauritius. In Proceedings of the Second International Conference on Data Mining, Internet Computing, and Big Data, Reduit, Mauritius (pp. 54-68).
[9]. Saxena, A. K., & Kumar, S. (2006). Network Penetration Testing. AKS Information Technology Service Ltd. Retrieved from https://cert-in.org.in/Downloader? pageid=5&type =2&fileName=CIPS-2010-0167.pdf
[10]. Shanthamurthy, D. (2011). NIST SP 800-30 standard for technical risk assessment: An evaluation. In Computer Weekly.com. Retrieved from https://www.computerweekly.com/tip/NIST-SP-800-30- standard-for-technical-risk-assessment-An-evaluation
[11]. Singh. G. (2011). Profilling campus network using Network Penetration testing (Master Thesis, Thapar University).
[12]. Stoneburner, G., Goguen, A., & Feringa, A. (2011). Risk Management Guide for Information Technology Systems. National Institute of Standards and Technology (NIST).
[13]. Timbs, N. H. (2013). Physical Security Assessment of a Regional University Computer Network. Electronic Thesis and Dissertations. Retrieved from http://dc.etsu.edu/etd/ 2280
[14]. Umrao, S., Kaur, M.,& Gupta, G. K. (2012). Vulnerability assessment and penetration testing. International Journal of Computer & Communication Technology, 3(6-8), 71-74.
[15]. Wei, J. (2016, May). The campus network security hidden danger analysis and countermeasure research. In 2016 2nd Workshop on Advanced Research and Technology in Industry Applications (WARTIA-16). Atlantis Press.
[16]. Wu, C. (2010, July). The problems in campus network information security and its solutions. In Industrial and Information Systems (IIS), 2010 2nd International Conference on (Vol. 1, pp. 261-264). IEEE.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.