2 research outputs found

    Enhancing the Design of a Secured Campus Network using Demilitarized Zone and Honeypot at Uew- kumasi Campus

    No full text
    The increasing complexity of information systems, as well as the rapid development of new vulnerabilities and exploits, the security of campus networks needs to be hardened to minimize or eradicate security flaws. Aim: To discover the vulnerabilities and enhance the creation and deployment of secured campus network.  Place and Duration of study: University of Education, Winneba – Kumasi campus. Methodology:  The integration of De-Militarized zone and Honeypot techniques was used to beef up the security of the campus network against vulnerabilities and exploits. Penetration testing was used in the assessment of the University of Education’s network infrastructure, and to demonstrate attacks and intrusion into the network infrastructure. Results: Two firewall DMZ architecture techniques protect sensitive resources of the campus network by sanctioning the inflow and outflow of traffic, determining which segment allow and disallow traffic,   whiles the Honeypot techniques were configured to keep the attention of attackers diverted from the main network, the full strength of an attack, until the administrators are prepared to put the effective counter in place. The fusion of DMZ and, Honeypot provide the System Administrators to effectively management the security of the campus networks. Conclusion: Honeypots are used to detect vulnerabilities based on the attacker’s behaviour and, data collected by honeypots can be used to enhance other security technologies.  The fusion of DMZ and Honeypot into the security models of the campus network made it more robust

    Campus Network and Systems Security Assessment Using Penetration Testing: The Case of the University of Education Winneba, Kumasi

    No full text
    Network intruders are becoming more sophisticated in their approach, resulting in many difficulties in preventing them. They exploit both well-configured systems and vulnerable systems. Aims: To examines the performance of a campus network against attacks on the network systems. Place and Duration of Study: University of Education, Winneba- Kumasi campus. Methodology: Penetration testing was adopted to investigate the vulnerabilities that may occur in a university network. This helps to test for vulnerabilities on the network system that may expose the system to exploits. Results: The test revealed that system-based attacks might be propelled by malignant pariahs on the Internet and noxious insiders straightforwardly associated with inward systems. The perpetrators can exploit vulnerabilities in network foundations and frameworks, for example, servers (web servers, software servers, file and mail servers, etc.), routers, and firewalls.  Conclusion: This work presents a way to deal with evaluating the security stance of a college utilizing penetration testing that meddles negligibly with the flow of traffic and activities on the network infrastructure. attack Insurance against network-based attacks is mind-boggling and, in the offer, to relieving one framework normally gives a stage that can be utilized to dispatch more attacks
    corecore