You are on page 1of 6

CENTRAL IT COLLEGE-Guwahati

Centre Code-1729

Authorized under
SIKKIM MANIPAL UNIVERSITY
Of Health, Medical & Technological Sciences
Gangtok-737102

PROJECT SYNOPSIS

“NETWORK SECURITY INFRASTRUCTURE”


IN

National Informatics centre [NIC]


Department of Information Technology
Ministry of Communications and Information
Technology
Civil Secretariat, Block-3,
Itanagar, Arunachal Pradesh – 7911 11

By

Achyut Kumar Borah

Registration No. 510912199


Semester III (Information Systems)

CENTRAL IT COLLEGE
Dr. R.P. Road, Dispur, Guwahati-781006
• INTRODUCTION:

Network security implies the protection of data that are stored on or that travel over a network
against both accidental and intentional unauthorized disclosure and/or modification. A network
matching the following characteristics are with highly vulnerable to attacks:

 Public and anonymous accessibility provision.


 Partial access to the network from the internet.
 Network of an organization dealing with financial or monetary information.
 Transaction of confidential information.

This is always crucial to protect all the network assets against any unauthorized access, alteration
or destruction.

Implementation of network security in any organization basically focuses on three goals: Data
Confidentiality, Integrity and Availability. The organizational data that must be kept private and
protected from unauthorized modification and/or destruction. Also it has to be ensured that the
data are accessible whenever needed by the organization. This implies protecting the network
from anything that would make it unavailable, including such events as power outages or
physical breakdown. Sufficient attention has to be paid towards external as well as internal
threats.

• AIMS AND OBJECTIVES

National Informatics Centre (NIC) is a premiere institution of the Government of India,


established in 1976, for providing e-governance Solutions adopting best practices, integrated
services and global solutions in Government Sector. NIC, Arunachal Pradesh State Centre is
actively involved in providing ICT support to State Government that includes free internet access
to various govt. departments, web-hosting, enterprise data storage, software development etc.

As the centre works as a storehouse of sensitive/confidential data and as the functions of e-


governance is growing day by day the priority of securing the network is also increasing
consequently. The organization has a state of the art Network Operation Centre (NOC) equipped
with various networking and security equipments. This project is aimed at analyzing the present
network security infrastructure of NIC, Arunachal Pradesh State Centre and providing feedback
for the improvement in the problem areas of the organization.

The main objectives of the study are:


I. To study the current network security infrastructure of the organization.
II. To find the loopholes in the current network security infrastructure. &
III. To provide suggestions/ feedback for improvement.

• LITERATURE REVIEW

I. Synacor Inc.(40 La Riviere Drive Suite 300 Buffalo, NY 14202,


http://www.synacor.com) is a leading technology company that advances the delivery of
meaningful content and technology solutions for multiple system operators (MSOs),
telecommunication companies, and Internet service providers (ISPs) around the globe.
Through Synacor's private label portals, subscribers can access a broad range of
published and premium content, including entertainment, education, and family-oriented
offerings from their homepages.
As the business as well as the computer network of the organization grew bigger, its
security exposure has evolved as well. Fast-growing Internet businesses simply cannot
afford network failures or security breaches. CISCO Inc. had carried out a case study to
protect the network of the organization and to improve the performance. Synacor's first
task was to re-architect the security policies to cover all of the company's users and
applications, and reflect the size and scope of the company. Next, Synacor began
planning the network overhaul. After reviewing several options, Synacor's leaders
decided to work with Cisco® Certified Gold Partner IPLogic, and to build the new
technology backbone of the company with Cisco solutions. The case study is available in
the following URL:

http://www.cisco.com/en/US/prod/collateral/vpndevc/ps6032/ps6094/ps6120/prod_case_
study0900aecd805ac906.html

II. Juniper Networks (1194 North Mathilda Avenue Sunnyvale, California 94089-1206
USA) carried out case study on building secure networks at various organizations to the
network. The reports are available in the following URL:

http://www.juniper.net/us/en/company/industry/enterprise/#case-studies

III. NIC, Arunachal Pradesh State Centre is currently using Microsoft ISA Server for Web
access firewall, Proxy (NAT) and web caching services. For application layer firewall
implementation and hardening issues case studies by Microsoft Corporation, US will be
used. The case studies are available in the following URL:

http://www.microsoft.com/forefront/edgesecurity/isaserver/en/us/case-studies.aspx
• DESCRIPTION OF STUDY METHODOLOGY:

1. Data Collection:

The following data will be collected for analysis:

I. The configuration of the PIX firewall.


II. The logs generated in syslog server.
III. The configuration of ISA (Web Proxy/ Firewall) server.
IV. The virus logs available in the Antivirus server.
V. The configurations of L2/L3 switches used for client access.
VI. The physical set-up of the Network Operation Centre as well as the LAN will be
studied.

2. Scope of study:

I. The scope of the study will be the current network set-up of NIC, Arunachal Pradesh
State Centre.
II. The study focuses to find out the security risk factors in the current set up and also
suggest some of the remedial measures secure the set up.

3. Limitations of the study:

I. Limited access is only available to the network security equipments due to


organizational norms.
II. Have to rely mostly upon the information/ configuration file provided by the officials.
III. Some information can’t be made public due to strict security directives.
IV. The study is limited to the available equipments/ servers in the organization.
V. Time constraints.

4. Data Analysis:

The collected data will be presented in descriptive (Summarized) and tabular method as well
to draw inferences and hence provide feedback to the organization.

5. Conclusion

The completion of the project will enhanced our technical skill and knowledge in creating a
secure network. The project is aimed at enhancing our understanding and developing skills in
network analysis. The project will be helpful in designing and developing a secure network
in the organization.
It will be required to undertake an in-depth analysis of the current network security system at
NIC, Arunachal Pradesh State Centre and consequently design an improved and enhanced
network for the organization.
5. Bibliography:

I. Cisco Systems, Inc., 170 West Tasman Dr., San Jose, CA 95134, USA, a leading
networking and security appliances manufacturer has conducted a wide range of case
studies in the field of network performance and security at various organizations. The
case study reports will be exclusively used for reference in this project. They are
available in the following URL:

http://www.cisco.com/en/US/products/hw/vpndevc/products_category_customer_case_studies.html

II. “Computer Networks” by Andrew S. Tanenbaum (Prentice Hall PTR, Upper Saddle
River, New Jersey).
III. “CCNA Security” by Michael Watkins, Kevin Wallace (Cisco Press, 2008).
IV. “Security Hardening Guide - Microsoft Internet Security and Acceleration Server 2004” -
Microsoft Corporation, US; available in the URL:

http://technet.microsoft.com/en-us/library/cc302511.aspx

You might also like