Skip to main content

Investigation and Development of a Networking and Cyber Security Lab


Investigation and Development of a Networking and Cyber Security Lab
Fungai P. Mundoma

Abstract
The world we live in today is centered around computer networks and the internet and until recently, the security vulnerabilities online have not been fully addressed. This project is based on raising the awareness of networking and cyber-security by designing a course structure for this subject as there is a predicted shortage of professionals in this area. Firstly, an investigation was carried out on the existing networks and current trends of cyber- security to get an in depth understanding of how these networks are exploited. The second step was to design a 24 week course structure that would address issues identified in the investigation and ensure students can understand and prevent network exploitation from online attackers. A website has been developed to contain all the study material for students which includes videos and practice questions for better understanding.

An isolated Local Area Network was created in room NW202 as a testing lab for students to practice the material listed in the course. The network was created using a Cisco 2960 series switch and a Cisco ASA 5510 series working as a router and firewall. The firewall implementation was carried out on two different platforms, with the first one being a software firewall used on a virtual network environment and the second one being a hardware firewall implemented in the University lab. A network intrusion detection system has been implemented to demonstrate the importance of enhanced security measures on the network by enabling the detection and monitoring of suspicious network traffic. Another network security measure implemented was the use of a virtual private network (VPN) for users to access internal network services from outside that network but through and approved secure tunnel.
The final part of the project involves performing penetration tests to the LAN. This would uncover any vulnerabilities of the network that could be open and available for exploitation. A step by step procedure has been laid out for students to understand the use and benefits of carrying out penetration test to protect their networks. 



The University of Northampton's, Department of Computing and Immersive Technologies offers five courses within the MSc Computing postgraduate provision (shown below) all available either part-time or full-time. 


Popular posts from this blog

Experiments in teaching Neural Networks

Excel Based







Scratch-based
More details available at https://computingnorthampton.blogspot.co.uk/2016/11/miniproject-using-scratch-to-build-and.html including links to the code.


All views and opinions are the author's and do not necessarily reflected those of any organisation they are associated with. Twitter: @scottturneruon

Social Analysis of Publications

The Computing staff's network of co-authors, at the University of Northampton, based on the University's  research repository NECTAR - http://nectar.northampton.ac.uk/view/divisions/SSTCT.html on 12th November 2016. The data goes back to 2010.




The data was analysed using the software VOSviewer - http://www.vosviewer.com/ free software for visualising networks. Differences in colours represents, the clusters of publications with those authors picked out by the software. The relative size of the circles is the relative number of publications listed; so for the two biggest circles/hubs it relates to 55 and 34 publications in this time period. Some relatively new authors, to the University but not to research, explains some of the 'islands' and the number of publications within it - it only reflects publications whilst at the University of Northampton.

To dig a little deeper, going to  look at the two biggest 'hubs' through their NECTAR records, so potentially going …

Computer lecturer’s research helps improve the next generation of technology

Taken from: http://www.northampton.ac.uk/news/computer-lecturers-research-helps-improve-the-next-generation-of-technology/ A computing lecturer at the University of Northampton, who is researching into how the efficiency of our everyday devices, such as mobile phones, can be improved, has been awarded the best paper at two recent conferences. Dr Michael Opoku Agyeman has written several journal papers focusing on how the next generation of technology can meet the ever increasing demands from consumers. He was invited to present his work at the 19th Euromicro Conference on Digital System Design in Cyprus and the Institute of Electrical and Electronics Engineers’ 14th International Conference in Paris. Part of his research concentrates on whether several processing elements can be incorporated on a single chip, known as System-On-Chip, to improve the efficiency and speed of the computing systems that we use every day, from mobile phones to video-game consoles and even medical equipment…