Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 9

Project One: Virtual Systems and Networking Concept Brief

Abu S Alam

CYB 220: Network Security: Prof. A. Mercer

Project One: Virtual Systems and Networking Concept Brief

Southern New Hampshire University

27th November 2022


Project One: Virtual Systems and Networking Concept Brief

Group Policy Changes

Change Windows Account Control (UAC)

Change Local Password Setting


Project One: Virtual Systems and Networking Concept Brief

Change Desktop Background User Rights Assignment

Configure Local Audit Policy Setting


Project One: Virtual Systems and Networking Concept Brief

Configure Default Logon Banner

Change Default Windows Firewall Profile


Project One: Virtual Systems and Networking Concept Brief

Network Configuration Settings

PC1_Kiosk

PC2_Kiosk

PC3_Kiosk

PC1_Admin
Project One: Virtual Systems and Networking Concept Brief

Network Router

Server Domain

Conceptual Justification for Uses of Virtual Systems: Benefits, Drawbacks, and Situation
Project One: Virtual Systems and Networking Concept Brief

Sandboxing is a practice where code is run, observed, analyzed in a safe, and isolated

environment of a network, that mimics the end-user environments. Sandboxing is designed to

test networks, and applications in a safe, isolated segment of the network, without causing in

threat, disruption to the production network. Sandbox is basically an isolated test environment.

Sandboxes are particularly useful when running tests on networks and applications because if

something goes wrong during the tests, the actual production environment is not impacted.

(Jnguyen, 2021).

Sandboxing has its advantages, as it does not risk any of the host devices or operating

systems on the production environment. Sandboxing can also be used to evaluate and analyze

potential malicious software that can pose threats to the network and the organization. sandboxes

can also be used to test, analyze and debug software changes before they go live for production.

Sandboxes are particularly advantageous to quarantine and eliminate zero-day threats. (Jnguyen,

2021).

Unfortunately, along with its benefits, sandboxing also has some drawbacks. Sandboxing

offers a variety of cybersecurity benefits, but one of the main flaws of sandboxing is that it can

limit the functionality of some applications, as it depends on the permissions that are given by

the user. Some other disadvantages can be the fact that sandboxing can give users a false sense of

security, which can make the users complacent. The biggest disadvantage is that complex and

detailed sandboxing tools are very expensive and require a lot of resources. (Ionos, 2020).

Sandboxing can be implemented as a cloud-based implementation. This uses the existing

security gateway, which does not need any more infrastructure. Sandboxing can also be used as a

dedicated on-site appliance, reducing the reliability on the cloud. It can also be used as software

bundles or even as a web-browser extension. (Jnguyen, 2021).


Project One: Virtual Systems and Networking Concept Brief

To summarize, sandboxes offer developers and security practitioners a secure, isolated

environment to test products, codes, and threats so the actual production network is not used.

Sandboxes are most effective when used as part of multiple security layers and is used in

conjunction with other security measures and protocols.


Project One: Virtual Systems and Networking Concept Brief

References:

Ionos. (2020, September 29). Sandboxing: Purpose and application explained. IONOS Digital

Guide. Retrieved November 27, 2022, from

https://www.ionos.com/digitalguide/websites/web-development/what-is-sandboxing/

Jnguyen, C. P. (2021, October 25). What is sandboxing? Check Point Software. Retrieved

November 27, 2022, from https://www.checkpoint.com/cyber-hub/threat-prevention/what-

is-sandboxing/

You might also like