Ass2 Security PDF
Ass2 Security PDF
Ass2 Security PDF
Threats have large quantity and forms and mostly use malicious code called malware.
Malware is a application specifically designed to break, corrupt or gain unauthorized
access to the most popular computer systems and delivery methods via email ,suspicious
websites.
Types of malware
Malware Description
Virus The classic malware that most people have know, a virus can Intrusion
itself to other programs and copy itself when files are opened or
transferred from one computer to another.
Worm A program can copy to other computers on the network by exploiting
vulnerabilities in systems.
Troia horse as name is familiar and is often seen in illegal sources (BenSanders,
2017)
Rootkit Software designed to robbery administrator rights (or Root) on the
computer without being detected. Sometime programs can hide their
tracks, making them very difficult to detect. After installation, they can
be used to access remote computers or take information from another
places.
Spyware An application that collects information about a person or organization
they unaware.
Adware often installed with other reputable applications, the adware will insert
unsolicited ads and offensive into the user's browser.
Ransomware one of the most popular malware in recent years, software designed to
exploit a known Windows vulnerability and software traditional and
authoritative antivirus protection. From this point, it starts encrypting
all user files and after done, it locks the victim out of their computer
and required to force users to pay to unlock the computer .
Polymorphic A special malware that changes its own code when copying, making it
malware difficult for anti-malware programs to detect infection.How to reduce
malware infections.
Install antivirus softwares and make sure the software is fully updated and safe.
Always consider the email files you open or the websites you visit. As a rule of
thumb, you should not open file or click links in emails from people you do not
know or even from people you know, but from friends who don't expect
attachments or links.
Turn on the Windows firewall.
Security breaches and types of organizational security risks are a very important and
essential issue in today's system security. Although there are many stories about
security leaks and distributed denial of service attacks and repetitive alerts from security
experts that businesses and individuals need to implement.
Identify other security threats in the organization
The risks outside the organization when being attacked into the data system, we have
some cases on the inside of the organization and when attached to the system, it is
even more dangerous to be attacked by an external virus. Have a few cases:
- Staff dissatisfied:
Employees are the biggest security risk for any organization because they
know where the company's valuable data is stored and they know to access it.
The cause of data breach is from an old employee, who is not promoted or raises
a salary.
If a employee is against you, the result may be disastrous if you are not prepared. The
best ways to prevent an attack are:
+ Monitor and manage access information closely and ensure privileged account
log activity and monitor unusual behavior.
- Careless staff:
o In addition to malicious attacks, careless employees can pose huge network security
risks. Another common problem is that employees open the attached gmail files or surf
malicious websites, which can bring malware into the system.
The solution is to train employees with appropriate security procedures and effective.
Other hand, we must ensure that they absolutely must understand the importance of data
security and remind employees to constantly on the risks of malware and suspicious emails.
For system protection, encrypt the data so it cannot be read even if the system is hacked.
- Outdated software
o A network security vulnerability is very common in all networks that are outdated
software and used too long. The virus is being updated every day and more and more.
Similarly, operating systems need to be updated periodically with security version.
Obsolete and customized software can also contain serious network security issues.
o Your best way now is to ensure that all patches and software are constantly updated,
even for business software.
P2 Describe organisational security procedures.
Your organization’s security policies are the foundation of its security program. An important
principle of security policies is that they focus on guiding behavior. Like security policies,
security procedures also focus on guiding behavior. While security policies address the who,
what, and why, security procedures inform individuals in your organization of the when,
where, and how relating to security. To help focus the security procedures within your
organization, standards and baselines should also be defined. Standards and baselines are
directed at the technology implemented in an organization, whereas policies and procedures
focus on guiding behaviors.
- Security Procedures should contain sufficient detail to be executable.
Security policies outline security needs in a general or high-level fashion. Security procedures,
on the other hand, must provide sufficient detail that an individual who is not familiar with the
process or technology can successfully reach the desired outcome for the procedure. Many
organizations have those one or two superstar tech geniuses who know how to do everything.
Avoid such circumstances by developing security procedures to define the how, where and
when things get accomplished. Beware to avoid developing procedures that rely on expert
knowledge as a foundation to execute the procedure, doing so often results in gaps in the
procedure. A good test for the level of detail for your procedure is to have some of your more
junior staff execute the procedure. If they can do it cleanly, then there is likely sufficient detail
to your procedure. If not, provide additional detail to your procedure. Also, make sure
everyone who may execute the procedure has the proper access/permissions. All of the
organization's security procedures include problems
Without any organization without an organization's own security policies and procedures in
the organization's and post-data systems, one of the most popular organization's security
policies includes:
- Organizational information
The purpose of this information is to declare the organization's privacy policies and all of these
policies belong to the organization's ownership of your organization. Apply policy
The purpose of the application This policy will apply to all information created, received and for
the organization's data including: Use, management and storage, information and data. The
application of this policy covers all areas, such as: Access control, information security incident
management, development and maintenance.
Policy principles
The principle of an organizational security policy is to identify the principles to establish all
security measures to makesure the integrity of the organization security and minimize all
security risks organization, such as: Take all appropriate control measures to protect
information from being disclosed to the outside, delete or copy all information of the
organization.
M1 Propose a method to assess and treat IT security risks.
Establishing a risk management framework
These are the rules governing how you will identify risks; who you assign risk ownership to;
how the risks affect the security, integrity and availability of the information; and the method
of calculating the estimated damage of each scenario and the likelihood of it occurring.
Identifying the risks that can affect the confidentiality, integrity and availability of information is
the most time-consuming part of the risk assessment process.
- Analyse risks
You should identify the threats and vulnerabilities that apply to each asset. For instance, if the
threat is ‘theft of mobile device’, the vulnerability is ‘a lack of formal policy for mobile devices’.
- Evaluate risks
You need to weigh each risk against your predetermined levels of acceptable risk ,
and determine which risks you need to address and which ones you should ignore.
Select risk treatment, there are four ways you can treat a risk:
o Avoid the risk by eliminating it entirely
o Modify the risk by applying security controls
o Share the risk with a third party
o Retain the risk
D1. Investigate how a ‘trusted network’ may be part of an IT security solution
LO2. Describe IT security solutions
P3. Identify the potential impact to IT security of incorrect configuration of firewall
policies and third- party VPNs.
Firewall policies:
Non-standard authentication will receive the impact of firewall failure failure. The wrong
remote control results in traffic not reaching your goal, it can be noticed quite quickly when the
process doesn't work
Configuration mistakes:
- It was blocked
- Get wrong limiting, too much or too little network traffic passed the firewall.
- Policy configuration is too large
- It has been moved to the wrong destination
- It cannot be located
Risky rogue services, management services and false sense of security it could generate, making
troubleshooting other part of system more difficult.
Dangerous ports open (Get error possible this could cause some negative conseque by
accident), it’s can a possible good attack vector for individuals with malicious intent (The cyber
threat).
Understanding how to set up VPNs correctly in an organization will avoid problems that
occur later. Here are some VPN issues and related technical problems:
- VPN client software work on all user devices, such as PCs, laptops, tablets and
smartphones; this makesure your company avoid a VPN security breach.
- VPN protocols makesure work end-to-end through firewalls, routers and switches.
- Should pick VPN devices that are compatible and interoperable with
concentrators, appliances and servers.
- Balance security and protection against ease and convenience of using your chosen
VPN to avoid technical VPN issues.
- They request your security, privacy . They folow your activity, they limit the amount of
data You should use
P4. Show, using an example for each, how implementing a DMZ, static IP and NAT in
a network can improve Network Security
DMZ which stands for demilitarized zone is strip of land that separated North Korea and
South Korea. A network DMZ is a buffer between the Internet and your internal network. DMZ
is not another fancy word for a firewall, but it does provide a similar kind of protection—just in
a different way. The devices included in the DMZ can be mail server, web server or public data.
It applies to office or corporate networks to makesure that the entire network will not be
affected by any external threats or threats.
Assume that we have the network below that has servers and workstations connected to the
same router.
Any malicious request from the outside that gets through the secure layer of the internal
network will Intrusion the server and system data. Because all the devices connecting to
the same network, the harmful packets can travel throughout all of the devices which
causes services and all offices stop working.
Therefore, we need to put the servers and office computers on the different network segments
which helps to reduce the harms from the outside.
Currently traffic from outside the network will point to the servers in that local network. We
have set firewalls as the intersection of network traffic to filter all unknown or unauthorized
requests that could harm the entire network. When there is public access, many companies
may need to open their servers to the internet to provide the necessary services to the
public but also ensure that other parts of the network are secure and not available.
accessible from external requests. Therefore, the area in the image above contains the Web
server, the mail server is called the demilitarized zone.
There is also a more advanced way to increase network security by using a dual firewall
with DMZ between them.
The NAT which stands for Network address translation and static IP configuration can
help to improve network security.
NAT is a method of converting a public IP address into a private or local IP address. The
purpose of NAT is its re-use feature which helps to avoid the lack of IP address so that every
time the device connects to any network, it only receives a single IP address. Although all
devices in that network have different IP addresses, they only need a public IP address to easily
access the Internet.
When we look at the image above, all local IP addresses will use a unique IP address to exit the
intranet. By using NAT, all packets going through the router will have the IP address converted
into the same IP. If any device on the local network tries to connect to the remote network or
device, it cannot detect the real IP address of that device as the sender because all devices
from the LAN are used. share a public IP address. If someone intends to harm such a dangerous
message, it will be difficult to get where the device package comes from because all they can
see is the public IP provided by the Internet Service Provider. not the private IP address
provided by the DHCP server.
M2. Discuss three benefits to implement network monitoring systems with supporting reasons.
Three benefits of network monitoring:
Identify security threat
When you don't have budget for intrusion detection software, but still want a tier 1 method to
help protect against data breaches, network monitoring can help secure your business-critical
data.
A network monitoring tool can provide that first level of security. The biggest benefit you get is
a picture of what "normal" performance looks like for your organization, making it easy to spot
anything out of the ordinary—whether that's a spike in traffic levels or an unfamiliar device
that's connected to your network. By drilling in to figure out when and on what device an
event occurred, you're able to take a proactive approach to network security.
Whether you're dealing with a configuration error or an abnormal traffic fluctuation, network
monitoring software helps you get to the bottom of issues once and for all. Live network maps lead you
to the origin of problems, and status windows give you performance metrics over time.
Also, network automation tools help you go one step further. Not only can you identify problems via
network monitoring, but you can fix them automatically, without having to get a person involved.
What causes IT outages? Human error, configuration issues, and environmental factors can all
contribute. Implementing network monitoring is one of the most basic and simple ways to prevent
these outages from happening in the first place.
Network monitoring gives you the visibility you need to stay one step ahead of potential issues. By
showing live network performance data in an easy-to-read interface, network monitoring software
helps you identify outages that could cause bottlenecks.
The proper IDAM controls will help limit access to personal data for authorized employees. The
two key principles in IDAM, separation of duties and least privilege, help ensure that
employees have access only to information to their job function.
What does this mean in terms of GDPR? Only those who need access to personal information
to perform their job have access to system. In this situation, privacy training should be available
to those individuals to makesure that the intended purpose for collection of personal data will
maintained.
Used to ensure that sensitive data is not lost, misused, or accessed by unauthorized users.it
classifies regulated, confidential and business critical data and identifies violations of policies
defined by organizations or within a predefined policy pack, typically driven by regulatory
compliance such as HIPAA, PCI-DSS, or GDPR. Once those violations are identified, DLP
enforces remediation with alerts, encryption, and other protective actions to prevent end
users from accidentally or maliciously sharing data that could put the organization at risk.
Pseudonymization can be one way to comply with the European Union's new General Data
Protection Regulation demands for secure data storage of personal
information.Pseudonymized data can be restored to its original state with the addition of
information which then allows individuals to be re-identified, while anonymized data can never
be restored to its original state.
A mature IRP should address phases such as preparation, identification, containment, destroy,
recovery and lessons learned. But, what if an incident occurs and it was identified that data may
have been breached?
Well, GDPR has requirements for your organization’s. Breach notification requirements are
among the most special in the legislation. Under GDPR, “In the event of a potential data breach
that involves personal information, an organization must notify the Data Protection Authority
without undue delay, within 72 hours if impossible, after becoming aware of the breach; and
Communicate high-risk breaches to affected data subjects without undue delay” .
Policy Management
Policy management is the process of creating, communicating, and maintaining policies and
procedures within an organization. An effective policy management system can mitigate risk
in two ways. First, it makes policies more quickly accessible to direct care staff, guiding care
and safety decisions. Second, it can protect an organization from litigation by staying up to
date on accreditation standards and creating an audit trail in the case of legal action. Because
the process of managing policies can be expensive and time consuming, hospital boards
should make the implementation of an efficient policy management system a priority. A
comprehensive and well-managed set of policies can support GRC activities by communicating
boundaries and expectations, establishing a culture of compliance within the organization,
protecting the organization from litigation, and helping achieve the organization’s objectives.
M3. Summarize the ISO 31000 risk management methodology and its application in
IT security
Raising awareness about the need to identify and handle risks in the
organization; Improve the identification of opportunities and threats;
Improve governance;
Establishing a reliable basis for decision making and planning;
- Risk analysis: The organization must analyze each identified risk in the step. Based on
the level of risk identified after risk analysis, the organization may consider whether the
risk should be accepted. If the risk is not acceptable, the organization may perform
preparatory actions to modify the risk to correspond to an acceptable level of risk. The
organization should use a formal technique to examine the consequences and
capabilities of each risk and these techniques may be contemplated, quantified or
combined based on the circumstances and objectives used.
- Risk assessment: This step provides the organization with an opportunity to have a
mechanism to help them rank relative to each risk, so that they can establish
treatment priorities.
- Risk Management: Proper risk management requires rational and wise decisions on how
to handle risks. Typically, such treatments include: avoiding activities that risk
originates, risk sharing, risk management by applying control measures, not taking any
further action, or accept risks and increase risks to pursue opportunities. Organizations
do not always find themselves in trouble because of their excessive and reckless
behavior. Sometimes organizations lag behind their opponents due to reluctance to
take risks and pursue these opportunities.
- Communication and consultation: Appropriate risk management requires structured
and continuous communication with people affected by the organization's activities.
The media must find ways to promote awareness and understanding of risks and
means to meet its requirements, while consultation includes collecting feedback and
information to support decision making. .
- Recording and reporting: Another step of risk management process based on ISO 31000
method is recording and reporting, ie the results of the risk management process will be
recorded and reported through mechanisms suitable. Recording and reporting
are important.
M4. Discuss possible impacts to organizational security resulting from an IT security audit.
Possible impacts to organizational security:
The IT security audit process ensures that your cyber defense measures are always
updated as quickly as possible.
And to deal effectively with threats caused by false information and these criminals
manipulate IT systems.
Security audits will save you money by finding the most effective ways to protect your
information system and minimize resource wastage for outdated or inefficient operations.
Security audits can use the criteria necessary to support your location and provide
appropriate utilities. We can help you make the most of your involuntary investment.
D2. Consider how IT security can be aligned with organizational policy, detailing the
security impact of any misalignment.
Maximum password age determines how many days a password can be used before the user
is required to change it. The value of this between 0 and 999; if it is set to 0, passwords never
expire.
Minimum password age determines how many days a user must keep new passwords
before they can change them.
The password contains characters from at least three of the following four categories:
English uppercase characters (A - Z)
Base 10 digits (0 - 9)
When checking against the user's full name, several characters are treated as delimiters that
separate the name into individual tokens: commas, periods, dashes/hyphens, underscores,
spaces, pound-signs and tabs. For each token that is three or more characters long, that
token is searched for in the password; if it is present the password change is rejected. For
example, the name "Erin M. Hagens" would be split into three tokens: "Erin," "M," and
"Hagens." Because the second token is only one character long, it would be ignored.
Therefore, this user could not have a password that included either "erin" or "hagens" as a
substring anywhere in the password. All of these checks are case insensitive.
Device Security
You will most likely identify these network segments with other security requirements while
designing the security for your network. For example, some servers will need to have access
staff. Some are still publicly accessible. Therefore, in order to implement security for different
departments, you will build belts that can only be overcome by a number of major types of
traffic in the form of Public Networks, Private Networks, and sold networks. The limitations of
such network segments are set by devices such as routers, ports, bridges and switches that
can adjust and control the flow of incoming and outgoing segments. Communication and
monitoring devices are often deployed in the network for many different purposes, must be
properly configured as required and accessed on the basis of privileges and profiles of users of
their available software. updated. In addition, the following measures should be taken in the
context of device security:
The company must sign an NDA for each employee about not disclosing details of the
devices deployed within the perimeter.
Internet Access
Internet access policies include systems that automatically block all websites identified as
inappropriate and unspecified for corporate users. Moreover, internet access should be based
on the nature of the work of each employee in each company. The Internet builds its own
network topology and connects itself to the various important assets of the company, such as
servers, accounts, etc., so it must be filtered and monitored properly.
VPN Policy
VPN systems provide a means to protect data while it moves to an unreliable network. VPN is
only for employees who use computer systems owned by the organization. All types of remote
access to the corporate network must go through VPN with the company's standard operating
system, along with certain security systems. Do not allow access to company computers when
coming from home via the internet. To protect the network when VPN is used to access remote
users, security administrators need to ensure that full protection is always performed on
endpoints using L2TP with IPSec. Furthermore, VPN providers must turn on their client's
firewall function to filter traffic.
Ports that communicate in or out of the workstation for services that do not need to be
blocked in addition to services such as HTTP, HTTPS, etc. since most have noticed that open
ports for some of the services that are opened are not appropriate, this often makes it easier
for hackers to break the system. Such security measures may be applied by the system
administrator as a defensive line. Therefore, a workstation communicates directly with the
internet and only uses authorized services or interfaces in the inbound connection.
To prevent possible abuse of wireless networks, the user must first authenticate the user in
accordance with the WEP replacement and the abnormal monitoring mechanism on the
wireless LAN. Furthermore, 802.11i security measures such as TKIP and CCMP should be used
to encrypt information. At the same time, having a list of the following suspicious events on
wireless LAN is always considered for intrusion detection:
Beacon frame from untrusted access point
Data security is becoming a common problem when many organizations establish network
links between their employees to share information and increase high security performance.
Security begins with the last session between the authorized user and the remote server on
the network and the user can perform all of his functions on the remote server. At the same
time, mismanagement of user information can also lead to exploitation. Therefore, direct
access to an organization's important server or system must be strictly limited through remote
login or SSH utility except authorized users. However, encrypted access is still allowed.
When a user connects to an unsecured network, he may open up a large door containing large
unidentified data. One of the best ways to protect against exploits from insecure networks is
to use a firewall, as it is necessary to protect their private networks and computers. Policies to
enforce rules vary according to the type of firewall and resource deployment:
In the case of dedicated server access, the proxy firewall must be located between the
remote user and the dedicated server to hide the identity of the server.
On the other hand, when speed is not a concern, configuring the status table filter (state
inspection firewall) is an appropriate option to automatically confirm connectivity and
packet forwarding.
Furthermore, NAT should also be used because it complements the use of firewalls in
providing an additional security measure for an organization's intranet, especially preventing
DDOS or other attacks.
Intrusion Policy
IDS applications should be located in a location that can detect abnormalities and monitor
unauthorized access, because for extreme defensive lines, firewalls or anti-viruses are not
sufficient. The security administrator must constantly check the system log files and must
secure something suspicious. In addition, use Advance Antivirus with IDS / IPS feature, for
inappropriate control, advanced privileges, incorrect group, permission to change,
change registration, and inactive users. Most importantly, IDS software is configured on
top of an operating system, but network blocking IDS is increasingly being deployed as a
hardware application because of its performance.
A proxy server is usually located between the server and the user, both for attack and defense
purposes. When deploying a proxy server, the following checklist must ensure:
DMZ Policy
Certain systems or servers, such as e-mail, web servers, databases, etc. . A potential attack
against critical systems can be destructive or even negligible by putting them together with
the firewall.
The account must be secured with a complex password (password length, password
complexity).
Account holders are only allowed to access information and services when necessary.
- User rights: A type of privilege that the User is allowed by the system to perform special
actions (for example: Right to back up files and folders, change system time, ...).
- Permissions: Controlled by the DACLs of the system, allowed to access files / directories or
Active Directory objects (eg User A has Read / Modify permissions with Directory C: Data,
User B is the complete control for the OU enterprise ...).
P8. List the main components of an organizational disaster recovery plan, justifying the
reasons for inclusion.
- Communication plan and role assignment.
A plan is essential because it puts all employees on the same page and makes sure to
clearly outline all communication. The document should contain all of the employee
contact information and should understand their role in the days following the disaster.
Tasks like setting up workstations, evaluating damage, redirecting phones and other tasks
to help you organize things.
It is important that you plan to protect your device when a major storm is coming. You need to
take all the equipment out of the floor, move into a room without a window and make sure it
is covered with plastic to ensure that there is no water in the device. It is obviously best to
completely seal the device to keep it safe from flooding, but sometimes in the case of severe
flooding, this is probably not an option.
When you create a disaster recovery plan, you will want to discover what your business requires to
run. You need to understand exactly what your organization needs to do, financially, related to
supplies and with the media. Whether you are a large consumer business that needs to complete
shipments and contact their customers about those shipments or a small business to a business
organization with many employees to be able to make backup plans , business continuity and have
a full understanding of the needs and logistics around those plans.
- Check backup.
Make sure your backup is still running and include running an additional full local backup on all
servers and data in your disaster preparedness plan. Run them as far as possible and ensure
that they have backed up to a location that will not be affected by any disaster. You should
also be cautious when putting that backup on an external hard drive that you can carry around
without knowing it at any time.
In your disaster preparedness plan, you should have a detailed repository of components,
servers, printers, scanners, phones, tablets and other technologies that you and your
employees have used. daily use This will give you a quick reference for insurance claims after a
disaster by providing your moderators with a simple list of any inventory you have.
M5. Discuss the roles of stakeholders in the organization to implement security
audit recommendation
The security audit process is an accurate systematic assessment of the security of the
information system by measuring its suitability with an existing set of criteria. Security
audits are often used to determine regulatory compliance, according to laws (such as HIPAA,
Sarbanes-Oxley Act and California Security Infringement Information Act) that have been
designated organizations to address believe.
To accomplish the purpose of collecting information from businesses, support from third
parties is needed to analyze data, market and support customer service or provide better
services to customers. In the process of information security of enterprises, stakeholders will
support the process according to the following table:
STAKEHOLDERS ROLE
Server manager A person always monitors and controls business data closely.
The second party will cooperate with businesses and help security
Business Partners audit businesses, two units will work together to comply with
security policies.
People who interact with businesses through VPN. Is the person
Customers who makes requests, reports incidents to fix the system.
Server and Branch Manager: Server managers need to follow security measures
such as:
Business
Partners: Business
consulting services:
- Overall security consulting: HPT will conduct a survey of the entire system, analyze
in detail the security risks and general security advice as well as the security
investment roadmap appropriate to the system of customers. .
- Security consulting on demand: Depending on the specific needs of customers, HPT will
check and analyze the system of detailed and related components, then advise in detail
solutions / services Security will be deployed to help meet customer security needs.
Customer:
Customers using the service will include survey and evaluation of the following information:
- Network security software and devices (Firewalls, attack detection and prevention
systems, VPN systems, etc.)
References
https://linfordco.com/blog/security-procedures/ https://www.itgovernance.eu/blog/en/5-
steps-to-an-effective-iso-27001-risk-assessment
https://www.helpsystems.com/resources/articles/top-benefits-network-monitoring
https://en.wikipedia.org/wiki/Pseudonymization
https://digitalguardian.com/blog/what-data-loss-prevention-dlp-definition-data-
loss-prevention
https://www.policymedical.com/what-is-policy-management/
http://www.itgeared.com/articles/1013-how-to-implement-active-directory/