SEC ASM2 NguyenThiMyDuyen
SEC ASM2 NguyenThiMyDuyen
INFORMATION TECHNOLOGY
ASSIGNMENT 1 & 2:
UNIT 5: Security
Student declaration
I certify that the assignment submission is entirely my own work and I fully understand the consequences of plagiarism. I understand
that making a false declaration is a form of malpractice.
Student’s signature
Grading grid
P1 P2 P3 P4 P5 P6 P7 P8 M1 M2 M3 M4 M5 D1 D2 D3
Summative Feedback: Resubmission Feedback:
First of all, I’m extremely grateful for my family’s support in giving me their endless
encouragement, cherished affection and prompt assistance. There is not a stretch to say
that they are the most crucial movement to me to accomplish this report.
Secondly, I also highly appreciate Mr. Xuan Ly NGUYEN THE for his lectures and
instructions which are a rich resource in knowledge for me to reference.
Thirdly, a vast thankfulness goes to all my BTEC friends for the remarkable periods
of time we have been experienced.
Last but not least, I spectacularly express my deep gratitude to all the authors that
have provided extensively the immense wisdom to be used as the reference materials
throughout this document.
ASSURANCE
I certify that this assignment is my own work, based on my personal study and that I
have acknowledged all material and sources used in its preparation, whether they be
books, articles, reports, lecture notes, and any other kind of document, electronic or per-
sonal communication. I also certify that this assignment has not previously been submitted
for assessment in any other unit, except where specific permission has been granted from
all unit coordinators involved, or at any other time in this unit, and that I have not copied in
part or whole or otherwise plagiarised the work of other persons.
Learners declaration
I certify that the work submitted for this assignment is my own and research
sources are fully acknowledged.
ACKNOWLEDGMENTS ............................................................................................ i
ASSURANCE ........................................................................................................... ii
TABLE OF CONTENT..............................................................................................iii
INTRODUCTION ...................................................................................................... 1
1.1.4 Consequences........................................................................................ 7
2.2 P4 Show, using an example for each, how implementing a DMZ, static IP
and NAT in a network can improve Network Security .................................................... 18
5.3.2 CCTV.................................................................................................... 66
CONCLUSION ........................................................................................................ 69
REFERENCES ....................................................................................................... 70
LIST OF FIGURES
IP Internet Protocol
The era of information technology develops so rapidly that the exploitation and as-
surance of information security are given more priority and attention, creating great con-
cern for important data security of the company. However, how and how to ensure securi-
ty, not everyone and businesses can do it well.
Before I go into my analysis, I would like to discuss a few points related to the CIAO
Company. The company is a three-floor building located on the outskirts of the city with the
distribution system as follows:
Performed Student: My Duyen NGUYEN THI Instructor: MSc. Xuan Ly NGUYEN THE 1
The remaining rooms are distributed for private purposes such as storage
room, materials room, meeting room, event hall and reception hall. Each
such room will contain 2 computers and 1 projector, its own reception hall
contains 5 wired computers and a 50-inch projection screen.
The wireless system provides wireless connection for 300 devices at the
same time, the access point is installed on the first floor in the centre of the
reception hall.
The third floor belongs to the company's executive board, including adminis-
trators, CEO, CFO, CTO and their secretaries. In addition, 3rd floor also con-
tains some of the most important documents of the company and meeting
rooms for senior departments.
On the first floor, there is a building guard on duty from 6 am to 9 pm, the
building is covered with a surveillance camera system in key areas and many
passers-by. The control system is located in the security room.
The same requirements that the CIAO Company is required to have is the
use of services such as FTP, DNS and Web. Some additional services are
added such as VPN, remote-access, VoIP...
Performed Student: My Duyen NGUYEN THI Instructor: MSc. Xuan Ly NGUYEN THE 2
Identify the security threats CIAO Company secure may face if they have a
security breach, in addition, we have listed some recently publicized security
breach and discuss their consequences.
Describe a variety of organizational procedures an organization can set up to
reduce the effects to the business of a security breach.
Propose a method that CIAO Company can use to go under the manage-
ment of different types of risk
Discuss three benefits to CIAO Company of implementing a network monitor-
ing system giving suitable reasons.
Investigate network security, identifying issues with firewalls and IDS incor-
rect configuration and show through examples how different techniques can
be implemented to improve network security.
Investigate a ‘trusted network’ and through an analysis of positive and nega-
tive is-sues determine how it can be part of a security system used by CIAO
Company.
The first part of this report includes some basic topics such as:
Performed Student: My Duyen NGUYEN THI Instructor: MSc. Xuan Ly NGUYEN THE 3
CHAPTER 1 ASSESS RISKS TO IT SECURITY
By extension, threat in security are unusual events that have the potential to occur
with damaging consequences, leading to the loss or collapse of data, infrastructure or the
normal functioning of the system. Risks can be caused by subjective - human-induced ac-
cidents, equipment failure, and objective reasons - natural disasters such as diseases,
earthquakes, droughts, floods..., internal like corruption, spying and external such as theft,
non-target specific (ransomware, worms, trojans, logic bombs, backdoors and viruses) ter-
rorists, hacktivists and armed conflicts, etc.
The exponential development of the Internet and technologies has exposed people,
including companies, to the possibility of data security breaches. Data stored by computer
Performed Student: My Duyen NGUYEN THI Instructor: MSc. Xuan Ly NGUYEN THE 4
users has become one of the most valuable things in need of protection against potential
severe harm if data storage is lost.
Malware Attacks
The term malware was first used by computer scientist and security researcher Yis-
rael Radai in 1990, to describe malware as programs or files that are harmful to computer
users by extensively damaging to systems or to gain unauthorized access to a computer
for stealing, encrypting or deleting sensitive data, altering or misappropriating core compu-
ting functions, and monitoring the user's computer activity without permission. Theirs can
be sent physically to a system via a USB drive or other means. Malware mainly includes
computer viruses, worms, Trojan horses and spyware.
This is a general concept in information protection that describes attacks that ma-
nipulate human behavior rather than focusing on leveraging bugs in computers' and
equipment's security to accomplish bad goals such as breaking into networks, breaching
common security procedures, accessing crucial data, and so on. It can be phishing, bait-
ing, vishing, piggybacking or Pop-up window, etc.
Natural disasters
Microsoft released a revised edition of Azure security rules at the beginning of De-
cember 2019. These laws were misconfigured by Microsoft staff, culminating in the unin-
tended spill. There was no password or two-factor authentication in place to secure access
Performed Student: My Duyen NGUYEN THI Instructor: MSc. Xuan Ly NGUYEN THE 5
to the servers. Furthermore, by tracking user accounts and analysing activity of confiden-
tial assets, the organization may have greatly decreased the detection time.
29th of July, 2019 Federal prosecutors said on Monday that a software developer in
Seattle broke into a server containing customer records for Capital One and stole the per-
sonal data of over 100 million individuals, in one of the biggest data breaches by a bank.
According to court records in Seattle, where she was arrested and charged, the defendant,
Paige Thompson, 33, formerly worked for Amazon Web Services, which housed the Capi-
tal One website that was hacked, she left a trail online for police to trace while she boasted
about the hacking. Ms Thompson had obtained access to the confidential information
through a "misconfiguration" of a web application's firewall. The hacker was able to con-
nect with the server that Capital One used to store its data and, as a result, obtain cus-
tomer files.
According to court papers and Capital One, Ms Thompson stole 140,000 Social Se-
curity numbers and 80,000 bank account numbers in the breach. The bank also estimated
that the hack would cost it up to $150 million, including the cost of credit protection for
those affected. Equifax paid out $650 million last week to settle lawsuits stemming from a
2017 data leak that revealed personal information on over 147 million people.
Houston data centres, for example, were put to the test by Hurricane Harvey. The
North Houston data centre, according to Edward Heni-gin, CTO of Data Foundry Inc. in
Austin, is a "purpose-built facility designed to withstand Category 5 hurricane wind
speeds." The corporation took on additional personnel just before Hurricane Harvey to run
the data centre during the emergency and provide food, showers, and coworking space.
The corporation called on additional workers just before Hurricane Harvey to operate the
data center during the emergency and arranged meals, showers, cots, books, and video
games for employees who stayed at work for five days. During the emergency, the big da-
ta centre operators in Houston announced that service was not affected.
Performed Student: My Duyen NGUYEN THI Instructor: MSc. Xuan Ly NGUYEN THE 6
Just before Hurricane Harvey, the company brought on additional staff to maintain
the data centre throughout the emergency and provided food, showers, cots, books and
video games for employees who remained at work five straight days. The major data cen-
tre providers in Houston reported that there was no interruption of service during the
emergency. This is especially noteworthy considering that Hurricane Harvey caused dam-
age to 203,000 homes and cost at least $125 billion in damages.
1.1.4 Consequences
Lost data
Economic contracts, loan contracts, corporate plans, marketing, and even payroll...
are all highly confidential documents that can have a significant impact on the whole en-
terprise. Simply put, information on how much time it takes you to write can be stolen and
erased...
Financial loss
Some of the policies and procedures that should be used in the security program
are:
An AUP explains the restrictions and procedures that workers who use organiza-
tional IT assets must agree to in order to connect to the corporate network or the internet.
It is a normal new employee on boarding policy. Before being issued a network ID, they
must read and sign an AUP.
Performed Student: My Duyen NGUYEN THI Instructor: MSc. Xuan Ly NGUYEN THE 8
Employees will be trained on the CIAO Company's data and security policies, as
well as their responsibilities for the safety of private information, including procedures for
preventing unauthorized entry, illegal use, or loss of non-public personal information. Edu-
cation would be given to company staff upon hiring, during induction, and at the outset of
the receivership period. Before being electronically transmitted, all data containing non-
public personal information must be encrypted.
A remote access policy is a manual that specifies and describes appropriate ways
of linking to an organization's internal networks from a remote location. I've even seen ad-
dendums of guidelines added to this policy. This strategy is mandatory for organisations
with distributed networks that can reach into vulnerable network locations.
Just those entities with a demonstrable need for access to classified information
stored on the CIAO Company's network will be given access. This includes staff, third-
party providers, and others.
General
Secure remote access must be tightly regulated, and only those persons
allowed by the Information Security Officer can have access. One-time
Performed Student: My Duyen NGUYEN THI Instructor: MSc. Xuan Ly NGUYEN THE 9
password authentication or public/private keys with robust passwords
must be used to create approved entry.
Authorized users must not give their login credentials to someone else,
and they must not write or keep a record of their login credentials.
Unless the Information Security Officer approves otherwise, approved
users can only access the network using equipment provided by CIAO
Company.
When dealing with high-risk content, equipment with remote access must
comply with the Transmission Encryption Technique requirements.
Confidential information must not be processed locally on a remote ac-
cess server or other information retrieval system unless it is encrypted in
compliance with the procedures' requirements.
This is a series of security procedures that give only designated employees, who
have been hand-picked for this honour, access to secure amenities. Its aim is to protect
the facilities, resources, and other properties inside a production facility or office space
from intruders, internal threats, cyber-attacks, incidents, and natural disasters, which ne-
cessitates a mixture of technology and human supervision, as well as holding unwelcome
visitors outside. Access control, surveillance, and security testing are the three most criti-
cal aspects of a physical security strategy.
Except when special procedures have been developed to leave a door open, all
building exterior doors must be kept locked at all times. And while a staff member is in a
position to control entry through the doorway should doors be left unlocked or open. No
one shall grant or give entry to any building or space to someone who is not a recognized
employee with permission to work there.
No one shall provide or give entry to any building or room to someone who is not
recognized to be an approved employee, guest, or vendor working in that area. Manage-
ment must be aware of someone that seems suspicious or cannot supply identification.
Employees and registered users of the CIAO Company are issued office and build-
ing keys depending on their real need for entry to particular areas.
The person is solely responsible for the equipment provided to him or her. The In-
formation Technology personnel or contractors must be alerted if any equipment is relo-
Performed Student: My Duyen NGUYEN THI Instructor: MSc. Xuan Ly NGUYEN THE 10
cated, destroyed, or replaced. The employee is in charge of the physical protection of any
business equipment assigned to him or her.
Internally switched machines with sensitive data must have the hard drive wiped be-
fore being used by the new owner.
(Group, 2008)
Securing a network is hard work and difficult, issues related to Cybersecurity are
not simple but can become very complex. As new security threats seem to emerge every
day, putting a risk on the information security of individuals and companies requires dy-
namic multi-point security solutions. Not only that, but administrators also need to quickly
identify vulnerabilities to protect data security. So the advent of network monitoring securi-
ty tools helps to reduce your effort and money with its features and functions, protecting
your IT surveillance environment. Below are some monitoring tools we highly recommend
for your company.
1.3.1 OSSEC
Performed Student: My Duyen NGUYEN THI Instructor: MSc. Xuan Ly NGUYEN THE 11
Figure 1.2: OSSEC (resources.infosecinstitute.com/)
Performed Student: My Duyen NGUYEN THI Instructor: MSc. Xuan Ly NGUYEN THE 12
1.3.2 Wireshark
It also intercepts traffic and transforms binary data into a human-readable format,
making it quick to see what traffic is going through the network, how often it does so, and
how much delay there is between those hops, among other things. It then provides search
tools, such as standard expressions and coloured highlighting, to help you zoom in on the
traffic you want to inspect. This makes it easier to find what you're searching for, particular-
ly anomalous illegal traffic and intrusion.
Performed Student: My Duyen NGUYEN THI Instructor: MSc. Xuan Ly NGUYEN THE 13
CHAPTER 2 IT SECURITY SOLUTIONS
2.1.1 Firewall
Definition
A firewall is a series of advanced rules that can help deter unauthorized access into
a device and restrict what goes out of the computer for network information protection. It
acts as a barrier between safe and insecure access through an active control model with
pre-defined policies, preventing unwanted access and viruses, preventing and mitigating
harm, and ensuring internal information is safe from bad access stealing.
Its usage
The TCP/IP protocol - an algorithmic protocol that breaks down data obtained from
network applications - utilities that run on protocols (Telnet, SMTP, DNS, SMNP, NFS...)
into data packets and then assigns these packets recognizable, reproducible addresses at
the destination to be sent - operates closely with the firewall.
A firewall aids the computer in controlling the flow of data from the intranet and the
internet by determining which services from the inside are able to be accessed from the
outside, who from the outside is allowed to enter the system, and so on. A firewall adminis-
trator configures or installs rules that restrict access to external resources from those in-
side the system. As an example, users in the inside network would not be allowed to enter
those sites such as Facebook and YouTube of the administrator has limited and does not
allow access to.
Performed Student: My Duyen NGUYEN THI Instructor: MSc. Xuan Ly NGUYEN THE 14
Figure 2.1: Firewall (vietnix.vn)
Its advantages
2.1.2 IDS
2.1.2.1 Definition
Performed Student: My Duyen NGUYEN THI Instructor: MSc. Xuan Ly NGUYEN THE 15
networks, authentication failures, and direct threats to the network or to a computer. As a
result, system security issues are analysed and identified, ensuring protection against rap-
idly cyber threats, and system administrators are alerted to search ports and block any af-
fected connections. Intrusion monitoring apps will give you alerts until any new attacks
have been detected.
These are IDSs that monitor the entire network, check network communications in
real-time, check communications, scan headers of packets, and can check the content of
packets to detect malicious code or different types of attacks.
HIDS is an intrusion detection system that monitors and records logs for host-
system. It runs on a different server or a specific device on the network and monitors and
records the actions of each individual computer. Operators and programs, as well as the
server's whole service. As a consequence, in addition to data traffic to and from the server,
the key source of information for HIDS is system log data and system audit. Just checks
the device's inbound and outbound packets, alerting the user or administrator if unusual
behaviour is observed.
Performed Student: My Duyen NGUYEN THI Instructor: MSc. Xuan Ly NGUYEN THE 16
2.1.2.2 Its usage
The two most critical elements of an IDS system are sensors and signature data-
bases. Sensors collect and interpret network traffic and other information sources to identi-
fy signatures, while signature databases store the signatures of threats that have been
identified and evaluated. Since signature databases function similarly to virus databases in
antivirus systems, routine maintenance of6 this database is important for an effective IDS
framework.
An IDS active detection: detect and respond is programmed to take the quickest ac-
tion possible to reduce future device threats. The answer may involve items like closing
down the server or facilities, as well as disconnecting connections.
An IDS with passive detection will respond to attacks but will not take direct action
against them. It has the power to record the entire system log and send an alert to the sys-
tem administrator. IDS is an excellent DoS attack detector; it can locate glitches, defects,
and secret functions, as well as search ports. However, it is unable to detect attacks based
on emails that contain malicious code.
2.1.3 The potential impact of Firewall and IDS incorrect configuration to the net-
work
When security threats get more sophisticated, it's more critical than ever to keep
track of the firewall and IDS settings. IT experts spend a lot of time thinking about glitches
and bugs, but according to Gartner research, misconfiguration triggers 95 percent of all
firewall breaches, not flaws. Likewise, most of the problem related to IDS is the misconfig-
uration, which is the faulty setting of the parameters. Those are valid communications, but
the IDS device warns that the communications are malicious code and vice versa. Some
of the effects that can occur when the firewall and IDS are misconfigured are as follows:
Performed Student: My Duyen NGUYEN THI Instructor: MSc. Xuan Ly NGUYEN THE 17
Bring the data into a less secure environment. It's possible that the infor-
mation is extremely confidential, and it's also possible that it's subject to reg-
ulatory rules.
Reduces protection and gives criminals more options, such as not imple-
menting the business protocol for authentication, which makes it possible for
them to reach the company network from a remote office. Workers in the re-
mote division had access to local accounts with bad passwords, and there
was a separate cap on how many login errors were enabled before an ac-
count was locked out.
Not only will you not be notified if you're being hacked, but you'll still have no
traceability while checking thereafter.
Legal traffic is blocked, redirected to the incorrect destination, or cannot be
routed at all, whereas illegal traffic is routed to a destination it should not be.
If the IDS isn't up to date and fine-tuned correctly, which takes time in and of
itself, more time is spent dealing with bugs.
If there is some way to predict the effect, it could range from financial losses
that could force the company into bankruptcy to data leakage, blackmailing,
and litigation, among other things.
The wanted traffic is blocked or stopped in any way from reaching its desti-
nation and vice versa.
2.2 P4 Show, using an example for each, how implementing a DMZ, static IP
and NAT in a network can improve Network Security
2.2.1 DMZ
2.2.1.1 Definition
The Demilitarized Zone (DMZ) is a physical or logical subnet that divides an existing
LAN from other untrusted networks that are situated outside of the firewall or security con-
trols from the rest of the network, such as the internet, in computing. Things in the DMZ,
such as external-facing servers, tools, and utilities, are available over the internet, but the
LAN is not. For an organization's internal network, the DMZ is one of the security shields of
a defence in depth device. Services of a DMZ include: DNS servers, FTP servers, Mail
servers, Proxy servers, Web servers.
Performed Student: My Duyen NGUYEN THI Instructor: MSc. Xuan Ly NGUYEN THE 18
Figure 2.3: DMZ
Performed Student: My Duyen NGUYEN THI Instructor: MSc. Xuan Ly NGUYEN THE 19
Figure 2.4: Access control (security.stackexchange.com)
A proxy server, which centralizes the flow of internal traffic and allows logging and
tracking the traffic easier, is often used in a DMZ to secure confidential data, processes,
and services by keeping internal networks apart from devices that may be attacked by at-
tackers. Deals may also use DMZs to monitor and block access to sensitive systems.
As can be seen from the following diagram, the server located in the DMZ can be
accessed by the Internet, but the spy action will not be allowed by the second firewall to
access the intranet and the server is located in private LAN is secure.
Performed Student: My Duyen NGUYEN THI Instructor: MSc. Xuan Ly NGUYEN THE 20
Figure 2.5: Prevent attackers (community.qlik.com)
Protection against IP spoofing
Attackers will fake their IP to be access to the network, changes that original IP into
a fake IP address.
Performed Student: My Duyen NGUYEN THI Instructor: MSc. Xuan Ly NGUYEN THE 21
Figure 2.7: Protection against IP spoofing (sc1.checkpoint.com)
2.2.2 Static IP
2.2.2.1 Definition
IP addresses are the foundation for network computers to identify and interact with
one another. The IP address will disclose the identities of the network's linked computers.
A static IP is useful in some circumstances where basic specifications are necessary, such
as hosting a site, mail, or FTP server, better DNS support, remotely accessing a corporate
network like a virtual private network (VPN) or other remote-access solution, hosting a
webcam for video streaming, or using Voice over Internet Protocol (VoIP) for voice and
video communications applications such as teleconferencing. But in terms of security, stat-
ic IP address can provide some big benefits as following:
Performed Student: My Duyen NGUYEN THI Instructor: MSc. Xuan Ly NGUYEN THE 22
Figure 2.8: Static IP
Static IP addresses are beneficial for activities such as hosting a website from
home, having FTP, mail servers in your network, using networked printers, routing ports to
a single computer, running a print server, or using a remote access application. Other de-
vices will know how to contact a computer that uses a static IP address because it stays
the same.
Expanding, in a small business model, it is convenient and easy to manage the traf-
fic flows in the network while the IPs are fixed. Similar, setting up a static IP to a shared
device that everyone in the office belonging to your private LAN needs to share. That way,
once every computer is set up to connect to that device, those connections will remain in-
definitely because the address will never change. For options, the use of static IP will cre-
ate a more reliable and stable connection.
Creating these stable, long-lasting settings gives us more benefits in improving se-
curity because we can focus more on setting rules for firewall, using security tools like IDS,
IPS, and anti-virus program on critical and essential devices.
For example, when an FTP server and a computer has been set up a specific static
IP address tied to them, a router can be easier and more stable to configure forward cer-
tain inbound requests directly from that computer to FTP server to receive files and access
data. As a result, sensitive data is more secure when authorized. This also has the same
meaning as using services from DNS servers.
For remote access applications, using a static IP address means you can only ac-
cess network with the same address. Therefore, for other IPs, traffic from remote connec-
Performed Student: My Duyen NGUYEN THI Instructor: MSc. Xuan Ly NGUYEN THE 23
tion has the right to be denied access, thus improving security from unauthorized access
from outside of Internet to internal LAN.
2.2.3 NAT
2.2.3.1 Definition
Network Address Translation (NAT) is the term to define the process of modifying
the network address IP in the IP header of a data packet as it passes through a network
towards the destination node, which allows private IP networks that use unregistered IP
addresses to connect to the Internet. This feature adds to the security of the system by es-
sentially concealing the entire internal network behind that public address. This method is
commonly came into remote-access use because it provides both security and address
conservation.
Before analyzing the benefits of using NAT for security needs, we need to have in-
formation and understand the basic operation of this method, the internet service provider
will assign a pool of IP addresses to every entity that establishes a networking system.
Within global addresses are IP addresses that have been registered and are specific. The
outside local address is one or more addresses that have been converted for the public
network by NAT from addresses on the internal network. This work is needed when com-
municating between devices on the stub domain to another network such as the Internet.
As in the example below, in the private LAN, there are many devices with different
private addresses, but when going to the public network, it is translated to the address
10.10.0.33 by the NAT using the TCP/IP protocol to be able to communicate with the de-
vices on the network 10.10.0.1. All this data about these addresses are stored by the rout-
er in the NAT routing table, or maybe called the address translation table, in the process of
transporting packets and making an entry for it.
Performed Student: My Duyen NGUYEN THI Instructor: MSc. Xuan Ly NGUYEN THE 24
Figure 2.9: NAT
NAT has the ability to broadcast only one IP address to the public network on behalf
of the entire internal network, which is easily visible. This provides anonymity by effectively
shielding the private network's total IP address behind the single address, keeping the
source and destination IP addresses hidden from the external network. This means even
large companies with thousands of computers and thousands of specific IPs, the comput-
ers outside the network can only see a single unique IP address. As shown in the image
above, 3 computers with IPs respectively 192.168.0.3, 192.168.0.13 and 192.168.0.23
simultaneously used access to the Internet and sent packets containing data. When pass-
ing through the router, now acting as an agent between the Internet and a or private net-
work, NAT is active and information such as the equivalent IP address and port number
will be logged and check in the NAT table, although inside the network you can see this
different information about those addresses, but from the access devices outside the LAN,
only one IP address is 10.10.0.33.
This also makes sense in reverse data forwarding. After searching data in the NAT
table, in case of data is found, the data is forwarded to the destination PC of the LAN net-
work. On the contrary, the data packet would be discarded by the router and marked as
unwanted traffic.
Performed Student: My Duyen NGUYEN THI Instructor: MSc. Xuan Ly NGUYEN THE 25
Figure 2.10: NAT benefits for LAN (kb.hostvn.net)
Consequently, the NAT router defends your link from malicious and unauthorized
access. This ensures that until your device initiates the communication, a computer on an
external network would not be able to connect to it. You can access the Internet, login to a
site, and even save a file, but your IP address cannot be used to connect to a port on your
device by anyone else. As a result, with a NAT router in place, none of the worms or mali-
cious viruses get the chance to damage your network.
Performed Student: My Duyen NGUYEN THI Instructor: MSc. Xuan Ly NGUYEN THE 26
2.3 M2 Benefits to implement network monitoring systems with supporting
reasons
Network monitoring systems, which provide software and hardware mechanisms for
detecting and documenting faults in devices and links for the purposes of enforcement and
security maintenance, can track different facets of a network's operation, including traffic,
bandwidth usage, and uptime. These systems can automatically add new devices, map
your network topology and spot malicious activity. Furthermore, it assists in quickly detect-
ing device or connection failures or issues such as traffic bottlenecks that limit data flow
and alert administrators.
Human error, configuration issues, and environmental factors can all cause outages
- one of the worst nightmares of any network administrator. Network monitoring solutions
can help companies prevent an outage before it happens by sweeping your network for
any suspicious performance behavior that indicates an outage is about to happen, it will
detect the problem and alert you to it.
A monitoring solution will inform your team of issues as major network performance
issues happen, drastically reducing the time and financial costs it takes for your enterprise
to discover problems. Your company can also reduce the mean time to repair (MTTR) of
network performance issues due to it alert your team to performance issues as soon as
they discover them and include diagnostics tools that provide your team with an initial as-
sessment of the issue. By identifying slowdowns and problem areas and collecting perfor-
mance data, network monitoring systems allow administrators to optimize a network’s per-
formance.
Some may identify potentially dangerous actors on a network and take action to
remove them as soon as possible thereby minimizing risk and damage. Furthermore, mon-
itoring software detects devices that link to a network automatically, creating and modifying
graphic charts that show information about the performance of your network nodes. Bring
in observations for any bit of traffic that passes through your network, as well as monitor-
ing and checking of every connected system and common performance metrics for your
business, as well as real-time analysis of data. It ensures that if a fault or problem is found,
you can be notified automatically by email. From there, it can help to reduce the need for a
physical system administrator and manual reviews, and save both time and money.
In conclusion, all of which assist in securing your data, giving your company safe
computing experiences, improving network performance and preserving essential data,
ensure your system run stably while remaining in control and understanding what's going
on in your system.
A ‘trusted network’ is the one that a network admin tries to protect and defines the
security parameters for the same is under the control of the network manager or the net-
work administrator
Uses to conduct internal business. In many cases, the trusted network is by default
defined in the organization as “secure.” The trusted network typically supports the backend
systems, internal-only-based web pages, data processing, messaging, and, in some cas-
es, internal instant messaging. In many companies, the trusted network allows direct inter-
action between systems without encryption. Also, various protocols will exist within the
trusted network without any type of filtering or even virus scanning.
Performed Student: My Duyen NGUYEN THI Instructor: MSc. Xuan Ly NGUYEN THE 28
CHAPTER 3 Mechanisms to control organisational IT security
Its goal is to help businesses prepare for and mitigate risk by providing an analysis
of possible hazards, preventing injuries and illnesses, and justifying risk management and
remediation costs.
Performed Student: My Duyen NGUYEN THI Instructor: MSc. Xuan Ly NGUYEN THE 29
3.1.3 Threat identification procedure
The threat identification process looks at IT vulnerabilities and decides their ability
to compromise the system so you can block unauthorised users, prevent data compromis-
es, and take proactive measures.
Divide the hazard into two categories: physical and logical. Fire, water, energy
variations, environmental destruction, pollution, and intrusion are all threats to the physical
structures of information systems. Logical threats include malware, worms, and logical in-
trusion, which cause damage to software and data without requiring physical presence.
This method entails evaluating and comprehending the organization's specific hazard port-
folio, as well as producing a report that helps you to take proactive risk control measures.
Design attack tree: This allows for the comprehensive modeling of risks to system
security in an easy-to-understand graphical format, as well as a sophisticated environment
for defining metrics that calculate the risk of an attack, the organizational complexity of
staging the attack, and any other related quantifiable measure of interest.
Here's an attack tree that shows a subset of potential attack vectors that might lead
to passengers receiving fake transit information from PID apps.
Performed Student: My Duyen NGUYEN THI Instructor: MSc. Xuan Ly NGUYEN THE 30
3.1.4 Risk assessment procedure
Risk assessment is a thorough review of what may cause individuals harm in the
workplace, in order to determine if any procedures are in effect and whether further pre-
ventative steps are needed.
After identifying the risks, they must be rated according to their likelihood of occur-
rence, and then the adverse impact must be determined. An existing analysis of the num-
ber of fire accidents in an organization for the purposes of fire protection, for example, is
meansurable. Users will be asked to provide a best estimate of how often the hazard is
likely to occur and how serious the effects would be in a situation where no previous evi-
dence or credible source of chance incidence is available. The higher the valuation of the
defined information asset, the more likely it is to be vulnerable.
2. The corporation must then quantify the risk's likelihood and impact.
The sum of predicted loss is calculated in the fourth stage of the exposure analysis
using the formula:
A=B*C*D
A = Expected Loss
Performed Student: My Duyen NGUYEN THI Instructor: MSc. Xuan Ly NGUYEN THE 31
Figure 3.2: Qualitative Risk Analysis (ccna)
3.1.5 List risk identification steps
Happening during the Risk Management Process and throughout the life-cycle of a
project, risk identification is an ongoing and persistent task that its method is to recognize
and evaluate risks to an organization's activities and personnel. For example, analyzing IT
security risks such as malware and ransomware, collisions, natural disasters, and other
potentially dangerous activities that could interrupt company processes are all examples of
risk identification. Risk identification is used to determine what, where, where, why, and
how anything could harm a company operation's ability. Businesses should create strate-
gies to mitigate adverse incidents by identifying risks before they occur. The aim of this
move is to recognise any potential threats to the company's activities, such as lawsuits,
theft, data breaches, market downturns, and so on.
Since certain threats will still exist, some risk identification processes have a final
phase of monitoring and reviewing risks. Using the example of a natural disaster, compa-
Performed Student: My Duyen NGUYEN THI Instructor: MSc. Xuan Ly NGUYEN THE 32
nies in Japan will still be vulnerable to earthquakes, while businesses in the high moun-
tains of Vietnam's North West area will be vulnerable to landslides.
Modern data protection for primary storage entails the use of a built-in solution that
supplements or substitutes backups while still protecting against the issues.
Firstly, to ensure the data is accessible even if a storage system fails. Synchronous
mirroring simultaneously writes data to a local disk and a remote site. The write isn't com-
plete until the remote site sends a confirmation, meaning that the two locations are always
identical.
Secondly, to guard against a single point of failure, data is spread over several
disks. The embodiments of this is snapshots which may be used to restore data that has
been lost or destroyed by mistake. Most storage systems today can monitor hundreds of
snapshots without affecting performance significantly. When data is lost or removed by
mistake, a snapshot can be used to copy back or overwrite the current volume.
Next, to save the most recent versions of data that are most likely to be used in the
case of a major incident, and to instantiate program images, a company may use replica-
tion in conjunction with cloud recovery products and services.
Furthermore, companies should ensure that data stored remotely is protected, since
ransomware attacks are exacerbated as workers are more insecure and use less stable
networks. Data protection, above all, prevents the organization's data from failure by back-
up and recovery.
First and most important, names, photographs, personal details – Email ID, Phone
number, bank and credit card details, health-related information, fingerprint, browser histo-
ry, cookie data, as well as passwords, financial records, a person's racial or ethnic herit-
age, political opinions, social or moral views, community identifiers, sexual orientation, bi-
Performed Student: My Duyen NGUYEN THI Instructor: MSc. Xuan Ly NGUYEN THE 33
ometric and genetic data and other confidential information of the company's existing
staffs, employees, corporate associates and clients, consumers and other members of the
public are in business data storage system.
Secondly, with the rise of user-generated data and data's exponential industrial val-
ue, it's more crucial than ever for companies to secure citizens' data rights. This helps to
deter data from being misused by third parties for fraud, such as phishing scams and iden-
tity theft.
Following that, it’s obtaining the approval of the individual whose data is being col-
lected, increasing client trust in the company, strengthening the company's brand, reputa-
tion, and appearance in the eyes of users, staff, and partners.
Next, it’s to avoid the possibility of a data breach, which may result in tens of thou-
sands of dollars in monetary damages for organizations deemed to be non-compliant or
incompetent in their data protection duties.
Last but not least, it’s to protect the privacy of individuals' personal information and
to restrict the collection, use, transmission, and dissemination of that information. Further-
more, understanding that personal data security is a human right allows people access to
their data and establishes compliance mechanisms for organisations that handle personal
data, as well as providing solutions for unauthorised and harmful processing.
Performed Student: My Duyen NGUYEN THI Instructor: MSc. Xuan Ly NGUYEN THE 34
CHAPTER 4 Manage organisational security
4.1.1 Definition
A security policy is a written guideline in an organisation that specifies the rules and
procedures for all entities accessing and using the organization's IT facilities and services
in order to protect the organization from attacks. As a result, a successful IT security policy
is a one-of-a-kind document for each company, shaped by its personnel's attitudes toward
their information and jobs.
Some examples of security policy are Acceptable Use Policy (AUP), Human Re-
source Policy, Password Management Policy, Physical Policy, Ethics Policy, DMZ Security
Policy, E-mail Policy, VPN Policy and Wireless Communication policy
In my book, two crucial policies are AUP and Physical Policy. But in CIAO Compa-
ny, the others necessary policies are Remote Access Policy and Password Management
Policy due to their need of using VPN to accees data to company server.
Information security is described as the safeguarding with three primary goals, aslo
known as CIA objectives:
Confidentiality: Data and information assets must be kept private and only
shared by those that have been granted access.
Integrity: Maintaining data integrity, completeness, and accuracy, as well as
keeping IT applications operating
Availability: This meaning that authorized users have access to information
or a device when they need it.
A security policy should include everything relating to IT security and the security of
related physical properties, so it must be enforceable in its entirety. The following is a list
of key factors to address when creating an information security policy.
Acceptable use: This is a general statement that defines the importance of security
to the company when it comes to the use of company resources and time. It will e
stablishes the structure of the security program, describes the policy's objectives and
values, and determines the responsible person.
Due care: This is a collection of appropriate steps taken by a company to show that
it is liable and can be used to avoid frivolous lawsuits.
Performed Student: My Duyen NGUYEN THI Instructor: MSc. Xuan Ly NGUYEN THE 35
Privacy: Protecting customer and provider data builds trust between the
organization and third stakeholders, which leads to increased consumer trust and avoid
illegal action.
Password mmanagement is the last and most critical safeguard for protecting
database safety and device integrity by keeping unauthorized users out of operating
networks. Minimum length, allowed character set, disallowed strings, and duration of
password usage are all attributes and procedures that can be defined.
Technology is used to combat external threats, although there are several technol-
ogies available to eliminate external network risks, such as firewalls, antivirus software,
IDS, e-mail filtering, among others, these tools are typically implemented by IT personnel
and go unnoticed by users. However, a policy will shield you and your business against
lawsuits if you can demonstrate that any inappropriate activities were carried out in excess
of it. A rational and well-defined approach, on the other hand, is more likely to decrease
bandwidth consumption, increase employee performance, and minimize the risk of poten-
tial legal problems. 4 main steps to design a policy are:
To detect threats, provide material that should be restricted, send or receive a num-
ber of big attachments and files, potentially offensive attachments making the rounds,
monitoring or reporting software may be used such as firewall and Internet security prod-
ucts. Any threats that could endanger the company must be identified by the planning
Performed Student: My Duyen NGUYEN THI Instructor: MSc. Xuan Ly NGUYEN THE 36
team. This can range from unwanted access to confidential data or data that has been im-
properly encrypted to organizational issues such as being passed or shared user ac-
counts. A data breach or device outage could cost you tens of thousands of dollars in
missed employee productivity.
The scope of security measures taken should correspond to the real threat. Exces-
sive enthusiasm in developing a cybersecurity strategy will potentially damage an organi-
zation's activities, causing inefficiencies and putting undue strain on employees. For ex-
ample, a small advertising startup would not need the same level of protection as an inter-
national organisation. Excessive protection can make it difficult to run a company smooth-
ly, so be careful not to overprotect. However, in order to serve as a point of reference and
a guiding principle for actions, the actual written information security policy must be both
specific about procedures and straightforward about how to interact with them.
As part of the AUP implementation process, staff training is either ignored or under-
valued. However, in fact, it not only assists you in informing staff and clarifying any con-
cerns that were not addressed explicitly, but it also encourages you to explore the policy's
particular implications. Ensure that every member of the team has read, signed, and com-
prehended the regulation; keep them updated as the guidelines and tools are developed;
since people recognize the importance of a responsible security policy, they will be far
more likely to comply.
Having a policy is one thing, but executing it is another. Today's organisations stand
or fall on the confidentiality of their sensitive data. They are protected from getting their
important data stolen by external cyberthreats or human error whether they have an ap-
propriate, robust information security policy. A organization will set itself in a position for
long-term development and prosperity by developing and enforcing an information security
policy that ensures all customers and employees are acting in a manner that improve ra-
ther than weaken data security.
Performed Student: My Duyen NGUYEN THI Instructor: MSc. Xuan Ly NGUYEN THE 37
4.2 P8 Main components of an organisational disaster recovery plan
The advance planning and training undertaken to ensure that an entity can have the
capabilities to perform its essential business operations during emergency situations is
known as a business continuity plan (BCP). It is vital for organisations of any scale to re-
tain all functions for the duration of a disaster. Natural disasters, business crises, pandem-
ics, workplace violence, and other events will all cause a disruption in your company oper-
ations. A strong BCP addresses the requirements for services, procedures, and functions
to return to normal operations, minimizing downtime.
Companies must prioritize cybersecurity measures, and shield your own and your
customers' data against cyber-attacks. Unfortunately, no metric is perfect, and outages
and natural disasters will interrupt company operations in similar ways. To prepare for
worst-case situations, all companies should have a DRP.
Performed Student: My Duyen NGUYEN THI Instructor: MSc. Xuan Ly NGUYEN THE 38
4.2.2.2 Team members and their contact information
After a tragedy, the personnel play a vital part in resuming operations. Key respon-
sibilities and personnel responsible for DRP coordination should be well defined in the
DRP. To avoid chaos, redundancy, and disruptions in the recovery work-flow, make sure
all of the employees are aware of the process and that everyone knows who
takes responsiblity. When including your staff in emergency preparations, make sure that
more than one person is aware of the critical steps to take.
After mapping out all of the assets and determine which ones need security, create
a list of assets, such as network infrastructure, hardware, software, cloud services, and
sensitive data, to provide a thorough overview of the company's structure. Update your list
as assets are added, removed, or changed, and use it as an opportunity to purge redun-
dant resources.
Then, due to their criticality and purpose, assets should be softened to understand
the value of each one, which will have the most important effect if destroyed or destroyed,
and how they work together to determine who should be prioritized from high to low in the
crisis event.
Businesses must not only put in place a solid DRP and BCP, but also track it to en-
sure that all aspects are executed effectively and that the plan is revised on a regular
schedule.
DRP helps the company continue to operate normally even though natural disasters
such as earthquakes, floods, or other catastrophes strike. It assists in maintaining a man-
Performed Student: My Duyen NGUYEN THI Instructor: MSc. Xuan Ly NGUYEN THE 39
ageable environment, decreases the effects of cyberattacks, and safeguards your clients'
personal information.
Natural hazards, power outages, and network failures, as well as human error, and
cyber attacks, all pose increasing threats to businesses. The first step is to identify any
weaknesses in the IT infrastructure so that you can understand where the risk is coming
from.
Any DRP should begin with an assessment of the organization's risks which can be
linked to a business impact report by managers. Only by considering risk and effect to-
gether will the board determine the organization's goals and the types of security
measures that are required. Some threats will be high, and their consequences will be ex-
tremely serious, that only a formalized DRP will be able to mitigate them, some solely
needs a staged DRP and some are best solved by insurance.
Once an incident has been successfully identified, a recorded series of methods will
be used to carry out the DCP. For the DRP to be as efficient as possible, all automatic
and manual processes should be neatly registered. The comprehensive data raises the
likelihood of an effective network infrastructure reconstruction. It's best to keep all of your
data offline and in a private cloud. Futhermore, it must be concise so it would be compre-
hended by all employees.
A security policy is a structured document that outlines clear, detailed, and well-
defined plans, regulations, and procedures that govern access to an organization's infra-
structure and the data contained inside it. Consequently, each company's effective IT se-
curity policy is a one-of-a-kind document influenced by its employees' attitudes toward
their data and work. It will define how the security program is structured, outline the poli-
cy's objectives, identify the responsible one, and explain the policy's strategic value.
Human resource policies are the written laws and procedures that companies use
to handle their workforce. HR protocols, on the other hand, are step-by-step directives that
Performed Student: My Duyen NGUYEN THI Instructor: MSc. Xuan Ly NGUYEN THE 40
detail how to deal with these policies. One of the main roles of human resource
management is to define these policies and procedures.
This policy extends to all staff, including employees, interns, temporary workers,
consultants, those hired by contracting agencies, and those allowed to access UF
enterprise assets and information services, regardless of ownership or location of
information systems used to store, process, transfer, or access data. So that, in the midst
of a crisis, the right decisions may be taken to regain control of the situation. A
cybersecurity event can be a frightening scenario, because if the solution isn't planned
carefully, the possible consequence may be serious harm to a company's credibility.
Performed Student: My Duyen NGUYEN THI Instructor: MSc. Xuan Ly NGUYEN THE 41
CHAPTER 5 Implement
Before carry out the security policy, let take a quick review of CIAO Company infra-
structure:
Performed Student: My Duyen NGUYEN THI Instructor: MSc. Xuan Ly NGUYEN THE 42
10 192.168.10.0 255.255.255.0 Engineering
During the design process, there are 3 main components that should be protected
to ensure the safety of the system:
Cross-Site Scripting (XSS) attacks are injection attacks in which malicious scripts
are inserted into normally trustworthy and innocuous websites. XSS attacks occur when an
attacker uses a web application to deliver malicious code to a particular end user, usually
in the form of a browser side script. The flaws that cause these attacks to work are com-
mon and can be found anywhere a web application uses user input in its output without
validating or encoding it.
SQL injection is a web hacking technique that involves inserting malicious code
into SQL statements through web page feedback, a code injection technique that has the
potential to break your database. It normally happens when you ask a user for information,
such as their username/userid, and the user instead gives you a SQL query that you
unknowingly run on your database..
Performed Student: My Duyen NGUYEN THI Instructor: MSc. Xuan Ly NGUYEN THE 43
Cookies are divided into three categories: first-party cookies, third-party cookies,
and session cookies. Third-party cookies can be used to detect a user's surfing or
purchasing habits, while first-party cookies can be hacked and used to impersonate the
user.
When malicious attachments are opened, they can transmit viruses, Trojans, and
other malware.
5.2 Network
5.2.1 Wireless
Performed Student: My Duyen NGUYEN THI Instructor: MSc. Xuan Ly NGUYEN THE 44
Figure 5.3: Disable SSID broadcast
Disable SSID broadcast: To block strangers from quickly accessing your network
and to stop publicizing your SSID, click disable. Users will shield their device's SSID on all
Wi-Fi routers, making it more difficult for attackers to locate a network. Shift your SSID to
something new at the very least. Allowing it to default to the manufacturer's setting might
allow a future intruder to gain access. Leaving it at the manufacturer's default settings
might cause a possible attacker to figure out what kind of router you have and exploit any
known flaws.
Performed Student: My Duyen NGUYEN THI Instructor: MSc. Xuan Ly NGUYEN THE 45
Figure 5.4: Encrypt the data
Protect the data on your network by encrypting it. By encrypting your wireless da-
ta, anybody who has access to your network will be unable to see it. This security can be
provided by a variety of encryption protocols. The Wi-Fi Protected Access (WPA), WPA2
Personal, and WPA2 Enterprise protocols encrypt data sent between wireless routers and
wireless devices. In this situation, WPA2 Enterprise are chosen.
Performed Student: My Duyen NGUYEN THI Instructor: MSc. Xuan Ly NGUYEN THE 46
Figure 5.5: Enable MAC filter
Restrict access. By filtering these MAC addresses, you will limit access to your
network. For detailed instructions on how to enable these functions, consult your user
documentation. You may also make use of the "guest" account, which is a popular feature
on many wireless routers. This feature allows you to provide guests wireless access on a
specific wireless channel with a different password while keeping your primary credentials
private.
Performed Student: My Duyen NGUYEN THI Instructor: MSc. Xuan Ly NGUYEN THE 47
Figure 5.6: Use Radius Server
The Radius server provides each one with an account that allows them to access
the network.
In this section, the routers will be secured with strong passwords, password encryp-
tion and a "You are not authorized to access!" login banner.
securi pass mi 9
enab s ciaoen3#$%
servi pass
Performed Student: My Duyen NGUYEN THI Instructor: MSc. Xuan Ly NGUYEN THE 48
AAA (Authentication, authorization, and accounting) refers to a system for intelli-
gently monitoring access to computing infrastructure, implementing rules, auditing use,
and supplying the information needed to charge for services. These processes work to-
gether to provide efficient network management and protection.
u Admin s ciaoad3@#$
aa n
aaa authen l d l n
li con 0
pass ciaocon3#$%
login
exe 5
Performed Student: My Duyen NGUYEN THI Instructor: MSc. Xuan Ly NGUYEN THE 49
logging synchronous
li vty 0 4
exe 5
pass ciaovty3#$%
login
SSH is a protocol that allows two computers to safely exchange data over an un-
trusted network. SSH ensures that the transferred identities, records, and files are kept
private and safe. It can be used on almost all machines and servers. An SSH server is a
piece of software that accepts connections from remote computers via the protected shell
Performed Student: My Duyen NGUYEN THI Instructor: MSc. Xuan Ly NGUYEN THE 50
protocol. SSH servers are often used for SFTP/SCP file transfers and remote terminal
connections.
lin vty 0 4
exit
2048
ip ssh t 100
ip ssh a 3
ip ssh v 2
Performed Student: My Duyen NGUYEN THI Instructor: MSc. Xuan Ly NGUYEN THE 51
Figure 5.11: Result of SSH: Telnet fail from R2 to R3
This connection is fail, since R3 has been configured to accept only SSH connec-
tions on the virtual terminal lines.
Performed Student: My Duyen NGUYEN THI Instructor: MSc. Xuan Ly NGUYEN THE 52
Figure 5.12: Result of SSH: Logging successful from R2 to R3
5.2.4 Syslog
Configure the routers to send logging messages to a remote host (Syslog Server).
On the routers, configure the timestamp service for logging.
logging on
logging 192.168.1.6
Performed Student: My Duyen NGUYEN THI Instructor: MSc. Xuan Ly NGUYEN THE 53
5.2.5 NTP
NTP (Network Time Protocol) helps network routers to synchronize their time set-
tings with an NTP server. NTP clients who get their time and date information from a single
source have more stable time settings and can analyze Syslog messages more effectively.
When troubleshooting network glitches and threats, this can be useful.
ntp trusted-key 1
ntp update-calendar
ntp authenticate
Performed Student: My Duyen NGUYEN THI Instructor: MSc. Xuan Ly NGUYEN THE 54
Figure 5.13: Result of NTP
5.2.6 CBAC and ZPF firewalls
To build an IOS firewall, Context-Based Access Control (CBAC) is used. You can
build a simple CBAC setup on edge router R3 in this operation. R3 gives hosts on the in-
side network access to services on the outside network. External hosts are denied access
to internal services by R3
ZPF (zone-based policy) firewalls are the most recent advancement in Cisco fire-
wall technology. You configure a simple ZPF on an edge router R3 in this operation to al-
low internal hosts access to external resources while blocking external hosts from access-
ing internal resources.
To block all traffic coming in from the outside network, create an IP ACL called
OUT-IN. On network Serial 0/0/0, apply the permission list to incoming traffic.
To inspect ICMP, Telnet, and HTTP traffic, create an inspection rule called IN-OUT-
IN. Apply the IN-OUT-IN inspection rule to the protocol where traffic leaves the network to
Performed Student: My Duyen NGUYEN THI Instructor: MSc. Xuan Ly NGUYEN THE 55
go outside. Make an internal zone with the name IN-ZONE and external zone - OUT-
ZONE. Create an extended, numbered ACL that allows all IP protocols to reach every des-
tination from the 192.168.3.0/24 source network. The ACL number should be 101. To fit
ACL 101, build a class map called IN-NET-CLASS-MAP. To figure out what to do with
matched traffic, create a policy map called IN-2-OUT-PMAP. Indicate the in-spect class
category and the IN-NET-CLASS-MAP relation class map. For this regulation chart, speci-
fy the inspect action. Create an IN-2-OUT-ZPAIR zone pair. Specify the previously created
source and destination areas. Attach a policy map and activities to the zone pair, referenc-
ing the IN-2-OUT-PMAP policy map that was previously developed.
Performed Student: My Duyen NGUYEN THI Instructor: MSc. Xuan Ly NGUYEN THE 56
Figure 5.15: Result of CBAC and ZPF Firewall
Performed Student: My Duyen NGUYEN THI Instructor: MSc. Xuan Ly NGUYEN THE 57
service password-encryption
line con 0
password ciaocon3#$%
login
exec-timeout 5
logging synchronous
exit
line vty 0 15
password ciaovty3#$%
login
exec-timeout 5
exit
Performed Student: My Duyen NGUYEN THI Instructor: MSc. Xuan Ly NGUYEN THE 58
Figure 5.17: Result of secure switches
int fa0/1
switchport nonegotiate
int r fa0/13-23
sh
int r gig0/1-2
sh
int r fa0/2-12
Performed Student: My Duyen NGUYEN THI Instructor: MSc. Xuan Ly NGUYEN THE 59
switchport mode access
switchport port-security
spanning-tree portfast
int fa0/24
switchport port-security
spanning-tree portfast
Performed Student: My Duyen NGUYEN THI Instructor: MSc. Xuan Ly NGUYEN THE 60
Figure 5.18: Check MAC address in interface f0/24
Performed Student: My Duyen NGUYEN THI Instructor: MSc. Xuan Ly NGUYEN THE 61
Figure 5.19: MAC address on PC B (have not change)
Performed Student: My Duyen NGUYEN THI Instructor: MSc. Xuan Ly NGUYEN THE 62
Figure 5.20: Check the up status in interface f0/24
Performed Student: My Duyen NGUYEN THI Instructor: MSc. Xuan Ly NGUYEN THE 63
Figure 5.21: Change MAC address
Performed Student: My Duyen NGUYEN THI Instructor: MSc. Xuan Ly NGUYEN THE 64
Figure 5.22: Interface F0/24 is down
5.3 Host
A security guard protects property from arson, robbery, burglary, extremism, and
criminal activity by patrolling and inspecting it. In order to deter violence, they keep an eye
on people and companies. In CIAO Company, they shield in the 1st floor of the building.
Performed Student: My Duyen NGUYEN THI Instructor: MSc. Xuan Ly NGUYEN THE 65
Figure 5.23: Security guard
5.3.2 CCTV
CCTV (Closed Circuit Television) Cameras are in high demand these days as the
primary surveillance platform for both private homes and enterprises. Buildings and resi-
dences with no CCTV built are uncommon. It is now included with all building kits and is a
standard for every business to run. CCTV systems are critical for any company that wants
to increase its efficiency. It will aid the owner in his or her monitoring duty, as well as in the
safekeeping of his or her employees' results. In CIAO Company, there are 30 CCTV Cam-
era, each floor has 10.
Performed Student: My Duyen NGUYEN THI Instructor: MSc. Xuan Ly NGUYEN THE 66
Figure 5.24: CCTV
5.3.3 Fingerprint scanners
Performed Student: My Duyen NGUYEN THI Instructor: MSc. Xuan Ly NGUYEN THE 67
Figure 5.25: Fingerprint scanner
Performed Student: My Duyen NGUYEN THI Instructor: MSc. Xuan Ly NGUYEN THE 68
CONCLUSION
After spending a lot of time working to complete the report, I have gathered the
knowledge and skills that are important in developing as a security specialist. The
knowledge related to security threats, some recently publicized security threats and breach
their consequences, organizational procedures, a method manage different types of risk
and list of some monitoring tools, some devices such as firewalls and IDS, some methods
like DMZ, static IP and NAT, and 'trusted network'.
The time constraints when the workload becomes too much causes the final
result to be finalized slowly and does not get as many details and ideas as
originally intended.
When faced with scheduling problems when the subject comes to the rush
period.
Novelty in approach and new concepts, terminology and methods and pro-
cedures used in security - something that I haven't had a chance to come
across before.
On the contrary, there are also certain advantages that I can see when doing pro-
ject work such as the enthusiastic support from friends and teachers. Also thanks to the
immense support of the documents used throughout this assignment and a number of oth-
er documents such as (Ciampa, 2015) (Charles, P. P., Shari, L. P. and Jonathan, M.,
2015) provided me the most objective points of view on this topic.
This report is completed with the great efforts that have been put through, we hope
that the next part of this report will be carefully cared for and completed on time.
Performed Student: My Duyen NGUYEN THI Instructor: MSc. Xuan Ly NGUYEN THE 69
REFERENCES
Charles, P. P., Shari, L. P. and Jonathan, M., 2015. Security in Computing, Courier
in Westford, Massachusetts.: Pearson Education, Inc..
Ellis, Tim, S and Juanita, 2003. The Security Review Process. s.l.:s.n.
Jones, S. V. f. A., 2005. Analyzing Threat Agents and Their Attributes. s.l.:s.n.
Performed Student: My Duyen NGUYEN THI Instructor: MSc. Xuan Ly NGUYEN THE 70