1 - Unit 5 - Assignment 1 Frontsheet
1 - Unit 5 - Assignment 1 Frontsheet
Student declaration
I certify that the assignment submission is entirely my own work and I fully understand the consequences of plagiarism. I understand that
making a false declaration is a form of malpractice.
Grading grid
P1 P2 P3 P4 M1 M2 D1
❒ Summative Feedback: ❒ Resubmission Feedback:
A security threat is an evil act that aims to disrupt an organization's systems, steal
information, or harm the entire organization. An event that could have exposed company
information or its organization is referred to as a security occasion. A security episode is also a
circumstance that leads to a data or organizational breach.
An IT project needs to keep an eye out for evolving and more sophisticated online security
risks in order to protect their data and organizations. They must first understand the different safety
risks they face in order to do that.
Viruses: A virus is a piece of malicious software with the ability to replicate by inserting itself
into a host program or file. When someone activates it to spread without the system or user's
consent, it will not function.
Figure 2: Virus
Worms: A worm is a computer program that spreads by itself without requiring user interaction
or internal replication. A worm that enters the system replicates immediately, infecting
networks and computers that aren't protected.
Figure 3: Worms
3.3. Ransomware
In a ransomware attack, the victim's PC is typically encrypted and locked, preventing the victim
from using the device or the information stored on it. The victim must make a payment to the
attacker, typically in a form of virtual currency like Bitcoin, in order to regain access to the device
or information. Through malicious email connections, corrupted software programs, contaminated
external storage devices, and compromised websites, ransomware can spread.
Figure 4: Ransomware
3.4. Botnet
A botnet is a collection of Internet-connected devices, such as PCs, smartphones, servers, and
Internet of Things (IoT) devices, that have been infected and are in some way restricted by a
common form of malware. Typically, botnet malware searches the internet for vulnerable devices.
The goal of the threat actor creating a botnet is to infect as many connected devices as is prudent,
registering the power and resources of those devices for computerized endeavors that typically
remain hidden from the clients of the devices. These botnets are controlled by threat actors, usually
cybercriminals, who use them to send spam emails, participate in click fraud campaigns, and
generate harmful traffic for distributed denial-of-service attacks.
Figure 5: Botnet
If you've been staying updated on the news lately, you may have noticed that a number of data
breaches have been making headlines. These breaches frequently involve getting access to customer
data, including addresses, names, social security numbers, and even credit card numbers. Due to
lawsuits and lost business, these breaches could cost the affected companies millions of dollars.
Detecting, defining, and recovering from a breach can be a lengthy and time-consuming process
for an organization. Although the consequences of this type of leak can be devastating for larger
corporations, they can spell the end of a small business. The best strategy is to be ready if it happens
and to prevent it from happening in the first place.
o Role-based access is similar to MAC and DAC in that it assigns a level of access to
users based on their job title or department.
Firewall policy:
o Based on its policy, a firewall determines which packets should be accepted, denied, or
dropped. Most firewalls can only accept or drop packets; denying a packet is possible
but uncommon. Denying packets is frequently skipped because the denied packet will
consume more bandwidth on its return trip, and because the originating system will
assume the packet has been dropped if it does not hear back from the remote system
and will act accordingly.
o When a person decides to install a firewall, they usually have a good idea of what it
should do. For example, the firewall should allow traffic to my web server while
blocking all other traffic. This is an illustration of a firewall policy. The person
responsible for implementing this policy in the firewall, also known as a firewall
administrator, will translate it into a set of technical statements known as a ruleset that
tells the hardware or software what to do.
o Firewalls have a default setting that normally denies all traffic. This is how the
Windows Firewall operates. Windows users who have enabled the Windows firewall
may be familiar with receiving a dialogue box asking if it is alright to allow an
application to accept a network connection. If allowed, the Windows Firewall program
adds a rule to the ruleset stating that traffic to that application is to be allowed. You can
add and remove firewall rules using the Windows Firewall control panel.
How does a firewall provide security to a network?
o Monitor network traffic: Data entering and exiting the system presents opportunities
for threats to disrupt user operations. When it comes to monitoring and analyzing
network traffic, the firewall relies on pre-defined rules to keep the system safe.
o Defense against virus attack: Controlling user entry points and blocking virus attacks
are two of the most obvious advantages of a firewall. The cost of damage caused by a
virus attack is determined on the type of virus encountered by the user.
o Prevent hacking: With the rise of data theft, firewalls are becoming increasingly
crucial because they can prevent hackers from getting unauthorized access to users'
data, emails, systems, and other resources. Firewalls can fully stop hackers or make it
more difficult for them to choose targets.
o Stop spyware: Stopping spyware from obtaining access and infiltrating your systems is
a much-needed benefit in a data-driven environment. As systems get more complicated
and robust, the number of entry points for thieves to obtain access to your systems
grows. One of the most popular methods for unauthorized individuals to get access is
through the use of spyware and malware4 programs designed to penetrate your
networks, control your machines, and steal your data. Firewalls are a crucial barrier
against harmful applications.
o Promotes privacy: The promotion of privacy is a major advantage. By working
proactively to keep your data and your customers' data safe, you create a privacy
environment that your clients can rely on. Nobody wants their data stolen, especially
when actions could have been done to prevent the intrusion. Upgraded data-protection
technologies can also provide a competitive edge and a selling point to customers and
clients. The value grows as your company's data becomes more sensitive.
2. IDS
Definition: An Intrusion Detection System (IDS) is a framework that monitors network traffic
for suspicious activity and delivers warnings when it detects it. It is a product application that
scans an organization or a framework for damaging actions or strategies. Any malicious
endeavor or infringement is normally reported to an executive or gathered halfway utilizing a
security data and event the board (SIEM) framework. A SIEM architecture organizes yields
from many sources and employs alert separation algorithms to distinguish between malicious
behavior and deceptive concerns.
How IDS work? Intrusion detection systems identify anomalies in order to capture hackers
before they cause significant damage to a network. IDSes can be network-based or host-based.
The client computer has a host-based intrusion detection system installed, while the network
has a network-based intrusion detection system.
Intrusion detection systems search for signatures of known assaults as well as deviations from
typical behavior. These deviations or anomalies are propagated up the stack and investigated at
the protocol and application layers. They are capable of detecting events such as Christmas tree
scans and DNS poisonings.
An intrusion detection system (IDS) can be implemented as a software application running on
customer hardware or as a network security appliance. To safeguard data and systems in cloud
deployments, cloud-based intrusion detection solutions are now available.
The Importance of IDS:
o Intrusion detection systems provide various advantages to enterprises, beginning with
the capacity to detect security problems. An intrusion detection system (IDS) can be
used to help assess the number and types of attacks. This information can be used by
organizations to modify their security systems or build more effective measures. An
intrusion detection system can also assist businesses in identifying flaws or issues with
their network device setups. These measures can then be used to analyze potential
dangers in the future.
o Intrusion detection systems can also assist businesses in meeting regulatory
requirements. An intrusion detection system (IDS) provides businesses with more
visibility throughout their networks, making it easier to meet security laws.
Furthermore, firms can utilize their IDS logs as proof to demonstrate that they are
satisfying specific compliance standards.
o In addition, intrusion detection systems can increase security responses. Because IDS
sensors can detect network hosts and devices, they can also be used to analyze data
within network packets and identify the operating systems of services being used.
Using an IDS to collect this data can be far more efficient than manually censusing
connected systems.
The importance of DMZ: To safeguard business intranets, DMZ aids in network separation.
Subnets make it difficult for attackers to obtain access to internal servers or resources by
restricting remote access to them. To divide applications or servers exposed to the internet
from the intranet, businesses deploy them in a DMZ. The DMZ isolates these resources, so that
even if they are compromised, the attack is unlikely to do significant harm.
How does a DMZ work? A DMZ acts as a buffer between the private and public networks.
Before reaching servers in the DMZ, all network traffics are routed to the subnet between two
firewalls and filtered using firewalls or other security devices.
Advantages of DMZ:
o Access control: The DMZ provides access control for external services that are not
within the scope of the enterprise. Additionally, a network segmentation level is
included, which increases the amount of obstacles users must pass in order to get access
to an organization's private network.
o Network reconnaissance prevention: The DMZ can also keep an attacker from
finding possible targets in the network. Even if the DMZ system is compromised, the
internal firewall secures the private network while keeping it separate from the DMZ. If
attackers attempt to breach the DMZ's internal barrier, they will be disconnected from
the private network.
o Protection against Internet Protocol (IP) phishing attacks: In some circumstances,
an intruder attempts to circumvent security constraints by impersonating an authorized
male IP address. The DMZ can then stop IP spoofers while another network service
checks access to verify the legitimacy of the IP address.
2. Static IP
Definition: A static IP address is a 32-bit number that is assigned to a computer as an internet
address. This number is often issued by an internet service provider (ISP) in the form of a
dotted quad. A static IP address is one that was directly allocated to a device rather than one
assigned by a DHCP server. It is called static because it does not change, as opposed to
dynamic IP addresses, which do.
3. NAT
Definition: Network Address Translation (NAT) is a technique that converts one or more local
IP addresses into one or more global IP addresses and vice versa to give Internet connectivity
to local hosts. It also performs port number translation, i.e., masks the host's port number with
another port number in the packet that will be forwarded to the destination. It then adds the
matching IP address and port number entries to the NAT table. NAT is often implemented on a
router or firewall.
VI. Conclusion
PC security is a broad subject that is becoming increasingly important as the world becomes
increasingly interconnected, with networks being used to govern substantial exchanges. Since the
advent of the Internet, the environment in which machines should reside has shifted dramatically. Most
security concerns are caused by programming that fails unexpectedly. While programming security
has a lot more work to do, it brings a lot to the table for professionals who want to get to the bottom of
safety issues.
Following the study, I had a better understanding of several methods to increase network security for
enterprises, such as firewalls, static IP addresses, and Nat... as well as some ways to avoid being
compromised or leaking data.
References
Henriquez, M., 2021. The top data breaches of 2021. [online] securitymagazine.com. Available at: [Accessed 15
February 2022].
Helll, M., 2021. What Is a Security Threat?: Get Your Answer Here. [online] debricked.com. Available at: [Accessed
15 February 2022].
Rosencrance, L., 2021. Top 10 types of information security threats for IT teams. [online] techtarget.com. Available
at: [Accessed 15 February 2022].
Omoth, T., 2022. Ten ways to protect your company from the next big data breach. [online] itpro.com. Available
at: [Accessed 17 February 2022].
Steven, J., 2016. How businesses should prepare for a data breach. [online] finextra.com. Available at: [Accessed
21 February 2022].
Patterson, D. and Fay, J., 2017. Contemporary Security Management. 4th ed. ButterworthHeinemann, pp.495-522.
Hayslip, G., 2018. 9 policies and procedures you need to know about if you’re starting a new security program.
[online] csoonline.com. Available at: [Accessed 22 February 2022].
Pankaj, 2022. Intrusion Detection System (IDS). [online] geeksforgeeks.org. Available at: [Accessed 22 February
2022].
Fisher, T., 2021. What Is a Static IP Address?. [online] lifewire.com. Available at: [Accessed 22 February 2022].
Sharma, S., 2021. Network Address Translation (NAT). [online] https://www.geeksforgeeks.org/. Available at:
[Accessed 22 February 2022].