Docsity Assignment 1 Security P M
Docsity Assignment 1 Security P M
Student declaration
I certify that the assignment submission is entirely my own work and I fully understand the consequenc
understand that making a false declaration is a form of malpractice.
Student’s signature
Grading grid
P1 P2 P3 P4 M1 M2 D1
3|Page
Pham Van Long – BHAF200011
❒ Summative Feedback: ❒ Resubmission Feedback:
Table of Contents
INTRODUCTION OF SECURITY..........................................................................................9
3.2. Non-target specific (Ransomware, Worms, Trojans, Logic Bombs, Backdoors and
Viruses perpetrated by vandals and the general public).............................................11
4|Page
Pham Van Long – BHAF200011
4. List type of threats that organizations will face............................................................12
4.4. DdoS.........................................................................................................................19
3. Anti-virus procedures....................................................................................................22
4. Password Procedures.....................................................................................................23
4.2. Procedures................................................................................................................23
5|Page
Pham Van Long – BHAF200011
5.1. Purpose of Physical security procedures...................................................................24
5.2. Procedures................................................................................................................25
3............................................................................................................................................... Show
with diagrams the example of how firewall works..........................................................32
P4 Show, using an example for each, how implementing a DMZ, static IP and NAT in a
network can improve Network Security............................................................................33
1. DMZ................................................................................................................................33
2. Static IP...........................................................................................................................36
Document shared on www.docsity.com
2.1. What is static IP ?.........................................................................................................
Downloaded by: hiep-pham-van ([email protected]) 36
3. NAT...............................................................................................................................38
6|Page
Pham Van Long – BHAF200011
3.1. What is NAT ?...........................................................................................................38
7|Page
Pham Van Long – BHAF200011
3.2. How does it work ?...................................................................................................39
M2 Discuss three benefits to implement network monitoring systems with supporting reasons.
..........................................................................................................................................53
3. The benefits of using a network monitoring system for and organization are next.....59
8|Page
Pham Van Long – BHAF200011
3. How can it be a solution in IT security...........................................................................61
Picture of the presentation.................................................................................................61
REFERENCES.......................................................................................................................83
Table of Pictures
Picture 1 Security......................................................................................................................9
Picture 2 Network security threats..........................................................................................10
Picture 3 The Malware............................................................................................................13
Picture 4 Trojans.....................................................................................................................13
Picture 5 Spyware...................................................................................................................14
Picture 6 Adware....................................................................................................................15
Picture 7 Rootkits...................................................................................................................15
Picture 8 Ransomware............................................................................................................16
Picture 9 Worms.....................................................................................................................17
Picture 10 Keyloggers.............................................................................................................17
Picture 11 SQL injected..........................................................................................................18
Picture 12 DdoS......................................................................................................................19
Picture 13 Biometric data.......................................................................................................20
Picture 14 Anti-virus procedure..............................................................................................23
Picture 15 Password Procedure..............................................................................................24
Picture 16 Physical Security Procedure..................................................................................25
Picture 17 Firewall.......................................................................................................................
Document shared on www.docsity.com 26
Downloaded by: hiep-pham-van ([email protected])
Picture 18 VPN.......................................................................................................................30
Picture 19 Diagram Firewall work..........................................................................................32
Picture 20 DMZ......................................................................................................................33
Picture 21 Example of DMZ..................................................................................................36
Picture 22 Static IP.................................................................................................................37
9|Page
Pham Van Long – BHAF200011
Picture 23 Example of Static IP..............................................................................................37
Picture 24 NAT.......................................................................................................................39
Picture 25 Document the Results............................................................................................48
Picture 26 Activity Log Analysis — XpoLog........................................................................49
Picture 27 Protecting apps and data – Imperva......................................................................49
Picture 28 Penetration Behavior Testing – Metasploit...........................................................50
Picture 29 Prevent phishing attacks - Hoxhunt......................................................................50
Picture 30 The OCTAVE method..........................................................................................53
Picture 31 SolarWinds Network Performance Monitor...........................................................54
Picture 32 Datadog Network Monitoring................................................................................54
Picture 33 ManageEngine OpManager...................................................................................55
Picture 34 Paessler PRTG Network Monitor..........................................................................56
Picture 35 Auvik.....................................................................................................................56
Picture 36 Site24x7 Network Monitoring...............................................................................57
Picture 37 Atera......................................................................................................................57
Picture 38 Discovery of Devices............................................................................................59
Picture 39 Indentify Security threats.......................................................................................60
Picture 40 Picture of the presentation.....................................................................................61
Picture 41 Picture of the presentation.....................................................................................62
Picture 42 Picture of the presentation.....................................................................................62
Picture 43 Picture of the presentation.....................................................................................63
Picture 44 Picture of the presentation.....................................................................................63
Picture 45 Picture of the presentation.....................................................................................64
Picture 46 Picture of the presentation.....................................................................................64
Picture 47 Picture of the presentation.....................................................................................65
Picture 48 Picture of the presentation........................................................................................
Document shared on www.docsity.com 65
Downloaded by: hiep-pham-van ([email protected])
Picture 49 Picture of the presentation.....................................................................................66
Picture 50 Picture of the presentation.....................................................................................66
Picture 51 Picture of the presentation.....................................................................................67
Picture 52 Picture of the presentation.....................................................................................67
Picture 53 Picture of the presentation.....................................................................................68
10 | P a g e
Pham Van Long – BHAF200011
Picture 54 Picture of the presentation.....................................................................................68
Picture 55 Picture of the presentation.....................................................................................69
Picture 56 Picture of the presentation.....................................................................................69
Picture 57 Picture of the presentation.....................................................................................70
Picture 58 Picture of the presentation.....................................................................................70
Picture 59 Picture of the presentation.....................................................................................71
Picture 60 Picture of the presentation.....................................................................................71
Picture 61 Picture of the presentation.....................................................................................72
Picture 62 Picture of the presentation.....................................................................................72
Picture 63 Picture of the presentation.....................................................................................73
Picture 64 Picture of the presentation.....................................................................................73
Picture 65 Picture of the presentation.....................................................................................74
Picture 66 Picture of the presentation.....................................................................................74
Picture 67 Picture of the presentation.....................................................................................75
Picture 68 Picture of the presentation.....................................................................................75
Picture 69 Picture of the presentation.....................................................................................76
Picture 70 Picture of the presentation.....................................................................................76
Picture 71 Picture of the presentation.....................................................................................77
Picture 72 Picture of the presentation.....................................................................................77
Picture 73 Picture of the presentation.....................................................................................78
Picture 74 Picture of the presentation.....................................................................................78
Picture 75 Picture of the presentation.....................................................................................79
Picture 76 Picture of the presentation.....................................................................................79
Picture 77 Picture of the presentation.....................................................................................80
Picture 78 Picture of the presentation.....................................................................................80
Picture 79 Picture of the presentation........................................................................................
Document shared on www.docsity.com 81
Downloaded by: hiep-pham-van ([email protected])
Picture 80 Picture of the presentation.....................................................................................81
Picture 81 Picture of the presentation.....................................................................................82
Picture 82 Picture of the presentation.....................................................................................82
11 | P a g e
Pham Van Long – BHAF200011
INTRODUCTION OF SECURITY
The security measure was first implemented for computers in 1960 when the internet
or networks was not yet to worry about. Many companies of that time were focused on
a physical measure to protect their computer-implemented the password from the
people with some knowledge of how the computers work. This report presenting in an
IT organization Octave method to assess the IT security risks, the impact of the IT
organization of incorrect Firewall and third party VPNS configuration, benefits and
reasons of network monitoring systems also presenting the improvement of the network
security using DMZ, static IP and NAT and then the explanation of Risk Assessment
and Risk Management of an Organization, the impact of the Organization after a SWOT
evaluation of an internal audit and then implementation of policy and describe the
recovery plan measure with the hierarchy structure of the organization and their role.
Picture 1 Security
12 | P a g e
Pham Van Long – BHAF200011
P1 Identify types of security risks to organisations.
13 | P a g e
Pham Van Long – BHAF200011
Document shared on www.docsity.com
Downloaded by: hiep-pham-van ([email protected])
14 | P a g e
Pham Van Long – BHAF200011
2. What is security risk?
A computer security risk is really anything on your computer that may damage or
steal your data or allow someone else to access your computer, without your
knowledge or consent. There are a lot of different things that can create a computer
risk, including malware, a general term used to describe many types of bad software.
We commonly think of computer viruses, but, there are several types of bad
software that can create a computer security risk, including viruses, worms,
ransomware, spyware, and Trojan horses. Misconfiguration of computer products as
well as unsafe computing habits also pose risks.
We have heard many examples of this from the alleged Russian interference with
the US Presidential elections, to Sony claiming that North Korea had been
responsible for their sites being hacked in 2014 and more recently the concerns
about Huawei providing 5G networks because of the possibility of them passing
information to the Chinese government.
Common mistakes such as sending an email to the wrong person happen but usually
we realise the mistake quickly and are able to rectify the situation. Simple measures
such as password protecting files can also help to mitigate the effects of such
mistakes.
However unfortunately there are also disgruntled people out there who purposefully
harm organisations from the inside. Recently Morrisons supermarket faced a case
where a disgruntled internal auditor downloaded payroll and other HR personal data
and published it on the internet. The ex-employee was convicted and sent to prison,
but Morrisons was also fined because it did not have the proper technical and
organisational measures in place to prevent this act (note that Morrisons is currently
appealing against the fine).
Programs are also considered malware if they secretly act against the interests of the
computer user. For example, at one point Sony music Compact discs silently
installed a
Document
rootkit on purchasers' shared
computers withon
thewww.docsity.com
intention of preventing illicit copying, but
Downloaded by: hiep-pham-van ([email protected])
which also reported on users' listening habits, and unintentionally created extra
security vulnerabilities.
17 | P a g e
Pham Van Long – BHAF200011
Document shared on www.docsity.com
Downloaded by: hiep-pham-van ([email protected])
Picture 4 Trojans
18 | P a g e
Pham Van Long – BHAF200011
4.1.2. Spyware
Spyware invades your computer and attempts to steal your personal information such
as credit card or banking information, web browsing data, and passwords to various
accounts.
Picture 5 Spyware
4.1.3. Adware
Adware is unwanted software that displays advertisements on your screen. Adware
collects personal information from you to serve you with more personalized ads.
19 | P a g e
Pham Van Long – BHAF200011
Document shared on www.docsity.com
Downloaded by: hiep-pham-van ([email protected])
20 | P a g e
Pham Van Long – BHAF200011
Picture 6 Adware
4.1.4. Rootkits
Rootkits enable unauthorized users to gain access to your computer without being
detected.
21 | P a g e
Pham Van Long – BHAF200011
Document shared on www.docsity.com
Downloaded by: hiep-pham-van ([email protected])
Picture 7 Rootkits
22 | P a g e
Pham Van Long – BHAF200011
4.1.5. Ransomware
Ransomware is designed to encrypt your files and block access to them until a
ransom is paid.
Picture 8 Ransomware
4.1.6. Worms
A worm replicates itself by infecting other computers that are on the same network.
They’re designed to consume bandwidth and interrupt networks.
23 | P a g e
Pham Van Long – BHAF200011
Document shared on www.docsity.com
Downloaded by: hiep-pham-van ([email protected])
24 | P a g e
Pham Van Long – BHAF200011
Picture 9 Worms
4.1.7. Keyloggers
Keyloggers keep track of your keystrokes on your keyboard and record them on a
log. This information is used to gain unauthorized access to your accounts.
25 | P a g e
Pham Van Long – BHAF200011
Document shared on www.docsity.com
Downloaded by: hiep-pham-van ([email protected])
Picture 10 Keyloggers
26 | P a g e
Pham Van Long – BHAF200011
4.2. Social engineering attack
In the context of information security, social engineering is the psychological
manipulation of people into performing actions or divulging confidential
information. This differs from social engineering within the social sciences, which
does not concern the divulging of confidential information. A type of confidence
trick for the purpose of information gathering, fraud, or system access, it differs
from a traditional "con" in that it is often one of many steps in a more complex fraud
scheme.
It has also been defined as "any act that influences a person to take an action that
may or may not be in their best interests."
27 | P a g e
Pham Van Long – BHAF200011
Document shared on www.docsity.com
Downloaded by: hiep-pham-van ([email protected])
28 | P a g e
Pham Van Long – BHAF200011
4.4. DdoS
A denial of service attack (DoS attack - short for Denial of Service) or a distributed
denial of service attack (DDoS attack - short for Distributed Denial of Service) is an
attempt to get people to User cannot use the resources of a computer. Although the
means, motives, and targets of a denial of service attack can vary, generally it
involves coordination, malicious attempts of one person or more people to a site, or
the network cannot use, interrupt, or slow down the system significantly for the
average user, by overloading the system's resources. The perpetrators of denial of
service attacks often target typical websites or servers such as banks, credit card
payment gateways and even DNS root servers.
One common attack method is often associated with saturating a target machine with
external communications requests, to the point that it cannot respond to legitimate
traffic, or respond too slowly. In general terms, DoS attacks are complemented by
forcing the target machine to restart or by consuming all its resources to the point
that it does not provide service, or obstructs communication between the user and
the crash. multiply.
29 | P a g e
Pham Van Long – BHAF200011
Document shared on www.docsity.com
Downloaded by: hiep-pham-van ([email protected])
Picture 12 DdoS
5. An example of a recently publicized security breach
Antheus Tecnologia Biometric Data Breach:
30 | P a g e
Pham Van Long – BHAF200011
The Story:
The server didn't store direct scans of fingerprints, but binary code that hackers
could use to recreate them, with potentially disastrous consequences.
Per Biometric Update: "The vulnerable server contained roughly 16 gigabytes of data,
31 | P a g e
Pham Van Long – BHAF200011
claimed that the data was hashed, which was not the case.
32 | P a g e
Pham Van Long – BHAF200011
Password protect all sensitive data when migrating to the cloud and apply the
same controls you would apply on-premises.
Some of the worst data breaches on this list result from misconfiguration errors
when transitioning to the cloud. According to Verizon's 2020 Data Breach Report,
errors are now the second most common source of breaches, ahead of malware and
only behind the hacking. In particular, misconfiguration errors have dramatically
increased since 2017, though the researchers acknowledge this is mostly due to
"internet-exposed storage discovered by security researchers and unrelated third
parties."
33 | P a g e
Pham Van Long – BHAF200011
causes them to forget or overlook a critical step.
34 | P a g e
Pham Van Long – BHAF200011
3. Anti-virus procedures
3.1. Purpose of Anti-virus procedures
The primary purpose of the anti-virus solution or software is to guard against
malicious software or scripts by blocking or quarantining this software that is
identified, and alerting administrators that such action has taken place. The solution
would detect and report on different types of malicious software that may be
introduced or attempted to be installed on the systems and network, including
endpoints such as mobile devices, desktops, laptops, servers, etc.
35 | P a g e
Pham Van Long – BHAF200011
Picture 14 Anti-virus procedure
4. Password Procedures
4.1. Purpose of Password procedures
To prevent unauthorized access and to establish user accountability when using IDs and
passwords to access College information systems.
4.2. Procedures
The successful adoption of a password procedure depends on the ability of the
organization to enforce it. Some school boards/authorities have sophisticated
technologies that can provide substantial automation and support for a large number
of users. Others may have limited resources and will need to develop a procedure
that is manageable in a more manual fashion. It is important to realize that
regardless of which category the school board/authority falls into, password
procedures are still a requirement for effective security management. When creating
a password procedure,
it is important to consider elements that can be enforced through software security
Downloaded by: hiep-pham-van ([email protected])
Document shared on www.docsity.com
settings and those which must be enforced through education of the users. Items such
as the minimum length of a password and expiry cycle for passwords are typically
set through system software. Issues that would be linked to user education include
not having passwords displayed on sticky notes and not sharing passwords. Another
important consideration when developing a password procedure is password
23 | P a g e
Pham Van Long – BHAF200011
retention. Even with the best procedures in place, passwords will be shared or
otherwise become
23 | P a g e
Pham Van Long – BHAF200011
known over time, weakening security, so it is necessary to change them on a regular
basis. Most systems allow the system administrator to set a parameter which causes
passwords to expire and requires them to be reset by the user. This parameter is
typically set for anywhere from 30 days to 90 days, depending on the number of
users, level of risk, and manageability of the procedure. Password expiry does add
some additional workload for technical staff as users often forget their new
passwords and need support to change them. It is also wise to force a password reset
the first time a user logs in to any system.
establish the rules for granting, control, monitoring, and removal of physical access to
Document shared on www.docsity.com
office premises;
Downloaded by: hiep-pham-van ([email protected])
24 | P a g e
Pham Van Long – BHAF200011
5.2. Procedures
Physical access to the server rooms/areas shall completely be controlled and
servers shall be kept in the server racks under lock and key.
Access to the servers shall be restricted only to designated Systems and
Operations Personnel. Besides them, if any other person wants to work on the
servers from the development area then he/she shall be able to connect to the
servers only through Remote Desktop Connection with a Restricted User
Account.
Critical backup media shall be kept in a fireproof off-site location in a vault.
Security perimeters shall be developed to protect areas that contain information
system to prevent unauthorized physical access, damage and interference.
A list of personnel with authorized access to the facilities where information
systems reside shall be maintained with appropriate authorization credentials. The
access list and authorization credentials shall be reviewed and approved by
authorized personnel periodically.
25 | P a g e
Pham Van Long – BHAF200011
Document shared on www.docsity.com
Downloaded by: hiep-pham-van ([email protected])
Picture 16 Physical Security Procedure
26 | P a g e
Pham Van Long – BHAF200011
VPN will be explained and the impact on the organisation. The typical questions
fasmany people are:
1. What is Firewall ?
Firewall- is a piece of software or hardware with the scope of filtering the traffic
between the Internet and network an also between computer to computer into any
organization. For work properly in good parameter, a firewall to can protect the
network or computers of the organization must be installed and configured. The jobs
of the firewall in an organisation once install and configure is to protect the system,
resources, files and data of viruses, hacking and any type of security attacked. For an
organization, the impacts if a Firewall is incorrect install and configure is that the
network is exposing of any kind of attack with the consequences of losing: Files,
Data, Confidential data, Staff time, Reputation. I next section is present the threat
and vulnerability with the description for incorrect firewall configuration of an
organisation.
Picture 17 Firewall
27 | P a g e
Pham Van Long – BHAF200011
DdoS Attack Distributed Denial of Services (DDOS) attacks are used by the
attackers with a highly effective and low-cost to execute. This
attack used to spread malicious software, infected emails and
attachments with the scope to infect the system or computer called
botnet. Once the system or computer is infected the attackers can
control the botnet commanding it to flood a site with traffic.
28 | P a g e
Pham Van Long – BHAF200011
It is a language that the attacker sends a code injection into all
vulnerable servers that use a SQL with the scope of reveal
SQL injection attack
information from the server.
30 | P a g e
Pham Van Long – BHAF200011
+ Stops Virus Attacks.Nothing can shut your digital operations down faster and
harder than a virus attack. With hundreds of thousands of new threats developed
every single day, it is vital that you put the defenses in place to keep your systems
healthy. One of the most visible benefits of firewalls is the ability to control your
system's entry points and stop virus attacks. The cost of damage from a virus attack
on your systems could be immeasurably high, depending on the type of virus.
Firewalls are often set up with an open policy of allowing traffic from any
source to any destination. This is because IT teams don’t know exactly what they
need at the outset, and therefore start with broad rules and work backwards.
However, the reality is that due to time pressures or simply not regarding it as
a priority, they never get round to defining firewall policies. This leaves the
network in a perpetually exposed state.
Organizations should follow the principle of least privilege – that is, giving
the minimum level of privilege that the user or service needs to function
normally, thereby limiting the potential damage caused by a breach. It’s also a good idea
to regularly revisit your firewall policies to look at application usage trends
and
identify new applications being used on the network and what connectivity they
require. Document shared on www.docsity.com
Downloaded by: hiep-pham-van ([email protected])
31 | P a g e
Pham Van Long – BHAF200011
Services that are left running on the firewall that don’t need to be is another mistake
I often find. Two of the main culprits are dynamic routing, which typically
should not be enabled on security devices as best practice, and “rogue” DHCP
32 | P a g e
Pham Van Long – BHAF200011
servers on the network distributing IPs, which can potentially lead to
availability issues as a result of IP conflicts. I’m also surprised to see the number
of devices that are still managed using unencrypted protocols like telnet,
despite the protocol being over 30 years old.
The answer to this problem is hardening devices and ensuring that
configurations are compliant before the device is put into a production setting.
This is something with which a lot of enterprises struggle. But by configuring
your devices based on the function that you actually want them to fulfill and
following the principle of least privileged access, you will improve security
and reduce the chances of accidentally leaving a risky service running on
your firewall.
During my work, I often find organizations that use routers that don’t follow the
enterprise standard for authentication. For example, a large bank I worked with
had all the devices in its primary data center controlled by a central
authentication mechanism, but did not use the same mechanism at its remote
office. By not enforcing corporate authentication standards, staff in the remote
branch could access local accounts with weak passwords, and had a different limit
on login failures before account lockout.
This scenario reduces security and creates more vectors for attackers, as it’s easier for
them to access the corporate network via the remote office. Organizations should
ensure that all remote offices follow the same central authentication mechanism
as the rest of the company.
34 | P a g e
Pham Van Long – BHAF200011
network security where the attackers are looking to access the weak point for
establishing and exploit the critical asset. The third-party VPN access if it is incorrect
configures the impact and consequences for an organisation are: credential theft,
compromised devices, excessive access and exposed servers.
Picture 18 VPN
2.2. Advantages of VPN
Protected File Sharing. With a VPN at your disposal, you and others can share
files over extended periods of time without having to worry about the data being
stolen or exposed.
Remote Access. Because a VPN is an actual network, you can access it remotely.
This makes it a great resource for companies, in particular, allowing employees
to work from outside the office. No matter where you are, your data and
information stay protected as long as you’re using the VPN.
Bypass blockersDocument
and filters. In some parts of the world, Internet censorship is real
shared on www.docsity.com
Downloaded by: hiep-pham-van ([email protected])
and that may mean someone more or less controlling the user's worldview. That is
why more and more people are using VPNs, possibly bypassing blocked websites
and Internet filters. Put the power back in your hands.
Performance improvements. As if online security wasn't enough, a solid VPN
can also improve things like bandwidth and efficiency. Better performance is
35 | P a g e
Pham Van Long – BHAF200011
something that no Internet user would argue with.
36 | P a g e
Pham Van Long – BHAF200011
2.3. What are the impacts of incorrect VPN configurations?
Risky business
No third-party accountability:
VPNs typically provide little or no granular audit records, so you can’t monitor and
record the actions of every third-party vendor using the VPN. Usually, all that is
logged in connection times and even then that data is in yet another log to
monitor and watch.
Without easy, centralized access to all the historical information on a connection
(user, applications accessed, the reason for access, etc.), it is impossible to prove
who or what created an issue, should a breach or mistake occur due to a vendor.
If your third-partyDocument
vendors and VPN
shared onusers have access to your network, you may
www.docsity.com
Downloaded by: hiep-pham-van ([email protected])
believe that your company data and network are safe; after all, the “P” in VPN does stand
for “private”.
37 | P a g e
Pham Van Long – BHAF200011
However, history has proven otherwise. The reality is that malicious hackers
have exploited weak VPN protocols and non-secure internet connections to
cause data breaches at major companies such as Home Depot and Target.
38 | P a g e
Pham Van Long – BHAF200011
VPNs are a haven for hackers:
Hackers often use VPNs to gain access to networks. If your business has many
third- party vendors, and each vendor has full access to your network, a hacker
now has multiple potential routes to break into and exploit your network using
VPN traffic.
Pictureshared
Document 19 Diagram Firewall work
on www.docsity.com
Downloaded by: hiep-pham-van ([email protected])
39 | P a g e
Pham Van Long – BHAF200011
P4 Show, using an example for each, how implementing a DMZ, static IP and NAT in a
network can improve Network Security.
1. DMZ
1.1. What is DMZ ?
DMZ- is call as a demilitarized zone which is a logical or physical subnet that
separates the organization network from other unsafe networks especially the
Internet with the scope of adding an extra security layer, protecting the most
vulnerable host against any attacks and keeping the organization network separated
from the external network. The configuration of DMZ is happening using one or two
firewalls that filter the traffic between the DMZ and organization network also
having a gateway filter for incoming traffic of the external network, Configuration
with one Firewall is when in a LAN network using three interfaces the DMZ will be
placed inside the firewall and for the connection with the ISP, the external devices
make the connection, the internal network device which is connected by the second
device and the connection with DMZ is handled by the third network devices.
Configuration with two Firewalls-the first Firewall is the frontend firewalls
configure to leave the fated traffic for DMZ. The second firewall is the backend
firewall with the responsibility of the traffic that travels from DMZ to the
organization network.
40 | P a g e
Pham Van Long – BHAF200011
Document shared on www.docsity.com
Downloaded by: hiep-pham-van ([email protected])
Picture 20 DMZ
41 | P a g e
Pham Van Long – BHAF200011
1.2. How does it work ?
DMZs are intended to function as a sort of buffer zone between the public internet
and the private network. Deploying the DMZ between two firewalls means that all
inbound network packets are screened using a firewall or other security appliance
before they arrive at the servers the organization hosts in the DMZ.
If a better-prepared threat actor passes through the first firewall, they must then gain
unauthorized access to those services before they can do any damage, and those
systems are likely to be hardened against such attacks.
Finally, assuming that a well-resourced threat actor is able to breach the external
firewall and take over a system hosted in the DMZ, they must still break through the
internal firewall before they can reach sensitive enterprise resources. While a
determined attacker can breach even the best-secured DMZ architecture, a DMZ
under attack should set off alarms, giving security professionals enough warning to
avert a full breach of their organization.
Access control for organizations. Organizations can provide users with access
to services outside of their network's perimeter through the public Internet.
The DMZ network provides access to these essential services while offering
a level of network segmentation that increases the number of obstacles that
unauthorized
users have to overcome before they can access an organization's private network.
DownloadedDocument shared on www.docsity.com
by: hiep-pham-van ([email protected])
In some cases, the DMZ includes a proxy server, which centralizes the internal
flow of internet traffic - usually employees - and makes it simpler to record
and monitor that traffic.
Prevent attackers from performing network reconnaissance. A DMZ, because
it acts as a buffer, prevents an attacker from being able to scope out potential
42 | P a g e
Pham Van Long – BHAF200011
targets within the network. Even if a system within the DMZ is
compromised, the
43 | P a g e
Pham Van Long – BHAF200011
private network is still protected by the internal firewall separating it from the
DMZ. It also makes external reconnaissance more difficult for the same
reason. Although the servers in the DMZ are publicly exposed, they are
backed by another layer of protection. The public face of the DMZ keeps
attackers from seeing the contents of the internal private network. If attackers
do manage to compromise the servers within the DMZ, they are still isolated
from the private network by the DMZ’s internal barrier.
Protection against IP spoofing. In some cases, attackers attempt to bypass
access control restrictions by spoofing an authorized IP address to
impersonate another device on the network. A DMZ can stall potential IP
spoofers while another service on the network verifies the IP address's
legitimacy by testing whether it is reachable.
The DMZ can also be useful in a home network, where computers and other devices
are connected to the internet using a broadband router and configured as a local
network. Some home routers include the DMZ server feature, which is as opposed
to the DMZ subnet that is typically deployed in organizations with more devices
than the feature
found indoors. The DMZ server feature specifies a device on your home network that
Document shared on www.docsity.com
Downloaded by: hiep-pham-van ([email protected])
works outside of the firewall, where it acts as the DMZ while the rest of your home
network is inside the firewall. In some cases, the game console is chosen as the
DMZ server so that the firewall does not interfere with gameplay. In addition, the
console is also a good candidate for a DMZ server as it is likely to contain less
44 | P a g e
Pham Van Long – BHAF200011
sensitive information than a PC.
45 | P a g e
Pham Van Long – BHAF200011
Picture 21 Example of DMZ
2. Static IP
2.1. What is static IP ?
Static IP address is an unchanged number configured manually for a device like a
computer or a router or one that was assigned by A DHCP server. To configure any
devices with a static IP that might be done through the device as a router giving out
IP addresses or manually, as a computer or laptop typing the IP address for the
device itself. Using a static IP address there are some benefits such as better DNS
support because is easier to set up and manage, Convenient remote access makes
easier to work remotely using any remote access program, Hosting a server if you
hosing a server that using a static IP it is easier for the customer to find you via DNS
server. Also using a static IP Is not ideal for all the situation because is easy to know
exactly by the hackers where your server is on the internet and is a real security
concern for an IT organization because with rights network tools the organization
computers can be located easily.
46 | P a g e
Pham Van Long – BHAF200011
Picture 22 Static IP
2.2. Example of Static IP
- This example applies to all AR routers that support LAN interfaces of
V200R003C00 and later versions:
47 | P a g e
Pham Van Long – BHAF200011
Document shared on www.docsity.com
Downloaded by: hiep-pham-van ([email protected])
48 | P a g e
Pham Van Long – BHAF200011
host names in a reliable way. That is why FTP servers, web servers, and similar
components use fixed addresses. Because they are not dynamic, there is never a
need to track their changes to locate them.
It may provide a better level of protection. Even though a static IP address
creates a fact, whereas a dynamic IP address creates change, you still have an
advantage when using this option over a DHCP address assignment. When you
have a static IP in place, your home network will receive an extra layer of
protection against the security problems which may develop over the network.
There are reduced lapses in connection.If you’re using a dynamic IP address at
home with your ISP (or with your business), then you may experience lapses in
connection to the internet. Some of these lapses may be momentary, while others
may force you to reboot your equipment. Although this is sometimes called a “ping,”
what is happening is a lack of recognition. When your IP address changes, you
become more difficult to find. Using a static IP address reduces this issue, which is
useful for heavy data users, since the IP never resets.
3. NAT
3.1. What is NAT ?
NAT-Network Address Translation is the process of transforming a public address
into private address used by the organization by using different types of devices
firewall and router. NAT capability using only one router is that it can configure
only one address for the entire network organization with the scope of hiding the
entire internal network behind that address when will be used to the Internet (Public
Netwo are implemented in remote- access environments. Configuration of a NAT is
to make on a router at list one interface for NAT outside and one interface for NAT
inside with a set of rules for the IP
addresses to be translated in the packet header configured. The devices as router or
Document
Downloaded shared on www.docsity.com
by: hiep-pham-van ([email protected])
firewall that use a NAT configuration can work in different ways: Static NAT mapping an
unregister address to a registered address on one to one connection, Dynamic NAT
mapping a group of unregistering address to a registered address
49 | P a g e
Pham Van Long – BHAF200011
Picture 24 NAT
3.2. How does it work ?
- NAT acts like a router, forwarding packets between different network layers on a
large network. NAT translates or changes one or both addresses within a packet
as the packet passes through a router, or some other device. Typically, NAT
changes the address that is usually the private IP address of a network connection
to a public IP (Public IP) address.
1 STATIC * A * A
- Internet addresses are all addresses on the interface sent to A; and Inside are all
internal servers on all other interfaces. With these NAT rules alone, all of the
servers inside Inside communicate with their private, unregistered addresses
when communicating with the Monitor or with each other.
51 | P a g e
Pham Van Long – BHAF200011
To get started with IT security risk assessment, you need to answer three
important questions:
52 | P a g e
Pham Van Long – BHAF200011
What are your organization’s critical information technology assets — that is, the data
whose loss or exposure would have a major impact on your business
operations?
What are the key business processes that utilize or require this information?
What threats could affect the ability of those business functions to operate?
Once you know what you need to protect, you can begin developing strategies.
However, before you spend a dollar of your budget or an hour of your time
implementing a solution to reduce risk, be sure to consider which risk you are
addressing, how high its priority is, and whether you are approaching it in the most
cost- effective way.
54 | P a g e
Pham Van Long – BHAF200011
Natural disasters that could damage servers
When taking stock of cyber risks, it’s important to detail the specific financial damage they
could do to the organization, such as legal fees, operational downtime and related profit
loss, and lost business due to customer distrust.
Threat — A threat is any event that could harm an organization’s people or assets.
Examples include natural disasters, website failures and corporate espionage.
Vulnerability — A vulnerability is any potential weak point that could allow a
threat to cause damage. For example, outdated antivirus software is a
vulnerability that can allow a malware attack to succeed. Having a server room in
the basement is a vulnerability that increases the chances of a hurricane or flood
ruining equipment and causing downtime. Other examples of vulnerabilities
include disgruntled employees and aging hardware. The NIST National
Vulnerability Database maintains a list of specific, code-based weaknesses.
Impact — Impact is the total damage the organization would incur if a
vulnerability were exploited by a threat. For example, a successful ransomware
attack could result in not just lost productivity and data recovery expenses, but
also disclosure of customer data or trade secrets that results in lost business, legal
fees and compliance penalties.
Likelihood — This is the probability that a threat will occur. It is usually not a
specific number but a range.
This isn’t strictly a mathematical formula; it’s a model for understanding the
relationships among the components that feed into determining risk:
55 | P a g e
Pham Van Long – BHAF200011
Threat is short for “threat frequency,” or how often an adverse event is expected to
occur. For example, the threat of being struck by lightning in a given year is
about 1 in 1,000,000.
Vulnerability is shorthand for “the likelihood that a vulnerability will be
exploited and a threat will succeed against an organization’s defenses.” What is the
security environment in the organization? How quickly can disaster be mitigated
if a breach does occur? How many employees are in the organization and what
is the probability of any given one becoming an internal threat to security
control?
Cost is a measure of the total financial impact of a security incident. It includes
hard costs, like damage to hardware, and soft costs, such as lost business and
consumer confidence. Other costs can include:
o Data loss — Theft of trade secrets could cause you to lose business to
your competitors. Theft of customer information could result in loss of
trust and customer attrition.
o System or application downtime — If a system fails to perform its
primary function, customers may be unable to place orders, employees
may be unable to do their jobs or communicate, and so on.
o Legal consequences — If somebody steals data from one of your
databases, even if that data is not particularly valuable, you can incur fines
and other legal costs because you failed to comply with the data protection
security requirements of HIPAA, PCI DSS or other compliance
The risk assessment factors in the relationship between the three elements. For example,
suppose you want to assess the risk associated with the threat of hackers compromising a
particular system. If your network is very vulnerable (perhaps because you have no
firewall and no antivirus solution) and the asset is critical, your risk is high. However, if
you have robust perimeter defenses that make your vulnerability low, your risk will be
medium, even though the asset is still critical.
Note that all three elements need to be present in order for there to be risk — since
anything times zero equals zero, if one of the elements in the equation is not present,
then there is no risk, even if the other two elements are high or critical.
56 | P a g e
Pham Van Long – BHAF200011
Assets include servers, client contact information, sensitive partner documents, trade
secrets and so on. Remember, what you as a technician think is valuable might not
57 | P a g e
Pham Van Long – BHAF200011
be what is actually most valuable for the business. Therefore, you need to work with
business users and management to create a list of all valuable assets. For each asset,
gather the following information, as applicable:
Software
Hardware
Data
Interfaces
Users
Support personnel
Mission or purpose
Criticality
Functional requirements
IT security policies
IT security architecture
Network topology
Information storage protection
Information flow
Technical security controls
Physical security environment
Environmental security
Because most organizations have a limited budget for risk assessment, you will likely
have to limit the scope of the remaining steps to mission-critical assets. Accordingly,
you need to define a standard for determining the importance of each asset.
Common criteria include the asset’s monetary value, legal standing and importance
to the organization. Once the standard has been approved by management and formally
incorporated into the risk assessment security policy, use it to classify each asset as
critical, major or minor.
A threat is anything that could cause harm to your organization. While hackers and
malware probably leap to mind, there are many other types of threats:
Document
Natural disasters. Floods, shared on www.docsity.com
hurricanes, earthquakes, fire and other
natural Downloaded by: hiep-pham-van ([email protected])
disasters can destroy not just data, but servers and appliances as well. When
deciding where to house your servers, think about the chances of different types
of natural disasters. For instance, your area might have a high risk of floods but a
58 | P a g e
Pham Van Long – BHAF200011
low likelihood of tornadoes.
Hardware failure. The likelihood of hardware failure depends on the quality
and age of the server or other machine. For relatively new, high-quality
equipment, the chance of failure is low. But if the equipment is old or from a
59 | P a g e
Pham Van Long – BHAF200011
“no-name” vendor, the chance of failure is much higher. This threat should be on your
list, no matter what business you are in. People can accidentally delete important
files, click on a malicious link in an email or spill coffee on a piece of equipment
that hosts critical systems.
Malicious behavior. There are three types of malicious behavior:
o Interference is when somebody causes damage to your business by
deleting data, engineering a distributed denial of service (DDOS)
against your website, physically stealing a computer or server, and so
on.
o Interception is theft of your data.
o Impersonation is misuse of someone else’s credentials, which are often
acquired through social engineering attacks or brute-force attacks, or
purchased on the dark web.
Don’t limit your thinking to software vulnerabilities; there are also physical and human
vulnerabilities. For example, having your server room in the basement increases your
vulnerability to the threat of flooding, and failure to educate your employees about the
danger of clicking on email links increases your vulnerability to the threat of malware.
Analyze the controls that are either in place or in the planning stage to minimize or
eliminate the probability that a threat will exploit a vulnerability. Technical controls
include encryption, intrusion detection mechanisms, and identification and
authentication solutions. Nontechnical controls include security policies, administrative
actions, and physical and environmental mechanisms.
Document shared on www.docsity.com
Downloaded by: hiep-pham-van ([email protected])
Both technical and nontechnical controls can further be classified as preventive or
detective. As the name implies, preventive controls attempt to anticipate and stop
attacks; examples include encryption and authentication devices. Detective controls are
used to discover threats that have occurred or are in process; they include audit trails and
intrusion detection systems.
60 | P a g e
Pham Van Long – BHAF200011
Step #5: Determine the Likelihood of an Incident
61 | P a g e
Pham Van Long – BHAF200011
Assess the probability that a vulnerability might actually be exploited, taking into
account the type of vulnerability, the capability and motivation of the threat source, and
the existence and effectiveness of your controls. Rather than a numerical score, many
organizations use the categories high, medium and low to assess the likelihood of an
attack or other adverse event.
Analyze the impact that an incident would have on the asset that is lost or damaged,
including the following factors:
The mission of the asset and any processes that depend upon it
The value of the asset to the organization
The sensitivity of the asset
To get this information, start with a business impact analysis (BIA) or mission impact
analysis report. This document uses either quantitative or qualitative means to
determine the impact of harm to the organization’s information assets, such as loss of
confidentiality, integrity and availability. The impact on the system can be qualitatively
assessed as high, medium or low.
For each threat/vulnerability pair, determine the level of risk to the IT system, based on
the following:
A useful tool for estimating risk in this manner is the risk-level matrix. A high
likelihood that the threat will occur is given a value of 1.0; a medium likelihood is
assigned a value of 0.5; and a low likelihood of occurrence is given a rating of 0.1.
Similarly, a high impact level is assigned a value of 100, a medium impact level 50,
Document shared on www.docsity.com
by the impact value, and the risks are categorized as high, medium or low based on the
result.
62 | P a g e
Pham Van Long – BHAF200011
Using the risk level as a basis, determine the actions needed to mitigate the risk. Here
are some general guidelines for each level of risk:
63 | P a g e
Pham Van Long – BHAF200011
High — A plan for corrective measures should be developed as soon as
possible.
Medium — A plan for corrective measures should be developed within a
reasonable period of time.
Low — The team must decide whether to accept the risk or implement
corrective actions.
Organizational policies
Cost-benefit analysis
Operational impact
Feasibility
Applicable regulations
The overall effectiveness of the recommended controls
Safety and reliability
The final step in the risk assessment process is to develop a risk assessment report to
support management in making appropriate decisions on budget, policies, procedures
and so on. For each threat, the report should describe the corresponding vulnerabilities,
the assets at risk, the impact to your IT infrastructure, the likelihood of occurrence and
the control recommendations.
64 | P a g e
Pham Van Long – BHAF200011
Picture 25 Document the Results
The risk assessment report can identify key remediation steps that will reduce multiple
risks. For example, ensuring backups are taken regularly and stored offsite will mitigate
both the risk of accidental file deletion and the risk from flooding. Each step should
detail the associated cost and the business reasons for making the investment.
65 | P a g e
Pham Van Long – BHAF200011
Document shared on www.docsity.com
Downloaded by: hiep-pham-van ([email protected])
66 | P a g e
Pham Van Long – BHAF200011
Picture 26 Activity Log Analysis — XpoLog
67 | P a g e
Pham Van Long – BHAF200011
Document shared on www.docsity.com
Downloaded by: hiep-pham-van ([email protected])
68 | P a g e
Pham Van Long – BHAF200011
Picture 28 Penetration Behavior Testing – Metasploit
Prevent phishing attacks - Hoxhunt
69 | P a g e
Pham Van Long – BHAF200011
Document shared on www.docsity.com
Downloaded by: hiep-pham-van ([email protected])
70 | P a g e
Pham Van Long – BHAF200011
2. What are the current weakness or threat of the organization?
6 main weaknesses in ICS systems that hackers can use and exploit to attack an
industrial plant as well as solutions.
unpatched Document
Microsoftshared
Windows operating systems so there are known
on www.docsity.com
Downloaded by: hiep-pham-van ([email protected])
vulnerabilities.
Unknown third party relationships: Many ICS vendors may not be fully
aware of the third-party components they use in their ICS systems, making
71 | P a g e
Pham Van Long – BHAF200011
it difficult for them to notify customers of vulnerabilities. As a result,
hackers who are
72 | P a g e
Pham Van Long – BHAF200011
well aware of this dependency can target software that the industrial
company doesn't even know about.
73 | P a g e
Pham Van Long – BHAF200011
Picture 30 The OCTAVE method
- OCTAVE criteria are a set of attributes, principles and outputs. Principles are the
fundamental concept of defining the philosophy behind the evaluation process, for
example one of the principles of OCTAVE is the self direction. Attributes is the quality
evaluation or characteristic that define the basic elements of OCTAVE approach with
the scope of make the evaluation a success of the process and organization perspective.
Outputs are the results of evaluation that analyse the achievement of the three phases.
74 | P a g e
Pham Van Long – BHAF200011
Picture 31 SolarWinds Network Performance Monitor
75 | P a g e
Pham Van Long – BHAF200011
Document shared on www.docsity.com
Downloaded by: hiep-pham-van ([email protected])
76 | P a g e
Pham Van Long – BHAF200011
ManageEngine OpManager An SNMP-based network monitor that has great
network topology layout options, all based on an autodiscovery process. Installs
on Windows Server and Linux.
77 | P a g e
Pham Van Long – BHAF200011
Document shared on www.docsity.com
Downloaded by: hiep-pham-van ([email protected])
78 | P a g e
Pham Van Long – BHAF200011
Picture 34 Paessler PRTG Network Monitor
79 | P a g e
Pham Van Long – BHAF200011
Document shared on www.docsity.com
Downloaded by: hiep-pham-van ([email protected])
Picture 35 Auvik
80 | P a g e
Pham Van Long – BHAF200011
Picture 36 Site24x7 Network Monitoring
81 | P a g e
Pham Van Long – BHAF200011
Document shared on www.docsity.com
Downloaded by: hiep-pham-van ([email protected])
Picture 37 Atera
82 | P a g e
Pham Van Long – BHAF200011
2. Why do you need to monitor network?
In addition, network monitoring software eliminates the need for a physical system
administrator and manual checks. This can save your company both time and
money, meaning that the problem is addressed effectively.
Another major benefit is the reporting generated from network monitoring. These
reports can help you identify patterns and trends in system performance, as well as
demonstrating the need for upgrades or replacements. Performance baselines can
also be easily established.
Finally, network monitoring systems can assist you in being able to identify the
specific areas of your network that are experiencing problems. This means that you
can quickly pinpoint the issue, saving you time and money when it comes to
addressing the problem.
Here are several other reasons why monitoring your networks is so important:
Track trends
Benchmark performance and availability data
83 | P a g e
Pham Van Long – BHAF200011
3. The benefits of using a network monitoring system for and organization are
next:
3.1. Discovery of Devices
The most aspect of the network monitoring tool is that it can discover the entire
network including the smaller parts with a click button. In the organization network
which is a very large network, it is very difficult to understand what devices or
computers are in the network and what IP addresses are used. Using a network
monitoring system software it is easy to identify all the devices and computers and
all IP address used of the organization and if any unauthorized devices are added to
your organization network you will be alerted.
85 | P a g e
Pham Van Long – BHAF200011
network and if the infrastructure is ready for handle more devices or gadgets to can
keep the cost under control of the evolving time. Network monitoring system
software is providing full equipment to use on the network, and for all the further
member staff that want to join on the organization network to can use all the future
upgrades with a limited cost.
engineers.
86 | P a g e
Pham Van Long – BHAF200011
to authorized users, and allows for only secure data to be transmitted.
87 | P a g e
Pham Van Long – BHAF200011
The trusted network should have the following features:
88 | P a g e
Pham Van Long – BHAF200011
Picture 41 Picture of the presentation
89 | P a g e
Pham Van Long – BHAF200011
Picture 43 Picture of the presentation
90 | P a g e
Pham Van Long – BHAF200011
Picture 45 Picture of the presentation
91 | P a g e
Pham Van Long – BHAF200011
Picture 47 Picture of the presentation
92 | P a g e
Pham Van Long – BHAF200011
Picture 49 Picture of the presentation
93 | P a g e
Pham Van Long – BHAF200011
Picture 51 Picture of the presentation
94 | P a g e
Pham Van Long – BHAF200011
Picture 53 Picture of the presentation
95 | P a g e
Pham Van Long – BHAF200011
Picture 55 Picture of the presentation
96 | P a g e
Pham Van Long – BHAF200011
Picture 57 Picture of the presentation
97 | P a g e
Pham Van Long – BHAF200011
Picture 59 Picture of the presentation
98 | P a g e
Pham Van Long – BHAF200011
Document shared on www.docsity.com
Downloaded by: hiep-pham-van ([email protected])
99 | P a g e
Pham Van Long – BHAF200011
Picture 61 Picture of the presentation
100 | P a g
Pham Van Long – BHAF200011 e
Picture 63 Picture of the presentation
101 | P a g
Pham Van Long – BHAF200011 e
Picture 65 Picture of the presentation
102 | P a g
Pham Van Long – BHAF200011 e
Picture 67 Picture of the presentation
103 | P a g
Pham Van Long – BHAF200011 e
Picture 69 Picture of the presentation
104 | P a g
Pham Van Long – BHAF200011 e
Picture 71 Picture of the presentation
Document
Downloaded shared on www.docsity.com
by: hiep-pham-van ([email protected])
Picture 72 Picture of the presentation
105 | P a g
Pham Van Long – BHAF200011 e
Picture 73 Picture of the presentation
106 | P a g
Pham Van Long – BHAF200011 e
Picture 75 Picture of the presentation
107 | P a g
Pham Van Long – BHAF200011 e
Picture 77 Picture of the presentation
108 | P a g
Pham Van Long – BHAF200011 e
Picture 79 Picture of the presentation
109 | P a g
Pham Van Long – BHAF200011 e
Picture 81 Picture of the presentation
110 | P a g
Pham Van Long – BHAF200011 e
REFERENCES
1. THE DATA GUARDIANS. 7 Threat Agents Your Cyber Security Team Should Be
Aware Of[Online] At available: https://www.thedataguardians.co.uk/2019/02/27/7-
threat- agents-your-cybersecurity-team-should-be-aware-of/ [ Accessed November
4th, 2021]
111 | P a g
Pham Van Long – BHAF200011 e
9. WIKIPEDIA. Virtual private network [Online] At
available: https://en.wikipedia.org/wiki/Virtual_private_network [ Accessed
November 4th, 2021]
112 | P a g
Pham Van Long – BHAF200011 e
10. Cyber Threat Portal. COMMON TYPES OF SECURITY THREATS TO
ORGANIZATIONS
[Online] At available: https://cyberthreatportal.com/types-of-security-threats-to-
organizations/ [ Accessed 17 Nov.2020]
113 | P a g
Pham Van Long – BHAF200011 e