Ias Ii
Ias Ii
Ias Ii
lOMoARcPSD|20832310
LESSON 1
Overview of the Security Environment
TOPICS
1. The state of Information Assurance today
2. Advance persistent of threats
3. Why Information Assurance (IA) matters at DoD
4. Information Confidentiality, Integrity and Availability
5. Threats, Vulnerabilities and Consequences
LEARNING OUTCOMES
At the end of the lesson, the students are expected to:
1. Assess the current security environment, including the risks and opportunities that attend
new processes and technologies.
2. Summarize the nature and role of information assurance in both providing and protecting
information.
“In March 2021, Chinese hackers broke into Microsoft Exchange Server and
stole emails from over 250,000 customers worldwide.” By New York (CNN
Business)
1
INFORMATION ASSURANCE SECURITY II
lOMoARcPSD|20832310
“In 2020, information about the SolarWinds cyber-attack broke with one
commentator describing the hack as ‘IT’s Pearl Harbor’. The state-sponsored data
breach threatened US national security with many key agencies including the
Department of Defense. It’s believed that the hackers had nine months inside these
systems between the breach and it being detected.”
This raises two questions: How do you stop these attacks happening? How
do you find out what data is affected and what damage has been done? Today’s
information security is the combination of cyber security, information governance,
risk management and information assurance that can address these issues.
typically involves implementing organization-wide standards that aim to minimize the risk
of a company being harmed by cyber threats. To achieve this, an information assurance
team may do something like overhauling login authentication systems or performing routine
backups of important company data. Thus, information assurance professionals are more
concerned with addressing the overall risk to an organization’s information, rather than
dealing with an individual, exterior threats.
Here are the five pillars of the IA framework that you need to manage in your office
cyberspace:
3. Availability. This means that authorized users have timely and easy access to
information services. IT resources and infrastructure should remain robust and fully-
functional at all times even during adverse conditions, such as database conundrum or
fall-overs. It involves protecting against malicious codes, hackers, and other threats that
could block access to the information system
5. Non-Repudiation. This attribute assures the sender of data is provided with proof
of delivery and the recipient is provided with proof of the sender’s identity, so neither party
can deny sending, receiving, or accessing the data. Security principles should be used to
prove identities and to validate the communication process.
Task 1
Direction: Analyze the given questions below and provide the correct answer on a separate
sheet of paper.
3
INFORMATION ASSURANCE SECURITY II
lOMoARcPSD|20832310
Answer:
________________________________________________________________________
______________
________________________________________________________________________
______________
________________________________________________________________________
______________
________________________________________________________________________
______________
________________________________________________________________________
______________
________________________________________________________________________
______________
______________________________
2. What is the role of Information Assurance and Security in your daily work cycle?
Explain and create your own scenario based on how you implement Information
assurance and security in your daily work cycle.
Answer:
________________________________________________________________________
______________
________________________________________________________________________
______________
________________________________________________________________________
______________
________________________________________________________________________
______________
________________________________________________________________________
______________
________________________________________________________________________
______________
______________________________
Answer:
________________________________________________________________________
______________
______________________________________________________________________
________________
______________________________________________________________________
________________
______________________________________________________________________
________________
________________________________________________________________________
______________
TOPIC Advanced Persistent Threat (APT)
2
Advanced Persistent Threat (APT) are compound network attacks that utilize
multiple stages and different attack techniques. APTs are not attacks conceived of or
4
INFORMATION ASSURANCE SECURITY II
lOMoARcPSD|20832310
Advanced persistent threats typically have several phases, including hacking the
network, avoiding detection, constructing a plan of attack and mapping company data to
determine where the desired data is most accessible, gathering sensitive company data,
and exfiltrating that data.
Advanced persistent threats have caused several large, costly data breaches and
are known for their ability to fly under the radar, remaining undetectable by traditional
security measures. What’s more, advanced persistent threats are becoming increasingly
common as cyber criminals look to more sophisticated measures to achieve their goals.
These attacks are different from many traditional threats, such as viruses and
malware that exhibit the same behavior consistently and are repurposed for attacking
different systems or companies. Advanced persistent threats do not take a general, broad
approach; instead, they are carefully planned and designed with the goal of attacking one
specific company or organization. Therefore, advanced persistent threats are highly
customized and sophisticated, designed specifically to get around the existing security
measures in place within a company.
Often, trusted connections are used to gain initial access. This means attackers
may use employees’ or business partners’ credentials obtained through phishing attacks
or other malicious means. This aids attackers in the important goal of remaining undetected
long enough to map the organization’s systems and data and devise a strategic plan of
attack to harvest company data.
5
INFORMATION ASSURANCE SECURITY II
lOMoARcPSD|20832310
There are a number of sure signs that point to the existence of an APT attack. These signs
include:
Actors. Attacks are typically carried out by actors with a specific mission. These actors
are frequently backed by nation-states or corporation-backed organizations.
Example groups include Deep Panda, OilRig, and APT28.
Objectives. Undermine target capabilities or gather intelligence over an extended
period. The purpose of this sabotage or exfiltration of data could be strategic or
political.
Timeliness. Attacks focus on ensuring that attackers can gain access and
maintain it for a significant amount of time. Frequently, attackers return to an
infiltrated system multiple times over the length of the attack.
Resources. APT attacks require significant resources to plan and execute. This
includes time, security and development expertise, and hosting.
Risk tolerance. Attackers are less likely to use broad attacks and instead focus on
specific targets. APT attackers are also more careful not to get caught or to create
suspicious behavior in a system.
Methods. APT attacks often employ sophisticated techniques requiring security
expertise. These techniques can include rootkits, DNS tunneling, social engineering,
and rogue Wi-Fi.
Attack origin. APT attacks can originate from a variety of locations and may occur
during an attack designed to distract security teams. Attackers often take the time
to comprehensively map a system’s weaknesses before choosing an entry point.
Attack value. Attack value can refer to the size of the target or to the size of the
attack operations. Large organizations tend to be the target of APTs more
frequently than small organizations. Likewise, large numbers of data transfers
typically indicate the greater organization required for APT attacks.
Can bypass traditional detection tools. APT attacks generally bypass traditional
detection tools which rely on signature-based detection. To do this, attackers use
novel techniques, such as fileless malware, or use methods that enable them to
obfuscate their actions.
1. Initial access. APT groups start their campaign by gaining access to a network via
one of three attack surfaces: web-based systems, networks, or human users. They
typically achieve access via malicious uploads, searching for and exploiting application
vulnerabilities, gaps in security tools, and most commonly, spear phishing targeting
employees with privileged accounts. The goal is to infect the target with malicious
software.
2. First penetration and malware deployment. After they gain access, attackers
compromise the penetrated system by install a backdoor shell, a trojan masked as
legitimate software, or other malware that allows them network access and remote control
of the penetrated system. An important milestone is to establish an outbound connection
to their Command-and-Control system. APTs may use advanced malware techniques
such as encryption, obfuscation or code rewriting to hide their activity.
6
INFORMATION ASSURANCE SECURITY II
lOMoARcPSD|20832310
3. Expand access and move laterally. Attackers use the first penetration to gather
more information about the target network. They may use brute force attacks, or exploit
other vulnerabilities they discover inside the network, to gain deeper access and control
additional, more sensitive systems. Attackers install additional backdoors and create
tunnels, allowing them to perform lateral movement across the network and move data at
will.
4. Stage the attack. Once they have expanded their presence, attackers identify the
data or assets they are after, and transfer it to a secure location inside the network,
typically encrypted and compressed to prepare for exfiltration. This stage can take time,
as attackers continue to compromise more sensitive systems and transfer their data to
secure storage.
6. Follow up attacks. If the APT attack involved a silent data exfiltration which was
not detected, attackers will remain inside the network and wait for additional attack
opportunities. Over time they may collect additional sensitive data and repeat the process.
They will also aim to create backdoors that are difficult to detect, so even if they are
caught, they can regain access to the system in the future.
Stuxnet. A worm used to attack Iran’s nuclear program, which was delivered via an
infected USB device, and inflicted damage to centrifuges used to enrich Uranium.
Stuxnet is malware that targets SCADA (industrial Supervisory Control and Data
Acquisition) systems—it was able to disrupt the activity of machinery in the Iranian
nuclear program without the knowledge of their operators.
APT28 . Russian group also known as Fancy Bear, Pawn Storm, and Sednit,
identified by Trend Micro in 2014. Conducted attacks against military and
government targets in the Ukraine and Georgia, NATO organizations and USA
defense contractors.
7
INFORMATION ASSURANCE SECURITY II
lOMoARcPSD|20832310
APT37. Also known as Reaper and StarCruft, probably originates from North
Korea and has been operating since 2012. The group has been connected to spear
phishing attacks exploiting the Adobe Flash zero-day vulnerability.
Email filtering. Most APT attacks leverage phishing to gain initial access. Filtering
emails, and blocking malicious links or attachments within emails, can stop these
penetration attempts.
Endpoint protection. All APT attacks involve takeover of endpoint devices.
Advanced anti-malware protection and Endpoint Detection and Response can help
identify and react to compromise of an endpoint by APT actors.
Access control. Strong authentication measures and close management of user
accounts, with a special focus on privileged accounts, can reduce the risks of APT.
Task 2
Monitoring of traffic, user and entity behavior. Can help identify penetrations,
lateral movement and exfiltration at different stages of an APT attack.
Direction: Analyze the given questions below and provide the correct answer on a separate
sheet of paper.
1. Given that someone already infiltrated your network (via web-based systems,
networks, or human users). As an IT practitioner, what will you do in this kind of
situation?
Answer:
________________________________________________________________________
______________
________________________________________________________________________
______________
________________________________________________________________________
______________
________________________________________________________________________
______________
________________________________________________________________________
______________
________________________________________________________________________
______________
______________________________
2. In your current state of knowledge as an IT practitioner, what are the best measures
to avoid APT attacks?
Answer:
________________________________________________________________________
______________
________________________________________________________________________
______________
________________________________________________________________________
______________
________________________________________________________________________
______________
________________________________________________________________________
______________
8
INFORMATION ASSURANCE SECURITY II
lOMoARcPSD|20832310
________________________________________________________________________
______________
______________________________
3. In your own opinion, what are the factors to consider why individual are vulnerable to
APT attackers?
Answer:
________________________________________________________________________
______________
________________________________________________________________________
______________
________________________________________________________________________
______________
________________________________________________________________________
______________
________________________________________________________________________
______________
“FY 1999 DoD Annual Statement of Assurance. The statement reports that information
assurance is a systemic weakness in the DoD, and that numerous computer system
intrusions occurred over the last several years that highlighted the vulnerability of DoD
information systems to attack. DoD dependence on information systems makes
information assurance a critical readiness issue. Although many corrective actions have
been implemented, intrusions continue to occur.”
“The FY 1998 DoD Chief Information Officer Annua1 Information Assurance Report,
May 1999. The annual report states that information is indispensable to all aspects of
mission planning and execution. Further, if mission participants cannot accurately
exchange information in a timely manner and ensure the availability, integrity, and, in
some cases, the confidentiality of that information, missions will fail. The timely
availability of information is universally acknowledged within DoD as critical to mission
accomplishment in all
operations.”
Robert J. Lieberman
Assistant Inspector General for
Auditing
DoD emphasis has also increased. During the past five years the Department has:
9
INFORMATION ASSURANCE SECURITY II
lOMoARcPSD|20832310
There are many challenges to realizing and sustaining this vision; among them:
Being united. Cyber assets are planned, resourced, acquired, deployed, and
operated across a multiplicity of missions, organizations, acquisitions, and systems-
of-systems, often without thought for their role in keeping the enterprise agile or
sustainable.
Being prepared. Today, adversaries are collecting information on and about DoD
networks to understand our capabilities. In the future, conventional and irregular
warfare will include cyberattacks to disrupt, co-opt, manipulate, or destroy DoD
networks and information.
Being aware. Dependence on cyber capabilities is pervasive but often
unacknowledged.
Countering cyber asymmetry. Cyberattacks can be launched with low risk, a low
threshold of investment in capability, from a distance, and with anonymity. Yet,
cyberattacks can deliver significant value to the attacker and have high
consequences to those being attacked.
Predicting cyber effects. Cyber event damage can propagate along many different yet
changing vectors, and may be non-localized
10
INFORMATION ASSURANCE SECURITY II
lOMoARcPSD|20832310
11
INFORMATION ASSURANCE SECURITY II
lOMoARcPSD|20832310
1. Confidentiality
2. Integrity
Upholding an information system’s integrity involves keeping its network intact and
uncompromised; thus, the primary goal of this pillar is to set up safeguards that deter
threats. For example, viruses and malicious code are the most common threats to a
system’s integrity. To prevent viruses from deleting or damaging files, IA professionals use
antivirus software and other tools to stop them before they enter the computer system.
They also develop policies to keep users in their organizations from mishandling data and
run penetration testing to simulate system attacks. These tests ensure that their networks
are strong; if the IA professionals detect weaknesses, they work to repair and secure the
system and protect the integrity of the data therein. Having the right IA rules and practices
in place helps keep organizations’ information and systems secure.
3. Availability
Availability means that users can access the data stored in their networks or use
services that are featured within those networks. Without easy data access, the system’s
users are limited in their ability to access important information or perform critical tasks.
Threats to availability are becoming more complex because more of the world’s information
is online and vulnerable to hackers. For instance, if a cybercriminal renders an automated
car’s operation system inoperable, the car could cause an accident. Businesses have the
same risk. If a company’s leaders can’t access important data when making business
decisions, the company could lose revenue as a result. IA professionals must know how
to avoid threats that could block data availability using tools like firewalls and implement
other, more complex security measures.
Task 3
Direction: Analyze the given questions below and provide the correct answer on a separate
sheet of paper.
1. What is the most important from the 3 pillars of information assurance? How it
matters in your organization? Give a scenario that will support your answer. (5pts)
Answer:
________________________________________________________________________
______________
________________________________________________________________________
______________
________________________________________________________________________
______________
________________________________________________________________________
______________
12
INFORMATION ASSURANCE SECURITY II
lOMoARcPSD|20832310
________________________________________________________________________
______________
________________________________________________________________________
______________
________________________________________________________________________
______________
________________________________________________________________________
______________
________________________________________________________________________
______________
___________________________________________________________________
2. “In early 2018, international shipping giant FedEx discovered that hackers had
managed to steal scanned images of approximately 119,000 of its customers’
personal documents, including passports and driver's licenses. Surprisingly, these
images were being stored on an unsecured third-party server that has since been
closed. According to a statement by FedEx officials, an internal investigation
concluded that none of the information had been misappropriated. This was a stroke
of luck for FedEx, but this is a compelling example of how a simple mistake can put
a large amount of private data at risk.”
In the statement above, where do you think it falls under the 3 pillars of information
assurance? Why? (5pts) Answer:
________________________________________________________________________
______________
________________________________________________________________________
______________
________________________________________________________________________
______________
________________________________________________________________________
______________
________________________________________________________________________
______________
________________________________________________________________________
______________
________________________________________________________________________
______________
________________________________________________________________________
______________
______________________________________________________________________
________________
______________________________________________________________________
________________
______________________________________________________________________
________________
______________________________
13
INFORMATION ASSURANCE SECURITY II
lOMoARcPSD|20832310
In today’s world, data and protecting that data are critical considerations for
businesses. Customers want to ensure that their information is secure with you, and if you
can’t keep it safe, you will lose their business. In order to have a strong handle on data
security issues that may potentially impact your business, it is imperative to understand the
relationships of three components:
Threat
Vulnerability
Consequences
Risk
What is a threat?
A threat refers to a new or newly discovered incident that has the potential to harm
a system or your company overall. There are three main types of threats:
Natural threats, such as floods, hurricanes, or tornadoes
Unintentional threats, like an employee mistakenly accessing the wrong information
Intentional threats, such as spyware, malware, adware companies, or the actions of
a disgruntled employee
Ensure your team members are staying informed of current trends in cybersecurity
so they can quickly identify new threats. They should subscribe to blogs (like Wired)
and podcasts (like Techgenix Extreme IT) that cover these issues, and join
professional associations so they can benefit from breaking news feeds,
conferences, and webinars.
Perform regular threat assessments to determine the best approaches to protecting a
system against a specific threat, along with assessing different types of threats.
Conduct penetration testing by modeling real-world threats in order to discover
vulnerabilities.
14
INFORMATION ASSURANCE SECURITY II
lOMoARcPSD|20832310
Viruses. Designed in such a way that can be easily transmitted from one computer
or system to another. Often sent as email attachments, viruses corrupt and co-opt
data, interfere with your security settings, generate spam, and may even delete
content.
Computer worms. They spread from one computer to the next by sending itself to
all of the user’s contacts and subsequently to all of the contacts’ contacts.
Trojans. These malicious pieces of software insert themselves into a legitimate
program. Often, people voluntarily let trojans into their systems in the form of email
messages from a person or an advertiser they trust. As soon as the accompanying
attachment is open, your system becomes vulnerable to the malware within.
Bogus security software. That tricks users into believing that their system has
been infected with a virus. The accompanying security software that the threat actor
provides to fix the problem causes it.
The adware. Tracks your browsing habits and causes particular advertisements
to pop up. Although this is common and often something you may even agree to,
adware is sometimes foisted upon you without your consent.
Spyware. Is an intrusion that may steal sensitive data such as passwords and credit
card numbers from your internal systems.
Denial of service (DOS) attack. Occurs when hackers deluge a website with
traffic, making it impossible for users to access its content. A distributed denial of
service (DDOS) attack is more forceful and aggressive since it is initiated from
several servers simultaneously. As a result, a DDOS attack is harder to mount
defenses against.
Phishing. Attacks are social engineering infiltrations whose goal is to wrongfully
obtain sensitive data: passwords and credit card numbers. Via emails or links coming
from trusted companies and financial institutions, the hacker causes malware to be
downloaded and installed.
SQL injections. Network threats that involve using malicious code to infiltrate cyber
vulnerabilities in data systems. As a result, data can be stolen, changed, or
destroyed.
Man-in-the-middle. Involve a third-party intercepting and exploiting
communications between two entities that should remain private. Not only does
eavesdropping occur but also information can be changed or misrepresented by
the intruder, causing inaccuracy and even security breaches.
Rootkit tools. Gain remote access to systems without permission and can lead to the
installation of malware and the stealing of passwords and other data.
What is a vulnerability?
A vulnerability refers to a known weakness of an asset (resource) that can be exploited by
one or more attackers. In other words, it is a known issue that allows an attack to succeed.
For example, when a team member resigns and you forget to disable their access
to external accounts, change logins, or remove their names from company credit cards,
this leaves your business open to both intentional and unintentional threats. However, most
vulnerabilities are exploited by automated attackers and not a human typing on the other
side of the network.
15
INFORMATION ASSURANCE SECURITY II
lOMoARcPSD|20832310
What kind of antivirus protection is in use? Are the licenses current? Is it running as
often as needed? Do you have a data recovery plan in the event of a vulnerability
being exploited?
What is risk?
Risk is defined as the potential for loss or damage when a threat exploits a
vulnerability. Examples of risk include:
Financial losses
Loss of privacy
Damage to your reputation Rep
Legal implications
Even loss of life
To reduce potential risk, creating and implementing a risk management plan. Here
are the key aspects to consider when developing your risk management strategy:
Assess risk and determine needs. When it comes to designing and implementing
a risk assessment framework, it is critical to prioritize the most important breaches
that need to be addressed. Although frequency may differ in each organization, this
level of assessment must be done on a regular, recurring basis.
Include a total stakeholder perspective. Stakeholders include the business
owners as well as employees, customers, and even vendors. All of these players
have the potential to negatively impact the organization (potential threats) but at
the same time they can be assets in helping to mitigate risk.
Designate a central group of employees who are responsible for risk
management and determine the appropriate funding level for this activity.
Implement appropriate policies and related controls and ensure that the
appropriate end users are informed of any and all changes.
Monitor and evaluate policy and control effectiveness. The sources of risk are
ever-changing, which means your team must be prepared to make any necessary
adjustments to the framework. This can also involve incorporating new monitoring
tools and techniques.
Task 4
Direction: Analyze the given questions below and provide the correct answer on a separate
sheet of paper.
16
INFORMATION ASSURANCE SECURITY II
lOMoARcPSD|20832310
1. As an IT practitioner, how can you protect yourself from this kind of threats?
Give one scenario on how you protect yourself from threats based on your own experience/
understanding. (5pts) Answer:
________________________________________________________________________
______________
________________________________________________________________________
______________
________________________________________________________________________
______________
______________________________________________________________________
________________
______________________________________________________________________
________________
______________________________________________________________________
________________
______________________________________________________________________
________________
______________________________________________________________________
________________
______________________________________________________________________
________________
___________________________________________________________________
2. What are the key differences between threats and vulnerabilities? (5pts)
Answer:
________________________________________________________________________
______________
________________________________________________________________________
______________
________________________________________________________________________
______________
________________________________________________________________________
______________
________________________________________________________________________
______________
_______________________
3. Choose one of the major computer threats of today and briefly discuss on
how you assess it in your current understanding about threats.
Answer:
________________________________________________________________________
______________
________________________________________________________________________
______________
________________________________________________________________________
______________
________________________________________________________________________
______________
________________________________________________________________________
______________
_______________________
17
INFORMATION ASSURANCE SECURITY II
lOMoARcPSD|20832310
LESSON 2
Principles of Cyber security
TOPICS
2. Cybersecurity models (The CIA triad, The star model, The Parkerian Hexad)
4. Cyber Threats
LEARNING OUTCOMES
At the end of the lesson, the students are expected to:
A computer system uses many devices, arranged in different ways to solve many
problems. This constitutes a computing environment where many computers are used to
process and exchange information to handle multiple issues.
Personal
Computing
Environment
Cluster Time-sharing
Computing Computing
Environment Environment
Types of
Computing
Environment
Distributed
Computing
Environment
19
INFORMATION ASSURANCE SECURITY II
lOMoARcPSD|20832310
TOPIC Cybersecurity models (The CIA triad, The star model, The
2 Parkerian Hexad)
20
INFORMATION ASSURANCE SECURITY II
lOMoARcPSD|20832310
21
INFORMATION ASSURANCE SECURITY II
lOMoARcPSD|20832310
Parkerian Hexad
22
INFORMATION ASSURANCE SECURITY II
lOMoARcPSD|20832310
Test 1.
Direction: Analyze the given questions below and provide the correct answer on
the space provided. Write your answer on a separate sheet of paper.
Tasks
5
_______________1. It contains multiple nodes that are physically separate but linked
together using the network.
_______________2. It allows multiple users to share the system simultaneously.
Each user is provided a time slice and the processor switches rapidly among the
users according to it.
_______________3. This is similar to parallel computing environment as they both
have multiple CPUs.
_______________4. This means that only the authorized individuals/systems can view
sensitive or classified information.
_______________5. This refers to the veracity of the claim of origin or authorship of the
information.
Test 2.
1. From the given cybersecurity model. Which of them do you think is the most
convenient to apply in your current organization? Why? (10pts) Answer:
________________________________________________________________________
______________
________________________________________________________________________
______________
________________________________________________________________________
______________
________________________________________________________________________
______________
______________________________________________________________________
________________
______________________________________________________________________
________________
______________________________________________________________________
________________
______________________________________________________________________
________________
______________________________________________________________________
________________
___________________________________________________________________
Computer security breaches are commonplace, and several occur around the world
every day. Some are considered minor, with little loss of data or monetary resources, but
many of them are considered major, or even catastrophic.
What is network security?
According to the SANS Institute, network security is the process of taking
preventative measures to protect the underlying networking infrastructure from
unauthorized access, misuse, malfunction, modification, destruction or improper
disclosure. Implementing these measures allows computers, users and programs to
perform their permitted critical functions within a secure environment.
Securing a network requires a complex combination of hardware devices, such as
routers, firewalls and anti-malware software applications. Government agencies and
businesses employ highly skilled information security analysts to implement security plans
and constantly monitor the efficacy of these plans.
Types of network security
Access control. This refers to controlling which users have access to the network
or especially sensitive sections of the network. Using security policies, you can restrict
network access to only recognized users and devices or grant limited access to
noncompliant devices or guest users.
Antivirus and anti-malware software. Malware, or “malicious software,” is a
common form of cyberattack that comes in many different shapes and sizes. Some
variations work quickly to delete files or corrupt data, while others can lie dormant for long
periods of time and quietly allow hackers a back door into your systems.
Application security. Each device and software product used within your
networking environment offers a potential way in for hackers. For this reason, it is important
that all programs be kept up-to-date and patched to prevent cyberattacks from exploiting
vulnerabilities to access sensitive data. Application security refers to the combination of
24
INFORMATION ASSURANCE SECURITY II
lOMoARcPSD|20832310
hardware, software, and best practices you use to monitor issues and close gaps in your
security coverage.
Behavioral analytics. In order to identify abnormal behavior, security support
personnel need to establish a baseline of what constitutes normal behavior for a given
customer’s users, applications, and network.
Data loss prevention. Data loss prevention (DLP) technologies are those that
prevent an organization’s employees from sharing valuable company information or
sensitive data—whether unwittingly or with ill intent—outside the network. DLP
technologies can prevent actions that could potentially expose data to bad actors outside
the networking environment, such as uploading and downloading files, forwarding
messages, or printing.
Distributed denial of service prevention. Distributed denial of service (DDoS)
attacks are becoming increasingly common. They function by overloading a network with
one-sided connection requests that eventually cause the network to crash.
Email security. Email is an especially important factor to consider when
implementing networking security tools. Numerous threat vectors, like scams, phishing,
malware, and suspicious links, can be attached to or incorporated into emails.
Firewalls. Firewalls are another common element of a network security model.
They essentially function as a gatekeeper between a network and the wider internet.
Firewalls filter incoming and, in some cases, outgoing traffic by comparing data packets
against predefined rules and policies, thereby preventing threats from accessing the
network.
Mobile device security. The vast majority of us have mobile devices that carry
some form of personal or sensitive data we would like to keep protected. This is a fact that
hackers are aware of and can easily take advantage of. Implementing mobile device
security measures can limit device access to a network, which is a necessary step to
ensuring network traffic stays private and doesn’t leak out through vulnerable mobile
connections.
Network segmentation. Dividing and sorting network traffic based on certain
classifications streamlines the job for security support personnel when it comes to applying
policies. Segmented networks also make it easier to assign or deny authorization
credentials for employees, ensuring no one is accessing information they should not be.
Security information and event management. These security systems (called
SIEMs) combine host-based and network-based intrusion detection systems that combine
real-time network traffic monitoring with historical data log file scanning to provide
administrators with a comprehensive picture of all activity across the network
Web security. Web security software serves a few purposes. First, it limits internet
access for employees, with the intention of preventing them from accessing sites that could
contain malware. It also blocks other web-based threats and works to protect a customer’s
web gateway.
What is Operating System Security?
Operating system security (OS security) is the process of ensuring OS integrity,
confidentiality and
availability.
OS security refers to specified steps or measures used to protect the OS from
threats, viruses, worms, malware or remote hacker intrusions. OS security encompasses
all preventive-control techniques, which safeguard any computer assets capable of being
stolen, edited or deleted if OS security is compromised.
OS security may be approached in many ways, including adherence to the following:
Performing regular OS patch updates
25
INFORMATION ASSURANCE SECURITY II
lOMoARcPSD|20832310
Application security describes security measures at the application level that aim to
prevent data or code within the app from being stolen or hijacked. It encompasses the
security considerations that happen during application development and design, but it also
involves systems and approaches to protect apps after they get deployed.
Application security may include hardware, software, and procedures that identify
or minimize security vulnerabilities. A router that prevents anyone from viewing a
computer’s IP address from the Internet is a form of hardware application security. But
security measures at the application level are also typically built into the software, such as
an application firewall that strictly defines what activities are allowed and prohibited.
Procedures can entail things like an application security routine that includes protocols
such as regular testing.
Types of application security
Different types of application security features include authentication, authorization,
encryption, logging, and application security testing. Developers can also code applications
to reduce security vulnerabilities.
Authentication: When software developers build procedures into an application to
ensure that only authorized users gain access to it. Authentication procedures ensure that
a user is who they say they are. This can be accomplished by requiring the user to provide
a user name and password when logging in to an application.
Authorization: After a user has been authenticated, the user may be authorized
to access and use the application. The system can validate that a user has permission to
access the application by comparing the user’s identity with a list of authorized users.
Authentication must happen before authorization so that the application matches only
validated user credentials to the authorized user list.
Encryption: After a user has been authenticated and is using the application, other
security measures can protect sensitive data from being seen or even used by a
cybercriminal. In cloud-based applications, where traffic containing sensitive data travels
between the end user and the cloud, that traffic can be encrypted to keep the data safe.
Logging: If there is a security breach in an application, logging can help identify
who got access to the data and how. Application log files provide a time-stamped record
of which aspects of the application were accessed and by whom.
Application security testing: A necessary process to ensure that all of these
security controls work properly.
log in to applications remotely. IT departments may also decide to vet mobile apps and
make sure they conform to company security policies before allowing employees to use
them on mobile devices that connect to the corporate network.
Web application security
Web application security applies to web applications—apps or services that users
access through a browser interface over the Internet. Because web applications live on
remote servers, not locally on user machines, information must be transmitted to and from
the user over the Internet. Web application security is of special concern to businesses that
host web applications or provide web services. These businesses often choose to protect
their network from intrusion with a web application firewall. A web application firewall works
by inspecting and, if necessary, blocking data packets that are considered harmful.
27
INFORMATION ASSURANCE SECURITY II
lOMoARcPSD|20832310
Tasks
6
Test 1.
Direction: Analyze the given questions below and provide the correct answer on
the space provided. Write your answer on a separate sheet of paper.
28
INFORMATION ASSURANCE SECURITY II
lOMoARcPSD|20832310
Test 2.
_______________________
What is Cryptography?
Cryptography is the process of encrypting and decrypting data in order to keep that
data safe when storing or transmitting it.
Encryption is a way of hiding data by converting it to an encoded format.
Decryption is a way of revealing encrypted data by decoding it from its encoded
format.
What Is Authentication?
Authentication is the act of validating that user are whom they claim to be. This is the
first step in any security process.
Complete an authentication process with:
Passwords. Usernames and passwords are the most common authentication
factors. If a user enters the correct data, the system assumes the identity is valid and
grants access.
One-time pins. Grant access for only one session or transaction.
Authentication apps. Generate security codes via an outside party that grants
access. Biometrics. A user presents a fingerprint or eye scan to gain access to the
system.
In some instances, systems require the successful verification of more than one factor
before granting access. This multi-factor authentication (MFA) requirement is often
deployed to increase security beyond what passwords alone can provide.
What Is Authorization?
Authorization in system security is the process of giving the user permission to access
a specific resource or function. This term is often used interchangeably with access control
or client privilege.
Giving someone permission to download a particular file on a server or providing
individual users with administrative access to an application are good examples of
authorization. In secure environments, authorization must always follow authentication.
Users should first prove that their identities are genuine before an organization’s
administrators grant them access to the requested resources.
30
INFORMATION ASSURANCE SECURITY II
lOMoARcPSD|20832310
Consider a person walking up to a locked door to provide care to a pet while the
family is away on vacation. That person needs:
Authentication, in the form of a key. The lock on the door only grants access to
someone with the correct key in much the same way that a system only grants
access to users who have the correct credentials.
Authorization, in the form of permissions. Once inside, the person has the
authorization to access the kitchen and open the cupboard that holds the pet food.
The person may not have permission to go into the bedroom for a quick nap.
Authentication and authorization work together in this example. A pet sitter has the right
to enter the house (authentication), and once there, they have access to certain areas
(authorization).
Tasks
6
CASE 1:
Company ABC is a banking company. Every day, they experience DDoS attacks every
12pm-1pm
making servers inaccessible to both employees and clients. They have 10CISCO firewall
active but cannot fix the issue. The only remediation that they can think is to turn off the
services from 12pm-1pm. because
of DDoS attacks clients start complain and productivity is very affected. just for one
month of December.
The company loss summed up to a total of 10million. it is expected the double in the
coming months if the
issue is not resolve and the banks reputation will be damage badly.
Answer:
________________________________________________________________________
______________
________________________________________________________________________
______________
31
INFORMATION ASSURANCE SECURITY II
lOMoARcPSD|20832310
32
INFORMATION ASSURANCE SECURITY II