0% found this document useful (0 votes)
16 views48 pages

Lec01 - Fundamental Aspect

The document outlines fundamental aspects of network security, including definitions of security, the AAA and CIA models, and various threats and risks. It emphasizes the importance of multiple layers of security, including data, application, endpoint, network, and human security, along with authentication, access control, and auditing mechanisms. Additionally, it discusses risk management and the necessity of an information security policy to mitigate potential threats and ensure the integrity, confidentiality, and availability of information.

Uploaded by

xuantae1030
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
16 views48 pages

Lec01 - Fundamental Aspect

The document outlines fundamental aspects of network security, including definitions of security, the AAA and CIA models, and various threats and risks. It emphasizes the importance of multiple layers of security, including data, application, endpoint, network, and human security, along with authentication, access control, and auditing mechanisms. Additionally, it discusses risk management and the necessity of an information security policy to mitigate potential threats and ensure the integrity, confidentiality, and availability of information.

Uploaded by

xuantae1030
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 48

Network Security

Fundamental Aspects

Faculty of Information Technology


Hanoi University
Contents

 Information Security Definition and Concept


 AAA & CIA models
 Threats and Risks
 Some security guidelines
What is Security
 Security: “The quality or state of being secure—to be free from
danger”
 Security is The protection of information and its critical elements,
including systems and hardware that use, store, and transmit that
information
 Necessary tools: policy, awareness, training, education, technology
 Bảo mật: “Chất lượng hoặc trạng thái an toàn—không có nguy
hiểm”
 Bảo mật là Bảo vệ thông tin và các yếu tố quan trọng của thông tin,
bao gồm các hệ thống và phần cứng sử dụng, lưu trữ và truyền
thông tin đó
 Các công cụ cần thiết: chính sách, nhận thức, đào tạo, giáo dục,
công nghệ
“This is, of course, untrue.
You can never secure yourself 100% from anything. Even I cannot help you
be 100% secure or 100% private.”
Layers of security
 A successful organization should have multiple
layers of security in place:
 1: Mission Critical Assets – This is the data you need to
protect*
 2: Data Security – Data security controls protect the storage
and transfer of data.
 3: Application Security – Applications security controls protect
access to an application, an application’s access to your
mission critical assets, and the internal security of the
application.
 4: Endpoint Security – Endpoint security controls protect the
connection between devices and the network.
 5: Network Security – Network security controls protect an
organization’s network and prevent unauthorized access of
the network.
 6: Perimeter Security – Perimeter security controls include
both the physical and digital security methodologies that
protect the business overall.
 7: The Human Layer – Humans are the weakest link in any
cybersecurity posture.
Human security controls include phishing simulations and
access management controls that protect mission critical
assets from a wide variety of human threats, including cyber
criminals, malicious insiders, and negligent users.
Building elements of Information
Security Authentication

AAA Triad

Auditing Access Control


Authentication

 Sender, receiver want to confirm identity of


each other

 Who am I talking to?


Example: FIT E-learning

ISP
ISPD
D
ISP
ISPBB FIT E-learning

ISP
ISPCC
ISP
ISPA
A

Student V
Authentication: Who am I
talking to?

ISP
ISPD
D
ISP
ISPBB FIT E-learning
Hello, I’m V

ISP
ISPCC
ISP
ISPA
A Is that
student
V?

Student V
Is that
FIT ?
Authentication

 Protection Mechanisms
 Password
 Manual
 One-Time Password
 Key Sharing
 Public-private keys
 Wifi
 Challenge-Response
 Multi-factor Authentication
Access Control

 Access control can be defined as a policy,


software component, or hardware component
that is used to grant or deny access to a
resource.
 Example of hardware components: A smart
card, a biometric device, or network access
hardware
Access Control

 Services must be accessible to appropriate


users

 Do you have adequate privileges to access


this information?
Access control

ISP
ISPD
D
Mr. Anonymous ISP
ISPBB FIT E-learning

ISP
ISPCC
ISP
ISPA
A
Are Mr. T
allowed to
Student V view course
contents?
Access Control

 Protection mechanisms
 Access control list
 Firewall
 VPN
 Smart card
 Rules
Auditing

 Auditing is the process of tracking and


reviewing events, errors, access, and
authentication attempts on a system.
 Protection mechanism: logging system,
history.
Auditing
 Develop a path and trail system in the logging of the
monitored events that allows to track usage and access,
either authorized or unauthorized.
 It improves security and allows for better audit policies
and rules
 Phát triển hệ thống đường dẫn và dấu vết trong quá
trình ghi nhật ký các sự kiện được giám sát cho phép
theo dõi việc sử dụng và truy cập, được ủy quyền hoặc
không được ủy quyền.
 Nó cải thiện bảo mật và cho phép các chính sách và quy
tắc kiểm toán tốt hơn
Example: Enable auditing for
logon events
Go to Administrative Tools | Local Security Policy
Navigate to Local Policies | Audit Policy
Enable auditing for logon
events

Go to Event Viewer to see logs.


Security Goal
Integrity

CIA TRIAD

Confidentiality Availability

21
INFO
RMA
TION ISO 27002:2005 defines Information Security as the
ATTR
IBUT preservation of:
ES
Ensuring that information is
accessible only to those
– Confidentiality authorized to have access

Safeguarding the
accuracy and
completeness of
– Integrity information and
processing methods

Ensuring that authorized


users have access to
information and
– Availability associated assets when
required

03/27/20
Mohan Kamat
25 22
Confidentiality

 Only sender, intended receiver should


“understand” message contents (Chỉ người
gửi, người nhận dự kiến ​mới có thể “hiểu” nội
dung tin nhắn)

 Is my data hidden from others?


Confidentiality

 Protection Mechanisms
 Data encryption
 Symmetric
 Asymmetric (public-private keys)
Confidentiality: Is my data
hidden?

ISP
ISPD
D
ISP
ISPBB FIT E-learning
Mr. T

ISP
ISPCC
ISP
ISPA
A

Student V
Can Mr. T see my
homework?
Integrity

 Sender, receiver want to ensure message not


altered (in transit, or afterwards) without
detection (Người gửi, người nhận muốn đảm
bảo tin nhắn không bị thay đổi (trong quá
trình truyền tải hoặc sau đó) mà không bị
phát hiện)

 Has my data been modified?


Integrity: Has my data been
modified?

ISP
ISPD
D
ISP
ISPBB FIT E-learning
Mr. T

ISP
ISPCC
ISP
ISPA
A

Can Mr. T
Student V modify student
V’s homework?
Integrity

 Protection mechanisms
 Digital signature
Availability

 Services must be available to users

 Can I reach the destination?


Availability: Can I reach the
destination?
Can I
access ISP
ISPD
D
FIT ISP
ISPBB FIT E-learning
during
midterm
? ISP
ISPCC
ISP
ISPA
A

Student V
Availability

 Protection mechanisms
 Backup and recovery
 Firewall
 Vulnerability scanning and patching
 Intrusion detection and response
 Virus scanning
W
H
AT
IS
What is Risk?
RI
S
K
Risk: A possibility that a threat exploits a vulnerability
in an asset and causes damage or loss to the
asset. (Rủi ro: Khả năng một mối đe dọa khai
thác lỗ hổng trong tài sản và gây ra thiệt hại
hoặc mất mát cho tài sản đó)
Threat: Something/Someone that can potentially
cause damage to the organisation, IT Systems
or network.

Vulnerability: A weakness in the organization, IT


Systems, or network that can be exploited
by a threat.(: Điểm yếu trong tổ chức, Hệ
thống CNTT hoặc mạng có thể bị khai thác
bởi mối đe dọa.)

32
INFO
SEC
URIT
Y
SUR
VEY • Information Security is “Organizational Problem”
rather than “IT Problem”
• More than 70% of Threats are Internal

• More than 60% culprits are First Time fraudsters

• Biggest Risk : People

• Biggest Asset : People

• Social Engineering is major threat

• More than 2/3rd express their inability to determine


“Whether my systems are currently compromised?”

03/27/20
Mohan Kamat
25 33
RISK
S&
THR
EATS
Potential
Threats

High User Theft,


Knowledge of IT Sabotage, Virus Attacks
Systems Misuse

Natural
Systems & Lack Of Lapse in
Calamities &
Network Documentation Physical
Fire
Failure Security

03/27/20
Mohan Kamat
25 34
SO HOW DO
WE
OVERCOME
THESE
PROBLEMS?

03/27/20
Mohan Kamat
25 35
USE
R

nformation Security Policy


RESP
ONSI
BILIT
IES

IS Policy is approved by Top


Management
Policy is released on Intranet at
http://xx.xx.xx.xx/ISMS/index.htm

03/27/20
Mohan Kamat
25 36
USE
R

Access Control - Physical


RESP
ONSI
BILIT
IES • Follow Security Procedures
• Wear Identity Cards and Badges
• Ask unauthorized visitor his credentials
• Attend visitors in Reception and Conference Room only
Thực hiện các thủ tục an ninh
• Đeo thẻ căn cước và phù hiệu
• Yêu cầu khách không được phép xuất trình giấy tờ tùy thân
• Chỉ tiếp khách tại phòng lễ tân và phòng họp

• Bring visitors in operations area without prior


permission
• Bring hazardous and combustible material in secure
area
• Practice “Piggybacking”
• Bring and use pen drives, zip drives, ipods, other
storage devices unless and otherwise authorized to do
so
• Đưa khách đến khu vực hoạt động mà không được phép
trước
•03/27/20
25 Mang vật liệu nguy hiểm và dễ cháy vào khu vực an toàn
Mohan Kamat
37
USE
R

Password Guidelines
RESP
ONSI
BILIT
IES

 Always use at least 8 character password with combination of


alphabets, numbers and special characters (*, %, @, #, $, ^)
 Use passwords that can be easily remembered by you
 Change password regularly as per policy
 Use password that is significantly different from earlier passwords

Use passwords which reveals your personal


information or words found in dictionary
Write down or Store passwords
Share passwords over phone or Email
Use passwords which do not match above complexity
criteria

03/27/20
Mohan Kamat
25 40
USE
R

Internet Usage
RESP
ONSI
BILIT
IES

 Use internet services for business purposes only

 Do not use internet for viewing, storing or transmitting


obscene or pornographic material
 Do not use internet for accessing auction sites
 Do not use internet for hacking other computer systems
 Do not use internet to download / upload commercial
software / copyrighted material

Technology Department is continuously monitoring Internet


Usage. Any illegal use of internet and other assets shall call
for Disciplinary Action.

03/27/20
Mohan Kamat
25 41
USE
R
E-mail Usage
RESP
ONSI
BILIT
IES
 Use official mail for business purposes only
 Follow the mail storage guidelines to avoid blocking of E-mails
 If you come across any junk / spam mail, do the following
a) Remove the mail.
b) Inform the security help desk
c) Inform the same to server administrator
d) Inform the sender that such mails are undesired

 Do not use official ID for any personal subscription purpose


 Do not send unsolicited mails of any type like chain letters or
E-mail Hoax
 Do not send mails to client unless you are authorized to do so
 Do not post non-business related information to large number
of users
 Do not open the mail or attachment which is suspected to be
virus or received from an unidentified sender

03/27/20
Mohan Kamat
25 42
USE
R

Security Incidents
RESP
ONSI
BILIT
IES
Report Security Incidents (IT and Non-IT) to
Helpdesk through
• E-mail to [email protected]
• Telephone : xxxx-xxxx-xxxx
• Anonymous Reporting through Drop boxes

e.g.:
IT Incidents: Mail Spamming, Virus attack, Hacking, etc.
Non-IT Incidents: Unsupervised visitor movement, Information leakage,
Bringing unauthorized Media

• Do not discuss security incidents with any one outside organisation


• Do not attempt to interfere with, obstruct or prevent anyone from reporting
incidents

03/27/20
Mohan Kamat
25 43
USE
R
RESP
ONSI
BILIT  Ensure your Desktops are having latest antivirus updates
IES  Ensure your system is locked when you are away
 Always store laptops/ media in a lockable place
 Be alert while working on laptops during travel
 Ensure sensitive business information is under lock and key
when unattended
 Ensure back-up of sensitive and critical information assets
 Understand Compliance Issues such as
Cyber Law
IPR, Copyrights, NDA
Contractual Obligations with customer
 Verify credentials, if the message is received from unknown
sender
 Always switch off your computer before leaving for the day
 Keep your self updated on information security aspects

03/27/20
Mohan Kamat
25 44
Disable Non-essential
services, protocols,
processes,
Protocols, systems, andprograms
processes that rob systems of resources
and allow potential attacks to occur that could damage your
systems.
 If they are not being actively used, it is an unnecessary security risk.
 The solution is simply to disable or inactivate the service, protocol,
system, or process which is not needed
 Các giao thức, hệ thống và quy trình cướp đi tài nguyên của hệ
thống và cho phép các cuộc tấn công tiềm ẩn xảy ra có thể gây hại
cho hệ thống của bạn.
 Nếu chúng không được sử dụng tích cực, thì đó là rủi ro bảo mật
không cần thiết.
 Giải pháp đơn giản là vô hiệu hóa hoặc hủy kích hoạt dịch vụ, giao
thức, hệ thống hoặc quy trình không cần thiết
But… Be Careful!

You need to understand what it is


and what you are doing!
Any questions?
Tutorial 1

 At home: Download Kali 2019 ISO +


VirtualBox
 Tut1 : Setup VB, Kali + Setup network

You might also like