Network Security

Network Security - prevention from unauthorized access

3 key principles of Network Security (C-I-A)
  1. Confidentiality - concerned with preventing the authorized disclosure of sensitive information
  2. Integrity - 3 goals
    • Prevention of the modification of information by unauthorized users
    • Prevention of the unauthorized or unintentional modification of information by authorized users
    • Preservation of the internal and external consistency.
  3. Availability
Other C-I-A related terms
  1. Identification -- Log-in
  2. Authentication - password
  3. Accountability - the person who is responsible into the whole account
  4. Authorization
3 Critical Elements of Security According in IATO
  1. People
    • Development of information assurance policies and procedures
    • Assignment of role and responsibility
    • Training of critical Personnel
    • Enforcement of personal accountability
    • Commitment of Resources
    • Establishment of physical security control
    • Establishment of personnel Security Control
    • Penalties Associated with Unauthorized behavior
  2. Technology
    • Security Policy
    • System-level information assurance architecture
    • Information assurance principle
    • Specification criteria for the required information assurance products
    • Acquisition of reliable, 3rd party validated products
    • Configuration recommendations
    • Risk Assessment process for the integrated system
  3. operations
    • A visible and up-to-date security policies
    • Enforcement of file information security policy
    • Certification and accreditation
    • Information Security posture management
    • Key management Services
    • Readiness Assessment
    • Protection of the infrastructure
    • Performing system security assessment
    • Monitory and reacting to threats
    • Attack sensing, warning, and response (ASW + R)
    • Recovery and reconstitution
The System Development Life Cycle
  1. Initiation
    • documentation
    • involves sensitivity assessment
  2. Development / Acquisition
    • security requirement
    • level of awareness
  3. Implementation
    • installation, testing, security testing and accreditation
  4. Operation / Maintenance
    • operation assurance
    • identify the measure
    • back-up, training process
  5. Disposal
    • involves disk sanitation, archiving files, moving equipment.

Risk Management
  • According to NIST, Risk management comprises of 3 process
    • risk assessment
      • identification and evaluation of risks
      • identification and evaluation of risk impacts
      • recommendation of risk-reducing measures
    • risk mitigation
      • prioritizing appropriate risk-reducing measures recommended from the risk assessment process.
      • implementing appropriate risk-reducing measures recommended from the risk assessment
      • maintaining the appropriate risk-reducing measures recommendation from the risk assessment.
    • evaluation and assessment
      • continuous process center residual risk in the system is acceptable
      • implement additional security controls for accreditation of the IT system

Security Vs Privacy


Security - is need by an organization to protect Intruders
Privacy - is wanted by an organization to protect the rights of an individual

3 Aspects of Information Security
  • Security Attack -- compromise the information
  • Security Mechanism
  • Security Service
    • enhance the security measures
    • counter security attacks

Four General Category of an attack
  1. Interruption - attack on availability
  2. Interception - attack on confidentiality
  3. Fabrication - attack on authentication
  4. Modification - attacked on Integrity
3 Classes of Intruders
  1. Masquerader
  2. Misfeasor
  3. Clandestine User
Reasons Behind an Attack
  1. Skill
    1. General Skill Level
    2. Custom Skill Level
  2. Motivation
    1. Satisfaction - struggle
    2. Tenacity - patience
    3. Ego - pride
  3. Opportunity
    1. Parsimony
    2. Justififiability - other people still can access
    3. Completeness
    4. Awareness
    5. Robustness - limitation

Security Policies and Security Awareness

Senior Management Policy Statement
Organizational Policy
Functional Policy
Standards

Guidelines ← Baselines
↓                   
Procedures                   

Advisory Policies
  • strong recommendations
  • recommend course of action / approaches but allow for independent judgement in the event of special case
Regulatory Policies
  • intended to ensure that an organization implements the standard procedures and best practices of its industry
Informative Policies
  • provide information and generally require no action by the affected individual
  • inform the user of the prohibited activities and resultant consequences of practicing these activities

Standards, Guidelines, Procedures and Baselines

Standards - are compulsory and usually refer to specific hardware and / or software

Guidelines - are suggestions to the personal of an organization on how to effectively secure their network and computers

Procedures - are compulsory, detailed steps to be followed in order to accomplish tasks

Baselines - are similar to standards and represent a level of implementation of security controls that provide protection of available to other similar reference entities.

Security Awareness

  • Refers to the collective consciousness of an organizations employees relative to security controls and their application to the protection of the organization's critical and sensitive information

Training
  • is a tool that can increase employee security awareness and capabilities in identifying, reporting and handling comprises of confidentiality, integrity and availability of information system.
Types of Internet Security Training


Training Type
Target
AwarenessPersonnel and Security-Sensitive Positions
Security - related job trainingOperator and other designated Users
High - Level Security TrainingSemi-managers final managers and business unit managers
Technical Security trainingIT Support and System Ad
Advanced Info Security trainingSecurity Practitioners and Info System Auditors
Specific Security Software and Hardware Product TrainingOperators; IT personnel System Ad; Security Fractitioners and Selected Users

Physical Security
  • is concerned with the protection of personnel, sensitive information facilities, and equipment through the use of physical controls.
Controls in physical security can be partitioned into physical technical and administrative type.

Possible threats to Physical Security
  • Murderers
  • rapist
  • terrorist
  • Car Jackers
  • Spy
  • Fire
  • disease
  • item thief
  • inside job
  • bomb
  • natural calamities and disaster
  • vandalisms
  • Sabotage
  • Lost of electrical security
  • strike
  • environmental conditions
  • water damage
  • smoke particles
  • hackers
  • extreme temperature and humidity
  • employee, abuse of powers
Physical Controls
  • Security Guards
  • K9 dogs / units
  • Lock with chain
  • Safe / Vault
  • Location of equipment
  • Temperature Monitoring
  • Warning Signs
  • Security Cage / Fencing
  • Disabling USB Ports
  • Paper Shredder
  • Man trap
  • Lighting
  • TV
  • Instrusion Detectors
  • Dry Contact Switches
Administrative Controls
  • Hire and monitoring security experts
  • Implement and design safety measures
  • Training of critical personnel
  • Installation of safety devices
  • Regular health monitoring
  • Security policy
  • Performing security assessment
Technical Controls
  1. Fire
    • Fire extinguishers
    • sprinklers
    • smoke detectors
    • thermal security camera
  2. Bomb
    • radar
  3. Hackers
    • Anti-viruses
    • System Firewalls
    • System Restrictions
  4. Natural Calamities
    • Sensor
    • Cameras
    • Satellites

Comments

Popular posts from this blog

Talambuhay ni Liwayway A. Arceo

Basketball Hand Signals

Uhaw ang Tigang na Lupa- Liwayway A. Arceo