GROUP Assignment - Information Security and Cryptography
GROUP Assignment - Information Security and Cryptography
SECURITY (MIS)
MODULE NAME: INFORMATION SECURITY AND
CRYPTOGRAPHY
MODULE CODE: ISG09104
NAME: GROUP F BLENDED
GROUP MEMBERS
S/N NAMES REGISTRATION NUMBER
1 ALPHA EPAPHRA MIS-02-0091-2023
Introduction:
The large dependency on online services in combination with a low level of cybersecurity
knowledge, obsolete technologies and poor enforcement of regulations puts Tanzania at
risk of being a target for cyber criminals. The information threatened relates to the core
principles of information security; confidentiality, integrity and availability, and results in
economic losses, business interruptions and the deterioration of trust of individuals in
electronic systems.
The following are trending information security incidences in Tanzania and their
mitigation measures;
There have been reports from Tanzanian organizations which include public institutions
and SMEs of incidents where cyber criminals adopted a ransomware approach that
involved encrypting sensitive information and then making ransom demands. Malware
infections usually are the result of the use of pirated applications and unprotected end
connections.
3. Insider Threats
Sensitive information and data sometimes are accessed and used improperly by negligent
employees or employees with malicious intent. This always results in unauthorized access
to the systems or data breaches to sensitive information e.g. violation of personal privacy.
4. Data Breaches
Certain industries like telecommunications, finance, and health have weak security
measures in place which has led to instances where highly private customer information
is exposed to unintended person.
5. Phishing Attacks
Deceptive websites and emails attraction the users into giving away crucial details. This
resulting on giving sensitive information for both individual and organization which can
lead to security breach and loss of fund and organization reputation e.g. social engineering,
impersonation and deceptive social media links.
Employee Training
Issue training materials and conduct regular training for both general and technical
employees of all public and private organizations on how to effectively scan for and
control cyberspace threats.
3. Enhancing IT Facilities
Patching systems on a continuous basis
Weaknesses in the system should be minimized by routinely updating and monitoring
patches on operating and application systems.
Device Security
Every computer device connected to the network domain should be secured and
maintained through active directory.
Cross-Sectoral Collaboration
Foster relationships among Government, private sectors and international organizations
to facilitate information sharing on threats and practices.
Public-Private Collaboration
Collaborate with Technology Providers and assist in improving cyber security tools and
skills in Tanzania.
Question 2:
Discuss the network and internet security.
• Web security issues
• SSL and TLS
• Digital certificate and digital signature
• IPSec and VPN
• Tunnel mode Vs Transport mode
• Tradition Firewall, Cyberoam Firewall, and Sophos Firewall
• What is DMZ, how does it used to solve the issue of network security
• Intrusion Detection and Prevention systems (IDPS)
Answer:
• Web security issues
Web security issues are obstacles that endanger the security, integrity, and usability of
information, software and even users on the internet. Examples SQL Injection, DDOS
Attack, Phishing, Ransomwares, Virus and Worms, Cross-Site Scripting (XSS),
unencrypted website and Cross-Site Request Forgery (CSRF).
ii. TLS
Transport Layer Security (TLS) is a cryptographic protocol that encrypts data transfer
over the internet. It's used to protect data privacy and integrity for communications like
web browsing, email, and video conferencing. It is the successor to SSL to enhance
security and performance.
TLS Features:
(i) Encryption Functionality: TLS operation mode is to ensure all information
exchanged between a client (for example, a web browser) and a server remains
confidential so that unauthorized interception or eavesdropping cannot occur.
(ii) Authentication Functionality: Using digital certificates that are issued by well-
trusted or recognized Certificate Authorities (CAs), TLS enables the verification of
the identity of each participant of the communication.
(iii) Data Integrity: TLS guarantees an unaltered transfer of data through the use of
message authentication codes (MACs) among other methods.
(iv) Forward Secrecy: Many of the newer implementations of TLS are compatible with
the forward secrecy option making sure that earlier communication will remain
indecipherable no matter what happens to the private key in the future.
• What is DMZ, how does it used to solve the issue of network security
What is DMZ (Demilitarized Zone)
A DMZ for the context of security is a perimeter network security that creates a security
region by separates an internal network from external internet. And also acts as a buffer
zone by isolating trusted network (internal) from untrusted network (external).
Usage of DMZ to solve network security issues:
Segmentation of Network: DMZ used to separate and isolated the internal network by
placing those services which are accessed publicly from services which accessed
internally. It makes demarcation point to the internal network.
Minimize attacks: By separating the internal network into two parts, public accessed and
internal accessed services it minimizes attack chances by applying specific control
measurements to the respective area.
Network resource access management: Firewalls between DMZ and internal network
is used to control access to the resources like web server, mail server and others and also
monitoring network traffics across the internal and external network.
In this scenario as shown in the topology above uses two layer three switches, one for the
internal network and the other for external network, the other device is the router which
configured as DMZ firewall
1. Internal LAN
In this LAN with network address 192.168.1.0/24, have two devices (computers) which
are connected to a layer three switch with port numbers Fa0/2 and Fa0/3.
The layer three switch is connected through port number Fa0/1 to the DMZ router which
allowing internal network to access DMZ and outside network. In this internal LAN the
configuration will be done on the firewall to secure sensitive systems and data from
external threats.
3. External Network
This outside network with network address 11.1.1.0/29 comprises one computer and one
server connected to layer three switch through port numbers Fa0/1 and Fa0/2 respectively.
Also, this layer three switch connects to the router through interface Gig0/2, providing
access to other zones (DMZ and internal LAN). This is the one that connects to the
untrusted public internet or external systems that interact with the DMZ.