managing network security unit 2
managing network security unit 2
Level-IV
Lack of Encryption:
• Failure to encrypt sensitive data during transmission or storage can
expose it to unauthorized access. Implementing encryption protocols,
such as SSL (Secure Sockets Layer) for data in transit and encryption
for stored data, is crucial.
Unsecured Wireless Networks:
• Open or poorly configured Wi-Fi networks can be exploited by unauthorized users.
Employ strong encryption (WPA3), use complex passwords, and regularly update
Wi-Fi passwords.
Threat Listing:
• Enumerate potential threats and vulnerabilities that could impact the network.
Consider external and internal threats, including malicious actors, malware,
insider threats, and natural disasters.
Vulnerability Assessment:
• Conduct vulnerability assessment to identify weaknesses in the network. This
involves scanning systems and applications for known vulnerabilities and
weaknesses in configurations.
Risk Assessment:
• Evaluate the probability and potential impact of identified threats. Assign risk
levels based on the combination of the threat's probability and impact. This helps
prioritize the justification efforts.
Attack Surface Analysis:
• Analyze the network's attack surface, which includes all points where an attacker
could potentially gain unauthorized access. This involves understanding entry
points, interfaces, and potential weak links in the network.
Data Protection:
• Implement measures to protect sensitive data, both in transit and at rest. This
includes encryption, data classification, and access controls.
Network Monitoring:
• Implement comprehensive network monitoring to detect unusual or suspicious
activities. Use intrusion detection and prevention systems to identify and respond to
potential security incidents.
Physical Security:
• Consider physical security aspects, such as access to server rooms, data
centers, and networking equipment. Restrict physical access to prevent
unauthorized tampering.