14.9 Network-Security--Protecting-Digital-Assets
14.9 Network-Security--Protecting-Digital-Assets
Assets
By Mahjabeen Fatima
Protects against
Network security
unauthorized
includes
procedures and
policies to protect
access,
destruction,
manipulation, and
Introduct
stored data
theft
ion to
Network
Security
Enables tracking Essential for both
and prevention of individuals and
security threats organizations
Common
Unauthoriz
ed access to
files and
Hacking
attempts
(authorized
Malware
infections
Denial of
Service
(DoS)
Network
Security
data and attacks
unauthorize
d)
Address
Resolution
Protocol
(ARP)
SSH key
vulnerabiliti
es
Brute force
attacks
Threats
spoofing
Systematic submission
of passwords to find
correct one
Spreads through:
• IP probing
• Infected websites
• Trojan horses
A computer script is a set of commands in a computer language that
is stored in file and can be executed on a computer without being
compiled. Scripts are written in languages such as Perl, PHP,
• Bots work by creating client-server or peer-to-peer
networks between devices.
• The malicious software is sent over the internet by a
cybercriminal, called a bot herder or bot master, by
randomly probing IP addresses or by inserting the bot
into the hypertext, JavaScript or other code of
websites as a Trojan.
• A device that loads the website or responds to an IP
address probe is ‘infected’ with the bot software.
• Botnets based on the client-server model connect to a
Understandi central command device, called a command and
control (C&C) server, and await instructions. The bot
ng Botnets herder sends out commands to all the bots, which
carry out the instructions and send the results back to
the herder via the C&C server.
• Peer-to-peer botnets do not have a central bot herder,
but bots update themselves with the latest version of
the malicious software from other bots. Commands or
instructions are carried out and the results sent back
to the originator.
• Botnets can be used to gather data about the keys
that a user presses or to directly harvest data about
login credentials. Key loggers and spyware can use
botnets to send the data back to the originator of the
Malicious software, or malware, is created to inflict damage
on computer systems, applications, files or data.
Categories:
Malwa • Adware
• Ransomware
re • Rogue software
• Scareware
Types
• Spyware
• Trojan horses
• Viruses
and • Worms
Spreads through:
Threat • Network connections
• Email attachments
s • Malicious links
• Infected software
Attacks database systems through web
applications-like in search or login fields
on online forms
SQL Targets:
on Prevention:
s in the system
• Regular software updates
• Input validation etc. by using reputable s/w
developers
Structured query language (SQL) is used for programming and
for managing, data in relational databases. SQL is used to
access, return and present the results of the access to a user,
for example when a user searches for a payment, item or any
Organisations have network policies to set the
rules on how their network is used.
s
secure and what to do if a breach or virus attack
occurs)
• the security protocols to be used (such as a
password policy)
Asymmetric encryption
(public/private keys)
Encrypti
Transport Layer Security (TLS)
on and
Data HTTPS for web security
Key management
Monitors and
controls network
traffic
Firewall Hardware
on
Packet
filtering
Access
Functions: control
Traffic
monitoring
Zone
protection
Acceptable use
Netwo guidelines
Technology restrictions
rk User responsibilities
Securi Security protocols
ty Password policies
Policie Data handling
s procedures
Incident response plans
Data Protection Methods: Advantages and
disadvantages of the various methods
Locks, keys, and physical
barriers
Physic Security guards at entrances
al
Key advantages:
Securi • Prevents direct access to systems
ty
• Blocks easy USB access
Key challenges:
Metho • Keys can be lost or stolen
• Guard reliability issues
ds • Privacy concerns with cameras
• Cost of implementation
Definition: Using unique physical characteristics for
identification Biometr
Common types:
ic
Security
Fingerprint scanning Retinal scanning
Solution
Benefits:
Cannot be forgotten or
Difficult to forge Fast and convenient
lost
s
Limitations:
High
Hygiene Privacy
implementation Accuracy issues
concerns considerations
costs
Anti-
malware • Real-time scanning
• Threat quarantine
Softwar
protectio • Regular updates needed
n:
• Protects data itself
e
Encrypti
on:
• Allows secure transmission
• Key management challenges
• Resource intensive
Protecti
Drive-by • Automatic malware installation
on
download
Methods
• System vulnerability exploitation
risks:
• Packet analysis
Firewalls • Real-time monitoring
: • DNS protection
Network
Limitatio • Performance impact
• Setup complexity
Security
ns: • Cost considerations
Infrastruc
Access
• File permissions
• Folder hierarchies
• Backup considerations
ture
Rights: • Protection against internal
threats
Impact
of
Business Financial
disruption losses
Security
Customer Data
trust loss destruction
Breache
Legal
Identity
consequen
theft
ces
Reputatio
n damage
s
Regular Strong
Multi-
factor
Best
Practic
software password
authenticat
updates policies
ion
es for
Regular
Employee Backup
security
training procedures
audits
Incident
response
Continuous
monitoring
Securit
planning
y