Please enable JavaScript.
Coggle requires JavaScript to display documents.
INTRODUCTION TO NETWORK SECURITY (SECURITY ORGANIZATIONS ROLES (CERT / CC,…
INTRODUCTION TO NETWORK SECURITY
NETWORK SECURITY
DEFINITION : Consists of the provisions and policies adopted by the network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of the computer network and network-accessible resources.
SECURITY MODEL
OPEN SECURITY MODEL
The easiest to implement
Simple password and server security becomes the foundation of this model
Suitable for LANs / public WANs that are not connected to the internet
RESTRICTIVE SECURITY MODEL
More difficult to implement
Firewalls and identity servers become the foundation of this model
Ease of use for users diminishes as security tightens
CLOSED SECURITY MODEL
Most difficult to implement
All available security is measures are implement in this design
User access is difficult and cumbersome
THE NEED FOR SECURITY
Network security is needed to : Prevent unauthorized access to the network that is of potential threat to the network and its resources.
Potential risk to network security : Hostile nations, Terrorist, Criminal elements, Hackers or corporate competitors
THREAT ANALYSIS OF NETWORK SECURITY
Asset Identification : To identify the resources used in network for various applications
Vulnerability Assessment : The process if identifying, quantifying and prioritizing the vulnerabilities in the system.
Threat Identification : To identify a threat in the system.
IDENTIFY LEGAL ISSUES AND PIRACY CONCERNS
In business, one of the biggest reasons to create and follow a security policy is compliance with the law
Legal liability in such cases is likely to depend on what prevention technologies and practices are available and on whether these technologies and practices are reasonably cost-effective to implement
NETWORK SECURITY TRENDS
Wireless Access : The increasing use of wireless LAN connection and the rapid rise of Internet access from cell phones in Europe and Asia are requiring entirely whole new approaches to security
The Need for Speed : The number of broadband connections to the internet from homes is exceeding projections
IT Staffing Shortages : To solve this problem, many enterprise are increasingly outsourching day-to-day security management tasks
ISO / IEC 17799 : is an information security standard that is published by the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC)
MALAYSIAN CYBER LAW
Digital Signature Act 1997
Computer Crimes Act 1997
Telemedicine Act 1997
Communications and Multimedia Act 1998
Copyright (Amendment) Act 1997
Electronic Commerce Act 2006
SECURITY ORGANIZATIONS ROLES
CERT / CC
US-CERT
SANS Institute
(ISC)^2
Common Criteria
FIPS
ICSA
ISSUES OF ON-LINE SECURITY / SECURITY THREATS
CATEGORIES
*data disclosure
*data modification
*data availability
ACTIVITIES
*hacking
*cracking
*spoofing
*sniffing
SECURITY METHODS
logon
file system
data communication
administration
INTERNET SERVICES
email and news
file transfer
remote access to hosts
real time conferencing services
THREATS TERMINOLOGY
information theft
unauthorized disclosure
information warfare
accidental data loss
SOURCES OF THREATS
internal threats
mobile and remote users
internet and TCP/IP
physical
phone attacks
social engineering
SECURITY THREATS
insecure architectures
broadcast networks
centralized services
METHODS OF ATTACKS
authentication compromises
improper input validation
sniffing activities
denial of services
exploiting physical access
virus, worms, trojans
CAUSES OF SUCCESSFUL ATTACKS
lack of basic password security
lack of basic firewall port blocking
lack of updating