Please enable JavaScript.
Coggle requires JavaScript to display documents.
Security of Networks, Systems, Applications and Data (Network security…
Security of Networks, Systems, Applications and Data
Process controls
Risk assessments
To be successful, the risk assessment process should:
-
-
-
-
involves three inputs : Asset assessment ,Threat assessment, Vulnerability assessment
-
-
They should be evaluated in terms of the organization’s mission, risk tolerance, budgets and other resources, and cost of mitigation.
-
-
Network security
-
Local Area Networks
• A local area network (LAN) covers a small, local area—from a few devices in a single room to a network across a few buildings.
-
-
-
LAN security provisions
• Declaring ownership of programs, files and storage
-
-
Wireless Technologies
• WLAN technologies conform to a variety of standards and offer varying levels of security features.
-
-
• WPA and WPA2 (preferred) are applicable to most wireless networks and commonly used in networks that involve PCs.
Ports and Protocols
• Allowable port numbers range from 0 to 65535. These are divided into three ranges, as follows:
-
-
• The dynamic and/or private ports—49152 through 65535: Not listed by IANA because of their dynamic nature.
Tunneling
-
-
• HTTP tunneling—A technique by which communications performed using various network protocols are encapsulated using the HTTP protocol.
-
Remote Access
-
include
-
-
-
• Encryption tools and techniques, such as use of a VPN
• Restriction of access to controlled systems, networks and applications
-
Application security
-
-
Additional Threats
• Covert channel—Transfers information between systems illicitly, using existing infrastructure
• Race condition—Accesses networks on an unauthorized basis, using operations processing vulnerabilities
-
• Steganography—Conceals messages, images or files within another similar file
-
Data security
When classifying data, the following requirements should be met:
-
-
-
-
-
-
-
• After data classification has been assigned, security controls can be established, including encryption, authentication and logging.
-
-
-
Database Controls:
-
• Access controls limiting or controlling the type of data that can be accessed and what types of accesses are allowed (read-only, read-and-write or delete)
-
-
-
-
-