Chap 22- Network security Flashcards
What activities does network security covers? Explain.
•Confidentiality: Keeping data private.
•Correctness(Integrity)
•Avalability
Ways to protect data confidentiality
•Ensuring only authorized users can access parts of Network resources
•Stopping misuse: Authorized people accessing file they aren’t supposed to be.
•Encrypting data: Can’t read w/o the encryption key.
What if the data is lacked of correctness (Integrity)?
-An error in patient’s health record or in manufacturing control system could cause serious consequences
Ways that will disable the availability of the network
•Broken network hardware components
•Corrupted program code
•Virus/DOS that
×Slow down the network performance/stop it working
×Delete data
×Alter data or program code
×Allow data to be stolen or eavesdropped on
What’s DOS & DDOS?
-Denial of service, Distributed Denial of Service
-Attack on a network preventing legitimate users from accessing to its service
Reasons why security is important.
•Required to run organization
-If data lost/fail to fulfil order(DOS) >Lose trust>Bankrupt
-School’s cant run effectively if they can’t access to their data(Timetables,presentation,..)
•Private/Confidential
-If data leak(not secure)>sue>lose trust>Close down
•Financially Valuable
-If business plan to raise revenue is obtained by competitor>Undercut the business/Lose chance to raise
What’s two-factors authentication?
Security check where users have to type secure token from device or SMS from mobile
What are ways to secure data?(as organization)
•Acess control: Controls what permission a user has to particular file
•Firewall: Monitor and contol data that is sent moving from one network to another.
•Physical security: Only authorized people (network technicians & Sysadmin) can physically access.
Why should organisation buy hardware based firewall than using software based?
•More flexiblilty in terms of rules
•Allow faster throughput of data.
What does firewall do?
•Inspects incoming, outgoing data
•Use firewall policy to decide whether to allow data to move from one network to another
•Rules designed to protect from wide range of potential threats
Why is electronic lock system better than traditional?
•Record Entry/Exit times
•Deactivate individual card if employee lose it or leave company
Ways to secure data physically?
•Install burglar alarm
•Security tagging
•Physical locking down equipment (safe)
•Physical guards
•Surveillance Technology
Why is physical security so important?
•Anyone with physical access can easily bypass access control or authentication system.
•Could copy, modify, delete any data on network.
•Install malware to gain remote access
What can firewall policy do?
•Stop certain protocols from being used.(FTP->prevent copying organization data to external sever)
•Block data coming/going to certain Network Address(URL/IP)
[ Eg.Website,server,
computer,another country and organization]
•Stop attempts at hacking by disallowing data matches pattern attacker would use
What can organization do in firewall to meet certain circumstances?
They can customize the firewall policy to meet their circumstances.
What’s NAS? Typical home/organization use consists?
•Network attached storage connected to a network.
•Provide file storage for devices in network.
Home:Single Hard Drive,Associated network hardware
Organization: Several Hard drive
Additional features of NAS?
•Accessible via internet
•Specialist app for smartphones to access files stored on NAS
Mistakes users make with NAS?
•Not changing device’s default password (Use complex)
•Not updating software running on NAS(fix security weaknesses)
Pros & Cons of USB flash drive?
Pros
•Easy to transport
•Cheap for amount of storage available
•Very convenient to use
Cons
•Easily lost large amount of sensitive information on drive
*Use encrypted Flash drive
USB?
Universal Serial Bus
Intentions of cyber attack?
•Make system unavailable
•Delete or modify information
•Gain access to data in system
•Physical damage a device(By overriding safety limits)
Social engineering?
Attacks rely on exploiting human’s behavior to reveal sensitive information
Forms of social engineering?
•Phishing: Attempt to get sensitive information through sms,VC, email, fake web(domain spoofing)
•Pharming: Spread malware that changes IP of domain name to fake web. [Malware can infect DNS->Everyone is redirected to bogus sites]
•Shoulder Surfing:Directly observing a user by looking over shoulder, using hidden cam to gain confidential information.(username,PIN)
How to prevent Pharming?
•Chrck the http address of intended website
•HTTPS? when enter sensitive information
•Install latest security updates
•Install latest antivirus software
Why is it longer to access website you have never visited before?
IP of visited website is stored in DNS cache so doesn’t need to request DNS server each time.
Forms of technical weaknesses
•Unpatched software:
-Unpatched>Known weakness>exploit it and attack unpatched software.
-Patched>fix security issues(Manually installed by technicians)
•USB devices:
-ontain malware>transfer to cur system and copy data to attacked via internet.
•Eavesdropping:
-Intercepting transferred data from/to computer system.
Why is “technical weaknesses”?
Unpatched software & USB devices> Allow malware>Eavesdrop
What things should software designer should consider?
•What authentication?
•Diff level access for diff user
•Warning issued before risky operation (copy, deleting)
•Stored data encrypted?
•Threats software will face, will software run on computer connected to internet?
What’s modular testing and why is it used?
-Testing each block of code separately to ensure code works as intended.
-To prevent hackers from exploiting small problem in code to access to data or system
Ways to protect cyber attacks?(organization)
•Audit Trails
•Secure OS
•Provide effective network security
Why are IPA standards needed?
So that all devices from diff manufacturers will use the same type of address and can communicate each other
Benefits of Audit Trials?
•There’s record of who changed what when
•Identifies when error/security issue is introduced
•Enables program to be rolled back previous state
•Improve accountability/produce robust code