Chap 22- Network security Flashcards
What activities does network security covers? Explain.
•Confidentiality: Keeping data private.
•Correctness(Integrity)
•Avalability
Ways to protect data confidentiality
•Ensuring only authorized users can access parts of Network resources
•Stopping misuse: Authorized people accessing file they aren’t supposed to be.
•Encrypting data: Can’t read w/o the encryption key.
What if the data is lacked of correctness (Integrity)?
-An error in patient’s health record or in manufacturing control system could cause serious consequences
Ways that will disable the availability of the network
•Broken network hardware components
•Corrupted program code
•Virus/DOS that
×Slow down the network performance/stop it working
×Delete data
×Alter data or program code
×Allow data to be stolen or eavesdropped on
What’s DOS & DDOS?
-Denial of service, Distributed Denial of Service
-Attack on a network preventing legitimate users from accessing to its service
Reasons why security is important.
•Required to run organization
-If data lost/fail to fulfil order(DOS) >Lose trust>Bankrupt
-School’s cant run effectively if they can’t access to their data(Timetables,presentation,..)
•Private/Confidential
-If data leak(not secure)>sue>lose trust>Close down
•Financially Valuable
-If business plan to raise revenue is obtained by competitor>Undercut the business/Lose chance to raise
What’s two-factors authentication?
Security check where users have to type secure token from device or SMS from mobile
What are ways to secure data?(as organization)
•Acess control: Controls what permission a user has to particular file
•Firewall: Monitor and contol data that is sent moving from one network to another.
•Physical security: Only authorized people (network technicians & Sysadmin) can physically access.
Why should organisation buy hardware based firewall than using software based?
•More flexiblilty in terms of rules
•Allow faster throughput of data.
What does firewall do?
•Inspects incoming, outgoing data
•Use firewall policy to decide whether to allow data to move from one network to another
•Rules designed to protect from wide range of potential threats
Why is electronic lock system better than traditional?
•Record Entry/Exit times
•Deactivate individual card if employee lose it or leave company
Ways to secure data physically?
•Install burglar alarm
•Security tagging
•Physical locking down equipment (safe)
•Physical guards
•Surveillance Technology
Why is physical security so important?
•Anyone with physical access can easily bypass access control or authentication system.
•Could copy, modify, delete any data on network.
•Install malware to gain remote access
What can firewall policy do?
•Stop certain protocols from being used.(FTP->prevent copying organization data to external sever)
•Block data coming/going to certain Network Address(URL/IP)
[ Eg.Website,server,
computer,another country and organization]
•Stop attempts at hacking by disallowing data matches pattern attacker would use
What can organization do in firewall to meet certain circumstances?
They can customize the firewall policy to meet their circumstances.