ITEC 3010 Network Security

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/23

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

24 Terms

1
New cards

Confidentiality

protection of organizational data from unauthorized disclosure

2
New cards

Integrity

assurance that data have not been altered (i.e., that data hasn’t lost its accuracy or validity)

3
New cards

Availability (aka business continuity)

protection against disruption, destruction and disasters; degree to which information and systems are accessible to authorized users

4
New cards

Threats to business continuity

disruption, destruction and disaster Loss or reduction in network service caused by viruses, hardware/software malfunctioning, natural or manmade disasters, etc

5
New cards

Threats to confidentiality

unauthorized access (i.e., intrusion by hackers [from outside the organization] or rogue employees [from inside the organization])

6
New cards

Mechanisms that reduce/eliminate security threats

Preventive controls stop a threat from occurring (e.g., passwords)

Detective controls reveal unwanted events (e.g., auditing software)

Corrective controls rectify an unwanted event (e.g., restoring an IS after a fire)

7
New cards

Three common risk assessment frameworks:

Operationally Critical Threat, Asset, and Vulnerability Evaluation (OCTAVE)

Control Objectives for Information and Related Technology (COBIT)

Risk Management Guide for Information Technology Systems (NIST guide)

8
New cards

Inventory IT assets

IT managers and business managers must: Identify all organization’s IT assets (Fig. 11- 2: Type of assets) Document and rank the importance of each asset for the organization

9
New cards

Identify threats

IT manager must: Identify the threats (Can use threats and likelihood, e.g., summarized in Fig. 11-4) Create for EACH IT asset a threat scenario that describes how that asset can be compromised by a one specific threat (therefore, it is common to have more than one threat scenario for each IT asset) Each threat scenario must include (1) the name of IT asset, (2) its importance, (3) the threat, (4) its likehood of occurrence, (5) the potential consequences of threat and a Risk Score used to quantify the impact and likelihood of occurrence and (6) content related to applied controls generated in Step 4 (see below and next slides)

10
New cards

Document Existing Controls

IT manager must: Determine the risk control strategy: 4 options Risk acceptance: Take no actions for risks that have low impacts Risk mitigation: Use of control to remove or reduce impact of threat Risk sharing: Transfer all or part of impact (through insurance or outsourcing) Risk deferring: Take no action while collecting more information about threat and risk (for non-imminent risks)

11
New cards

Identify Improvements

They evaluate adequacy of (1) the controls and (2) degree of risk associated with each threat

12
New cards

Antiviruses

protect against malware i.e., viruses, worms, spyware, etc
Traffic anomaly detector and traffic anomaly analyzer protect against Denial of Service (DoS or DDoS) attacks that prevent normal access to servers (see Fig. 11-8)

13
New cards

Protection against device failure

Solution for failing component: Redundancy in the network (e.g., BN), use of fault-tolerant servers (i.e., servers with redundant components), RAID storage technology, cluster/server farms, backup servers, etc. Solution for power interruption: Uninterruptible power supplies (UPS) allowing IS to operate while battery lasts and shut down properly

14
New cards

Disaster protection

Solution 1: Disaster avoidance i.e., storing critical data in multiple locations and avoiding locations prone to flood (basements) or natural disasters Solution 2: Disaster Recovery Plan (DRP) i.e., clear plan that (1) identifies responses to different types of disasters, (2) provides recovery of data, applications and network and (3) specifies the backup and recovery controls. DRPs can be outsourced to disaster recovery firms

15
New cards

Security policy

Document clearly identifying (1) key IT assets, (2) what employees should and should not do and (3) plan for routinely train employees (Elements of a security policy, Fig. 11-11)

16
New cards

Perimeter security and firewalls

Firewalls: Network component (typically a router) that examines packets flowing into and out of the organization’s network and restrict access to that network Packet-level firewalls: Filtering based on IP address and ACL rules (Fig. 11-13) Application-level firewalls: Filtering based on content (i.e., stateful filtering or executable files)

Physical security: All servers and network equipment are in secured rooms and only authorized personnel can enter those rooms To prevent eavesdropping, use fiber optic cables on wired networks and encryption on wireless networks

17
New cards

Server and client protection

Installing security patches eliminates software security holes i.e., flaws in network software that permit unintended access to the network • Installing and updating antivirus protects against (1) trojan horse (or rootkits)

18
New cards

Encryption

Process of message coding that involves (1) a plaintext, (2) an encryption algorithm (often widely known), (3) a key or a combination of keys, (4) a ciphertext and (5) decryption (reverse process that doesn’t always use the same key)

19
New cards

Encryption techniques:

Symmetric (private key encryption): Uses a single (receiver) key for encrypting and decrypting. Advantage: fast and secure. Problem: key distribution Asymmetric (public key encryption): Uses 2 keys. Solves key distribution problem (see next slide)

20
New cards

Asymmetric (public-key) encryption

A pair of keys are used One key is designated the public key and can be freely shared The other key is designated the secret private key When a message is encrypted using one key, it can only be decrypted with the other Based on mathematical calculations that are easy in one direction but difficult in reverse

21
New cards

User authentication

User profile specifies data and network resources a user can access and the type of access or privileges (CRUD i.e., Create, Read, Update or Delete).

22
New cards

Preventing social engineering (e.g.: Phishing):

Training end user not to disclose User IDs and passwords as a solution

23
New cards

Intrusion Protection Systems (IPS)

Software/Hardware package designed to detect an intrusion and take action to stop it

24
New cards

IPS use 2 techniques to determine if an intrusion is in progress:

Misuse detection: Compares monitored activities with signatures of known attacks Anomaly detection: Looks for major deviations from the “normal” parameters of network operation (Ex. of anomaly: large number of failed logins)