Vous êtes sur la page 1sur 34

DFN 5033

NETWORK SECURITY
By:
Miss Ruzanna Ramli
Session December 2017
Student should be able to:
• Identify the important requirements of network
security.
• Describe the need for network security.
• Identify potential risks to network security.
• Describe the goals of network security based on
asset, threat and risk.
• Explain THREE Security Models.
• Identify Legal Issues and Privacy Concerns.

CLO1: Explain common network vulnerabilities and attacks,


defence mechanisms against network attacks.
(C4, PLO1)
UNDERSTANDING THE GOALS OF
INFORMATION SECURITY:
PREVENTION:
Preventing computer or information violations
from occurring.

DETECTION:
Identifying events when its occur.

RESPONSE:
Developing strategies and techniques to deal
with an attack or loss
NETWORK SECURITY:

Consists of the provisions and policies adopted


by the network administrator to prevent and
monitor unauthorized access, misuse, modificati
-on, or denial of the computer network and
network-accessible resources.

The authorization of access to data in a


network, which is controlled by the network
administrator.
1.1.1 Identify the important require
-ments of network security:

1. Confidentiality
2. Integrity
3. Availability
4. Accountability
CONFIDENTIALITY:

To prevent or minimize unauthorized access to


and disclosure of data and information.

Confidentiality entails ensuring that data


expected to remain private is seen only by
those who should see it.

Confidentiality is implemented through


authentication and access controls.
INTEGRITY:

To make sure that data being worked with its


correct data.

Integrity as the level of confidence you have


that the data is what it’s supposed to be –
untampered with and unchanged.

Description integrity in terms of data:


Authentic
Complete
Trustworthy
AVAILABILITY:

To protect data and prevent its loss. Usually


often expressed in terms of uptime 24/7.

The key to availability is that the data must be


available when it’s needed and accessible by
those who need it.
ACCOUNTABILITY:

To be clear about who owns the data or is


responsible for making sure it’s accurate.

Be able to track and monitor data changes to


detect and repair the data in the event of loss
or damage.
ACCOUNTABILITY:
1.1.2 Describe the need for
network security:
Prevent unauthorized access to the network
that is of potential threat to the network and its
resources.

Ensure that the authentic users can effectively


access the network and its services.

Applications that can protect the network from


unauthorized access are in place.
1.1.3 Identify potential risks to
network security:
Data disclosure
Data modification
Data availability
Hacker
Malware
1.1.4 Describe the goals of network
security based on:

1. Asset Identification
2. Threat Assessment
3. Risk Assessment
ASSETS IDENTIFICATION:

Assets have to be identified and valued.


The process in which an organization attempts
to place a value on the information and systems
it has in place.
Assets such as hardware can be valued
according to their monetary replacement costs.
For assets such as data & information this is
more difficult. Value assets according to their
importance.
As a good metric for importance, ask yourself
how long your business could survive when a
given asset has been damaged: a day, a week,
a month?
ASSETS IDENTIFICATION:
ASSETS IDENTIFICATION:

Hardware: laptops, servers, routers, PDAs, mobile


phones, smart cards, …
Software: applications, operating systems,
database systems, source code, object code, …
Data & information: essential data for running
and planning your business, design plans, digital
content, data about customers, …
Services & revenue
Reputation of enterprise, trust, brand name
Employees’ time
THREAT ASSESSMENT:

Threats: actions by adversaries who try to


exploit vulnerabilities to damage events.
Evaluate the risks of both internal and external
threats to the data and network.
Various ways for identifying threats:
Categorize threats by the damage done to assets.
Identify source of attacks. Would the adversary be a
member of your organisation or an outsider, a contract
or or a former member? Has the adversary direct
access to your systems or is the attack launched
remotely?
THREAT ASSESSMENT:
RISK ASSESSMENT:

The process of evaluating and cataloging the


threats, vulnerabilities, and weaknesses that exist
in the systems being used.
An attempt to identify the costs of replacing
stolen data or systems, the costs of downtime,
and virtually any risk factor that can be imagine.
This phase only can be done only after
completing the asset identification.
Risk is associated with the consequences of
uncertain events, Hazard risk relate to damaging
events.

Risk = Assets  Threats  Vulnerabilities


TAKE

5 min
BREAK
Identify Security Models:

1. Open
2. Restrictive
3. Closed
1.1.5 Explain Open Security
Models:
1.1.5 Explain Open Security
Models:
The easiest to implement.
Simple password and server security becomes
the foundation of this model.
This model assumes that the protected assets
are minimal, user are trusted, and threats are
minimal.
Suitable for LANs / public WANs that are not
connected to the Internet.
If security breaches occurs, the result will be in
great damage or loss.
Example: hardware (router, switch).

Characteristics Open Security Models


1.1.6 Explain Restrictive Security
Models:
1.1.6 Explain Restrictive Security
Models:
More difficult to implement
Firewalls and identity servers become the found
ation of this model.
This model assumes that the protected assets
are substantial, some users are not trustworthy,
and that threats are likely.
Suitable for LANs / public WANs that connect
to the Internet.
Ease of use for users diminishes as security
tightens.

Characteristics Restrictive Security Models


1.1.7 Explain Closed Security
Models:
1.1.7 Explain Closed Security
Models:
Most difficult to implement
All available security measures are implement in
this design.
This model assumes that the protected assets ar
e premium, all users are not trustworthy, and th
at threats are frequent.
User access is difficult and cumbersome.
Need many train network administrator to main
tain the tight security applied.
Example: hardware (firewall)

Characteristics Closed Security Models


1.1.8 Identify Legal Issues and
Privacy Concerns:
• Internet Scam
• Ransomware
• DDOS Attack
• Phishing
• Cyber Bully
• Traditional crime vs Cybercrime
Internet mule
Since Jan 2012, there have been 6 cases involving 10 Malaysian women – Berita Harian, 30 Mac 2012
TAKE

5 min
BREAK