Proactive Network Defence 7CS017
Proactive Network Defence 7CS017
Table of Contents
1. Executive summary........................................................................................................................2
2. Data Flow Decomposition Diagram...............................................................................................2
3. Threat Modelling Approach...........................................................................................................3
Web server—Threat and vulnerability...............................................................................................3
Wireless access..................................................................................................................................6
Threats on email server.....................................................................................................................9
4. Threat Mitigation Plan.................................................................................................................10
Threat mitigation plan for web server.............................................................................................10
Threat mitigation for wireless..........................................................................................................10
Threats mitigation for email server.................................................................................................12
5. Legal and Ethical Considerations.................................................................................................13
6. Conclusion...................................................................................................................................13
References...........................................................................................................................................15
1. Executive summary
The corporation is aware of the protection specifications of the Control System (CS), but the
Idaho National Laboratory (INL) has observed that security procedures and hardware are
not implemented consistently and sufficiently in on-site tests. The Department of Homeland
Security (DHS) National Cyber Security Division (NCSD) developed the Control Systems
Protection Center (CSSC) at INL to help business and government strengthen the security of
the CSs used in the nation's vital infrastructures. One of the CSSC's main priorities is to
recognise vulnerabilities in the control mechanism and create appropriate mitigation for
them. Our analysis tackles the challenges and vulnerabilities contained in on-site CS tests
and familiar methods of relief by supplying resource owners with knowledge that they need
to make sure that their frameworks are more readily secured from usual protection
blemishes.
We have selected the three realms in which there is an extremely chased assault to occur
for this case study centred on CNI/ IT systems, i.e. According to our report, we have also
done research on threat reduction and threat susceptibility in the selected specific domain,
following which we also have research on legal and ethical concern. We have also done
research on threat mitigation and threat vulnerability in the selected specific domain.
Wireless access
a. Establishing a rogue point of entry
A rogue AP is a wireless AP that is installed on a secure network without the
authority of a network administrator.
In the event of potential ruin of the enterprise, the rogue AP is usually created by a
hostile hacker on the company or government network.
This is a common vulnerability to protection since criminals often use it to trick
companies into assuming that they are related to a valid AP. They eventually fall into
a pit built by an unauthorised intruder to directly intercept the organization's private
and vital data (Kropp, 2006).
b. Poor twin points of entry
A rogue connector will conveniently release the same SSID (network name) as the
legitimate AP.
It would easily trick local WiFi users to bind to them, since the lawful and rogue APs
will not be alerted at any moment.
It is not really difficult to create an evil twin AP for nefarious purposes. Methods like
the Karmetasploit really made it almost as plain as a cake. It helps us to construct
fake APs, gather passwords, gather details and carry out browser-based client
attacks.
c. WiFi interface attacks robbed or destroyed (Kropp, 2006).
This threat is little known and thus the remainder of the lot is ignored.
We might have locked our Wi-Fi business with the finest security on the market, but
it is the system that may be something from a smartphone, a laptop or even a
mobile or a PC if CNI always fails the machine it used to attach to the same network.
As anyone retrieves the machine, if they can crack the device's password
themselves, they can reach the network on the basis of data obtained on the server
(if the password is not available, that will be much easier).
d. Problems with settings
Config issues often apply to glitches that can establish a significant security
problem for CNI or WiFi IT devices as a whole.
Typically, these problems arise when persons actually handle standalone APs.
The dilemma is restricted to a certain degree of power now with the
installation of a more central wireless network.
A variety of security advantages are offered by centrally regulated wireless
internet.
Using periodic audits and standardised warnings on TCO reduction.
e. Inability to customize safe
In growth, run the debug-enabled software.
The directory listing on the registry that leaks sensitive information has been
activated.
Overdated programmes that function like: WordPress plugins from
PhpMyAdmin.
Having the software run wasteful services.
There are no changed default keys and passwords.
Searching for error detection information, such as stack traces, for attackers
f. Exposure to confidential data
Encryption and resource safety are Web security flaws. At all points, both in motion
and at rest, sensitive information can be encrypted. Exceptions should not exist.
Never unencrypted, haze passwords, fly or store credit card details and credentials
for the account. The crypto/hash algorithm will definitely not become faint - it will
mean AES (256-bit) and RSA protection requirements if you have a concern (2048
bits and up).
Although it goes without noting that it is difficult to apply session and private URL
information with a protected flag, this is sincerely necessary and not over-
emphasizable.
g. Regulation of the loss of access level feature
This is a non-allowance, basically. This indicates that the proper authorization has
not been carried out as a process is called on a device. Many developers depend on
the backend to create the UI, which they claim will not reach the features provided
by the user from the server. It's not that easy, because the 'hidden' function can still
be queried by an attacker, and the UI doesn't bother with this feature. Imagine that
the /admin panel is open and if you are a client, the UI is just allowed. Nothing
prevents an attacker from detecting this feature if permission is missing.
h. Firewall Cross Site Framework (CSRF)
This illustration is a nice depiction of a legislative delegate condemning someone
else who misuses the browser. A third-party website can exploit a user's browser by
doing stuff with an attacker, for example.
A third party website utilises a CSRF cookie/session browser that issues software on
the goal platform (i.e. our bank). For example, if we log into a tab on the homepage
of the bank that is vulnerable to the assault, a different tab will misuse the attacker's
privileges that add to the administrator's problem. The member is a browser that
uses the legitimacy of the intruder to do something (session cookies).
i. Usage of identified vulnerability components
More on service/deployment problems. Conduct some checking, even some auditing
before implementing a new code. It can be extremely beneficial to use Random
GitHub code or some other forum, but risks a major vulnerability in terms of site
security.
For eg, there are many situations in which a third party gains managerial access to a
computer, not because the devices are stupid, but that third-party software has
been unbundled in its production for years. For eg, this is always the case with
WordPress plugins. If you felt your secret phpmyadmin installation could not be
found.
f. Conclusion
Web Server is for software as well as hardware. Yet, irrespective of its meaning, it is a
critical feature of the Internet that we remember today. We also ensure that details can
be stored on a network-connected device and that this information is made visible to
any other system, such as TCP/IP, via internet and network protocols. Cellular
Networking can be predicted internationally as technology advances. There are many
benefits of wireless networking that can increase the planet's competitiveness.
Nevertheless, even with all the other new advancements made in the world today, there
remain questions. Any of the things that obstruct the progress that wireless technologies
may produce are the privacy issues related to the access or negative effects of personal
information on an entity on the organisation. More experiments and tests would
remove the difficulties associated with wireless networking and make it a significant part
of the community. The need for wires connecting individual users will be very necessary
for wireless technology in the near future.
The mail distribution approaches on multiple servers offered here are a flexible solution
for applications where it is challenging to host mails on a single server from a particular
domain. By adding a hop to the wait and effectively multiplying the usage of the network
for the mail, this method typically costs postal delivery and retrieval. For every multi-
stage method, the first is an inherent dilemma. Multiple physical interfaces on one
device and the flow of traffic between interfaces will mitigate the second.
References
owns, C. (2016). Networks, trust, and risk mitigation during the American Revolutionary
D
War: a case study. The Economic History Review, 70(2), pp.509–528.
Kropp, T. (2006). System threats and vulnerabilities [power system protection. IEEE Power
and Energy Magazine, 4(2), pp.46–50.
Shaikh, A., Pardeshi, B. and Dalvi, F. (2020). Overcoming Threats and Vulnerabilities in
DNS. SSRN Electronic Journal.
Threats and Vulnerabilities to IoT End Devices Architecture and suggested remedies.
(2020). International Journal of Recent Technology and Engineering, 8(6), pp.5712–5718.