0% found this document useful (0 votes)
10 views

Network Security Notes

The concepts of computer networks and architecture and also the security of networks

Uploaded by

Shadreck Mubanga
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views

Network Security Notes

The concepts of computer networks and architecture and also the security of networks

Uploaded by

Shadreck Mubanga
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 16

PILLARS OF SECURITY POLICIES

The pillars of security policies are the fundamental principles and


guidelines that ensure the confidentiality, integrity, and availability
of an organization's assets and data. The six pillars of security policies
are:
Confidentiality: Protecting sensitive information from unauthorized
access, disclosure, or use.
Integrity: Ensuring the accuracy, completeness, and reliability of data
and systems.
Availability: Ensuring that data and systems are accessible and
usable when needed.
Authentication: Verifying the identity of users, devices, and systems.
Authorization: Controlling access to resources based on user
identity, role, or privileges.
Non-Repudiation: Ensuring that actions and transactions are
traceable and cannot be denied.

Additionally, some organizations consider the following as additional


pillars:
Recovery: Ensuring timely and effective restoration of data and
systems after a security incident.
Compliance: Adhering to relevant laws, regulations, and industry
standards.
These pillars serve as the foundation for an organization's security
program, guiding the development of security policies, procedures,
and controls to protect against various threats and risks.
Threat taxonomy, in the context of network security and information
systems, refers to a classification system used to categorize and
understand potential threats to an organization's assets, data, and
infrastructure. A threat taxonomy provides a framework for
identifying, analysing, and prioritizing threats, enabling organizations
to develop effective strategies for mitigation and defence.
Common categories in a threat taxonomy include:
1. External threats:
- Hacking and cracking
- Malware and ransomware
- Phishing and social engineering
- Denial of Service (DoS) and Distributed Denial of Service (DDoS)
attacks
2. Internal threats:
- Insider threats (e.g., employees, contractors)
- Unauthorized access or privilege escalation
- Data breaches or leaks
3. Environmental threats:
- Natural disasters (e.g., floods, fires)
- Power outages or electrical failures
- Physical damage or theft of equipment
4. Accidental threats:
- Human error (e.g., accidental deletion, misconfiguration)
- System or software failures
5. Intentional threats:
- Cyberterrorism
- Nation-state attacks
- Industrial espionage
6. Compliance and regulatory threats:
- Non-compliance with regulations (e.g., GDPR, HIPAA)
- Fines or legal action due to security breaches
7. Reputation and brand threats:
- Damage to reputation due to security breaches or incidents
- Loss of customer trust and confidence

Having a comprehensive threat taxonomy helps organizations:


1. Identify potential threats and vulnerabilities
2. Assess the likelihood and impact of threats
3. Develop effective security controls and countermeasures
4. Prioritize resources and investments in security
5. Improve incident response and disaster recovery planning

By understanding the various categories of threats, organizations can


proactively defend against potential attacks and minimize the risk of
security breaches and incidents.
ENCRYPTION
Encryption is the process of converting plaintext (readable data) into
ciphertext (unreadable data) to protect it from unauthorized access.
It involves using an encryption algorithm and a secret key to
transform the data into a code that can only be deciphered with the
correct decryption key.
Types of Encryption:
1. Symmetric Encryption: Uses the same key for both encryption and
decryption. Examples include AES, DES, and Blowfish.
2. Asymmetric Encryption: Uses a public key for encryption and a
private key for decryption. Examples include RSA, Elliptic Curve
Cryptography (ECC), and PGP.
3. Hash-based Encryption: Uses a hash function to encrypt data, such
as SHA-256 and MD5.
4. End-to-End Encryption: Ensures that only the sender and intended
recipient can read the data, like in WhatsApp and Signal.

Characteristics:
1. Confidentiality: Encryption ensures that only authorized parties
can access the data.
2. Integrity: Encryption ensures that the data is not tampered with or
altered during transmission.
3. Authentication: Encryption verifies the identity of the sender and
ensures the data comes from a trusted source.
How to Encrypt Data:
1. Choose an encryption algorithm and key.
2. Convert the data to a digital format (if necessary).
3. Use the encryption algorithm and key to transform the data into
ciphertext.
4. Store or transmit the encrypted data.
5. Decrypt the data using the corresponding decryption key.
Pros:
1. Secure data transmission and storage.
2. Protects against unauthorized access and data breaches.
3. Ensures confidentiality, integrity, and authenticity.
4. Compliant with regulatory requirements (e.g., GDPR, HIPAA).

Cons:
1. Computational overhead and resource-intensive.
2. Key management can be complex and vulnerable to attacks.
3. Data recovery can be difficult if keys are lost or compromised.
4. Not foolproof; sophisticated attacks can still compromise
encryption.
1. Encryption is not the same as encoding or compressing data.
2. Encryption does not protect against all types of cyber threats (e.g.,
phishing, social engineering).
3. Regularly update and patch encryption software and systems to
prevent vulnerabilities.
4. Use secure key management practices, such as key rotation and
revocation.
5. Consider using hybrid encryption approaches that combine
multiple encryption methods.
6. Encryption is a critical component of a comprehensive security
strategy, but it should be used in conjunction with other security
measures.
Encryption technology is a method of securing data by transforming
it into a code that can only be deciphered with the correct
decryption key or password.
The basics of encryption technology include:
Plaintext: The original data that needs to be secured.
Encryption algorithm: A mathematical formula that scrambles the
plaintext into unreadable ciphertext.
Key: A secret code used to encrypt and decrypt the data.
Ciphertext: The encrypted data that is unreadable without the
decryption key.
Decryption: The process of transforming ciphertext back into
plaintext using the decryption key.
Symmetric encryption: Uses the same key for both encryption and
decryption (e.g., AES).
Asymmetric encryption: Uses a public key for encryption and a
private key for decryption (e.g., RSA)
Hash functions: One-way encryption that produces a fixed-length
string (e.g., SHA-256).
Digital signatures: Authentication mechanism using asymmetric
encryption and hash functions.
Encryption protocols: Standardized methods for implementing
encryption, such as SSL/TLS and PGP.
Encryption technology ensures confidentiality, integrity, and
authenticity of data, making it essential for secure communication
and data protection.
Here is an overview of popular encryption algorithms and crypto
analytics attacks:

Symmetric Encryption:
Advanced Encryption Standard (AES): A widely used block cipher for
encrypting data at rest and in transit.
Data Encryption Standard (DES): An older block cipher, considered
insecure due to its short key size.
Blowfish: A fast and secure block cipher, often used in password
hashing.
Hash Algorithm Encryption:
SHA-256 (Secure Hash Algorithm 256): A widely used hash function
for data integrity and authenticity.
MD5 (Message-Digest Algorithm 5): An older hash function,
considered insecure due to collisions.
bcrypt: A password hashing algorithm that uses Blowfish.

Asymmetric Encryption:
RSA (Rivest-Shamir-Adleman): A popular public-key encryption
algorithm for secure data transmission.
Elliptic Curve Cryptography (ECC): A more efficient and secure
alternative to RSA.
PGP (Pretty Good Privacy): A hybrid encryption protocol using RSA
and symmetric encryption.
Crypto Analytics Attacks:
Brute Force Attack: Trying all possible keys or passwords to decrypt
data.
Side-Channel Attack: Exploiting implementation weaknesses, like
timing or power analysis.
Collision Attack: Finding two inputs with the same hash output (e.g.,
MD5).
Man-in-the-Middle (MitM) Attack: Intercepting and altering data in
transit.
Quantum Computer Attack: Using quantum computers to break
certain encryption algorithms (e.g., RSA).
Rainbow Table Attack: Precomputed tables for reversing hash
functions (e.g., MD5).
Dictionary Attack: Trying common passwords or phrases to decrypt
data.
Encryption general problems.
Key Management: Generating, distributing, storing, and managing
encryption keys is a complex task.
Performance Overhead: Encryption and decryption processes can
consume significant computational resources and slow down data
transmission.
Data Recovery: Losing or compromising encryption keys can make
data recovery impossible.
Interoperability: Ensuring compatibility between different
encryption algorithms, protocols, and systems can be challenging.
Quantum Computing Threats: Emerging quantum computers may
potentially break certain encryption algorithms.
Side-Channel Attacks: Attackers may exploit implementation
weaknesses, like timing or power analysis, to compromise
encryption.
Key Exchange: Securely exchanging encryption keys between parties
is a difficult problem.
Authentication: Verifying the identity of parties involved in encrypted
communication can be tricky.
Addressing these challenges is crucial for effective and secure
encryption practices.

General categories of attacks:


1. Network attacks (e.g., hacking, DoS/DDoS)
2. Social engineering attacks (e.g., phishing, pretexting)
3. Malware attacks (e.g., viruses, Trojans, ransomware)
4. Physical attacks (e.g., theft, vandalism)
5. Insider threats (e.g., employee misconduct, data breaches)
6. Application attacks (e.g., SQL injection, cross-site scripting)
7. Data attacks (e.g., data breaches, data manipulation)
8. Identity attacks (e.g., identity theft, impersonation)

Major attack routes to a corporate office:


1. Email (phishing, spam, malware)
2. Internet (web attacks, drive-by downloads)
3. Network (unsecured Wi-Fi, vulnerabilities)
4. Employees (social engineering, insider threats)
5. Physical access (tailgating, unauthorized entry)
6. Third-party vendors (supply chain attacks)
7. Publicly available information (OSINT, social media)

Major attack routes to an IT environment:


1. Network vulnerabilities (unpatched software, open ports)
2. Weak passwords and authentication
3. Unsecured cloud storage and services
4. Outdated software and systems (end-of-life, unpatched)
5. Insider threats (privileged access, data breaches)
6. Malware and ransomware
7. Denial of Service (DoS/DDoS) attacks
8. SQL injection and database attacks
9. Cross-site scripting (XSS) and web application attacks
10. Unsecured IoT devices and BYOD (Bring Your Own Device)

Risk evaluation, also known as risk assessment, is a systematic


process to identify, analyze, and prioritize potential risks that could
harm an organization or individual. Here's a step-by-step explanation
of how a risk is evaluated:
Identify the risk: Recognize a potential risk that could impact the
organization or individual.
Assess the likelihood: Evaluate the probability of the risk occurring,
typically on a scale from low (unlikely) to high (very likely).
Assess the impact: Evaluate the potential severity of the risk's
consequences, considering financial, operational, reputational, and
human factors.
Determine the risk rating: Combine the likelihood and impact scores
to determine the overall risk rating, usually using a risk matrix (e.g.,
low, moderate, high, critical).
Analyze the risk: Examine the risk's root causes, potential triggers,
and affected assets or processes.
Evaluate existing controls: Assess the effectiveness of current
measures in place to mitigate the risk.
Determine risk treatment: Decide on the best course of action, such
as:
- Accept the risk (if it's low or unavoidable).
- Mitigate the risk (implement controls or reduce
likelihood/impact).
- Transfer the risk (e.g., insurance or outsourcing).
- Avoid the risk (if possible).
Develop a risk management plan: Create a plan to implement and
monitor the chosen risk treatment, including assigning
responsibilities and timelines.
Review and update: Regularly review and update the risk evaluation
as circumstances change or new information becomes available.
By following this structured approach, organizations and individuals
can systematically evaluate risks and make informed decisions to
manage and mitigate them effectively.
Categories of Security Control:
Technical Controls: Implementing technical measures to secure
systems, data, and infrastructure, such as firewalls, encryption, and
access controls.
Administrative Controls: Establishing policies, procedures, and
guidelines to manage and oversee security, including training and
awareness programs.
Physical Controls: Implementing physical measures to secure
facilities, assets, and resources, such as locks, surveillance, and
access control systems.

Outcomes of Security Processes:


Prevention: Stopping security incidents from occurring in the first
place.
Detection: Identifying security incidents or vulnerabilities in a timely
manner.
Response: Taking action to contain and mitigate the effects of a
security incident.
Recovery: Restoring systems, data, and operations after a security
incident.
Compliance: Meeting regulatory and legal requirements for security
and privacy.
Response to Security Incidents:
Identification: Quickly identifying and reporting security incidents.
Containment: Isolating affected systems or assets to prevent further
damage.
Eradication: Removing the root cause of the incident (e.g., malware).
Recovery: Restoring systems, data, and operations to a known good
state.
Post-Incident Activities: Conducting investigations, reporting, and
implementing improvements to prevent similar incidents.
Note: These categories and outcomes are not exhaustive, but they
provide a general framework for understanding security controls,
processes, and incident response.

Intrusion Detection (ID)


is a security technology that monitors network traffic or system
activities for signs of unauthorized access, misuse, or other malicious
activities. Its primary goal is to identify and alert on potential security
threats in real-time, enabling swift incident response and minimizing
damage.
Types of Intrusion Detection:
Network-based Intrusion Detection (NIDS): Monitors network traffic
for suspicious packets or patterns.
Host-based Intrusion Detection (HIDS): Monitors system logs,
processes, and file access for signs of unauthorized activity.
Hybrid Intrusion Detection: Combines NIDS and HIDS for
comprehensive monitoring.
Key Features:
1. Real-time monitoring and analysis
2. Signature-based detection (using known attack patterns)
3. Anomaly-based detection (identifying unusual behavior)
4. Alerting and notification systems
5. Integration with security information and event management
(SIEM) systems
Intrusion Detection Process:
1. Data collection: Gathering network packets or system logs
2. Analysis: Examining data for signs of intrusion
3. Identification: Determining the type and severity of the threat
4. Alerting: Notifying security teams or administrators
5. Response: Taking action to contain and remediate the threat
Benefits:
1. Enhanced security posture
2. Early detection and response
3. Improved incident response
4. Compliance with regulatory requirements
5. Reduced risk of security breaches

Note: Intrusion Detection is an essential component of a layered


security approach, complementing other security controls like
firewalls, antivirus software, and access controls.
SECURITY MECHANISMS
Security mechanisms are controls and countermeasures
implemented to protect a system, network, or asset from
unauthorized access, use, disclosure, disruption, modification, or
destruction. Here are some common security mechanisms:
Access Control: Restricting access to resources based on user
identity, role, or privileges.
Authentication: Verifying user identities through passwords,
biometrics, or tokens.
Authorization: Granting or denying access to resources based on user
privileges.
Encryption: Protecting data confidentiality and integrity using
algorithms and keys.
Firewalls: Network devices or software controlling incoming and
outgoing traffic.
Intrusion Detection and Prevention Systems (IDPS): Monitoring and
blocking malicious traffic.
Secure Communication Protocols: Protecting data in transit using
SSL/TLS, IPsec, etc.
Password Management: Securely storing, generating, and expiring
passwords.
Account Management: Managing user accounts, including creation,
modification, and termination.
Incident Response: Responding to security incidents, including
containment, eradication, and recovery.
Backup and Recovery: Ensuring data availability through regular
backups and recovery processes.
Network Segmentation: Dividing networks into smaller segments to
limit attack surfaces.
Vulnerability Management: Identifying and remediating
vulnerabilities in software and systems.
Content Security: Protecting against malware, spam, and other
unwanted content.
Proxy server
nap

You might also like