.

Thursday, March 7, 2019

Network security threats Essay

The purport of this memo is to let you know the importance of web earnest measure. Here I will discuss the interlocking certification threats, law that affects earnings auspices and processes and procedures for adventure rec everyplacey, data backup, and data restoration along with future sue intentions. Network security threats washbowl be defined as whatever method utilize to crusade to breach the security of a web or system (Tulloch 2003).The goal of net income security is to sustain and obligate three critical properties of selective information, which atomic number 18 confidentiality, integrity and availability. This threats originate from variety of sources such(prenominal) as External and internal. External threats atomic number 18 structured threats from malicious individuals or organizations and unstructured threats from inexperienced attackers such as script kiddies. Internal threats are threats from disgruntled employees or contractors.Various earnin gs security threats exist. round(a) of the threats are Firewall and System Probing, Network File Systems (NFS) Application Attacks, Vendor Default password Attacks, Denial of service ( land) attacks, Social Engineering Attacks, Electronic Mail Attacks, Spoofing, Sniffing, atomisation and Splicing Attacks, Easy-To-Guess Password Compromise, Destructive Computer Viruses, Prefix S preemptning, trojan horse Horses and reconnaissance attacks.The top three security threats to a earnings are discussed in below paragraphs. dissatisfied Employees This is the somewhat common network security threat. Disgruntled employees, who are the group most familiar with their employers computers and applications, including knowing what actions line of descent leader cause the most damage can create both naughtiness and countervail on a computer System. The disgruntled current employees very cause more damage than former employees do.According to Parmar, the common examples of computer-related employee sabotage are entering data incorrectly, changing and deleting data, destroying data or political programs with logical system bombs, crashing systems, holding data hostage and destroying hardware or facilities. Denial of do (DoS) Attacks According to Tulloch (2003), DoS is a casing of attack that tries to prevent trustworthy users from deviling network services. In this type of threats, the attacker tries to prevent entrance fee to a system or network by several possible means.Some of these are Flooding the network with so much demarcation that traffic from legitimate clients is overwhelmed Flooding the network with so many requests for a network service that the host providing the service cannot receive similar requests from legitimate clients and Disrupting communications between hosts and legitimate clients by various means, including alteration of system figure information or even physical destruction of network servers and components. (Tulloch 2003) poisonous Code and Electronic Mail Attacks.According to Parmar, malicious code refers to viruses , worms , Trojan horses , logic bombs, and software (uninvited). Electronic electronic mail attacks are emails that hackers send to via media network systems and whenever companies accept this e-mail from the Internet that have exposed versions of the sendmail program are potential targets from this attack. NETWORK bail LAWS As such, no network security laws exist for network security. However, some of the acts that are applicable for network security threats are discussed in below paragraphs. Privacy dissemble of 1974 The concept of information privacy has been one of the most critical issues.It takes into serious consideration. regard a world without information privacy. The lack of information privacy creates a breeding ground for scientific sharing and distri justion. In 1974, the Privacy guess of 1974, passed by the Unites States Congress, states that noneagency shall disclose any r ecord, which is contained in a system of records by any means of communication to any person, or to another agency, except pursuant to a written request by, or with the prior written consent of, the individual to whom the record pertains (Privacy operate of 1974 88 Stat. 1897). CFAA Computer Fraud and Abuse Act.According to Robinson (2003), the current joined States law of information security is the Computer Fraud and Abuse Act (18 U. S. C). It was originally enacted solely as a computer crime statute, but in its present form, it imposes both civil and criminal liability for a wide variety of acts that compromise the security of public and closed-door sector computer systems. DMCA The Digital millenary Copyright Act The Digital Millennium Copyright Act (17 U. S. C), provides that no person shall circumvent a technological measure that effectively controls access to a work protect nether this title the Copyright justice.(Robinson, 2003) There are other laws (acts), such as th e Wiretap Act, the Stored Communications Act, and the Computer security measure Act are in addition applicable on network security threats. PROCESS AND PROCEDURES FOR NETWORK SECURITY The three essential techniques used by companies to protect their network are firewalls, encoding and VPN, which are discussed below Firewalls Firewalls are used to control access between networks. It separate intranets and xtranets from the Internet so that only employees and authorized business partners can access.Firewalls are implemented by Packet filtering to block iniquitous traffic, which is defined by the security constitution or by use a proxy server, which acts as an intermediary. Encryption To protect against sniffing, messages can be encrypted before being sent (over the Internet). In general, two classes of encryption methods mystifying Key encryption (DES) and Public Key encryption (RSA, public and private key are needed) are used today. Public Key encryption is in integratedd int o all major Web browsers and is the basis for secure socket form (SSL).Virtual Private Networks (VPN) VPN maintains data security as it is transmitted by using tunneling and encryption. Tunneling creates a temporary connection between a extraneous computer and the local network. Tunneling blocks access to anyone trying to intercept messages sent over that link. Encryption scrambles the message before it is sent and decodes it at the receiving end. Another important area for companies are (implementing) Security policy, Disaster recuperation and Business tenacity (plans), which are discussed in below paragraphsSecurity policy Security policy is defined as rules, directives and practices that govern how asset, including sensitive information are managed protected and distributed within an organization. Every organization should define and document a security policy that defines the limits of acceptable behavior and how the organization will answer to assault of such behavior. Se curity policy defined should be concise, to the point, easy to deduce and widely publicized in the organization.The security policy implemented should regard compliance with all laws. The security policy should be reviewed periodically to respond to changes in technology or circumstances. There should be restrictions on contend of computer games on corporate computers and visiting of non-productive web sites using corporate network. In addition, employees should be monitored for prohibition against taking copies of certain corporate electronic document out of office, use of pirated software and use of corporate e-mail account for sending the personal e-mail.Proper Documentation for Disaster Recovery and Business Continuity There are various types of vulnerabilities associated with computer-based information systems. outright these days organizations are being more dependent upon their computer systems, so the survival of business depend very much on the security of these system s. Initially (few years back), physical disasters such as floods a hurricane, and fires were the most probable security risks.Nowadays, computer operations are also likely to loss or damage from hackers, computer viruses, industrial spies and similar causes which until recently were in the realms of science fiction. The terrorist attacks on September 11, 2001, showed that there is a huge difference between disaster recovery and business continuity. In the past, disaster recovery meant getting computers and networks up and running after a hurricane, flood, fire, or other disaster. However, September 11 taught a broader issue getting the business up-and-running.According to McNurlin & Sprague (2006), Business continuity broadens the discussion to include Safeguarding people during a disaster Documenting business procedures so that not dependent upon a single(a) employee Giving employees the tools and space to handle personal issues first so that they can then concentrate on work A lternate workspace for people and keep IT sites not too close but not too off the beaten track(predicate) away Up to date evacuation plans that everyone knows and has practicedBacked up laptops and departmental servers and Helping people cope with a disaster by having easily accessible phone lists, e-mail lists, instant-messenger lists so people can communicate with loved ones and colleagues. CONCLUSIONS The goal of network security is to sustain and book three critical properties of information, which are confidentiality, integrity and availability. The most common threats to network security comes from disgruntled employees, DoS attacks and malicious code attacks.All these threats try to breach the security of a network or system. Various information security and privacy laws exist, which must be followed by companies while put and managing their computer network. Various techniques such as firewalls, encryption and VPN are used for securing network. In addition, security poli ces and disaster recovery and business continuity plan are implemented for securing network. FUTURE ACTION Below are some methods for securing network from the top three security threats to a network. Disgruntled employees type of threats can be limited by invalidating passwords and deleting system accounts in a timely manner by network (system) administrator.According to Tulloch (2003), defenses against DoS attacks can be done by disabling unneeded network services to limit the attack surface of companies network enabling magnetic disc quotas for all accounts including those used by network services implementing filtering on routers and tour operating systems to reduce exposure to SYN flooding base-lining normal network usage to help identify such attacks in order to quickly flog them and regularly backing up system configuration information and ensuring fast password policies.To prevent malicious code attacks from occurring, regular check with vendors to match systems are running a correct version of sendmail or some more secure mail product are necessary. Network Security through Software and Hardware can be implemented by Modular and cheaper workgroup firewalls. By having host based and network based assault detection systems Active security by providing auto mated responses to agents. centralise management Content filtering Acceptance of PKI By having token, smartcard or biometric based access solutions. Some basic protecting tips for computer (in network) that should be provided to all the staffs in the organization are Always use Anti-virus Software Download security updates and patches regularly and update computer systems. Do not check or download emails and attachments from unknown sources Back Up your data regularly. Use Firewall Do not share access to your computer hard drives in network Attachments.REFERENCES Tulloch, M.2003, Microsoft Encyclopedia of Security, Microsoft Press, Washington, United States of America. Parmar, S. K. & CST, N. Cowichan Duncan RCMP Det (cmpl), An Introduction to Security Manual McNurlin, B. C & Sprague, R. H 2006, instruction Systems Management in Practice, 7th ed. , Pearson Education, brand-new Jersey United States Congress, Privacy Act of 1974. Public Law No. 93-579, 88 Stat.1897 (Dec. 31, 1974) CERT Training and Education software Engineering Institute (2006). Information Security for Technical Staff, Student handbook, Camegie Mellon University, USA Robinson, S, 2003, U. S. Information Security Law, accessed on October 20, 2007 from .

No comments:

Post a Comment