Podcast
Questions and Answers
What is the primary function of a network?
What is the primary function of a network?
- To provide power to devices
- To isolate devices from external threats
- To store data securely
- To connect two or more devices for communication (correct)
Which of the following describes a potential vulnerability in data communications?
Which of the following describes a potential vulnerability in data communications?
- Data is compressed for faster transfer
- Data travels on a wire or wirelessly (correct)
- Data is stored on a secure server
- Data is encrypted before transmission
What is 'packet sniffing' in the context of network security?
What is 'packet sniffing' in the context of network security?
- Combining multiple packets into one
- Examining each packet as it goes by (correct)
- Securing packets using encryption
- Compressing packets for faster transmission
Which of the following best describes the vulnerability associated with 'radiation' in network transmission?
Which of the following best describes the vulnerability associated with 'radiation' in network transmission?
Which type of cable is difficult to tap without being detected?
Which type of cable is difficult to tap without being detected?
Why are microwave communications more accessible to outsiders?
Why are microwave communications more accessible to outsiders?
What is a key weakness of satellite communication regarding security?
What is a key weakness of satellite communication regarding security?
What is the primary function of a MAC address?
What is the primary function of a MAC address?
What does the term 'eavesdropping' refer to in network security?
What does the term 'eavesdropping' refer to in network security?
What is a Denial of Service (DoS) attack?
What is a Denial of Service (DoS) attack?
What does a 'Smurf attack' involve?
What does a 'Smurf attack' involve?
In a SYN flood attack, what is the attacker primarily trying to do?
In a SYN flood attack, what is the attacker primarily trying to do?
What is the main goal of a 'teardrop' attack?
What is the main goal of a 'teardrop' attack?
What are compromised machines in a DDoS attack often called?
What are compromised machines in a DDoS attack often called?
What is a 'botnet'?
What is a 'botnet'?
What is wiretapping?
What is wiretapping?
What does 'inductance' allow an intruder to do?
What does 'inductance' allow an intruder to do?
What is impersonation in network security?
What is impersonation in network security?
Which of the following is an example of a message integrity violation?
Which of the following is an example of a message integrity violation?
What is one reason why networks have security problems?
What is one reason why networks have security problems?
A network always involves a single client interacting with a single server.
A network always involves a single client interacting with a single server.
Data communications are only vulnerable when transmitted wirelessly.
Data communications are only vulnerable when transmitted wirelessly.
Optical fiber cables are easily tapped without detection using inductance.
Optical fiber cables are easily tapped without detection using inductance.
A MAC address is a unique identifier for a network interface card.
A MAC address is a unique identifier for a network interface card.
Wires do not radiate signals, making them secure from eavesdropping.
Wires do not radiate signals, making them secure from eavesdropping.
Microwave transmissions are harder to intercept than cable transmissions.
Microwave transmissions are harder to intercept than cable transmissions.
Satellite communication signals are only accessible to the intended receiver.
Satellite communication signals are only accessible to the intended receiver.
In a sequencing attack, packets arrive in the correct order.
In a sequencing attack, packets arrive in the correct order.
Eavesdropping and wiretapping are forms of interception.
Eavesdropping and wiretapping are forms of interception.
SSID is a string to identify a wired access point.
SSID is a string to identify a wired access point.
Losing network services is called Denial of Service.
Losing network services is called Denial of Service.
A smurf attack directly uses the attacker's IP address.
A smurf attack directly uses the attacker's IP address.
In a SYN flood attack, the attacker's identity is easily traced.
In a SYN flood attack, the attacker's identity is easily traced.
DDoS attacks are difficult to launch.
DDoS attacks are difficult to launch.
Data corruption can only be caused by hackers.
Data corruption can only be caused by hackers.
A 'botnet' is a network of compromised computers used to launch attacks.
A 'botnet' is a network of compromised computers used to launch attacks.
A replay attack involves legitimate data being intercepted and reused.
A replay attack involves legitimate data being intercepted and reused.
Routing always follows a single, predetermined path in a network.
Routing always follows a single, predetermined path in a network.
Impersonation involves pretending to be someone else.
Impersonation involves pretending to be someone else.
In link encryption, data is decrypted only at the final destination.
In link encryption, data is decrypted only at the final destination.
What is a common contributor to security problems in organizations?
What is a common contributor to security problems in organizations?
What can result because of lack of unique responsibility for a network resource?
What can result because of lack of unique responsibility for a network resource?
What can be the consequence of not having audit trails in place?
What can be the consequence of not having audit trails in place?
Which of the following is considered an environmental attack on network systems?
Which of the following is considered an environmental attack on network systems?
What's a potential risk of using software that's poorly designed or inadequately tested?
What's a potential risk of using software that's poorly designed or inadequately tested?
How does the high portability of devices impact security?
How does the high portability of devices impact security?
What is a risk that can arise from combining multiple duties for one individual without proper segregation?
What is a risk that can arise from combining multiple duties for one individual without proper segregation?
Which the following is a class of security measures?
Which the following is a class of security measures?
What is the purpose of policies for user authentication and access control?
What is the purpose of policies for user authentication and access control?
Why should users not leave printers unattended when printing sensitive output?
Why should users not leave printers unattended when printing sensitive output?
What is the purpose of securing equipment housing hardware components?
What is the purpose of securing equipment housing hardware components?
What do software controls involve for security?
What do software controls involve for security?
What should users do regarding software and potential threats?
What should users do regarding software and potential threats?
Why is securing a Wide Area Network (WAN) complicated?
Why is securing a Wide Area Network (WAN) complicated?
What can the distributed nature of ownership in WAN deployments lead to?
What can the distributed nature of ownership in WAN deployments lead to?
What is a key feature of an incident handling plan?
What is a key feature of an incident handling plan?
What is the purpose of the CRACK tool?
What is the purpose of the CRACK tool?
What does Tripwire monitor?
What does Tripwire monitor?
What is the main purpose of COPS?
What is the main purpose of COPS?
What does SATAN do?
What does SATAN do?
Low awareness of security problems is a contributor to security challenges.
Low awareness of security problems is a contributor to security challenges.
Unique responsibility for security ensures collective diffusion of accountability.
Unique responsibility for security ensures collective diffusion of accountability.
Audit trails hinder effective threat detection.
Audit trails hinder effective threat detection.
Environmental attacks can compromise data integrity and network security.
Environmental attacks can compromise data integrity and network security.
Regular backups decrease the risk of data loss in the event of system failures.
Regular backups decrease the risk of data loss in the event of system failures.
There are four classes of security measures.
There are four classes of security measures.
Security measures encompass issues addressed by procedures for use.
Security measures encompass issues addressed by procedures for use.
Leaving printers unattended reduces the risk of unauthorized access to printed documents.
Leaving printers unattended reduces the risk of unauthorized access to printed documents.
Practices such as separation of authority should be implemented to centralize responsibilities.
Practices such as separation of authority should be implemented to centralize responsibilities.
Security boards provide additional layers of protection.
Security boards provide additional layers of protection.
Hardware controls are aimed to disregard critical assets.
Hardware controls are aimed to disregard critical assets.
It is recommended to use software from dubious sources.
It is recommended to use software from dubious sources.
Wide Area Networks (WAN) are harder to secure due to distance and size.
Wide Area Networks (WAN) are harder to secure due to distance and size.
COPS is a collection of password cracking tools.
COPS is a collection of password cracking tools.
System administrators should develop an incident handling plan.
System administrators should develop an incident handling plan.
Tripwire is a tool to use before a suspected penetration.
Tripwire is a tool to use before a suspected penetration.
CRACK can identify users with weak passwords.
CRACK can identify users with weak passwords.
SATAN is a collection of network analysis tools.
SATAN is a collection of network analysis tools.
The Computer Emergency Response Team was created by the US Department of Energy.
The Computer Emergency Response Team was created by the US Department of Energy.
Security planning starts with risk analysis.
Security planning starts with risk analysis.
Flashcards
What is a network?
What is a network?
Two devices connected by hardware and software for communication.
What is packet sniffing?
What is packet sniffing?
Examining each packet as it goes by in a network.
What is radiation in network security?
What is radiation in network security?
Wires radiate signals readable by an intruder.
What is cable splicing?
What is cable splicing?
Signup and view all the flashcards
What is a MAC address?
What is a MAC address?
Signup and view all the flashcards
What is a network protocol?
What is a network protocol?
Signup and view all the flashcards
What is routing?
What is routing?
Signup and view all the flashcards
What is a port?
What is a port?
Signup and view all the flashcards
What is a replay attack?
What is a replay attack?
Signup and view all the flashcards
What is interruption?
What is interruption?
Signup and view all the flashcards
What is a SYN flood attack?
What is a SYN flood attack?
Signup and view all the flashcards
What is a Teardrop attack?
What is a Teardrop attack?
Signup and view all the flashcards
What is traffic redirection?
What is traffic redirection?
Signup and view all the flashcards
What are botnets?
What are botnets?
Signup and view all the flashcards
What is Denial of Service?
What is Denial of Service?
Signup and view all the flashcards
What is link encryption?
What is link encryption?
Signup and view all the flashcards
What is end-to-end encryption?
What is end-to-end encryption?
Signup and view all the flashcards
What is KDC in Kerberos?
What is KDC in Kerberos?
Signup and view all the flashcards
What is Kerberos?
What is Kerberos?
Signup and view all the flashcards
What is hacking?
What is hacking?
Signup and view all the flashcards
What is cable interception?
What is cable interception?
Signup and view all the flashcards
What is Microwave communication?
What is Microwave communication?
Signup and view all the flashcards
What is a Botnet?
What is a Botnet?
Signup and view all the flashcards
What is wiretapping?
What is wiretapping?
Signup and view all the flashcards
What is Impersonation?
What is Impersonation?
Signup and view all the flashcards
Message Confidentiality Violation
Message Confidentiality Violation
Signup and view all the flashcards
Message Integrity Violation
Message Integrity Violation
Signup and view all the flashcards
Low Awareness of Security Problems
Low Awareness of Security Problems
Signup and view all the flashcards
No Unique Responsibility
No Unique Responsibility
Signup and view all the flashcards
No Audit Trails
No Audit Trails
Signup and view all the flashcards
Environmental Attacks
Environmental Attacks
Signup and view all the flashcards
No Backups
No Backups
Signup and view all the flashcards
Amateur Quality Software
Amateur Quality Software
Signup and view all the flashcards
High Portability
High Portability
Signup and view all the flashcards
Combination of Duties
Combination of Duties
Signup and view all the flashcards
Procedures for Use
Procedures for Use
Signup and view all the flashcards
Issues Addressed by Hardware Controls
Issues Addressed by Hardware Controls
Signup and view all the flashcards
Issues Addressed by Software Control
Issues Addressed by Software Control
Signup and view all the flashcards
CRACK
CRACK
Signup and view all the flashcards
Tripwire
Tripwire
Signup and view all the flashcards
COPS
COPS
Signup and view all the flashcards
SATAN
SATAN
Signup and view all the flashcards
Off-site Backup
Off-site Backup
Signup and view all the flashcards
Networked Storage
Networked Storage
Signup and view all the flashcards
Hot Site
Hot Site
Signup and view all the flashcards
Usefulness
Usefulness
Signup and view all the flashcards
Revolving Backups
Revolving Backups
Signup and view all the flashcards
Low awareness
Low awareness
Signup and view all the flashcards
Secure physical equipment
Secure physical equipment
Signup and view all the flashcards
Incident Handling Plan
Incident Handling Plan
Signup and view all the flashcards
Risk analysis
Risk analysis
Signup and view all the flashcards
Security Plan
Security Plan
Signup and view all the flashcards
Security Policy Considerations
Security Policy Considerations
Signup and view all the flashcards
Cold Site
Cold Site
Signup and view all the flashcards
File Copy
File Copy
Signup and view all the flashcards
Selective Backup
Selective Backup
Signup and view all the flashcards
Security policy breadth
Security policy breadth
Signup and view all the flashcards
Security policy durability
Security policy durability
Signup and view all the flashcards
Security Planning: Six Issues
Security Planning: Six Issues
Signup and view all the flashcards
Policy Realism
Policy Realism
Signup and view all the flashcards
Complete Backup
Complete Backup
Signup and view all the flashcards
System Admin Responsibility
System Admin Responsibility
Signup and view all the flashcards
Study Notes
Chapter Outline
- This chapter addresses why administering security is important
- The chapter also covers elements to know as an information security officer
Contributors to Security Problems
- Low awareness of security problems, like underestimating the complexity
- No unique responsibility when users share resources
- No audit trails to track user activities and system events
- Environmental attacks targeting physical infrastructure
- No backups of critical data increases risk of data loss
- Amateur quality software introduces vulnerabilities
- High portability of devices expands attack surface
- Combination of duties increases insider threats
Security Measures
- Three classes of security measures exist, including procedures for use, hardware controls, and software controls
Issues Addressed by Procedures for Use
- Implementing policies for user authentication, access control, data handling, and incident response
- Instructing users not to leave PCs unattended in exposed environments
- Advising users not to leave printers unattended when printing sensitive output
- Securing media containing sensitive information
- Performing regular backups of critical data and system configurations
- Implementing separation of authority
Issues Addressed by Hardware Control
- Securing equipment housing sensitive hardware components to prevent physical access
- Using add-on security boards or modules for protection like hardware-based encryption
- Examples include biometric authentication, smart cards, locks, and surveillance cameras
- Controls safeguard assets, infrastructure, and resources from physical threats
Issues Addressed by Software Control
- Deploying software controls within applications, OS, and network devices
- Using software with full understanding of threats, awareness of vulnerabilities ,and safe usage guidelines
- Avoiding software from dubious resources
- Being cautious of results from software applications
- Maintaining periodic backups of all system resources
Network Security Management
- Securing a Wide Area Network (WAN)
- Distance and Size: Managing infrastructure due to vast geographical spread
- Distance and Size: Distance impacting performance and security
- Distance and Size: Requires planning and coordination to protect entire infrastructure
- Insiders and Outsiders: Distinguishing between legitimate and unauthorized users due to diversity
- Insiders pose potential risks intentionally or unintentionally
- Outsiders include hackers, cybercriminals who probe for vulnerabilities
- Ownership and Responsibility: WANs involve multiple stakeholders with different roles
- The distributed nature of ownership can cause challenges in consistent policy enforcement
- Establishing clear lines of ownership and communication is essential
Elements to consider when administering network security
- Architecture (structure, connectivity, permissions, backups)
- Host (software versions, accounts)
Network Security Management - Incidents
- Each system administrator should develop an incident handling plan
- Users should know what is suspicious behavior and who to report it to
- The administrator should have a management contact list in emergencies.
- Management should have decided on action for an attack like close operations
- Have means to notify users
Network Security Management - Tools:
- CRACK is a collection of password checking tools
- Tripwire is a tool to use after a suspected penetration
- COPS is a set of programs that check important system files, user configurations
- SATAN is a collection of network analysis tools
Network Security Management - CRACK
- CRACK is designed to assess strength and security of user passwords
- Administrators run the tool against a password file or database
- It employs dictionary-based, brute-force, and rule-based attacks
- Analyzing results from crack will let admins identify users with weak passwords
Network Security Management - Tripwire
- Tripwire is an Intrusion Detection System IDS, that monitors and alerts administrators to changes in critical system files, directories, and configurations
- After a suspected penetration or security breach, administrators can conduct a post-incident analysis
- Comparing current system states with baseline configurations stored in a secure database detects unauthorized modifications, file tampering.
- Administrators can use Tripwire's reporting and alerting features to investigate activities, identify security incidents, and take appropriate actions.
Network Security Management - COPS
- COPS (Computer Oracle and Password System) is a set of programs designed to assess and evaluate the security posture of UNIX-based systems.
- COPS checks important system files, user configurations, permissions settings, and other critical parameters to identify potential security flaws or weaknesses that could contribute to undesirable events.
- To use COPS, administrators typically run the tool on target systems to perform security audits and vulnerability assessments.
- COPS generates detailed reports listing security issues, misconfigurations, and vulnerabilities discovered during the assessment, allowing administrators to prioritize remediation efforts and strengthen the overall security of the system.
Network Security Management - SATAN
- SATAN (Security Analysis Tool for Auditing Networks) is a collection of network analyses tools designed to audit and assess the security of networked systems and services
- To use SATAN, administrators deploy the tool to scan networked host, servers, and services for potential security vulnerabilities, misconfigurations, and weaknesses.
- SATAN performs various security test and checks against target systems including port scanning, service enumeration, version detection, and vulnerability identification.
- Administrators can analyze the results generated by SATAN to identify security gaps, prioritize remediation efforts, and implement appropriate security measures to protect against potential threats and attacks.
Computer Emergency Response Team
- CERT was formed because the Internet worm incident exposed no central source of information for security incidents involving Internet hosts.
- The U.S. Department of Defense established CERT at the Software Engineering Institute at Carnegie Mellon University.
- CERT monitors reports of incidents and security flaws, helps manufacturers, develops fixes to security problems and issues notices of problems and solutions
Risk Analysis
- Security planning begins with risk analysis.
- Risk analysis determines the exposures and their potential harm.
- Reasons to perform risk analysis: improve awareness, identify assets and vulnerabilities, improve basis for risk decisions, and justify security expenditure
Risk Analysis - Steps
- Identify assets
- Determine vulnerabilities
- Estimate likelihood of exploitation
- Compute expected annual loss
- Survey applicable controls and their costs
- Project annual savings of control.
Security Planning
- A security plan describes how an organization will address its needs.
- The plan is subject to revision as changes in requirements happen
Six Issues Security Plans must Address
- Policy
- Current state
- Recommendations and requirements
- Accountability
- Timetable
- Continuing attention
Security planning - Policy
- A policy defines the overarching security policies and principles which guide an organization's method to security
- This includes rules, standards, and guidelines for protecting assets as well as managing risks and compliance
- The policy statement addresses who should be allowed access, what resources, and how should access be regulated
Security Planning - Current Security Status
- Risk analysis can form the basis of a description of the current security status.
- The assessment will include existing security measures, controls and practices (listing the assets of the organization, security threats to the assets and the controls in place to protect the assets).
Security Planning - Recommendations and Requirements
- The heart of the security plan is action that will be taken.
- Create recommendations for enhancing security and specify requirements for implementing new security measures, controls, and protocols to address identified risks and vulnerabilities.
- Include requirements are being imposed and over what period they are being instituted.
- Plans must be extensible over time
Security Planning - Responsibility for Implementation
- Define roles, responsibilities, and accountability mechanisms for personnel involved in security management and enforcement
- Assign responsibilities for implementing security measures, monitoring compliance, and responding to security incidents
- All individuals will understand what can be done and who to coordinate with.
Security Planning - Timetable
- Develop a timetable for implementing the recommended security measures, set deadlines and milestones
- If the controls are expensive or complicated, they may be acquired and implemented
Security Planning - Continuing Attention
- Establishing an evaluation and review date of the security situation that includes regular reviews, updates, and revisions to the security plan to adapt to evolving threats, changes in the organization's environment, and emerging security challenges
- The security plan should arrange periodic reviews.
Contingency Planning - Backup
- Includes copying all or part of a file for recovering data loss
- It requires performing periodic backups of the entire system in storage.
- Maintain a rotating set of backups, retaining recent backups
- Save only the files have been modified or created since the last backup
Off- site Backup
- Requires taking completed backups and physically transporting it to designated locations
- Reduces data loss if primary systems are damaged
Networked Storage - Contingency planning
- Services offer storage space data remotely.
- Ideal for backing up critical data, as you can select a storage provider whose physical location is separate from your processing facility.
- Ensures data integrity and availability if backups are separated.
Cold Site - Contingency planning
- Facility with power and cooling infrastructure to install systems for operations
- Some use their facilities while others lease from disaster recovery providers
- Organizations restore operations at a cold site within a week
Hot Site - Contingency Planning
- Facilities are equipped with a fully operational computing system, telecommunications lines, power supplies, trained personnel.
- Utilized for mission-critical applications needing minimal downtime
- Can be owned by leased from the organization or disaster recovery providers
- Activation of a hot site requires loading software and data from offsite backup sources
Good Security Policy - Coverage
- The security policy must be comprehensive
- It should also be sufficiently broad to accommodate new situations as they may arise
Good Security Policy - Durability
- Durability is necessary to adapt policies over time.
- Policies must be flexible to changes over time.
- However, it should be amendable overtime to effectively address new conditions
Good Security Policy - Realism
- The policy must be realistic, stated security requirements have to be feasible to implement with current tech
- The implementation should practically benefit users in terms of saving time ,cost-effectiveness, and convenience.
Good Security Policy - Usefulness
- The usefulness of a security policy hinges on its clarity and comprehensibility.
- Policies are obscure if it is discarded if incorrectly
- Written in a way that can be understood and followed that must be concise and direct.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.