The need for a computer / network security:
Computer / Network security includes:
Control physical access to your computer or network
Prevention of accidental data
Cancellation, modification, compromise
Detection and Prevention
willful violations of internal security
unauthorized external attacks (hacking)
All three legs of the triangle must be for a network intrusion:
Reason
One reason to do against yourSecurity
Media
The ability to
Opportunities
The ability to access the network
This last point is the only administrator has the ability to control events.
Fundamentals of Network Security:
protection objectives of the network are sometimes referred to as confidentiality.
Only the sender and the receiver must "see" the integrity of the message.
Transmitter and receiver want to ensure that the message is not traveling, or changes later. Authentication
The transmitter and receiverconfirming the identity of any other available.
Services and resources must be available and accessible.
Information on risk management:
A basic principle of security is that no network is completely secure.
Information security is primarily concerned with risk management.
The most important of an asset, the more threats, more resources then you need to put the fuse in sight.
Understanding Risk Management - 2:
In general, without training,Administrators to respond to a threat to the safety of three ways:
Ignoring the threat, or identify them, but do nothing to prevent it.
Addressing the threat in an ad hoc manner.
Try to complete the security of all goods to the highest degree, without regard for usability or manageability
None of these strategies take account of the real risk, and they will all generally lead to failure in the long term.
What are someRisks?
Interceptions
Listening to messages
Kidnapping
Take on the role of a sender or recipient.
Inserting
Messages in an active connection
Imitation
Spoof a source address in a packet or a field in a package
Denial of Service (DOS).
Prevent others from access to resources, usually by overloading the system.
Risk management:
Once identified assets and threats have been risk management can beby:
Acceptance
Mitigation
Transmission
Prevention
Accept the risk:
If you do not take any proactive action, accept the consequences of exposure and threats to security, good.
Should accept the risk as a last resort when there are no reasonable alternatives, or if the cost is extremely high.
After the acceptance of risk is always a good idea to create an emergency plan.
A contingency plan details a series of actions to be taken after the riskmade and the impact of the compromise to reduce the loss of property.
Reducing the risk:
The most common method of protecting computers and networks to reduce security risks.
Through proactive measures both to reduce the exposure of a well to threats or reduce dependence on the organization, you are mitigating security risk.
A simple example: the installation of anti-virus software.
Transfer of risk:
security risk of transfer to another party has manyAdvantage include:
The economies of scale, such as insurance.
The use of know-how and organizational services.
For example, a web-hosting.
If this type of risk transfer companies, the terms of the contract are clearly in a contract for the Service Level Agreement (SLA), known specified.
Risk prevention:
On the contrary, the risk is to avoid the risk altogether.
To avoid risks, you need the source of the threat of exposure to danger,or your organization the confidence in asset management.
In general, avoid risks when there is little or no opportunity to mitigate or transfer risk, or risk the consequences of risk are by far the benefits business.
An example, a military dBase or law enforcement authorities, which, if compromised, life could be endangered.
Implementing Security:
Think about security in relation to the granting of permission to perform at leastTask.
Example: Consider the case of a network administrator inadvertently opening an email attachment that launches a virus.
If the administrator is connected to a domain administrator, the virus has administrative rights on all computers in the domain, and then have unlimited access to almost all data on the network.
Defense in depth:
Set the security of your network as a series of layers.
Each layer is removed to get closer to the center where thecritical assets exist.
In defense of the network, each layer as if the first outer layer is invalid or nonexistent.
The security of the entire network will increase significantly if defend at all levels of security and fault tolerance.
For example, to protect you in creating an e-mail-borne viruses, in addition to anti-virus software on users 'computers', you can e-mail client software that runs the blocks potentially dangerous file typesBlocking potentially unsafe attachments by file type, and ensures that the user is running under a limited user account.
Reduce the attack surface:
An attacker would only attack a vulnerability successfully to your network know when all you need to identify weaknesses in order to protect your network.
The smaller the surface area, the better your chances of accounting for all assets and their protection.
The attackers are less objective andThen you have less to monitor and maintain.
For example, the surface of each computer on the network low, you can disable services that are not used, and remove software that is not necessary.
Account of the security objectives:
Physical access control to
Server
Workstations on the network
Network Device
Cable System
Because of safety considerations related to the average wireless laptops.
Recognizing the security risk.
Fromso that data is printed.
The inclusion of floppy disks, CDs, tapes and other removable media.
In recognition of the threats to network security:
To protect your network, consider the following:
Question: who or what to protect, when?
Who: The types of network intruders and their motivations.
What: types of network attacks and how they work.
These questions form the basis for an assessment of the threat.
A comprehensive assessment of threats, the product mustBrainstorming among people who know the business processes, industrial, security, and so on.
The classification of certain types of attacks:
Social engineering attacks
DOS attacks
Scanning and Spoofing
Source Routing Protocol, and other exploits
Software and systems used
Trojans, viruses and worms
It 'important to understand the types of threats to deal properly with them.
Design of an overall security plan:
RFC2196, theSite Security Handbook.
Identify what you are trying to protect.
Determine what you are trying to protect them.
Determine how likely the threats expected.
implement measures to protect your assets in a cost effective way.
Review the process continuously and make improvements each time a weakness is discovered.
Steps to create a security plan:
Your security plan, usually three different aspects of protection are yourNetwork
Prevention: Measures taken to keep your information changes, destroyed or damaged.
To recognize the actions taken when a security breach has occurred or been attempted, and perhaps the source of the damage are: the test.
Action: Relax measures implemented to recover from a security hole to recover data lost or altered, the operations of the system or network and prevent future accidents.
SecurityFeedback:
The U.S. government specifications for the evaluation of implementations of network security in a publication often called Orange Book, which formally designated as the DOD Trusted Computer System.
The evaluation criteria or TCSEC.
The Red Book, or Trusted Network Interpretation of the TCSEC (TNI) explains how the TCSEC evaluation.
The criteria are used for computer networks.
Canada has released the security classification system that works similarly.
CTPEC
Safety Ratings-2:
A contract with the government, companies are often required to achieve a C2 rating.
An evaluation of C2 has different needs.
That the operating system to use the monitoring data access, even when it is accessed and has been viewed.
Users to control access to objects (access rights).
Clearly that users on the system (account user name and password) identified.
Security events and monitored permanentlyJoined on Auditing (audit log).
androidmarketsearch
Continuar leyendo 
Ocultar articulo 