Monitor Threats To The Network
Monitor Threats To The Network
Monitor Threats To The Network
Computer and network security help to keep data and equipment functioning and provide
access only to appropriate people. Everyone in an organization should give high priority to
security because everyone can be affected by a lapse in security.
Theft, loss, network intrusion, and physical damage are some of the ways a network or
computer can be harmed. Damage or loss of equipment can mean a loss of productivity.
Repairing and replacing equipment can cost the company time and money. Unauthorized
use of a network can expose confidential information and reduce network resources.
Computer networks were used by corporation’s employee to share printers and data,
accessing different resources. When millions of ordinary citizens using the network for
banking operations, purchases and tax payments, network security is a major potential
problem. Network security problems can be divided in four interconnected areas: privacy,
authentication, integrity and non-repudiation.
Threats to security can come from the inside or outside of an organization, and the level of
potential damage can vary greatly:
Physical loss or damage to equipment can be expensive, and data loss can be detrimental
to your business and reputation. Threats against data are constantly changing as attackers
find new ways to gain entry and commit their crimes.
Operating systems processes and do the designated task as instructed. If a user program
made these process do malicious tasks, then it is known as Program Threats. One of the
common example of program threat is a program installed in a computer which can store
and send credentials via network to some hacker. The following is the list of some well-
known program threats:
Trojan horse:
Such program traps user login credentials and stores them to send to malicious user who
can later on login to computer and can access system resources.
The Trojan does not need to be attached to other software. Instead, a Trojan threat is
hidden in software that appears to do one thing, and yet behind the scenes it does another.
Trojans are often disguised (masked) as useful software. The Trojan program can
reproduce like a virus and spread to other computers. A Trojan horse is not a virus because
it does not replicate and spread like a virus.
If a program which is designed to work as required, have a security hole in its code and
perform illegal action without knowledge of user then it is called to have a trap door.
Logic Bomb:
Logic bomb is a situation when a program misbehaves only when certain conditions met
otherwise it works as a genuine program. it is harder to detect.
Viruses
A software virus is a freeloading program written intentionally to alter the way your computer
operates without your permission or knowledge.
A virus attaches copies of itself to other files such as program files or documents and is
inactive until you run an infected program or open an infected document. When activated, a
virus may damage or delete files, cause erratic system behavior, display messages or even
erase your hard disk.
A virus may spread through email and instant messenger attachments, through infected files
on floppy disks or CD-ROMs, or by exploiting a security flaw in Microsoft Windows.
System threats refers to misuse of system services and network connections to put user in
trouble. System threats can be used to launch program threats on a complete network
called as program attack. System threats creates such an environment that operating
system resources or user files are misused. The following is the list of some well-known
system threats:
Worm
A worm is a self-replicating program that is harmful to networks. A worm uses the network to
duplicate its code to the hosts on a network, often without any user intervention. It is
different from a virus because a worm does not need to attach to a program to infect a host.
Even if the worm does not damage data or applications on the hosts it infects, it is harmful to
networks because it consumes bandwidth.
Port Scanning:
Denial of service attacks normally prevents user to make legitimate use of the system. For
example, a user may not be able to use internet if denial of service attacks browsers content
setting.
Grayware or malware is a file or program other than a virus that is potentially harmful. Many
grayware attacks are phishing attacks that try to persuade the reader to unknowingly
provide attackers with access to personal information. As you fill out an online form, the data
is sent to the attacker. Grayware can be removed using spyware and adware removal tools.
A security plan should be used to determine what will be done in a critical situation. Security
plan policies should be constantly updated to reflect the latest threats to a network. A
security plan with clear security procedures is the basis for a technician to follow. Security
plans should be reviewed on a yearly basis.
Privacy
Authentication
Authorization and integrity
There are multiple layers of security in a network, including physical, wireless, and data.
Each layer is subject to security attacks. The technician needs to understand how to
implement security procedures to protect equipment and data.
An important issue in control and secure information system and computer network is the
security model that the system or network will be based. Security model implements security
policy, which was chosen and implemented by designers of system and computer network
[18]. To protect against unauthorized access to computers in a network there are several
solutions: using firewalls and secure the network area, authentication and authorization
access, creating of secure communication channels, etc... The main methods of securing a
computer network are: firewalls, authentication and authorization external access, NIS
service, SSL protocol, S-HTTP protocol, PCT protocol, IP-level security, Secure Shell (SSH).
A firewall is a system placed between the internal network (intranet) and external network
(internet). The main role is to protect the intranet in accordance with certain rules and criteria
that can be set by configuration. The simplest form of protection wall is shown in Figure
below.
MS Windows 7 is the latest desktop operating system from Microsoft, which was built on the
strengths and weaknesses of its predecessor, MS Windows XP and Windows Vista. In
addition to basic system enhancements and new services, MS Windows 7 provides more
security functionality, enhanced auditing, monitoring capacity and the ability to encrypt
personal data and remote connections. MS Windows 7 also has recently developed internal
improvements to protect the internal system such as Service Hardening, Data Execution
Prevention, Address Space Layout Randomization, and required levels of integrity. MS
Windows 7 is designed to be used safely.
Password Protection
BIOS – Prevents BIOS settings from being changed without the appropriate
password
Login – Prevents unauthorized access to the network
Network logins provide a means of logging activity on the network and either preventing or
allowing access to resources. This makes it possible to determine what resources are being
accessed. Usually, the system administrator defines a naming convention for the usernames
when creating network logins. A common example of a username is the first initial of the
person's first name and then the entire last name. You should keep the username naming
convention simple so that people do not have a hard time remembering it. When assigning
passwords, the level of password control should match the level of protection required. A
good security policy should be strictly enforced and include, but not be limited to, the
following rules:
However, there are a few broad areas that can be considered which require protection of
equipment’s. These include:
Facility protection
Strategies must be in place to protect IT equipment from water damage, fire, contamination,
power failure and theft. Some of these strategies include:
o The implementation of early warning systems to detect water leaks, fire and air-borne
contaminants
o Devices to continue power supply should there be a power failure such as a UPS
(uninterruptible power supply) as well as on-site power generation
o Security access to computer facilities such as swipe cards or entry of a security
number
o Recording serial numbers, asset numbers, location and allocation details of
workstations.
Temperature
Electromagnetic interference
All electronic devices are capable of producing electromagnetic interference that can cause
data to be lost, problems with picture quality on monitors, and other problems.
Protection of data — backup
All organisations need strategies in place to:
Backup critical data, and Ensure that data backup is being undertaken according to
organisational policies.
This will involve both server backup and workstation backup
Server backup
Workstation backup
Workstations in an organisation are often standardised with respect to operating system and
common applications. An ‘image’ or ‘build’ is created, making it much easier to restore the
workstation to a re-usable state. There is usually an IT policy that specifies a ‘Standard
Operating Environment’ for workplace PCs. Uncommon, or specific, applications are usually
installed separately after the standard image is loaded.