SlideShare una empresa de Scribd logo
1 de 21
Award: Level 5 Diploma in Computing (L5DC)
Module Title: Network Security and Cryptography
Assignment Title: Together Trust
Examination Cycle: December 2018
Candidate Name: Mojakwe. A Mojakwe
NCC Education Centre: Institute of Development Management,
Botswana
Candidate No: 00173107
Submission Date: 05-11-2018
Marker’s Comment:
Moderator’s comments:
Moderated Mark: ________________ Final mark: _________________________
Network Security and Cryptography December2018
_________________________________________________________________________________________
Action.mjk.mojakwe@gmail.com .IDM.2018
Page 1 of 20
STATEMENT AND CONFIRMATION OF OWN WORK
Each NCC Education accessed assignment submitted by you must have this statement attached
to the assignment as cover page or it will not be accepted for marking. Please insure that this
statement is either firmly attached to the cover of the assignment or electronically inserted into
the front of assignment.
Student Declaration
I have read and understood NCC Education’s Policy on Academic Dishonesty and Plagiarism.
I can confirm the following:
Program/Qualification Name: Level 5 Diploma in Computing (L5DC)
Student ID/Registration number: 00173107
Name: Mojakwe A Mojakwe
Centre Name: Institute of Development Management,
Botswana
Module Name: Network Security and Cryptography
Module Leader: Mr. Tadios Munodawafa
Number of words: 1779
I confirm that this is my own work and that I have not plagiarized any part of it. I have read also
noted the assessment criteria and pass mark for assignment.
Due Date: …………………………………………………………..
Student Signature: …………………………………………………………..
Submitted Date: …………………………………………………………..
_________________________________________________________________________________________
Action.mjk.mojakwe@gmail.com .IDM.2018
Page 2 of 20
Table of Contents
ACKNOWLEDGEMENTS ...................................................................................................................... 3
INTRODUCTION .................................................................................................................................4
Task 1................................................................................................................................................ 5
A) Electronically held information assets ......................................................................................... 5
B) A Table Listing the Assets............................................................................................................ 5
Task 2................................................................................................................................................ 6
a) Threats and Security Measures ...................................................................................................6
b) ISO27001 and Cyber Essentials Relevance.................................................................................... 8
c) Recommendation....................................................................................................................... 9
Task 3.............................................................................................................................................. 10
a) Network Diagram..................................................................................................................... 10
Task 4.............................................................................................................................................. 13
Task 5.............................................................................................................................................. 14
CONCLUSION................................................................................................................................... 14
REFERENCE...................................................................................................................................... 15
PLAGIARISMREPORT ....................................................................................................................... 17
_________________________________________________________________________________________
Action.mjk.mojakwe@gmail.com .IDM.2018
Page 3 of 20
ACKNOWLEDGEMENTS
I would like to thank all those who assisted me in making this project a success. Firstly, I would
like to thank my lecturer Mr. Tadios Munodawafa for all his effort and guidance during the entire
course of this module. My thanks also goes to my classmates for their existence as team working
mates, not forgetting the Almighty God for the time I took for the completion of this assignment.
_________________________________________________________________________________________
Action.mjk.mojakwe@gmail.com .IDM.2018
Page 4 of 20
INTRODUCTION
In this assignment I have been tasked for identification of key security challenges, that Together
Trust is faced and make recommendation for solutions, insuring that measures of security are put
into place in most effective way.
Risk assessment of the most valuable information assets, which is divided into tasks in Network
Security and Cryptography module. I started with Risk assessment in Task 1, explaining Risk
Control in Task 2, Task 3 is a Network Diagram and Maintaining Security in Task 4 as well as
Reflective commentary in Task 5.
_________________________________________________________________________________________
Action.mjk.mojakwe@gmail.com .IDM.2018
Page 5 of 20
Task 1
A) Electronically held information assets
 Patient record data - This information is critical for Trust charity. It's confidentiality,
integrity and availability is of utmost importance.
 Financial systems Records – Financial Information that may be required for its
confidentiality and integrity.
 Radio and Chemo therapies data – Data kept to avoid ad-hoc decisions in a crisis.
 Email - This method of exchanging messages between people using electronic devices
is confidential.
 Employees data - HR professionals have a lot to keep track of Healthcare data, and to
stay Checking compliant. Contact information for the employee directory, Social Security
numbers and pay history.
B) A Table Listing the Assets.
Asset
(a)
Threat
(b)
CIA?
(b)
Likelihood
(c)
Impact
(c)
Risk
(d)
Patient personal
data
Disclosure C Medium Low Low
Disk problem A Low Low Very Low
Fire A Low Medium Low
Pseudonymisation
Technical Failure
C Low Medium Low
Financial systems
records
Unauthorised Access I Low Low Very Low
Disclosure C Low Low Very Low
Modifying Data C Low Low Very Low
Radio and Chemo
Therapies Data
Catastrophic damage A Medium Low Low
Fire A Low Medium Low
E-mails Virus and hacking
attacks
I High Low Medium
Ransomware attack C Medium Medium Medium
Spam, Spyware threats C High High Very
High
Employee’s Data Catastrophic damage A Medium Low Low
Identity theft/
Masquerade
I Low Low Very Low
_________________________________________________________________________________________
Action.mjk.mojakwe@gmail.com .IDM.2018
Page 6 of 20
Task 2
a) Threatsand Security Measures
Disclosure
 Revealing or releasing a private data to an individual who is not authorized to see it.
 I recommend that leaders should avoid having conversation over the phone or via e-
mail. Directly talk to a representative face to face (Kroenke & Tingling, 2011).
Disk problem/Corruption
 Hard disk Corruption malfunctions can happen anytime due to the phishing emails and
virus attacks downloaded by Together Trust users.
 I recommend Onsite and Offsite backups to recover data.
Fire
 Fire can cause loss of important information assets in the trust, it may be caused by
lightening or corrupted electric appliance.
 Proactive fire prevention programs and proper inspection, testing, and maintenance of
fire detection should be carried out.
Pseudonymisation Technical Failure
 Is a technique used to reduce the chance that personal data records and identifiers lead
to the identification of the natural person or data subject, whom they belong to.
 General Data Protection Regulation (GDPR) explicitly recommends pseudonymization of
personal data as one of several ways to reduce risks from the perspective of the data
subject (Cédric & Nédélec, 2018).
Unauthorised Access
Someone gaining access to servers or emails, using one’s else's account or other more
method.
 Authenticator, hardware or software firewall updates and setting up malware protection
is the best.
Modifying Data
 Altering some portion of a legitimate message to produce an unauthorized effect.
 Encryption is necessary to ensure integrity (digitalguardian, 2018).
_________________________________________________________________________________________
Action.mjk.mojakwe@gmail.com .IDM.2018
Page 7 of 20
Catastrophic-damages
 Storms, power-outage, floods, earthquakes, and complete loss of healthcare
infrastructure as well as data systems.
 Digitize and back-up duplicate documents, Physical copies need to be also made and
stored on onsite and offsite backups.
Virus and hacking attacks
 Unauthorised perpetrator deliberately and knowingly attacks a healthcare infrastructure,
components, data and systems.
Viruses refers programs that are executable, replicating and infecting other programs.
 Turning On firewall security, antivirus software, setting up automatic update (Fox News,
2014).
Ransomware attack
 It is a kind of malware that encrypts data, blocking access to it until a fee is paid to the
attacker.
 Prevention is better that cure, the following best practices will help to prevent
ransomware attacks;
o Security awareness training
o updating devices and systems regularly
o Real-time traffic monitoring
o Reliable secure backups and recovery plan (researchgate, 2018).
Spam, Spyware threats
 Spam is a message links sent through the Internet, to large number of emails, with
intention of phishing, advertising, spread of malware.
Spyware is a piece of malware that tricks into installing it by disguising itself as the one
desired.
 Together Trust need to install Vulnerability Scanner, Antispyware Firewall and Intrusion
Detection Systems (bullguard, 2018).
Identity theft
 Capturing authentication sequences and replay after a valid authentication, enabling
authorisation entity of fewer privilege obtaining extra privileges, by impersonating entity
that has right privilege.
 Users should make sure to logout their user accounts after using internet.
Two Factor Authentication (2FA) is needed as an extra layer of protection used to ensure the
security of online accounts beyond just a username and password.
_________________________________________________________________________________________
Action.mjk.mojakwe@gmail.com .IDM.2018
Page 8 of 20
b) ISO27001and Cyber Essentials Relevance
ISO/IEC 27001 is International Standard for Implementing Information Security Management
System (ISMS), while Cyber Essentials guard against the common cyber threats, demonstrating
commitment to cyber security.
1. Risk Management
Regularly review of risk management registers, agreeing with the board for appropriate
measures basically on costs benefit analysis as well as Trust risk tolerance which
complies to ISO 27001 standard Risk assessment.
2. Secure Configuration
Insures patching of systems, installing anti-virus / anti-malware is updated and running,
which complies to ISO 27001 Security policy.
3. Network Security
Preventing unauthorised access to a network and connected devices, through regular
penetration tests of network, monitoring and filtering content, as well as firewalls.
Relating to ISO 27001 Access Control.
4. Malware Prevention
Producing policies and establishing antimalware defence across the Trust, based on
ISO 27001 Organisation of information Security.
5. Removable Media Control
Manages the use of all removable media.
o Policy-based data encryption
o Port management solutions
o Monitoring and reporting
This relate to Access control, Communications and operations management
on ISO 27001.
6. User Education and Awareness
Ensures employees training, and behaviour expected of them. Complies with ISO 27001
Information systems acquisition, development and maintenance.
7. Managing User Privileges
Insures that all users on the system have the correct access privileges, and access
rights for leavers are removed. Complies with Human resources security on ISO 27001.
8. Incident Management
Insures continuity in the event of cyber-attack. Incident Management Policy, Staff
awareness training, Business continuity planning, Disaster recovery systems and
procedures and Secure offsite backup solutions. Complies with ISO 27001 Information
security incident management.
9. Monitoring
Continuously monitoring all systems and Networks, analysing logs for unusual activity
that could indicate an attack and identify a potential issue before it becomes more
serious. Relates to ISO 27001 Compliance.
10.Home and Mobile Working
Ensuring secure remote access solutions and authentication systems.
Mobile Device Management and Cloud Data Encryption. Complies with new and
updated ISO 27001 2013 standard controls (onboardonline and techtarget, 2018).
_________________________________________________________________________________________
Action.mjk.mojakwe@gmail.com .IDM.2018
Page 9 of 20
c) Recommendation
1. Encryption
Together Trust needs to be encrypted using S/MIME encryption process, which supports
encryption of emails through public key technology;
Message-Integrity, Authentication, email Privacy Data Security. For wireless, using the
Wi-Fi protected Access (WPA-2) including AES which is considered a stronger
algorithm.
_________________________________________________________________________________________
Action.mjk.mojakwe@gmail.com .IDM.2018
Page 10 of 20
Task 3
a) Network Diagram
_________________________________________________________________________________________
Action.mjk.mojakwe@gmail.com .IDM.2018
Page 11 of 20
b) The network diagram at (a) Figure 1 above uses class C private IP address ranging from
192.168.0.0 to 192.168.255.255 and DHCP is used to allocate addresses within the Trust
Charity IP network users.
Also firewalls will be configured such that valid IP address are translated into
the appropriate private address through Network Address Translation (NAT).
The diagram consists of the following subnets;
I. Screened Subnet, hosting only servers that need to allow access to and from the
Internet.
II. Shared Services Subnet, hosting internal DNS, Mail, Web, and File or Print Servers.
Includes NIDS with SPAN configuration to protect the segment services.
III. Application Subnet, providing extra layer of defence against attacks on critical assets.
IV. Management Subnet, defining Access Control Lists (ACLs) on appropriate devices
(e.g. firewalls, switches, routers and hosts) denying administration access by any
device that is not defined to the Subnet.
c) Network design meets the security requirements identified in Tasks 1 & 2 since;
I. Border router is installed generally to be the first line of network defence, to define a
limited set of high level rules in the router’s Access Control List (ACL).
II. De-Militarized Zone (DMZ), containing a hub communicating with a Network Intrusion
Detection System (NIDS) and Bastion host designed and configured to withstand
attacks.
III. Firewall is installed providing a secured network.
IV. Distribution level Routers or the access layer Switches connecting hosts (servers,
workstations) are connected making sure other security features; Port Security, VLANs
can easily be configured, through communication with servers, which is less vulnerable
compared to WIFI.
V. A Screened Subnet DMZ, contains DNS server, web server as well as mail server is
available to protect sensitive organizational systems, resources and blocking the most
casual threats.
Screened subnetwork refers to logical or physical subneting that separate internal local
area network (LAN) from an untrusted networks, usually internet.
Also has a NIDS.
VI. Also has a NIDS installed on Shared Services Subnet, Application Subnet as well as
Screened Subnet which is similar to activated security alarm system, watching for
known behaviours, indicating suspicious activity and systems break-ins. NIDS sensor is
usually connected to a hub, tap, or Switch Port Analyser (SPAN).
_________________________________________________________________________________________
Action.mjk.mojakwe@gmail.com .IDM.2018
Page 12 of 20
VII. The Console installed at Management Subnet, used for remote administration of device
or hosts in the other various subnets. Ideally SSH or Telnet (through a VPN) would be
used for the remote administration of network devices (Margaret Rouse & Shricha,
2015).
_________________________________________________________________________________________
Action.mjk.mojakwe@gmail.com .IDM.2018
Page 13 of 20
Task 4
A good policy is to keep computers and wireless network secure to protect Together Trust’s
critical data.
 Auditing Network Regularly- Periodic scan should be done in order to identify
unauthorized computers and devices that may have accessed the network through
wireless or directly.
 Updating Operating System Patches - Updating Computer Operating System security
patches may help prevent malware and viruses from the Trust data operating system or
network.
 Updating Malware Definitions and Antivirus - Making sure and confirming up-to-date
Malware definitions and Antivirus. This protects computer from attacks and maintain the
network security.
 Establishing Wireless Devices Policy – Ensuring that devices maintain same security
standards of Trust computers through staff training.
 Checking Firewall Security Settings - Ensuring the protection of the Trust from recent
viruses, worms as well as hackers, through firewall settings (Zorro, 2012).
_________________________________________________________________________________________
Action.mjk.mojakwe@gmail.com .IDM.2018
Page 14 of 20
Task 5
a) Problems I had and how solved them.
I had challenges throughout this assignment, I had a network issue when i
wanted to do a research which led me to visit different libraries and websites for
more research.
It was difficult to find important points from the research due to the limitation of
words, and I had to paraphrase my assignment based on its requirements.
It was difficult to use MS Visio, Edraw software since it was my first time to use
them. I ended up designing on Adobe Illustrator, designing some icons from
scratch so that I have them as PNG files.
b) If I were to start again, I would definitely do;
 Will buy a network router from Orange, so that I do my research even at
home.
 Find activated MS Visio and Edraw software for my Diagram.
 Design my diagram on A3 paper size so that I can identify more robust
encryption protocols compared to the ones chosen in this article.
CONCLUSION
In conclusion, this assignment gave me a complete knowledge of understanding all Network
Security and Cryptography components, security maintenance, risk control and assessment.
Network Security is used nowadays in order protect or encrypt files or documents
This module gave mea solid foundation in Network Security, Cryptography skills since I am eager
to learn and have advanced technology of Network Security and Cryptography knowledge and
skills.
_________________________________________________________________________________________
Action.mjk.mojakwe@gmail.com .IDM.2018
Page 15 of 20
REFERENCE
1. Bullguard (2018). Bullguard security center. [online] Spyware threat to online
privacy. Available from: https://www.bullguard.com/bullguard-security-
center/internet-security/internet-threats/spyware-threat-to-online-privacy.aspx/
[Accessed 27 September 2018].
2. Christopher, J.A. and Audrey, D. (2002). Managing Information Security Risks.
Addison-Wesley Longman Publishing Co., Inc.
3. csoonline (2018). 10 ways to prevent, detect and recover from ransomware and
zero day threats. [online] Ransomware. Available from:
https://www.csoonline.com/article/3287099/ransomware/10-ways-to-prevent-
detect-and-recover-from-ransomware-and-zeroday-threats.html/ [Accessed 27
September 2018].
4. European Union, Data Protection Working Party (2014) Opinion 05/2014:
Anonymisation Techniques. 55654346. Europa: Practical Law. Available from
https://www.pdpjournals.com/docs/88197.pdf [Accessed 17 September 2018].
5. Kroenke, D.M., Gemino, A., Tingling, P. (2011). Experiencing MIS (Third
Canadian Edition). New Jersey: Pearson Education Inc.
6. Ncsc. (2018). Cyber Essentials. [online] National Cyber Security Centre.
Available from: https://www.cyberessentials.ncsc.gov.uk/ [Accessed 23
September 2018].
7. Networkmagazineindia (2018). Identifying and classifying assets. [online]
Security. Available from:
http://www.networkmagazineindia.com/200212/security2.shtml/ [Accessed 27
September 2018].
8. Novastor. (2018). Top 6 data loss causes and top 10 preventions. [online]
Novabackup blog. Available from: http://novabackup.novastor.com/blog/top-6-
data-loss-causes-and-top-10-preventions/ [Accessed 18 September 2018].
_________________________________________________________________________________________
Action.mjk.mojakwe@gmail.com .IDM.2018
Page 16 of 20
9. Onboardonline (2018). Industry article index. [online] 10 steps to cyber security.
Available from: https://www.onboardonline.com/industry-article-
index/features/10-steps-to-cyber-security/ [Accessed 29 September 2018].
10.Researchgate. (2018). Ransomware attacks detection, prevention and cure.
[online] ResearchGate Publication. Available from:
https://www.researchgate.net/publication/308736523_Ransomware_attacks_det
ection_prevention_and_cure [accessed Sep 19 2018].
11.S3 amazonaws. (2018). Risk Terminology [online]. Emerald Group Publishing
Limited. Available from: https://ss-
usa.s3.amazonaws.com/c/308451531/media/58a2f1495f44c/Risk-
Terminology.pdf [Accessed 7 September 2018].
12.strengtheningnonprofits (2018). Resources. [online] Managing crisis. Available
from: http://www.strengtheningnonprofits.org/resources/e-
learning/online/managingcrisis/default.aspx?chp=4/ [Accessed 28 September
2018].
13.Techtarget (2018). Definition. [online] ISO-27001. Available from:
https://whatis.techtarget.com/definition/ISO-27001/ [Accessed 27 September
2018].
_________________________________________________________________________________________
Action.mjk.mojakwe@gmail.com .IDM.2018
Page 17 of 20
PLAGIARISM REPORT
Turnitin Originality Report
 Processed on: 29-Oct-2018 10:04SAST
 ID: 1028292225
 Word Count: 1920
 Submitted: 3
NSC ASSIGNMENT By Mojakwe Mojakwe
Similarity Index
3%
Similarityby Source
Internet Sources:
N/A
Publications:
N/A
Student Papers:
3%
include quoted exclude bibliography exclude small matches dow nload print
mode:
quickview (classic) report
1% match (student papers from 07-Oct-2015)
Submitted to KMD Computer Center on 2015-10-07
1% match (student papers from 10-Jan-2017)
Submitted to Softwarica College of IT & E-Commerce on 2017-01-10
1% match (student papers from 30-Jun-2018)
Submitted to Champlain College on 2018-06-30
1% match (student papers from 05-May-2017)
Submitted to KMD Computer Center on 2017-05-05
INTRODUCTION In this assignment I have been tasked for identification of key security
challenges, that Together Trust is faced and make recommendation for solutions, insuring
that measures of security are put into place in most effective way. Risk assessment of the
most valuable information assets, which is divided into tasks in Network Security and
Cryptography module. I started with Risk assessment in Task 1, explaining Risk Control in
Task 2, Task 3 is a Network Diagram and Maintaining Security in Task 4 as well as
Reflective commentary in Task 5. A) Electronically held information assets ? Patient record
data - This information is critical for Trust charity. It's confidentiality, integrity and availability
is of utmost importance. ? Financial systems Records – Financial Information that may be
required for its confidentiality and integrity. ? Radio and Chemo therapies data – Data kept
to avoid ad-hoc decisions in a crisis. ? Email - This method of exchanging messages
between people using electronic devices is confidential. ? Employees data - HR
professionals have a lot to keep track of Healthcare data, and to stay Checking compliant.
Contact information for the employee directory, Social Security numbers and pay history. B)
A Table Listing the Assets. Asset (a) Threat (b) CIA? (b) Likelihood (c) Impact (c) Risk (d)
Patient personal Disclosure C Medium Low Low data Disk problem A LowLow Very Low
Fire A Low Medium Low Pseudonymisation Technical Failure C Low Medium Low
Financial systems Unauthorised Access I Low Low Very Low records Disclosure C Low
Low Very Low Modifying Data C Low Low Very Low Radio and Chemo Catastrophic
damage A Medium Low LowTherapies Data Fire A Low Medium Low E-mails Virus and
hacking attacks I High Low Medium Ransomware attack C Medium Medium Medium
Spam, Spyware threats C High High Very High Employee’s Data Catastrophic damage A
Medium Low Low Identity theft/ Masquerade I Low Low Very Low a) Threats and Security
Measures Disclosure • Revealing or releasing a private data to an individual who is not
_________________________________________________________________________________________
Action.mjk.mojakwe@gmail.com .IDM.2018
Page 18 of 20
authorized to see it. • I recommend that leaders should avoid having conversation over the
phone or via e- mail. Directly talk to a representative face to face (Kroenke & Tingling,
2011). Disk problem/Corruption • Hard disk Corruption malfunctions can happen anytime
due to the phishing emails and virus attacks downloaded by Together Trust users. • I
recommend Onsite and Offsite backups to recover data. Fire • Fire can cause loss of
important information assets in the trust, it may be caused by lightening or corrupted electric
appliance. • Proactive fire prevention programs and proper inspection, testing, and
maintenance of fire detection should be carried out. Pseudonymisation Technical Failure •
Is a technique used to reduce the chance that personal data records and identifiers lead to
the identification of the natural person or data subject, whom they belong to. • General Data
Protection Regulation (GDPR) explicitly recommends pseudonymization of personal data as
one of several ways to reduce risks from the perspective of the data subject (Cédric &
Nédélec, 2018). Unauthorised Access Someone gaining access to servers or emails, using
one’s else's account or other more method. • Authenticator, hardware or software firewall
updates and setting up malware protection is the best. Modifying Data • Altering some
portion of a legitimate message to produce an unauthorized effect. • Encryption is
necessary to ensure integrity (digitalguardian, 2018). Catastrophic-damages • Storms,
power-outage, floods, earthquakes, and complete loss of healthcare infrastructure as well
as data systems. • Digitize and back-up duplicate documents, Physical copies need to be
also made and stored on onsite and offsite backups. Virus and hacking attacks •
Unauthorised perpetrator deliberately and knowingly attacks a healthcare infrastructure,
components, data and systems. Viruses refers programs that are executable, replicating
and infecting other programs. • Turning On firewall security, antivirus software, setting up
automatic update (foxnews, 2014). Ransomware attack • It is a kind of malware that
encrypts data, blocking access to it until a fee is paid to the attacker. • Prevention is better
that cure, the following best practices will help to prevent ransomware attacks; o Security
awareness training o updating devices and systems regularly o Real-time traffic monitoring
o Reliable secure backups and recovery plan (researchgate, 2018). Spam, Spyware threats
• Spam is a message links sent through the Internet, to large number of emails, with
intention of phishing, advertising, spread of malware. Spyware is a piece of malware that
tricks into installing it by disguising itself as the one desired. • Together Trust need to install
Vulnerability Scanner, Antispyware Firewall and Intrusion Detection Systems (bullguard,
2018). Identity theft • Capturing authentication sequences and replay after a valid
authentication, enabling authorisation entity of fewer privilege obtaining extra privileges, by
impersonating entity that has right privilege. • Users should make sure to logout their user
accounts after using internet. Two Factor Authentication (2FA) is needed as an extra layer
of protection used to ensure the security of online accounts beyond just a username and
password. b) ISO27001 and Cyber Essentials Relevance ISO/IEC 27001 is International
Standard for Implementing Information Security Management System (ISMS), while Cyber
Essentials guard against the common cyber threats, demonstrating commitment to cyber
security. 1. Risk Management Regularly review of risk management registers, agreeing with
the board for appropriate measures basically on costs benefit analysis as well as Trust risk
tolerance which complies to ISO 27001 standard Risk assessment. 2. Secure Configuration
Insures patching of systems, installing anti-virus / anti-malware is updated and running,
which complies to ISO 27001 Security policy. 3. Network Security Preventing unauthorised
access to a network and connected devices, through regular penetration tests of network,
monitoring and filtering content, as well as firewalls. Relating to ISO 27001 Access Control.
4. Malware Prevention Producing policies and establishing antimalware defence across the
Trust, based on ISO 27001 Organisation of information Security. 5. Removable Media
Control Manages the use of all removable media. o Policy-based data encryption o Port
management solutions o Monitoring and reporting This relate to Access control,
Communications and operations management on ISO 27001. 6. User Education and
Awareness Ensures employees training, and behaviour expected of them. Complies with
ISO 27001 Information systems acquisition, development and maintenance. 7. Managing
User Privileges Insures that all users on the system have the correct access privileges, and
_________________________________________________________________________________________
Action.mjk.mojakwe@gmail.com .IDM.2018
Page 19 of 20
access rights for leavers are removed. Complies with Human resources security on ISO
27001. 8. Incident Management Insures continuity in the event of cyber-attack. Incident
Management Policy, Staff awareness training, Business continuity planning, Disaster
recovery systems and procedures and Secure offsite backup solutions. Complies with ISO
27001 Information security incident management. 9. Monitoring Continuously monitoring all
systems and Networks, analysing logs for unusual activity that could indicate an attack and
identify a potential issue before it becomes more serious. Relates to ISO 27001
Compliance. 10. Home and Mobile Working Ensuring secure remote access solutions and
authentication systems. Mobile Device Management and Cloud Data Encryption. Complies
with new and updated ISO 27001 2013 standard controls (onboardonline and techtarget,
2018). c) Recommendation 1. Encryption Together Trust needs to be encrypted using
S/MIME encryption process, which supports encryption of emails through public key
technology; Message-Integrity, Authentication, email Privacy Data Security. For wireless,
using the Wi-Fi protected Access (WPA-2) including AES which is considered a stronger
algorithm. a) Network Diagram b) The network diagram at (a) Figure 1 above uses class C
private IP address ranging from 192.168.0.0 to 192.168.255.255 and DHCP is used to
allocate addresses within the Trust Charity IP network users. Also firewalls will be
configured such that valid IP address are translated into the appropriate private address
through Network Address Translation (NAT). The diagram consists of the following subnets;
I. Screened Subnet, hosting only servers that need to allow access to and from the Internet.
II. Shared Services Subnet, hosting internal DNS, Mail, Web, and File or Print Servers.
Includes NIDS with SPAN configuration to protect the segment services. III. IV. Application
Subnet, providing extra layer of defence against attacks on critical assets. Management
Subnet, defining Access Control Lists (ACLs) on appropriate devices (e.g. firewalls,
switches, routers and hosts) denying administration access by any device that is not defined
to the Subnet. c) Network design meets the security requirements identified in Tasks 1 & 2
since; I. Border router is installed generally to be the first line of network defence, to define
a limited set of high level rules in the router’s Access Control List (ACL). II. De-Militarized
Zone (DMZ), containing a hub communicating with a Network Intrusion Detection System
(NIDS) and Bastion host designed and configured to withstand attacks. III. IV. V. VI. VII.
Firewall is installed providing a secured network. Distribution level Routers or the access
layer Switches connecting hosts (servers, workstations) are connected making sure other
security features; Port Security, VLANs can easily be configured, through communication
with servers, which is less vulnerable compared to WIFI. A Screened Subnet DMZ, contains
DNS server, web server as well as mail server is available to protect sensitive
organizational systems, resources and blocking the most casual threats. Screened
subnetwork refers to logical or physical subneting that separate internal local area network
(LAN) from an untrusted networks, usually internet. Also has a NIDS. Also has a NIDS
installed on Shared Services Subnet, Application Subnet as well as Screened Subnet which
is similar to activated security alarm system, watching for known behaviours, indicating
suspicious activity and systems break-ins. NIDS sensor is usually connected to a hub, tap,
or Switch Port Analyser (SPAN). The Console installed at Management Subnet, used for
remote administration of device or hosts in the other various subnets. Ideally SSH or Telnet
(through a VPN) would be used for the remote administration of network devices (Margaret
Rouse & Shricha, 2015). A good policy is to keep computers and wireless network secure to
protect Together Trust’s critical data. ? Auditing Network Regularly - Periodic scan should
be done in order to identify unauthorized computers and devices that may have accessed
the network through wireless or directly. ? Updating Operating System Patches - Updating
Computer Operating System security patches may help prevent malware and viruses from
the Trust data operating system or network. ? Updating Malware Definitions and Antivirus -
Making sure and confirming up-to-date Malware definitions and Antivirus. This protects
computer from attacks and maintain the network security. ? Establishing Wireless Devices
Policy – Ensuring that devices maintain same security standards of Trust computers
through staff training. ? Checking Firewall Security Settings - Ensuring the protection of the
Trust from recent viruses, worms as well as hackers, through firewall settings (Zorro, 2012).
_________________________________________________________________________________________
Action.mjk.mojakwe@gmail.com .IDM.2018
Page 20 of 20
a) Problems I had and how solved them. I had challenges throughout this assignment, I had
a network issue when i wanted to do a research which led me to visit different libraries and
websites for more research. It was difficult to find important points from the research due to
the limitation of words, and I had to paraphrase my assignment based on its requirements.
It was difficult to use MS Visio, Edraw software since it was my first time to use them. I
ended up designing on Adobe Illustrator, designing some icons from scratch so that I have
them as PNG files. b) If I were to start again, I would definitely do; ? Will buy a network
router from Orange, so that I do my research even at home. ? Find activated MS Visio and
Edraw software for my Diagram. ? Design my diagram on A3 paper size so that I can
identify more robust encryption protocols compared to the ones chosen in this article. Task
1 Task 2 Task 3 Task 4 Task 5

Más contenido relacionado

La actualidad más candente

Cyber security career development paths
Cyber security career development pathsCyber security career development paths
Cyber security career development pathsChelsea Jarvie
 
Cybersecurity in the Boardroom
Cybersecurity in the BoardroomCybersecurity in the Boardroom
Cybersecurity in the BoardroomMarko Suswanto
 
Chapter 06 risk_management_identifying_and_assessing_risk
Chapter 06 risk_management_identifying_and_assessing_riskChapter 06 risk_management_identifying_and_assessing_risk
Chapter 06 risk_management_identifying_and_assessing_riskhusseinalshomali
 
2023 Ivanti August Patch Tuesday
2023 Ivanti August Patch Tuesday2023 Ivanti August Patch Tuesday
2023 Ivanti August Patch TuesdayIvanti
 
Chapter 1 Introduction to Security
Chapter 1 Introduction to SecurityChapter 1 Introduction to Security
Chapter 1 Introduction to SecurityDr. Ahmed Al Zaidy
 
1 understanding cyber threats
1   understanding cyber threats 1   understanding cyber threats
1 understanding cyber threats mohamad Hamizi
 
Understanding and complying with RBI’s Cyber security guidelines for Email sy...
Understanding and complying with RBI’s Cyber security guidelines for Email sy...Understanding and complying with RBI’s Cyber security guidelines for Email sy...
Understanding and complying with RBI’s Cyber security guidelines for Email sy...Vaultastic
 
Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?
Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?
Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?PECB
 
Cybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurityCybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecuritysommerville-videos
 
How To Handle Cybersecurity Risk PowerPoint Presentation Slides
How To Handle Cybersecurity Risk PowerPoint Presentation SlidesHow To Handle Cybersecurity Risk PowerPoint Presentation Slides
How To Handle Cybersecurity Risk PowerPoint Presentation SlidesSlideTeam
 
Service Organizational Control (SOC 2) Compliance - Kloudlearn
Service Organizational Control  (SOC 2) Compliance - KloudlearnService Organizational Control  (SOC 2) Compliance - Kloudlearn
Service Organizational Control (SOC 2) Compliance - KloudlearnKloudLearn
 
Chapter 07 risk_management_controlling_risk
Chapter 07 risk_management_controlling_riskChapter 07 risk_management_controlling_risk
Chapter 07 risk_management_controlling_riskhusseinalshomali
 
Implementing cybersecurity best practices and new technology ppt (1).pptx
Implementing cybersecurity best practices and new technology ppt (1).pptxImplementing cybersecurity best practices and new technology ppt (1).pptx
Implementing cybersecurity best practices and new technology ppt (1).pptxdamilolasunmola
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security GovernancePriyanka Aash
 
Chapter 10: Information Systems Acquisition, Development, and Maintenance
			Chapter 10:  Information  Systems Acquisition, Development, and Maintenance			Chapter 10:  Information  Systems Acquisition, Development, and Maintenance
Chapter 10: Information Systems Acquisition, Development, and MaintenanceNada G.Youssef
 
Information Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn HospitalInformation Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn HospitalAtlantic Training, LLC.
 

La actualidad más candente (20)

Cyber security career development paths
Cyber security career development pathsCyber security career development paths
Cyber security career development paths
 
Cybersecurity in the Boardroom
Cybersecurity in the BoardroomCybersecurity in the Boardroom
Cybersecurity in the Boardroom
 
Chapter 06 risk_management_identifying_and_assessing_risk
Chapter 06 risk_management_identifying_and_assessing_riskChapter 06 risk_management_identifying_and_assessing_risk
Chapter 06 risk_management_identifying_and_assessing_risk
 
2023 Ivanti August Patch Tuesday
2023 Ivanti August Patch Tuesday2023 Ivanti August Patch Tuesday
2023 Ivanti August Patch Tuesday
 
Domain 1 - Security and Risk Management
Domain 1 - Security and Risk ManagementDomain 1 - Security and Risk Management
Domain 1 - Security and Risk Management
 
Chapter 1 Introduction to Security
Chapter 1 Introduction to SecurityChapter 1 Introduction to Security
Chapter 1 Introduction to Security
 
1 understanding cyber threats
1   understanding cyber threats 1   understanding cyber threats
1 understanding cyber threats
 
Understanding and complying with RBI’s Cyber security guidelines for Email sy...
Understanding and complying with RBI’s Cyber security guidelines for Email sy...Understanding and complying with RBI’s Cyber security guidelines for Email sy...
Understanding and complying with RBI’s Cyber security guidelines for Email sy...
 
Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?
Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?
Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?
 
Cybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurityCybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurity
 
How To Handle Cybersecurity Risk PowerPoint Presentation Slides
How To Handle Cybersecurity Risk PowerPoint Presentation SlidesHow To Handle Cybersecurity Risk PowerPoint Presentation Slides
How To Handle Cybersecurity Risk PowerPoint Presentation Slides
 
Whitman_Ch06.pptx
Whitman_Ch06.pptxWhitman_Ch06.pptx
Whitman_Ch06.pptx
 
Service Organizational Control (SOC 2) Compliance - Kloudlearn
Service Organizational Control  (SOC 2) Compliance - KloudlearnService Organizational Control  (SOC 2) Compliance - Kloudlearn
Service Organizational Control (SOC 2) Compliance - Kloudlearn
 
Hackers
HackersHackers
Hackers
 
Chapter 07 risk_management_controlling_risk
Chapter 07 risk_management_controlling_riskChapter 07 risk_management_controlling_risk
Chapter 07 risk_management_controlling_risk
 
Implementing cybersecurity best practices and new technology ppt (1).pptx
Implementing cybersecurity best practices and new technology ppt (1).pptxImplementing cybersecurity best practices and new technology ppt (1).pptx
Implementing cybersecurity best practices and new technology ppt (1).pptx
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security Governance
 
Module 3-cyber security
Module 3-cyber securityModule 3-cyber security
Module 3-cyber security
 
Chapter 10: Information Systems Acquisition, Development, and Maintenance
			Chapter 10:  Information  Systems Acquisition, Development, and Maintenance			Chapter 10:  Information  Systems Acquisition, Development, and Maintenance
Chapter 10: Information Systems Acquisition, Development, and Maintenance
 
Information Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn HospitalInformation Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn Hospital
 

Similar a Network security and cryptography 2018

Key note in nyc the next breach target and how oracle can help - nyoug
Key note in nyc   the next breach target and how oracle can help - nyougKey note in nyc   the next breach target and how oracle can help - nyoug
Key note in nyc the next breach target and how oracle can help - nyougUlf Mattsson
 
A Comprehensive Review of Cyber Security, Threats and Cyber Attacks
A Comprehensive Review of Cyber Security, Threats and Cyber AttacksA Comprehensive Review of Cyber Security, Threats and Cyber Attacks
A Comprehensive Review of Cyber Security, Threats and Cyber AttacksIRJET Journal
 
Corporate Cybersecurity: A Serious Game
Corporate Cybersecurity: A Serious GameCorporate Cybersecurity: A Serious Game
Corporate Cybersecurity: A Serious GameTatainteractive1
 
Examining the emerging threat of Phishing and DDoS attacks using Machine Lear...
Examining the emerging threat of Phishing and DDoS attacks using Machine Lear...Examining the emerging threat of Phishing and DDoS attacks using Machine Lear...
Examining the emerging threat of Phishing and DDoS attacks using Machine Lear...IRJET Journal
 
Running Head DATA BREACH 1DATA BREACH 3Data Breach Whit.docx
Running Head DATA BREACH 1DATA BREACH 3Data Breach Whit.docxRunning Head DATA BREACH 1DATA BREACH 3Data Breach Whit.docx
Running Head DATA BREACH 1DATA BREACH 3Data Breach Whit.docxtodd271
 
Cybersecurity vs Data Science A Roadmap.pptx
Cybersecurity vs Data Science A Roadmap.pptxCybersecurity vs Data Science A Roadmap.pptx
Cybersecurity vs Data Science A Roadmap.pptxInfosectrain3
 
Cybersecurity vs Data Science A Roadmap.pptx
Cybersecurity vs Data Science A Roadmap.pptxCybersecurity vs Data Science A Roadmap.pptx
Cybersecurity vs Data Science A Roadmap.pptxInfosectrain3
 
Securing And Protecting Information
Securing And Protecting InformationSecuring And Protecting Information
Securing And Protecting InformationLaura Martin
 
A SYSTEMATIC REVIEW ON MACHINE LEARNING INSIDER THREAT DETECTION MODELS, DATA...
A SYSTEMATIC REVIEW ON MACHINE LEARNING INSIDER THREAT DETECTION MODELS, DATA...A SYSTEMATIC REVIEW ON MACHINE LEARNING INSIDER THREAT DETECTION MODELS, DATA...
A SYSTEMATIC REVIEW ON MACHINE LEARNING INSIDER THREAT DETECTION MODELS, DATA...IJNSA Journal
 
IDG 2020 Security Priorities Research
IDG 2020 Security Priorities ResearchIDG 2020 Security Priorities Research
IDG 2020 Security Priorities ResearchIDG
 
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...Social Media Privacy Protection for Blockchain with Cyber Security Prediction...
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...IRJET Journal
 
Cybersecurity Challenges in the Modern Digital Landscape.docx
Cybersecurity Challenges in the Modern Digital Landscape.docxCybersecurity Challenges in the Modern Digital Landscape.docx
Cybersecurity Challenges in the Modern Digital Landscape.docxPelorusTechnologies
 
Cyber Attacks and Crimes in Cyber Security: A Comparative Analysis
Cyber Attacks and Crimes in Cyber Security: A Comparative AnalysisCyber Attacks and Crimes in Cyber Security: A Comparative Analysis
Cyber Attacks and Crimes in Cyber Security: A Comparative AnalysisIRJET Journal
 
How close is your organization to being breached | Safe Security
How close is your organization to being breached | Safe SecurityHow close is your organization to being breached | Safe Security
How close is your organization to being breached | Safe SecurityRahul Tyagi
 
Boardroom to War Room: Practical Application of the NIST Cybersecurity Frame...
Boardroom to War Room:  Practical Application of the NIST Cybersecurity Frame...Boardroom to War Room:  Practical Application of the NIST Cybersecurity Frame...
Boardroom to War Room: Practical Application of the NIST Cybersecurity Frame...robbiesamuel
 
Credential Harvesting Using Man in the Middle Attack via Social Engineering
Credential Harvesting Using Man in the Middle Attack via Social EngineeringCredential Harvesting Using Man in the Middle Attack via Social Engineering
Credential Harvesting Using Man in the Middle Attack via Social EngineeringIRJET Journal
 

Similar a Network security and cryptography 2018 (20)

Key note in nyc the next breach target and how oracle can help - nyoug
Key note in nyc   the next breach target and how oracle can help - nyougKey note in nyc   the next breach target and how oracle can help - nyoug
Key note in nyc the next breach target and how oracle can help - nyoug
 
A Comprehensive Review of Cyber Security, Threats and Cyber Attacks
A Comprehensive Review of Cyber Security, Threats and Cyber AttacksA Comprehensive Review of Cyber Security, Threats and Cyber Attacks
A Comprehensive Review of Cyber Security, Threats and Cyber Attacks
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
GITA March 2015 Newsletter
GITA March 2015 NewsletterGITA March 2015 Newsletter
GITA March 2015 Newsletter
 
Corporate Cybersecurity: A Serious Game
Corporate Cybersecurity: A Serious GameCorporate Cybersecurity: A Serious Game
Corporate Cybersecurity: A Serious Game
 
Examining the emerging threat of Phishing and DDoS attacks using Machine Lear...
Examining the emerging threat of Phishing and DDoS attacks using Machine Lear...Examining the emerging threat of Phishing and DDoS attacks using Machine Lear...
Examining the emerging threat of Phishing and DDoS attacks using Machine Lear...
 
Running Head DATA BREACH 1DATA BREACH 3Data Breach Whit.docx
Running Head DATA BREACH 1DATA BREACH 3Data Breach Whit.docxRunning Head DATA BREACH 1DATA BREACH 3Data Breach Whit.docx
Running Head DATA BREACH 1DATA BREACH 3Data Breach Whit.docx
 
Cybersecurity vs Data Science A Roadmap.pptx
Cybersecurity vs Data Science A Roadmap.pptxCybersecurity vs Data Science A Roadmap.pptx
Cybersecurity vs Data Science A Roadmap.pptx
 
Cybersecurity vs Data Science A Roadmap.pptx
Cybersecurity vs Data Science A Roadmap.pptxCybersecurity vs Data Science A Roadmap.pptx
Cybersecurity vs Data Science A Roadmap.pptx
 
Securing And Protecting Information
Securing And Protecting InformationSecuring And Protecting Information
Securing And Protecting Information
 
A SYSTEMATIC REVIEW ON MACHINE LEARNING INSIDER THREAT DETECTION MODELS, DATA...
A SYSTEMATIC REVIEW ON MACHINE LEARNING INSIDER THREAT DETECTION MODELS, DATA...A SYSTEMATIC REVIEW ON MACHINE LEARNING INSIDER THREAT DETECTION MODELS, DATA...
A SYSTEMATIC REVIEW ON MACHINE LEARNING INSIDER THREAT DETECTION MODELS, DATA...
 
IDG 2020 Security Priorities Research
IDG 2020 Security Priorities ResearchIDG 2020 Security Priorities Research
IDG 2020 Security Priorities Research
 
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...Social Media Privacy Protection for Blockchain with Cyber Security Prediction...
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...
 
Cybersecurity Challenges in the Modern Digital Landscape.docx
Cybersecurity Challenges in the Modern Digital Landscape.docxCybersecurity Challenges in the Modern Digital Landscape.docx
Cybersecurity Challenges in the Modern Digital Landscape.docx
 
Cyber Attacks and Crimes in Cyber Security: A Comparative Analysis
Cyber Attacks and Crimes in Cyber Security: A Comparative AnalysisCyber Attacks and Crimes in Cyber Security: A Comparative Analysis
Cyber Attacks and Crimes in Cyber Security: A Comparative Analysis
 
How close is your organization to being breached | Safe Security
How close is your organization to being breached | Safe SecurityHow close is your organization to being breached | Safe Security
How close is your organization to being breached | Safe Security
 
Cyber threat forecast 2018..
Cyber threat forecast 2018..Cyber threat forecast 2018..
Cyber threat forecast 2018..
 
Boardroom to War Room: Practical Application of the NIST Cybersecurity Frame...
Boardroom to War Room:  Practical Application of the NIST Cybersecurity Frame...Boardroom to War Room:  Practical Application of the NIST Cybersecurity Frame...
Boardroom to War Room: Practical Application of the NIST Cybersecurity Frame...
 
Data Breach Guide 2013
Data Breach Guide 2013Data Breach Guide 2013
Data Breach Guide 2013
 
Credential Harvesting Using Man in the Middle Attack via Social Engineering
Credential Harvesting Using Man in the Middle Attack via Social EngineeringCredential Harvesting Using Man in the Middle Attack via Social Engineering
Credential Harvesting Using Man in the Middle Attack via Social Engineering
 

Último

Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Principled Technologies
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024The Digital Insurer
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 

Último (20)

Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 

Network security and cryptography 2018

  • 1. Award: Level 5 Diploma in Computing (L5DC) Module Title: Network Security and Cryptography Assignment Title: Together Trust Examination Cycle: December 2018 Candidate Name: Mojakwe. A Mojakwe NCC Education Centre: Institute of Development Management, Botswana Candidate No: 00173107 Submission Date: 05-11-2018 Marker’s Comment: Moderator’s comments: Moderated Mark: ________________ Final mark: _________________________ Network Security and Cryptography December2018
  • 2. _________________________________________________________________________________________ Action.mjk.mojakwe@gmail.com .IDM.2018 Page 1 of 20 STATEMENT AND CONFIRMATION OF OWN WORK Each NCC Education accessed assignment submitted by you must have this statement attached to the assignment as cover page or it will not be accepted for marking. Please insure that this statement is either firmly attached to the cover of the assignment or electronically inserted into the front of assignment. Student Declaration I have read and understood NCC Education’s Policy on Academic Dishonesty and Plagiarism. I can confirm the following: Program/Qualification Name: Level 5 Diploma in Computing (L5DC) Student ID/Registration number: 00173107 Name: Mojakwe A Mojakwe Centre Name: Institute of Development Management, Botswana Module Name: Network Security and Cryptography Module Leader: Mr. Tadios Munodawafa Number of words: 1779 I confirm that this is my own work and that I have not plagiarized any part of it. I have read also noted the assessment criteria and pass mark for assignment. Due Date: ………………………………………………………….. Student Signature: ………………………………………………………….. Submitted Date: …………………………………………………………..
  • 3. _________________________________________________________________________________________ Action.mjk.mojakwe@gmail.com .IDM.2018 Page 2 of 20 Table of Contents ACKNOWLEDGEMENTS ...................................................................................................................... 3 INTRODUCTION .................................................................................................................................4 Task 1................................................................................................................................................ 5 A) Electronically held information assets ......................................................................................... 5 B) A Table Listing the Assets............................................................................................................ 5 Task 2................................................................................................................................................ 6 a) Threats and Security Measures ...................................................................................................6 b) ISO27001 and Cyber Essentials Relevance.................................................................................... 8 c) Recommendation....................................................................................................................... 9 Task 3.............................................................................................................................................. 10 a) Network Diagram..................................................................................................................... 10 Task 4.............................................................................................................................................. 13 Task 5.............................................................................................................................................. 14 CONCLUSION................................................................................................................................... 14 REFERENCE...................................................................................................................................... 15 PLAGIARISMREPORT ....................................................................................................................... 17
  • 4. _________________________________________________________________________________________ Action.mjk.mojakwe@gmail.com .IDM.2018 Page 3 of 20 ACKNOWLEDGEMENTS I would like to thank all those who assisted me in making this project a success. Firstly, I would like to thank my lecturer Mr. Tadios Munodawafa for all his effort and guidance during the entire course of this module. My thanks also goes to my classmates for their existence as team working mates, not forgetting the Almighty God for the time I took for the completion of this assignment.
  • 5. _________________________________________________________________________________________ Action.mjk.mojakwe@gmail.com .IDM.2018 Page 4 of 20 INTRODUCTION In this assignment I have been tasked for identification of key security challenges, that Together Trust is faced and make recommendation for solutions, insuring that measures of security are put into place in most effective way. Risk assessment of the most valuable information assets, which is divided into tasks in Network Security and Cryptography module. I started with Risk assessment in Task 1, explaining Risk Control in Task 2, Task 3 is a Network Diagram and Maintaining Security in Task 4 as well as Reflective commentary in Task 5.
  • 6. _________________________________________________________________________________________ Action.mjk.mojakwe@gmail.com .IDM.2018 Page 5 of 20 Task 1 A) Electronically held information assets  Patient record data - This information is critical for Trust charity. It's confidentiality, integrity and availability is of utmost importance.  Financial systems Records – Financial Information that may be required for its confidentiality and integrity.  Radio and Chemo therapies data – Data kept to avoid ad-hoc decisions in a crisis.  Email - This method of exchanging messages between people using electronic devices is confidential.  Employees data - HR professionals have a lot to keep track of Healthcare data, and to stay Checking compliant. Contact information for the employee directory, Social Security numbers and pay history. B) A Table Listing the Assets. Asset (a) Threat (b) CIA? (b) Likelihood (c) Impact (c) Risk (d) Patient personal data Disclosure C Medium Low Low Disk problem A Low Low Very Low Fire A Low Medium Low Pseudonymisation Technical Failure C Low Medium Low Financial systems records Unauthorised Access I Low Low Very Low Disclosure C Low Low Very Low Modifying Data C Low Low Very Low Radio and Chemo Therapies Data Catastrophic damage A Medium Low Low Fire A Low Medium Low E-mails Virus and hacking attacks I High Low Medium Ransomware attack C Medium Medium Medium Spam, Spyware threats C High High Very High Employee’s Data Catastrophic damage A Medium Low Low Identity theft/ Masquerade I Low Low Very Low
  • 7. _________________________________________________________________________________________ Action.mjk.mojakwe@gmail.com .IDM.2018 Page 6 of 20 Task 2 a) Threatsand Security Measures Disclosure  Revealing or releasing a private data to an individual who is not authorized to see it.  I recommend that leaders should avoid having conversation over the phone or via e- mail. Directly talk to a representative face to face (Kroenke & Tingling, 2011). Disk problem/Corruption  Hard disk Corruption malfunctions can happen anytime due to the phishing emails and virus attacks downloaded by Together Trust users.  I recommend Onsite and Offsite backups to recover data. Fire  Fire can cause loss of important information assets in the trust, it may be caused by lightening or corrupted electric appliance.  Proactive fire prevention programs and proper inspection, testing, and maintenance of fire detection should be carried out. Pseudonymisation Technical Failure  Is a technique used to reduce the chance that personal data records and identifiers lead to the identification of the natural person or data subject, whom they belong to.  General Data Protection Regulation (GDPR) explicitly recommends pseudonymization of personal data as one of several ways to reduce risks from the perspective of the data subject (Cédric & Nédélec, 2018). Unauthorised Access Someone gaining access to servers or emails, using one’s else's account or other more method.  Authenticator, hardware or software firewall updates and setting up malware protection is the best. Modifying Data  Altering some portion of a legitimate message to produce an unauthorized effect.  Encryption is necessary to ensure integrity (digitalguardian, 2018).
  • 8. _________________________________________________________________________________________ Action.mjk.mojakwe@gmail.com .IDM.2018 Page 7 of 20 Catastrophic-damages  Storms, power-outage, floods, earthquakes, and complete loss of healthcare infrastructure as well as data systems.  Digitize and back-up duplicate documents, Physical copies need to be also made and stored on onsite and offsite backups. Virus and hacking attacks  Unauthorised perpetrator deliberately and knowingly attacks a healthcare infrastructure, components, data and systems. Viruses refers programs that are executable, replicating and infecting other programs.  Turning On firewall security, antivirus software, setting up automatic update (Fox News, 2014). Ransomware attack  It is a kind of malware that encrypts data, blocking access to it until a fee is paid to the attacker.  Prevention is better that cure, the following best practices will help to prevent ransomware attacks; o Security awareness training o updating devices and systems regularly o Real-time traffic monitoring o Reliable secure backups and recovery plan (researchgate, 2018). Spam, Spyware threats  Spam is a message links sent through the Internet, to large number of emails, with intention of phishing, advertising, spread of malware. Spyware is a piece of malware that tricks into installing it by disguising itself as the one desired.  Together Trust need to install Vulnerability Scanner, Antispyware Firewall and Intrusion Detection Systems (bullguard, 2018). Identity theft  Capturing authentication sequences and replay after a valid authentication, enabling authorisation entity of fewer privilege obtaining extra privileges, by impersonating entity that has right privilege.  Users should make sure to logout their user accounts after using internet. Two Factor Authentication (2FA) is needed as an extra layer of protection used to ensure the security of online accounts beyond just a username and password.
  • 9. _________________________________________________________________________________________ Action.mjk.mojakwe@gmail.com .IDM.2018 Page 8 of 20 b) ISO27001and Cyber Essentials Relevance ISO/IEC 27001 is International Standard for Implementing Information Security Management System (ISMS), while Cyber Essentials guard against the common cyber threats, demonstrating commitment to cyber security. 1. Risk Management Regularly review of risk management registers, agreeing with the board for appropriate measures basically on costs benefit analysis as well as Trust risk tolerance which complies to ISO 27001 standard Risk assessment. 2. Secure Configuration Insures patching of systems, installing anti-virus / anti-malware is updated and running, which complies to ISO 27001 Security policy. 3. Network Security Preventing unauthorised access to a network and connected devices, through regular penetration tests of network, monitoring and filtering content, as well as firewalls. Relating to ISO 27001 Access Control. 4. Malware Prevention Producing policies and establishing antimalware defence across the Trust, based on ISO 27001 Organisation of information Security. 5. Removable Media Control Manages the use of all removable media. o Policy-based data encryption o Port management solutions o Monitoring and reporting This relate to Access control, Communications and operations management on ISO 27001. 6. User Education and Awareness Ensures employees training, and behaviour expected of them. Complies with ISO 27001 Information systems acquisition, development and maintenance. 7. Managing User Privileges Insures that all users on the system have the correct access privileges, and access rights for leavers are removed. Complies with Human resources security on ISO 27001. 8. Incident Management Insures continuity in the event of cyber-attack. Incident Management Policy, Staff awareness training, Business continuity planning, Disaster recovery systems and procedures and Secure offsite backup solutions. Complies with ISO 27001 Information security incident management. 9. Monitoring Continuously monitoring all systems and Networks, analysing logs for unusual activity that could indicate an attack and identify a potential issue before it becomes more serious. Relates to ISO 27001 Compliance. 10.Home and Mobile Working Ensuring secure remote access solutions and authentication systems. Mobile Device Management and Cloud Data Encryption. Complies with new and updated ISO 27001 2013 standard controls (onboardonline and techtarget, 2018).
  • 10. _________________________________________________________________________________________ Action.mjk.mojakwe@gmail.com .IDM.2018 Page 9 of 20 c) Recommendation 1. Encryption Together Trust needs to be encrypted using S/MIME encryption process, which supports encryption of emails through public key technology; Message-Integrity, Authentication, email Privacy Data Security. For wireless, using the Wi-Fi protected Access (WPA-2) including AES which is considered a stronger algorithm.
  • 12. _________________________________________________________________________________________ Action.mjk.mojakwe@gmail.com .IDM.2018 Page 11 of 20 b) The network diagram at (a) Figure 1 above uses class C private IP address ranging from 192.168.0.0 to 192.168.255.255 and DHCP is used to allocate addresses within the Trust Charity IP network users. Also firewalls will be configured such that valid IP address are translated into the appropriate private address through Network Address Translation (NAT). The diagram consists of the following subnets; I. Screened Subnet, hosting only servers that need to allow access to and from the Internet. II. Shared Services Subnet, hosting internal DNS, Mail, Web, and File or Print Servers. Includes NIDS with SPAN configuration to protect the segment services. III. Application Subnet, providing extra layer of defence against attacks on critical assets. IV. Management Subnet, defining Access Control Lists (ACLs) on appropriate devices (e.g. firewalls, switches, routers and hosts) denying administration access by any device that is not defined to the Subnet. c) Network design meets the security requirements identified in Tasks 1 & 2 since; I. Border router is installed generally to be the first line of network defence, to define a limited set of high level rules in the router’s Access Control List (ACL). II. De-Militarized Zone (DMZ), containing a hub communicating with a Network Intrusion Detection System (NIDS) and Bastion host designed and configured to withstand attacks. III. Firewall is installed providing a secured network. IV. Distribution level Routers or the access layer Switches connecting hosts (servers, workstations) are connected making sure other security features; Port Security, VLANs can easily be configured, through communication with servers, which is less vulnerable compared to WIFI. V. A Screened Subnet DMZ, contains DNS server, web server as well as mail server is available to protect sensitive organizational systems, resources and blocking the most casual threats. Screened subnetwork refers to logical or physical subneting that separate internal local area network (LAN) from an untrusted networks, usually internet. Also has a NIDS. VI. Also has a NIDS installed on Shared Services Subnet, Application Subnet as well as Screened Subnet which is similar to activated security alarm system, watching for known behaviours, indicating suspicious activity and systems break-ins. NIDS sensor is usually connected to a hub, tap, or Switch Port Analyser (SPAN).
  • 13. _________________________________________________________________________________________ Action.mjk.mojakwe@gmail.com .IDM.2018 Page 12 of 20 VII. The Console installed at Management Subnet, used for remote administration of device or hosts in the other various subnets. Ideally SSH or Telnet (through a VPN) would be used for the remote administration of network devices (Margaret Rouse & Shricha, 2015).
  • 14. _________________________________________________________________________________________ Action.mjk.mojakwe@gmail.com .IDM.2018 Page 13 of 20 Task 4 A good policy is to keep computers and wireless network secure to protect Together Trust’s critical data.  Auditing Network Regularly- Periodic scan should be done in order to identify unauthorized computers and devices that may have accessed the network through wireless or directly.  Updating Operating System Patches - Updating Computer Operating System security patches may help prevent malware and viruses from the Trust data operating system or network.  Updating Malware Definitions and Antivirus - Making sure and confirming up-to-date Malware definitions and Antivirus. This protects computer from attacks and maintain the network security.  Establishing Wireless Devices Policy – Ensuring that devices maintain same security standards of Trust computers through staff training.  Checking Firewall Security Settings - Ensuring the protection of the Trust from recent viruses, worms as well as hackers, through firewall settings (Zorro, 2012).
  • 15. _________________________________________________________________________________________ Action.mjk.mojakwe@gmail.com .IDM.2018 Page 14 of 20 Task 5 a) Problems I had and how solved them. I had challenges throughout this assignment, I had a network issue when i wanted to do a research which led me to visit different libraries and websites for more research. It was difficult to find important points from the research due to the limitation of words, and I had to paraphrase my assignment based on its requirements. It was difficult to use MS Visio, Edraw software since it was my first time to use them. I ended up designing on Adobe Illustrator, designing some icons from scratch so that I have them as PNG files. b) If I were to start again, I would definitely do;  Will buy a network router from Orange, so that I do my research even at home.  Find activated MS Visio and Edraw software for my Diagram.  Design my diagram on A3 paper size so that I can identify more robust encryption protocols compared to the ones chosen in this article. CONCLUSION In conclusion, this assignment gave me a complete knowledge of understanding all Network Security and Cryptography components, security maintenance, risk control and assessment. Network Security is used nowadays in order protect or encrypt files or documents This module gave mea solid foundation in Network Security, Cryptography skills since I am eager to learn and have advanced technology of Network Security and Cryptography knowledge and skills.
  • 16. _________________________________________________________________________________________ Action.mjk.mojakwe@gmail.com .IDM.2018 Page 15 of 20 REFERENCE 1. Bullguard (2018). Bullguard security center. [online] Spyware threat to online privacy. Available from: https://www.bullguard.com/bullguard-security- center/internet-security/internet-threats/spyware-threat-to-online-privacy.aspx/ [Accessed 27 September 2018]. 2. Christopher, J.A. and Audrey, D. (2002). Managing Information Security Risks. Addison-Wesley Longman Publishing Co., Inc. 3. csoonline (2018). 10 ways to prevent, detect and recover from ransomware and zero day threats. [online] Ransomware. Available from: https://www.csoonline.com/article/3287099/ransomware/10-ways-to-prevent- detect-and-recover-from-ransomware-and-zeroday-threats.html/ [Accessed 27 September 2018]. 4. European Union, Data Protection Working Party (2014) Opinion 05/2014: Anonymisation Techniques. 55654346. Europa: Practical Law. Available from https://www.pdpjournals.com/docs/88197.pdf [Accessed 17 September 2018]. 5. Kroenke, D.M., Gemino, A., Tingling, P. (2011). Experiencing MIS (Third Canadian Edition). New Jersey: Pearson Education Inc. 6. Ncsc. (2018). Cyber Essentials. [online] National Cyber Security Centre. Available from: https://www.cyberessentials.ncsc.gov.uk/ [Accessed 23 September 2018]. 7. Networkmagazineindia (2018). Identifying and classifying assets. [online] Security. Available from: http://www.networkmagazineindia.com/200212/security2.shtml/ [Accessed 27 September 2018]. 8. Novastor. (2018). Top 6 data loss causes and top 10 preventions. [online] Novabackup blog. Available from: http://novabackup.novastor.com/blog/top-6- data-loss-causes-and-top-10-preventions/ [Accessed 18 September 2018].
  • 17. _________________________________________________________________________________________ Action.mjk.mojakwe@gmail.com .IDM.2018 Page 16 of 20 9. Onboardonline (2018). Industry article index. [online] 10 steps to cyber security. Available from: https://www.onboardonline.com/industry-article- index/features/10-steps-to-cyber-security/ [Accessed 29 September 2018]. 10.Researchgate. (2018). Ransomware attacks detection, prevention and cure. [online] ResearchGate Publication. Available from: https://www.researchgate.net/publication/308736523_Ransomware_attacks_det ection_prevention_and_cure [accessed Sep 19 2018]. 11.S3 amazonaws. (2018). Risk Terminology [online]. Emerald Group Publishing Limited. Available from: https://ss- usa.s3.amazonaws.com/c/308451531/media/58a2f1495f44c/Risk- Terminology.pdf [Accessed 7 September 2018]. 12.strengtheningnonprofits (2018). Resources. [online] Managing crisis. Available from: http://www.strengtheningnonprofits.org/resources/e- learning/online/managingcrisis/default.aspx?chp=4/ [Accessed 28 September 2018]. 13.Techtarget (2018). Definition. [online] ISO-27001. Available from: https://whatis.techtarget.com/definition/ISO-27001/ [Accessed 27 September 2018].
  • 18. _________________________________________________________________________________________ Action.mjk.mojakwe@gmail.com .IDM.2018 Page 17 of 20 PLAGIARISM REPORT Turnitin Originality Report  Processed on: 29-Oct-2018 10:04SAST  ID: 1028292225  Word Count: 1920  Submitted: 3 NSC ASSIGNMENT By Mojakwe Mojakwe Similarity Index 3% Similarityby Source Internet Sources: N/A Publications: N/A Student Papers: 3% include quoted exclude bibliography exclude small matches dow nload print mode: quickview (classic) report 1% match (student papers from 07-Oct-2015) Submitted to KMD Computer Center on 2015-10-07 1% match (student papers from 10-Jan-2017) Submitted to Softwarica College of IT & E-Commerce on 2017-01-10 1% match (student papers from 30-Jun-2018) Submitted to Champlain College on 2018-06-30 1% match (student papers from 05-May-2017) Submitted to KMD Computer Center on 2017-05-05 INTRODUCTION In this assignment I have been tasked for identification of key security challenges, that Together Trust is faced and make recommendation for solutions, insuring that measures of security are put into place in most effective way. Risk assessment of the most valuable information assets, which is divided into tasks in Network Security and Cryptography module. I started with Risk assessment in Task 1, explaining Risk Control in Task 2, Task 3 is a Network Diagram and Maintaining Security in Task 4 as well as Reflective commentary in Task 5. A) Electronically held information assets ? Patient record data - This information is critical for Trust charity. It's confidentiality, integrity and availability is of utmost importance. ? Financial systems Records – Financial Information that may be required for its confidentiality and integrity. ? Radio and Chemo therapies data – Data kept to avoid ad-hoc decisions in a crisis. ? Email - This method of exchanging messages between people using electronic devices is confidential. ? Employees data - HR professionals have a lot to keep track of Healthcare data, and to stay Checking compliant. Contact information for the employee directory, Social Security numbers and pay history. B) A Table Listing the Assets. Asset (a) Threat (b) CIA? (b) Likelihood (c) Impact (c) Risk (d) Patient personal Disclosure C Medium Low Low data Disk problem A LowLow Very Low Fire A Low Medium Low Pseudonymisation Technical Failure C Low Medium Low Financial systems Unauthorised Access I Low Low Very Low records Disclosure C Low Low Very Low Modifying Data C Low Low Very Low Radio and Chemo Catastrophic damage A Medium Low LowTherapies Data Fire A Low Medium Low E-mails Virus and hacking attacks I High Low Medium Ransomware attack C Medium Medium Medium Spam, Spyware threats C High High Very High Employee’s Data Catastrophic damage A Medium Low Low Identity theft/ Masquerade I Low Low Very Low a) Threats and Security Measures Disclosure • Revealing or releasing a private data to an individual who is not
  • 19. _________________________________________________________________________________________ Action.mjk.mojakwe@gmail.com .IDM.2018 Page 18 of 20 authorized to see it. • I recommend that leaders should avoid having conversation over the phone or via e- mail. Directly talk to a representative face to face (Kroenke & Tingling, 2011). Disk problem/Corruption • Hard disk Corruption malfunctions can happen anytime due to the phishing emails and virus attacks downloaded by Together Trust users. • I recommend Onsite and Offsite backups to recover data. Fire • Fire can cause loss of important information assets in the trust, it may be caused by lightening or corrupted electric appliance. • Proactive fire prevention programs and proper inspection, testing, and maintenance of fire detection should be carried out. Pseudonymisation Technical Failure • Is a technique used to reduce the chance that personal data records and identifiers lead to the identification of the natural person or data subject, whom they belong to. • General Data Protection Regulation (GDPR) explicitly recommends pseudonymization of personal data as one of several ways to reduce risks from the perspective of the data subject (Cédric & Nédélec, 2018). Unauthorised Access Someone gaining access to servers or emails, using one’s else's account or other more method. • Authenticator, hardware or software firewall updates and setting up malware protection is the best. Modifying Data • Altering some portion of a legitimate message to produce an unauthorized effect. • Encryption is necessary to ensure integrity (digitalguardian, 2018). Catastrophic-damages • Storms, power-outage, floods, earthquakes, and complete loss of healthcare infrastructure as well as data systems. • Digitize and back-up duplicate documents, Physical copies need to be also made and stored on onsite and offsite backups. Virus and hacking attacks • Unauthorised perpetrator deliberately and knowingly attacks a healthcare infrastructure, components, data and systems. Viruses refers programs that are executable, replicating and infecting other programs. • Turning On firewall security, antivirus software, setting up automatic update (foxnews, 2014). Ransomware attack • It is a kind of malware that encrypts data, blocking access to it until a fee is paid to the attacker. • Prevention is better that cure, the following best practices will help to prevent ransomware attacks; o Security awareness training o updating devices and systems regularly o Real-time traffic monitoring o Reliable secure backups and recovery plan (researchgate, 2018). Spam, Spyware threats • Spam is a message links sent through the Internet, to large number of emails, with intention of phishing, advertising, spread of malware. Spyware is a piece of malware that tricks into installing it by disguising itself as the one desired. • Together Trust need to install Vulnerability Scanner, Antispyware Firewall and Intrusion Detection Systems (bullguard, 2018). Identity theft • Capturing authentication sequences and replay after a valid authentication, enabling authorisation entity of fewer privilege obtaining extra privileges, by impersonating entity that has right privilege. • Users should make sure to logout their user accounts after using internet. Two Factor Authentication (2FA) is needed as an extra layer of protection used to ensure the security of online accounts beyond just a username and password. b) ISO27001 and Cyber Essentials Relevance ISO/IEC 27001 is International Standard for Implementing Information Security Management System (ISMS), while Cyber Essentials guard against the common cyber threats, demonstrating commitment to cyber security. 1. Risk Management Regularly review of risk management registers, agreeing with the board for appropriate measures basically on costs benefit analysis as well as Trust risk tolerance which complies to ISO 27001 standard Risk assessment. 2. Secure Configuration Insures patching of systems, installing anti-virus / anti-malware is updated and running, which complies to ISO 27001 Security policy. 3. Network Security Preventing unauthorised access to a network and connected devices, through regular penetration tests of network, monitoring and filtering content, as well as firewalls. Relating to ISO 27001 Access Control. 4. Malware Prevention Producing policies and establishing antimalware defence across the Trust, based on ISO 27001 Organisation of information Security. 5. Removable Media Control Manages the use of all removable media. o Policy-based data encryption o Port management solutions o Monitoring and reporting This relate to Access control, Communications and operations management on ISO 27001. 6. User Education and Awareness Ensures employees training, and behaviour expected of them. Complies with ISO 27001 Information systems acquisition, development and maintenance. 7. Managing User Privileges Insures that all users on the system have the correct access privileges, and
  • 20. _________________________________________________________________________________________ Action.mjk.mojakwe@gmail.com .IDM.2018 Page 19 of 20 access rights for leavers are removed. Complies with Human resources security on ISO 27001. 8. Incident Management Insures continuity in the event of cyber-attack. Incident Management Policy, Staff awareness training, Business continuity planning, Disaster recovery systems and procedures and Secure offsite backup solutions. Complies with ISO 27001 Information security incident management. 9. Monitoring Continuously monitoring all systems and Networks, analysing logs for unusual activity that could indicate an attack and identify a potential issue before it becomes more serious. Relates to ISO 27001 Compliance. 10. Home and Mobile Working Ensuring secure remote access solutions and authentication systems. Mobile Device Management and Cloud Data Encryption. Complies with new and updated ISO 27001 2013 standard controls (onboardonline and techtarget, 2018). c) Recommendation 1. Encryption Together Trust needs to be encrypted using S/MIME encryption process, which supports encryption of emails through public key technology; Message-Integrity, Authentication, email Privacy Data Security. For wireless, using the Wi-Fi protected Access (WPA-2) including AES which is considered a stronger algorithm. a) Network Diagram b) The network diagram at (a) Figure 1 above uses class C private IP address ranging from 192.168.0.0 to 192.168.255.255 and DHCP is used to allocate addresses within the Trust Charity IP network users. Also firewalls will be configured such that valid IP address are translated into the appropriate private address through Network Address Translation (NAT). The diagram consists of the following subnets; I. Screened Subnet, hosting only servers that need to allow access to and from the Internet. II. Shared Services Subnet, hosting internal DNS, Mail, Web, and File or Print Servers. Includes NIDS with SPAN configuration to protect the segment services. III. IV. Application Subnet, providing extra layer of defence against attacks on critical assets. Management Subnet, defining Access Control Lists (ACLs) on appropriate devices (e.g. firewalls, switches, routers and hosts) denying administration access by any device that is not defined to the Subnet. c) Network design meets the security requirements identified in Tasks 1 & 2 since; I. Border router is installed generally to be the first line of network defence, to define a limited set of high level rules in the router’s Access Control List (ACL). II. De-Militarized Zone (DMZ), containing a hub communicating with a Network Intrusion Detection System (NIDS) and Bastion host designed and configured to withstand attacks. III. IV. V. VI. VII. Firewall is installed providing a secured network. Distribution level Routers or the access layer Switches connecting hosts (servers, workstations) are connected making sure other security features; Port Security, VLANs can easily be configured, through communication with servers, which is less vulnerable compared to WIFI. A Screened Subnet DMZ, contains DNS server, web server as well as mail server is available to protect sensitive organizational systems, resources and blocking the most casual threats. Screened subnetwork refers to logical or physical subneting that separate internal local area network (LAN) from an untrusted networks, usually internet. Also has a NIDS. Also has a NIDS installed on Shared Services Subnet, Application Subnet as well as Screened Subnet which is similar to activated security alarm system, watching for known behaviours, indicating suspicious activity and systems break-ins. NIDS sensor is usually connected to a hub, tap, or Switch Port Analyser (SPAN). The Console installed at Management Subnet, used for remote administration of device or hosts in the other various subnets. Ideally SSH or Telnet (through a VPN) would be used for the remote administration of network devices (Margaret Rouse & Shricha, 2015). A good policy is to keep computers and wireless network secure to protect Together Trust’s critical data. ? Auditing Network Regularly - Periodic scan should be done in order to identify unauthorized computers and devices that may have accessed the network through wireless or directly. ? Updating Operating System Patches - Updating Computer Operating System security patches may help prevent malware and viruses from the Trust data operating system or network. ? Updating Malware Definitions and Antivirus - Making sure and confirming up-to-date Malware definitions and Antivirus. This protects computer from attacks and maintain the network security. ? Establishing Wireless Devices Policy – Ensuring that devices maintain same security standards of Trust computers through staff training. ? Checking Firewall Security Settings - Ensuring the protection of the Trust from recent viruses, worms as well as hackers, through firewall settings (Zorro, 2012).
  • 21. _________________________________________________________________________________________ Action.mjk.mojakwe@gmail.com .IDM.2018 Page 20 of 20 a) Problems I had and how solved them. I had challenges throughout this assignment, I had a network issue when i wanted to do a research which led me to visit different libraries and websites for more research. It was difficult to find important points from the research due to the limitation of words, and I had to paraphrase my assignment based on its requirements. It was difficult to use MS Visio, Edraw software since it was my first time to use them. I ended up designing on Adobe Illustrator, designing some icons from scratch so that I have them as PNG files. b) If I were to start again, I would definitely do; ? Will buy a network router from Orange, so that I do my research even at home. ? Find activated MS Visio and Edraw software for my Diagram. ? Design my diagram on A3 paper size so that I can identify more robust encryption protocols compared to the ones chosen in this article. Task 1 Task 2 Task 3 Task 4 Task 5