Security
Security
G.D.N. Abeywickrama
Student’s name
List which assessment Pass Merit Disncon
criteria the Assessor has
awarded.
• Consrucve?
Give deails:
* Please noe ha grade decisions are provisional. They are only conrmed once inernal and exernal moderaon has aken place and grades decisions have
been agreed a he assessmen board.
1. A Cover page or title page – You should always attach a title page to your assignment. Use previous page as your cover
sheet and make sure all the details are accurately filled.
4. All the assignments should be printed on A4 sized papers. Use single side printing.
5. Allow 1” for top, bottom , right margins and 1.25” for the left margin of each page.
1. The font size should be 12 point, and should be in the style of Time New Roman.
3. Ensure that all the headings are consistent in terms of the font size and font style.
4. Use footer function in the word processor to insert Your Name, Subject, Assignment No, and Page Number on
each page. This is useful if individual sheets become detached for any reason.
5. Use word processing application spell check and grammar check function to help editing your assignment.
Important Points:
1. It is strictly prohibited to use textboxes to add texts in the assignments, except for the compulsory information. eg:
Figures, tables of comparison etc. Adding text boxes in the body except for the before mentioned compulsory
information will result in rejection of your work.
3. Carefully check the hand in date and the instructions given in the assignment. Late submissions will not be accepted.
4. Ensure that you give yourself enough time to complete the assignment by the due date.
5. Excuses of any nature will not be accepted for failure to hand in the work on time.
6. You must take responsibility for managing your own time effectively.
7. If you are unable to hand in your assignment on time and have valid reasons such as illness, you may apply (in writing)
for an extension.
9. Non-submission of work without valid reasons will lead to an automatic RE FERRAL. You will then be asked to
complete an alternative assignment.
10. If you use other people’s work or ideas in your assignment, reference them properly using HARVARD referencing
system to avoid plagiarism. You have to provide both in-text citation and a reference list.
11. If you are proven to be guilty of plagiarism or any academic misconduct, your grade could be reduced to A REFERRAL
or at worst you could be expelled from the course
I hereby, declare ha I know wha plagiarism enails, namely o use anoher’s work and o presen i as my own
wihou atribung he sources in he correc way. I urher undersand wha i means o copy anoher’s work.
www.nadishaabeywickramaslac@gmail.com
Student’s Signature: Date:
(Provide E-mail ID) (Provide Submission Date)
Unit Tutor
Issue Date
Submission Date
Submission Format:
The submission is in the form of an individual written report. This should be written in a concise, formal
business style using single spacing and font size 12. You are required to make use of headings, paragraphs
and subsections as appropriate, and all work must be supported with research and referenced using the
Harvard referencing system. Please also provide an end list of references using the Harvard referencing
system.
METROPOLIS CAPITAL Banks Head Office is a 5 Story Building in Kollupitiya with the Ground
Floor allocated for Customer Services, the First Floor allocated for HR, the Second Floor allocated for
Meeting Rooms and Senior Executive Staff, the Third Floor is allocated for the Technical Support Team
and the Fourth Floor hosts High Performance Servers running core banking systems. Fifth Floor is for
some other outside companies that are not related with the METROPOLIS CAPITAL Bank. Other than
this, METROPOLIS CAPITAL bank provides a lot of services to customers including online and mobile
banking facilities. Therefore, their core banking system must communicate with several outside systems
and all communication between outside systems, Data centers and the Head Office is protected by a
single firewall. In Addition, METROPOLIS CAPITAL Bank has recently implemented a bring your own
device (BYOD) concept for Senior Executive Staff and HR Departments and to facilitate this, they are
providing employee WiFi as well as a guest WiFi Hotspot.
The bank has signed agreements, AMCs, contracts and NDAs with several Local and foreign IT service
vendors. Some local vendors provide services and supports to foreign companies. METROPOLIS
CAPITAL Banks Technical Support Team is a local third-party vendor, contracted by METROPOLIS
CAPITAL Bank and managed by their Supply chain management officer. The Technical Support Team
provides onsite and remote support for their customers.
METROPOLIS CAPITAL bank strictly follows the rules and regulations enforced by the government
and the Central Bank. Therefore, they have obtained the ISO 31000:2009 certification. In addition to
this, the areas of datacenters, branches, ATM and HQ is covered by CCTV and 24x7 monitoring is
happening. Other security functions like VA scanning, internal auditing, and security operation done by
It has been reported that an emergency is likely to occur where a work from home situation may be
initiated. Therefore, you have been employed by METROPOLIS CAPITAL Bank as a Network Security
Analyst to recommend and implement a suitable Security solution to facilitate this situation.
Activity 01
Discuss and assess the security procedures and types of security risks METROPOLIS CAPITAL Bank
may face under its current status and evaluate a range of physical and virtual security measures that
can be employed to ensure the integrity of organizational IT security. You also need to analyze the
benefits of implementing network monitoring systems for METROPOLIS CAPITAL Bank with valid
reasons in order to minimize security risks identified and enhance the organizational security.
Activity 02
2.1 Discuss how an incorrect/improper configuration for network infrastructure such as firewall and VPN
could impact METROPOLIS CAPITAL Bank. Assess IT security risks that may face by the employees of
METROPOLIS CAPITAL Bank and propose how the organization can facilitate their employees with a
“Secure remote working environment”.
2.2. Discuss how following technologies would benefit METROPOLIS CAPITAL Bank and its Clients to
increase network performance. (Support your answer with suitable illustrations).
i) Static IP,
ii) NAT
Activity 03
Review risk assessment procedures for METROPOLIS CAPITAL Bank to protect itself and its clients.
Explain the mandatory data protection laws and procedures which will be applied to data storage
solutions provided by METROPOLIS CAPITAL Bank. Explain the topic "ISO 31000 risk management
methodology" and summarize he ISO 31000 risk managemen mehodology and is applicaon in IT
securiy. Analyze possible impacts to organizational security resulting from an IT security audit.
Recommend how IT security can be aligned with organizational Policy, detailing the security impact of
any misalignment.
Activity 04
4.1 Design and Implement suitable security policy to prevent misuse and exploitations in line with
METROPOLIS CAPITAL Bank using the Organizational policy tools for the given scenario,
While evaluating and justifying the suitability of the tools used in an organizational policy to meet
business needs. Identify the stakeholders who are subject to the METROPOLIS CAPITAL Bank and
describe the role of these stakeholders to build security audit recommendations for the organization.
4.2 Discuss and present a disaster recovery plan for METROPOLIS CAPITAL Bank for all their sites to
guarantee maximum reliability to their clients. (Student must develop a PowerPoint-based presentation
which illustrates the recovery plan within 15 minutes of time including justifications and reasons for
decisions and options used).
Security risk
What is the meaning of security risk?
Because they are most knowledgeable with how a business operates, including
where sensitive data is kept and how to access it, employees provide the greatest
security risk to any company. Organizations must contend with a variety of cyber
security issues in addition to hostile attacks by careless employees.
They use fairly simple passwords so they can remember them in addition to sharing
passwords. Another problem that regularly occurs is when staff members open
suspicious email attachments, click suspicious links, or visit risky websites that
could allow malware to enter the system.
This implies that a hacker can steal your password and then use it to profit the
company from which he also stole it. When password theft spreads from one
company computer to another, it can undoubtedly damage the organization's ability
to do business as usual.
Password theft can occur in any business, even one that takes security safeguards,
making untrained organizations particularly vulnerable to it. Passwords should be
regularly changed to increase security.
If you don't change your passwords periodically, you put your firm at risk of
occurrences that could disrupt its ability to conduct business.
Phishing Attacks
When a hacker has access to your credit card information, password, or other
personal online information, phishing assaults take place. An impact from a phishing
attack can be felt at the highest levels of an organization.
Training and awareness campaigns are among the most successful preventive
interventions. Employees should receive training and education about various
security dangers in general as well as specific phishing tactics.
A data breach is a security issue that exposes private or protected information when
data is accessed from a system without the owner's permission.
Customer information, trade secrets, credit card details, and other delicate, private,
or proprietary information could be included.
Computer virus
A piece of software known as a virus spreads across computers or across networks
without the user's awareness and conducts hostile attacks. It is capable of erasing
files, formatting hard drives, and destroying or ruining a company's sensitive data.
Ransomware
In this kind of assault, the victim's computer is usually encrypted and locked,
preventing them from accessing it or anything stored on it. The victim is required to
pay ransom, frequently in the form of virtual money, in order to regain access to the
gadget. There are various forms that spread these hazards. However, malicious email
attachments, infected software programs, compromised websites, and infected
external storage are how ransomware is typically propagated.
Computer worm
A computer worm is a type of malicious software or a program that spreads over the
network it is attached to by duplicating itself from one computer in an organization
to another computer in the same organization.
It has the capacity to propagate automatically, exploit software security holes, and
try to get access in order to steal sensitive information, corrupt files, and install a
back door giving remote access to the system.
These risks monitor online activity while monitoring login information and listening
in on sensitive information. It might be a secret component of software packages, a
computerized installation, or it could be installed using more typical malware tricks
like misleading you with ads, emails, and instant messages.
Botnet
A botnet is a combination of the words "robot" and "network" and refers to a group
of infected personal computers that are managed collectively without the users'
awareness. They are routinely used to launch DDoS attacks, disseminate massive
amounts of spam, and steal passwords. Botnets can act as a force multiplier for
parties attempting to interfere with or hack targets' systems due to their combined
computing power.
Trojan Horse
The following are examples of the most typical sorts of Trojan horses:
Backdoor trojan: A backdoor trojan can give an attacker remote access and
control of a device. This enables the hacker to access your systems and
perform any actions they desire, including deleting files, restarting computers,
Trojan Game thief: This Trojan is made primarily to steal user account
information from people playing online games.
SQL Injection
SQL injection, a type of injection attack that is one of the most often used internet
hacking techniques, allows hackers control over the back-end database so they may
add, remove, or change data.
Because the application doesn't thoroughly sanitize the SQL statements, there is a
security hole that enables an attacker to include their own malicious SQL commands
to access the company database. The attacker inserts malicious code into SQL
queries by using web page input.
Rootkit
Among the many different types of rootkit viruses are Boot kits, Firmware Rootkits,
Kernel-Level Rootkits, and Application Rootkits.
Cloud attacks
Cloud services are become indispensable in our daily lives. We should be mindful,
nevertheless, that not all cloud services offer secure encryption and authentication.
Numerous problems, including attacks, network weaknesses, and data spills, can be
brought on by misconfiguration.
Over half of cloud security breaches, according to IBM, are the result of
straightforward problems. While examining configurations could help to prevent
two-thirds of cloud security issues.
Malvertising attacks
Malvertising, often known as malicious advertising, is a relatively new and
developing type of cybercrime. By using this method, thieves insert dangerous code
inside digital adverts, sending users to rogue websites or infecting their devices with
malware. Identification by internet users and publishers is exceedingly challenging.
As a result, customers typically receive these through trustworthy advertising
networks. Any online advertisement can put visitors at risk for infection.
Publishers, on the other hand, are obligated to safeguard web users against harmful
advertising. The following actions should be taken by them to lower risk:
A security procedure can also install, enable, or enforce security controls outlined in
the policies of your firm. Every safety process adheres to these security rules,
regulations, guidelines, and procedures. Additionally, security rules serve as the
cornerstone of a company's security program.
In terms of the level of specificity, there are fundamental ideas and elements to
understand for security procedures.
Security policies
Standards
Baselines
Procedures
1. Access Control: These procedures make ensuring that only people with the
proper access can access particular locations, systems, or data. Strong
passwords, authentication methods (such biometrics or two-factor
authentication), user access management, and role-based access restrictions
are examples of access control techniques.
Verify the website is additionally secured with the necessary security measures.
Think about setting up accounts that have been approved by the firm, making secure
passwords, and keeping the server secure.
Access Control
The first step in building efficient security in a company is to manage server
accessibility. You can restrict access to only the chosen people using the access
control system on your server, making sure that nobody else has access to it. The
likelihood of attacks from outside sources will be lessened by doing this.
Two-Factor Authentication
The final important step you may take is to implement two-factor authentication.
Many have adopted this security measure since it increases protection by requiring
more than just a password to access your account.
Online business security is a critical element that needs further comprehension. The
best way to safeguard the METROPOLIS CAPITAL bank is to have all the
necessary technology requirements and precautions.
SSL Certificate
The next essential step in ensuring the security of your website is to obtain an SSL
certificate. Verified website owners can use a digital signature to securely confirm
their identity to everyone by using an SSL certificate.
It's crucial to keep in mind that these are generic categories of security processes,
and the particular ones that a company implements may differ depending on its
industry, legal requirements, and risk assessments.
4. Traffic Analysis: To obtain insight into usage trends, spot abnormalities, and
spot potential security issues, analyze network traffic patterns and flows.
Packet analysis, flow-based analysis, or specialist network monitoring tools
can all be used to accomplish this.
5. Event and Log Monitoring: To spot security issues, system failures, and
configuration changes, keep an eye on network events and logs. Various
network devices and systems' logs can be collected and analyzed with the use
of centralized log management systems, such as SIEM (Security Information
and Event Management) solutions.
1. Security: The bank can identify and stop security lapses and unwanted access
attempts thanks to network monitoring. It offers real-time visibility into
network traffic and can spot any unusual or malicious activity that could
jeopardize the infrastructure or critical data of the bank. METROPLIS
CAPITAL can quickly respond to any threats by keeping an eye on the
network and putting the required security measures in place to protect their
systems.
Although you can never guarantee 100 percent service availability, even with the most
comprehensive network monitoring system, they can nevertheless aid in preventing
unexpected network outages. One of the primary functions of network monitoring
systems is to find network activity that indicates a device or network is about to crash.
This helps the METROPOLIS CAPITAL bank to minimize service interruptions and
avoid any unplanned outages whenever possible.
The majority of network managers believe that bandwidth use is one of the most
important performance indicators to take into account. As much bandwidth as is
practical should be used by the METROPOLIS CAPITAL bank while ensuring that
each service is performing at its highest level. A network monitoring system will
notify the network and ensure that the quality-of-service (QoS) protocols are working
properly when bandwidth use approaches critical levels.
Network performance difficulties don't just have a monetary cost; instead, the time it
takes the network employees of the METROPOLIS CAPITAL bank to resolve a
problem could be employed on other, more important tasks. Therefore, it is essential
Any modifications you make to a device or the network must be tested to ensure they
function as intended. The rest of your network could become unusable if adding or
changing a device is done incorrectly. You may test new or updated connections and
equipment to see if they might cause problems before your network is seriously
harmed with the aid of network monitoring tools.
Performance issues can arise at any time, even when no one is around to resolve them.
Network monitoring software can uncover these problems for you because they
continuously monitor a network. A problem must be reported to the METROPOLIS
CAPITAL bank if it occurs after business hours. However, a trustworthy network
monitoring system won't immediately send out notices for these issues because these
cautions can be overlooked by the time the staff arrives at work. The patch would
ideally delay the alert until a time that the network administrator specifies.
Physical and virtual security measures that can be employed to ensure the
integrity of organizational IT security
What is a physical security?
Physical security refers to the steps taken to protect the physical security of IT
assets, such as structures, equipment, personnel, resources, and other assets, from
physical injury and unauthorized access. Physical security measures are
implemented to protect these assets from physical threats such theft, vandalism, fire,
and natural catastrophes.
Physical security measures are crucial for protecting people, buildings, and
other physical assets against physical threats such as theft, damage, and
unlawful access. Here are a few typical physical security measures used by
businesses.:
2. Access Control Systems: Access control systems limit access to those who
are permitted. This can involve PIN codes, combination locks, fingerprint, iris,
or other biometric scanners, key cards, proximity cards, or combination locks.
3. Video Surveillance: Cameras placed strategically around the space are used
by video surveillance systems to record and monitor activity. In the event of a
security incident, CCTV cameras can serve as a deterrent and a source of
proof. Advanced systems might have capabilities for remote monitoring, facial
recognition, and motion detection.
6. Security Lighting: Areas with enough lighting can help with monitoring and
deter crime. Ample illumination helps reduce blind spots and increase
visibility for security staff and cameras around entrances, parking lots,
walkways, and other critical locations.
Make sure the server room door locks are in working order before you shut the
servers down or even before you switch them on for the first time. Even the best lock
won't help you if you don't use it, so you need laws requiring such doors to always be
shut whenever a room is unoccupied. The policies should specify who has the key or
keycode to get access.
The server room, which acts as the brain of your physical network, is home to servers,
switches, routers, cables, and other equipment that may be physically accessed by
anybody and cause serious harm.
2. Establish surveillance
Locking the server room door is a good first step, but someone might break in or
someone with access might misuse that right. You require a system to keep track of
who enters and leaves at what times. Using a log book for signing in and out is the
simplest way to achieve this, but it has a number of drawbacks. A bad person would
probably just stay away from it.
The doors must be unlocked using a smart card, token, or biometric scan, and
everyone entering is required to provide identity. An authentication system integrated
into the locking mechanisms is preferable to the log book as a substitute.
3. Ensure that the devices that are most susceptible are in the secured room.
In light of this, you shouldn't be focused solely on the servers. A hacker can use
sniffer software to record network traffic by connecting a laptop to a hub. The
majority of your network hardware ought to be in that locked room, or if they must be
elsewhere, in a locked closet someplace else in the building.
Hackers may use any unsecured device connected to the network to access or delete
vital data for your business. Workstations at vacant offices, vacant desks (such as
those used by absentee or departing employees who have not yet been replaced), or
locations where visitors can easily enter the building, such as the front desk of the
receptionist, are particularly vulnerable.
Computers that aren't in use should be turned off or removed, and offices that are
vacant, even briefly while a worker is out to lunch or unwell, should have their doors
secured. To make it harder for unauthorized users to log in, install smart card or
biometric readers on computers that must remain in public areas, frequently concealed
from employees' view.
Servers and workstations should both be guarded against burglars who can open the
casing and grab the hard disk. Much easier to smuggle out of a building than a full
skyscraper is a hard disk in your pocket. To prevent case opening without a key, case
locks are frequently incorporated with computers.
Locking kits, such as the one from Innovative Security Products, can be found
everywhere for incredibly low costs.
With regard to physical security, laptops and other portable computers present unique
challenges. A thief can easily access any data on the computer's HDD as well as any
saved network login information. If employees use laptops at their workstations, they
should either take them with them when they leave or secure them using a cable lock,
like the one provided by PC Guardian, to a permanent fixture.
Handhelds can easily be tucked into a pocket and taken with you as you leave the
area. Even a drawer or safe can be used to store them. Motion-sensing alarms are
Backing up important data is an essential part of disaster recovery, but it's important
to keep in mind that the information on those tapes, CDs, or discs could be taken and
used against the company. IT professionals usually keep the backups in the server
room, close to the server. They should be stored in a safe or drawer at the very least.
The best practice is to retain a set of backups off-site, but you must take security
measures to ensure their safety.
Remember that some workers might keep backup copies of their work on floppy
disks, USB keys, or external hard drives. Have policies specifying that if this behavior
occurs, the backups must always be locked up.
If you don't want employees transmitting company data to removable media, you can
disable or remove floppy drives, USB ports, and other connections for external
devices. Cutting the wires might not be enough to deter technically competent staff.
Some organizations will even go so far as to cover ports with glue or other materials
in an effort to permanently restrict their usage, despite the fact that software
mechanisms prohibit it. Disk locks, like the one from SecurityKit.com, can be
installed to keep out other diskettes on computers that still have floppy drives.
Even though you might not think of printers as a security risk, many contemporary
printers now come equipped with on-board memory where they store document data.
If a hacker steals the printer and gains access to its memory, they could be able to
copy recently printed documents. In the same way that servers and workstations that
house sensitive data are locked down and maintained in safe locations to prevent theft,
printers should also.
9. Security Signage and Markings: Staff members and visitors can be directed
by clear signage, warnings, and markings that identify restricted areas,
emergency exits, or safety considerations. These aid in enforcing security
regulations and raising security awareness in general.
Numerous alternatives with several advantages are available for physical security.
Turnstiles, mantraps, fences, and electric fences make up the perimeter security
system in the first place. safe locks with tricky to duplicate keys. Any employee
must have a badge in order for their identity to be validated. Install the surveillance
in areas where it won't be exposed to the attacker or vulnerable to tampering. Ensure
the safety of any flimsy devices and portables. Put the backups in a place that is hard
to access and is secure. In the event of an explosion, fire, or electrical problem, use
the appropriate control approach to perhaps save some of the vital objects in the
METROPOLIS CAPITAL bank.
4. Safety of Personnel: Physical security measures help to ensure the safety and
wellbeing of a facility's tenants, visitors, and staff. Security officers can make
people feel comfortable, deal with crises, and make sure everyone adheres to
safety rules. People are protected during emergencies by emergency
preparedness measures including evacuation plans and fire safety systems.
10. Peace of Mind: Employees, clients, and stakeholders are all given piece of
mind by physical security measures. Trust and confidence in the organization's
dedication to safety and protection are fostered by knowing that adequate
security measures are in place.
However, there are a few gaps. Intruders and animals could be damaged or harmed
by some of the approaches. The intrusion could be accomplished by a leaping
intruder. Validity could be compromised by both authentication and access control
(AC). It is possible for hackers to steal smart cards or keys, which makes it easier for
them to enter your computer and recover the missing USB. Users are left to figure
out how to operate the highly complex security installations and systems of today on
their own.
Staying up to speed with security technology is difficult because new updates and
development plans are implemented every year. The issue is that despite the
abundance of facilities, employees hardly ever know how to use them. For instance,
the firm is equipped with fire extinguishers.
Physical security measures have many benefits, but there are also some possible
drawbacks that organizations should take into account.:
2. False Sense of Security: Physical security measures alone may give one a
false sense of security. It's common for businesses to believe that their
physical defenses, locks, or surveillance measures are adequate to fend off all
dangers. Physical security measures are simply one part of an all-
encompassing security strategy, it's crucial to keep in mind. Additionally
crucial are elements like personnel training, cybersecurity, and procedural
controls.
6. Human Error and Insider Threats: Human error or insider threats are
possible with regard to physical security measures. An employee might
unintentionally violate security protocols, open a locked door, or jeopardize
access credentials. Through employee training, awareness campaigns, and
8. Limited Flexibility: Physical security measures may limit the comfort and
flexibility of authorized workers. Strict access restrictions, complicated
authentication processes, or time-consuming security measures may obstruct
normal business operations, annoying staff members or visitors.
9. Backup and Disaster Recovery: Regular data backups and a reliable disaster
recovery plan are essential. Backups and recovery procedures help reduce
downtime and data loss in the case of a security incident or system failure.
10. User Education and Awareness: It is crucial to encourage user education and
understanding of best security measures. Overall virtual security is
strengthened by teaching employees how to spot phishing emails, create
secure passwords, and stay away from dubious websites or downloads.
It's crucial to remember that virtual security measures should be put into place using
a tiered strategy, combining several defenses to offer complete protection against
developing cyber threats.
For everyday activities, connect to ESXi hosts using just non-root user accounts.
Create a named administrator user in vCenter Server and give specific users the
administrator role so that you can keep track of who used what host, at what time,
etc., and hold them accountable for the changes they make to your environment.
Based on their particular focal areas, virtual security measures can be divided into
a number of different types. The following list of popular virtual security
measures:
1. Network Security:
Firewalls
Intrusion Detection and Prevention Systems (IDS/IPS)
Virtual Private Networks (VPNs)
Network segmentation
Network monitoring and traffic analysis tools
2. Endpoint Security:
Antivirus and antimalware software
Host-based intrusion detection and prevention systems
Data loss prevention (DLP) tools
Device and application control
Patch management
Having a solid backup and disaster recovery plan is essential for ensuring company
continuity, regardless of whether you encounter a cyberattack or a storm takes down
your production datacenter. The likelihood of a prolonged outage can be decreased
with the use of a DR site in the cloud or at a remote datacenter. Two essential
recommendations to keep in mind while you create your DR plan are as follows.:
Backup physical servers and virtual machines — Although ESXi itself cannot
be backed up, its settings can be utilizing the Power CLI scripting tool and the
VMware command line. Nowadays, the same tools may be used to back up
both physical computers running Windows or Linux and virtual machines
running any OS.
Use the fallback. Make at least three copies of your data, keep them up to date,
and store two of them as backups—one of which should be offshore. This is
known as the 3-2-1 rule.
Consider replication: For further DR protection, you can replicate your
production VMs to a different datacenter, where you can failover quickly if
necessary.
Advantages of virtual security measures
Virtualized security not only meets the complicated security needs of a virtualized
network better than traditional physical protection, but is also more flexible and
effective. Here are a few of its unique benefits:
Virtual security measures have many benefits for protecting networks, computer
systems, and data from online attackers. Here are several major benefits.:
Although virtual security measures have many benefits, there are also some
potential drawbacks to take into account.:
Activity 02
Configuration
Configuration describes the precise options and parameters that specify how
hardware elements, software programs, and network components are set up
and function in computers and computer networks. It entails modifying and
altering a number of system components to guarantee optimal operation,
connectivity, and security. Here are several illustrations of configuration in this
situation.:
1. Hardware Configuration: Setting up and altering the physical settings of a
computer system's CPU, RAM, storage, and peripheral devices is known as
Misconfigurations
Security misconfiguration occurs when security settings are not properly configured
during the configuration process or when they are maintained and deployed with
default values. This could have an impact on any layer of the application stack,
Unpatched systems
Default/ out of the box account settings (i.e. usernames and passwords)
Unencrypted files
Old and out of date web applications
Unsecured devices
Web application and cloud misconfiguration
Insufficient firewall protection
We are all aware that your business may be affected by these dangerous security
anomalies and threats due to the challenges of operating in a heterogeneous
environment for businesses and a lack of security awareness. In your heterogeneous
environment, you must manage security weaknesses like improper configurations at
every level.
Security setup errors can occur for a number of reasons, including the following:
1. Lack of Secure Defaults: Systems and software frequently have default
settings that place more emphasis on usability than security. Systems may
become susceptible if these settings are not correctly changed during
installation or configuration. Security misconfigurations may occur if default
passwords are not changed, necessary security measures are not enabled, or
superfluous services are not disabled.
For instance, an improperly configured database server can enable data access
through a typical online search. If this data contains administrator credentials, an
attacker may be able to access other data not contained in the database or launch
another attack on the company's servers.
Due to inadequately designed (or nonexistent) security, many critical and personal
bits of information may be made publicly accessible online.
"It is said that "prevention is better than treatment." Up to this point, we've discussed
methods for identifying and correcting these setup mistakes.
According to a Cypress Data Defense post, there are several doable actions you may
take to prevent security misconfiguration.
3. Regularly Update and Patch Systems: Keep the most recent security patches
and upgrades installed on your systems, programs, and firmware. Ensure that
essential security updates are immediately applied to address known
Firewall
An internal network and an external network are separated by a firewall, which is a
network security equipment or piece of software (such as the Internet). Its main
objective is to watch over and manage incoming and outgoing network traffic in
accordance with predefined security policies. For the purpose of safeguarding the
internal network from unauthorized access, malicious activities, and potential risks,
the firewall functions as a filter, allowing or blocking network connections
depending on established criteria.
Network packets are examined by firewalls, which then apply rules to decide
whether to accept or deny the traffic. Various variables, such as source and
destination IP addresses, port numbers, protocols, or particular application
signatures, can be used to base these rules. Firewalls can be set up to enact
regulations like restricting access to specific ports or services, only permitting
authorized connections, or monitoring for and stopping suspicious activity.
2. Host-based firewalls are software programs that are installed on particular PCs
or servers. By regulating inbound and outbound traffic specifically for the host
on which they are placed, they offer protection at the system level. In
particular, host-based firewalls are helpful for protecting individual systems,
especially when they are connected to unreliable networks.
Firewall filters guard your PC from harmful data. Firewalls can protect your computer
from backdoors, DoS attacks, macros, remote logins, spam, malware, and other
frequent threats.
Attackers can enter vulnerable apps through backdoors, which act as "doorways."
This includes operating systems that potentially have flaws that hackers could use to
gain access to your computer.
When a hacker requests permission to connect to a server but the server is unable to
identify the system when it responds, a denial-of-service attack is initiated. Repeating
this causes the server to become overwhelmed and consume so much energy
processing the numerous requests that it is unable to support actual users. In some
cases, the server may need to be completely shut down. Some firewalls can
authenticate connection requests, protecting your network from denial-of-service
attacks.
Occasionally, links to risky websites might be found in spam. These websites activate
malicious software, which downloads cookies to the user's computer. The cookies
create backdoors that allow hackers to gain access to the computer. Avoiding clicking
on anything suspicious in an email, regardless of who the sender appears to be, can
frequently stop a spam campaign. Your emails can be examined by a firewall, which
can also prevent computer malware.
1. Packet Inspection: The firewall examines the headers and content of network
packets as they pass through it to learn the source and destination IP addresses,
port numbers, protocols, and other pertinent information. The term "packet
inspection" or "packet filtering" refers to this procedure.