Security asm 1 (Greenwich)

53 60 2
Security asm 1 (Greenwich)

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

Thông tin tài liệu

Môn security của Trường FPT Greenwich, Dùng quillbot có thể đc P hoặc cả M(Twitch is one of the largest streaming platforms in the world for people that want to go on to play games, and chat with other people. On October 7th,2021 Twitch put out a tweet from Twitter that their data has been hacked due to server configuration changes. The hackers also leak out every information such as username, and password from a streamer the most important is that the hackers leak how much money Twitch or all the top streamers on the platform made from streaming, this is very personal and when they leak out all of that information, everyone socks, and question twitch a lot)

ASSIGNMENT FRONT SHEET Qualification BTEC Level HND Diploma in Computing Unit number and title Unit 5: Security Submission date 10/10/2020 Date Received 1st submission Re-submission Date Date Received 2nd submission Student Name Student ID Class GCH1006 Assessor name 10/10/2020 Ha Trong Thang Student declaration I certify that the assignment submission is entirely my own work and I fully understand the consequences of plagiarism I understand that making a false declaration is a form of malpractice Student’s signature Grading grid Tien P1 P2 P3 P4 M1 M2 D1  Summative Feedback:  Resubmission Feedback: 2.1 Grade: Assessor Signature: Date: Lecturer Signature: Table of Contents Introduction .4 Task - Identify types of security threats to organizations Give an example of a recently publicized security breach and discuss its consequences (P1) Define Threat .4 Identify threats agents to organizations List the type of threats that organizations will face: 4.What are the recent security breaches? List and give examples with dates Discuss the consequences of this breach 11 Suggest solutions to organizations 11 Task – Describe at least organizational security procedures(P2) 13 Definition: 13 Organizational security procedures : .14 2.1 Incident Response (IR) Procedure: .14 2.2 Discussion on Acceptable Use Policy 17 2.3 Discussion on Remote Access Policy 18 Task 2.1 – Propose a method to assess and treat IT security risks (M1) 19 Discuss methods required to assess security threats? .19 What is the current weakness or threats of an organization? 21 What tools will you propose to treat IT security risks? 21 Task – Identify the potential impact to IT security of incorrect configuration of firewall policies and IDS (P3) 25 Define Firewall 25 Types of Firewall .26 2.1 Firewall policies: .27 2.2 Firewall usage: 27 2.3 Firewall advantage in the network: 29 2.3 How does a firewall provide security to a network? 29 2.4 Diagram of how the firewall works 29 IDS 30 3.1 Define IDS : 30 3.2.IDS usage: 30 3.3 Diagram of how the IDS works 31 3.4 Diagram example of the IDS .31 The Potential Impact (Threat-Risk) of a Firewall and IDS if they are incorrectly configured in a network .33 4.1 Firewall: 33 4.2 IDS : 34 Task – Show, using an example for each, how implementing a DMZ, static IP and NAT in a network can improve Network Security(P4) 34 DMZ 34 1.1 Definition: 34 1.2 DMZ usage and security function as advantage : 35 Static IP 37 2.1 Definition: 37 2.2 Static IP usage and security function as advantage 37 NAT 38 3.1 Definitions : 38 3.2.Types of NAT : 38 3.3 NAT usage and security function as advantage 39 Task 4.1 – Discuss three benefit to implement network monitoring systems with supporting reasons (M2) 40 1.List of networking monitoring devices: 40 1.1 Zabbix : .40 1.2 Nagios: 42 1.3 Auvik : 43 2.Why you need to monitor networks? 45 3.What are the benefits of monitoring a network? .46 Conclusion: 47 References: 48 Introduction - In today's information and globalized world society, data routinely moves freely between individuals, organizations, and companies Data is really very important, and hackers are well aware of this As a result of the ongoing increase in cybercrime, there is indeed a rising need for security professionals to defend and protect an organization from cyberattacks This report will highlight some fundamentally basic security theories, such as identifying the different types of security threats to organizations, overall organizational security procedures, and firewall policies, including the use of IDS, DMZ, static IP addresses, and NAT in networks, in order to assist my journey for in-depth knowledge in this field Task - Identify types of security threats to organizations Give an example of a recently publicized security breach and discuss its consequences (P1) Define Threat - Information security risks include things like computer viruses, intellectual property theft, identity theft, equipment or data breaches, sabotage, and information extortion Threats include anything that has the ability to breach security, modify, damage, or destroy a specific product or object of interest For the sake of this educational series, a threat is defined as a potential hacker attack that would allow someone access to a computer system without authorization Identify threats agents to organizations 2.1 Nation States : Businesses that operate in certain areas, such as telecom, natural gas, mining, power generation, and national infrastructure, could become targets for foreign nations, either to disrupt operations now or to give that nation hold in the future in tough moments There are countless cases of this, including the alleged Russian meddling in the US Presidential elections, Sony's allegation that North Korea was to keep blaming for their websites being damaged in 2014 2.2 Non-target specific: Every organization is vulnerable to random attacks since there are so many of them happening every day A non-target specific attack is best demonstrated by the WannaCry ransomware incident, which affected over 200,000 computers in 150 countries The NHS was closed down in the UK for a period of time Of course, there is also the busy student searching the web in a loft somewhere for a weak point 2.3 Employees and Contractors: Except for Zero-day viruses, computers and software programs a decent job of preventing malware People are often the weakest link in the security system, whether it is on purpose or by mistake Common mistakes like sending the wrong email to the wrong person can happen, but most of the time we notice the mistake immediately and can fix it Simple measures like filing strong passwords might help to minimize the impact of such mistakes 2.4 Terrorists and Hacktivists: The level of threat these individuals pose depends on your decisions, similar to the danger posed by national governments In spite of the continual risk of a random attack against you, some terrorists seek to target particular nations or industries Some of the organizations that did this are political parties, activists, and religious followers,… 2.5 Corporates: Although it is clear that the threat of a competitor stealing your property rights exists, we are increasingly working with numerous alliance partners to fulfill skill and resource gaps or simply offer a service Depending on their objectives, these partner companies might steal or leak your intellectual property or the private details you are storing List the type of threats that organizations will face: 3.1 Cause by a human mistake: - Accidental issues - Poorly written programs - Inadequately planned procedures - Physical accidents - User destruction of systems, apps, and data - User security policy violation - Disgruntled workers waging war on the business or creating sabotage 3.2 Cause by a human malicious activity: - Botnet: + Botnet is a combination of the words "robot" and "network," is a group of personal computers that are infected with malicious software and are controlled together without the owners' knowledge They are commonly utilized to spread lots and lots of spam, carry out DDoS assaults, and steal data and passwords For groups attempting to disrupt or infiltrate targets' systems, botnets can act as a force multiplier thanks to their collective computing power - Cryptojacking: + Due to the illegal mining of cryptocurrency on some other user's computer is referred to as crypto jacking Hackers typically force their targets into clicking on a malicious email link that downloads a crypto mining program onto the computer or else infect a website or online commercial with code that immediately runs whenever the target browser loads it As unsuspecting victims use their computers as usual, the crypto-mining malware continues to run in the background While using the computer, the victim may notice slower performance, but otherwise, it may go undetected - Ransomware: + Malicious software known as ransomware threatens to steal or disclose the data of its victims or to block users from accessing their computers until a ransom is paid Ransomware has grown to be one of the biggest problems in network security because it can paralyze large organizations and even whole cities However, there are situations when paying the ransom won't solve the issue Cybercriminals may demand payment even after the stolen data has already been erased - APT (Advanced Persistent Threat): + APT is a covert, persistent computer network attack in which a person or group gains access to a network without authorization with the intention of remaining undetected for as long as possible in order to spy, install unique malicious code on numerous computers for particular purposes, gather information, and access sensitive, classified information Historically, APT was linked to governments, but in recent

Ngày đăng: 21/04/2023, 08:34

Tài liệu cùng người dùng

Tài liệu liên quan