M-4 - Fundamentals of Information Security
M-4 - Fundamentals of Information Security
Module-4
1. Device-Based Security
A network is made up of many hardware components like firewalls, routers, switches, modems, servers,
workstations, and mobile devices. Each device has its own security concerns. If any device is weak in security, the
whole network can be at risk. So, all components must be properly secured.
A firewall is a device or software that protects a network by blocking unwanted traffic from outside sources. It
checks incoming data and allows or denies it based on security rules.
Types of Firewalls
• Individuals and small offices can use software firewalls to secure their computers.
1
• Example: ZoneAlarm – A software firewall for Windows 2000 Professional, suitable for home and small office
protection.
[Link]-Based Security
Media-based security involves protecting network communication devices like routers and switches to ensure safe
data transmission.
Routers connect different parts of a network and work at the Network Layer (Layer 3) of the OSI model. They guide
data packets using routing tables and algorithms to find the best path to the destination. Routers form the
backbone of the internet and can be managed manually or automatically using protocols like:
• Remote Access Risks – Attackers may try to access router settings remotely.
• Prevention Measures:
Switches operate mostly at the Data Link Layer (Layer 2) but newer models also work at the Network Layer (Layer
3). They are used in Ethernet-based networks and manage network traffic efficiently.
Each port in a switch is a separate collision domain, meaning data is sent only to the intended [Link] makes
switches more efficient than hubs, which broadcast data to all [Link] use MAC addresses to route data.
Security in Switches
Wireless networks and modems provide high-speed internet access but come with unique security risks. It is
important to secure these devices to prevent unauthorized access.
Wireless Security
Wireless networks started in homes but are now widely used in businesses, especially after the 802.11n Wi-Fi
standard was introduced. However, they bring special security risks because data is transmitted through airwaves
instead of physical cables.
Wireless signals can be intercepted by anyone within [Link] cannot protect against attacks on the wireless
network because they only block threats from the internet connection.
(a) Wired Equivalent Privacy (WEP) : Uses RC4 encryption with 40-bit or 128-bit keys to protect data. However,
WEP encryption can be broken, making it less secure. Still, WEP is better than no security at all.
(b) Wi-Fi Protected Access (WPA & WPA2) : More secure than WEP. Uses 128-bit RC4 encryption with dynamic keys
to improve security. Reduces the risk of data being intercepted.
(c) MAC Address Filtering : Allows only approved devices to connect to the network. However, hackers can fake MAC
addresses, making this method less effective.
• Wireless Access Points allow remote access, just like routers and switches.
• To secure access:
A modem is a device that connects a computer to the internet. The term modem comes from
"modulator/demodulator," referring to the conversion of digital signals to analog and vice versa.
Most modern modems are DSL or Cable modems, which work differently from traditional modems:
• They convert DSL or Cable signals into Ethernet signals that computers can understand.
• They provide continuous internet connectivity for faster speeds and convenience.
3
• Most basic modems do not have firewalls, leaving networks vulnerable.
To improve security: Use a modem with a built-in firewall. Even better, place a router with a firewall between the
modem and the network.
Security Features in RAS : Uses authentication and authorization protocols to verify access. Can be set up to call
back an approved number before allowing access for extra security.
• To reduce risk, they should be placed in a DMZ (Demilitarized Zone) where an inner firewall can block
malicious activities.
Telecom/PBX Security
A Private Branch Exchange (PBX) is a system that connects company phones to the public telephone network. These
systems are now often linked to IT networks, increasing security risks.
• VoIP (Voice Over IP) systems have made PBXs more vulnerable.
• Phone hackers, called phreakers, may misuse PBXs to make expensive calls at the company’s cost.
• Firewalls can block long-distance calls at certain times or require users to enter access codes before making
international calls.
• Encryption can:
o Encrypt the entire packet, wrap it inside another packet, and send it (called tunneling).
VPN Benefits
4
• Protects sensitive data from hackers.
Several tools help in checking network issues and finding their locations. These include:
These tools help diagnose if a network problem exists and where it is occurring.
SNMP is a protocol that works at the Application layer of the OSI model. It is used to collect network statistics from
connected devices in a TCP/IP network.
• SNMP Network Management Station – Collects and analyzes data from agents.
5
Networks are always changing, and network administrators must add new users, technologies, and applications.
These changes can affect network performance. When problems arise, admins need to find and fix the issue quickly
before it impacts users and business operations.
Many IT organizations follow Service Level Agreements (SLAs) to maintain performance. Network Monitoring
Systems (NMS) help by performing five key functions:
Different NMS tools offer different capabilities for each of these functions.
Network monitoring starts with discovery. If admins don’t know what’s in the network, they cannot monitor it.
NMS tools detect network devices like:
• Routers
• Switches
• Firewalls
• Servers
• Printers
NMS tools also use monitoring templates to track different device types. For example, a Cisco router needs different
monitoring than a Dell server.
Hackers constantly try to break into networks. The best defense is a firewall, which is a hardware or software
system that controls network traffic.
A firewall sits between a computer and the internet. It allows or blocks data based on configured rules. It blocks
unauthorized access to protect data. Some firewalls filter both inbound and outbound traffic.
Filtering in Firewalls
Firewalls analyze network traffic and decide whether to allow or block data based on rules.
6
Firewalls must be regularly checked to ensure rules and filters are up-to-date. Hackers often probe firewalls for
weaknesses, so logs should be reviewed. Firewall logs help detect suspicious activity, such as unauthorized access
attempts. If a hack occurs, firewall logs can help law enforcement track the attackers.
When IDS detects malicious activity, it sends alerts to an administrator or a Security Information and Event
Management (SIEM) system. SIEM integrates multiple data sources and uses alarm filtering to separate real
threats from false alarms. IDS must be fine-tuned after installation to distinguish normal network traffic from
malicious activity. Intrusion Prevention Systems (IPS) also monitor incoming network traffic and immediately send
warning notifications about threats.
• Example: NIDS is installed on a subnet with firewalls to detect hacking attempts on the firewall.
• Takes snapshots of system files and compares them to detect unauthorized changes.
• Example: Used on critical machines where system settings should not change.
Signature-Based IDS
o Number of bytes
7
• Uses a database of known attack signatures to identify threats.
• Limitation: Cannot detect new malware if its signature is not already stored in the database.
Anomaly-Based IDS
• Flags any suspicious activity that does not match the model.
An Intrusion Prevention System (IPS), also called Intrusion Detection and Prevention System (IDPS), is a network
security tool that monitors network or system activity for malicious threats.
IPS is an advanced version of Intrusion Detection System (IDS) because both monitor network traffic, but IPS
actively prevents attacks, while IDS only detects them.
8
• Monitors the entire network for suspicious traffic.
Signature-Based Detection
• Works well for detecting known threats but cannot detect new attacks.
• Detects unusual patterns but may generate false alarms if not properly configured.
9
To secure an OS, it must be configured properly, updated regularly, and follow security rules and policies. This
reduces exposure to threats and minimizes risks.
Network Hardening
Network hardening helps reduce vulnerabilities and strengthens security. Though no network is 100% safe,
hardening can significantly lower successful cyber-attacks. It involves three key phases:
• Using tools like Dynamic Network Maps helps automate network documentation.
• Engineers can check firewall policies and traffic flow to ensure security.
• This can be done manually (slow and difficult) or with automation tools.
• Automated tools check if device passwords are encrypted, timeouts are set, and other security rules are
followed.
For this process to work, teamwork between security and network teams is essential. Collaboration ensures effective
threat prevention and a secure network.
Application Hardening
Application hardening is the process of making an app more secure by preventing reverse engineering and
tampering. It works alongside secure coding to protect an app’s intellectual property (IP) and prevent misuse,
cheating, or repackaging by bad users.
Application hardening strengthens a completed application by modifying and adding code to guard against both
static and dynamic attacks. It goes beyond basic security measures like verifying senders or message formats.
1. Code Obfuscation
o Hides the app’s code at the binary level so attackers cannot easily understand how it works.
o Ensures the app’s code remains unchanged and has not been altered.
10
3. Root/Jailbreak Detection
o Identifies if the app is running on a rooted (Android) or jailbroken (iOS) device, which could make it
vulnerable.
o Changes security methods in every version to prevent attackers from learning patterns.
o Decides how the app should react when it detects an attack or a compromised device.
By using these techniques, application hardening enhances security, making apps more resistant to hacking and
tampering.
A security policy is a set of rules and objectives that protect an organization's network and computer systems. It
serves as a "living document", meaning it must be updated regularly as technology and business needs change.
A security policy acts as a bridge between management objectives and specific security requirements by:
One important part of a security policy is the Acceptable Use Policy (AUP), which defines what users can and cannot
do on company systems and networks.
• It may include rules about allowed and restricted website access or network usage.
A security policy applies to anyone with access to the network, but different groups require different levels of detail:
Internal Audience
• End Users – Must understand their responsibilities to comply with security rules.
External Audience
11
• Partners, Customers, and Suppliers – Need security guidelines to ensure safe collaboration.
• Consultants and Contractors – Must follow security policies when working with company systems.
A single document may not be suitable for everyone, so security policies should be tailored to different audiences to
ensure clarity and compliance.
1. Governing Policy
This is a high-level security policy that defines key security concepts for the company. It is intended for managers
and technical staff and controls all security-related interactions between departments.
• Aligns with existing company policies (e.g., HR, IT, and email usage policies).
2. End-User Policies
This document compiles all security rules for employees in one place, making it easy to follow. It answers "what,
who, when, and where" security questions at a user level.
3. Technical Policies
These policies provide detailed security guidelines for IT and security staff responsible for system security.
• Answers "what, who, when, and where" security questions for technical staff.
12
By organizing policies into these categories, companies ensure that each group (managers, employees, and IT staff)
understands and follows the security rules relevant to them.
Technical Policies
Technical policies provide detailed security guidelines for IT and security staff. These policies focus on specific
security areas, such as network security, remote access, applications, and personal devices. They serve as security
handbooks but do not specify how security tasks should be performed.
1. General Policies
• Acceptable Use Policy (AUP): Defines how employees can use company equipment and computing services
securely.
• Account Access Request Policy: Ensures proper account and access request processes to avoid security risks.
• Audit Policy: Guides audits and risk assessments to maintain data integrity.
• Information Sensitivity Policy: Specifies how to classify and secure data based on sensitivity.
• Password Policy: Sets standards for creating and managing strong passwords.
• Risk-Assessment Policy: Provides guidelines for identifying and mitigating security risks.
• Global Web Server Policy: Defines security standards for all web hosts.
2. Email Policies
• Email Policy: Prevents misuse of emails that could harm the organization’s image.
• Remote Access Policy: Establishes standards for external connections to the organization’s network.
• Analog & ISDN Line Policy: Controls the use of analog and ISDN lines for business purposes.
• Personal Communication Device Policy: Outlines security measures for smartphones, tablets, and voicemail.
5. Application Policies
• Application Service Provider (ASP) Policy: Sets minimum security requirements for external service providers.
13
• Database Credentials Coding Policy: Defines secure methods for storing and retrieving database credentials.
• Source Code Protection Policy: Defines security standards for handling product source code.
6. Network Policies
• Extranet Policy: Requires third-party organizations to sign agreements before accessing company networks.
• Minimum Requirements for Network Access: Sets security standards for devices connecting to the internal
network.
• Network Access Standards: Ensures physical security of wired and wireless network ports.
• Router & Switch Security Policy: Defines security configurations for routers and switches.
• Wireless Communication Policy: Specifies security measures for wireless network connections.
• Electronic Communication Retention Policy: Defines how long emails and instant messages should be kept.
• Employee Records Retention Policy: Specifies guidelines for storing employee personal records.
• Operation Records Retention Policy: Covers retention of training manuals, supplier lists, and past inventory
data.
Security policies provide a broad framework, but they need standards, guidelines, and procedures to ensure proper
implementation and enforcement. These three components help organizations maintain security, consistency, and
efficiency in their IT and business operations.
1. Standards
Standards define the specific technologies, methods, and security measures that an organization must follow. They
ensure uniformity and consistency across all systems, reducing security risks and operational inefficiencies.
Key Features:
• Help IT teams focus on limited technologies rather than managing multiple options.
14
Examples of Standards:
• Password policy: Minimum 12-character passwords with uppercase, lowercase, numbers, and symbols.
• Encryption standards: Use of AES-256 encryption for sensitive data storage and transmission.
2. Guidelines
Guidelines provide recommendations and best practices for improving security, but they are not mandatory. They
help organizations develop better security measures while allowing flexibility in implementation.
Key Features:
Examples of Guidelines:
• NIST security guidelines: Recommends steps to improve cybersecurity but allows organizations to modify
them.
• Secure software development guidelines: Encourage best practices for writing secure code to prevent
vulnerabilities.
• Network security guidelines: Suggest firewall configurations to enhance security but do not enforce a single
rule.
3. Procedures
Procedures provide detailed step-by-step instructions on how to implement security measures. They are mandatory
and help ensure that standards and guidelines are followed properly.
Key Features:
Examples of Procedures:
• Firewall configuration procedure: Steps to properly configure firewalls to block unauthorized access.
• Incident response procedure: Steps to follow when a cyberattack occurs, including reporting, containment,
and recovery.
• User access management procedure: Process for granting, modifying, and revoking access permissions.
15
Comparison of Standards, Guidelines, and Procedures
Ensure consistency and Offer flexible security best Help in the correct execution of
Purpose
efficiency in IT security. practices. security measures.
Flexibility Strict and fixed. Flexible and adaptable. Strict and detailed.
Mandatory? Yes, must be followed. No, optional but recommended. Yes, must be followed.
Covers specific technologies Covers best practices and security Covers detailed implementation
Scope
and processes. improvements. steps.
Level of Medium – defines what must Low – provides general High – includes exact steps, often
Detail be done but not how. recommendations. with illustrations.
Standardizing router security NIST security guidelines, NSA Instructions for configuring
Examples
settings, password policies. security recommendations. firewalls, setting up secure access.
Provides flexible
Helps maintain consistency in Ensures security policies are
Importance recommendations to improve
security across systems. applied correctly.
security.
Supports and enforces security Helps in developing security Implements security policies,
Dependency
policies. standards. standards, and guidelines.
16