Documente Academic
Documente Profesional
Documente Cultură
mothods to mitigate
www.saigonlab.vn
Network Security
Security Policy
Confidentiality
The protection of data from unauthorized disclosure
to a third party
Integrity
Assurance data is not altered or destroyed in an
unauthorized manner again including sending it
electronic
Availability/Transparently
Connectivity
Performance
Ease of Use
Manageability
Availability
10
11
12
13
14
15
16
17
Compromised
host
18
Packet sniffers
IP weaknesses
Password attacks
DoS or DDoS
Man-in-the-middle attacks
Application layer attacks
Trust exploitation
Port redirection
Virus
Trojan horse
Operator error
Worms
19
Reconnaissance attacks
Access attacks
Denial of service attacks
20
21
22
23
24
25
Data Assessment
Vulnerabilities
Host Addressing
Denial of Service
Application Definition
POLICY
Misuse
Usage Guidelines
Reconnaissance
Topology/Trust Model
26
Network Security as
a Continuous
Process
Secure
Step 1: Secure
Step 2: Monitor
Step 3: Test
Step 4: Improve
Security
Policy
Test
27
Monitor
Implement security
solutions to stop or
prevent unauthorized
access or activities, and to
protect information:
Improve
Authentication
Encryption
Firewalls
Vulnerability patching
Turn off unncessary
services
28
Secure
Security
Policy
Test
Monitor
Monitor Security
Detects violations to
the security policy
Involves system
auditing and real-time Improve
intrusion detection
(IDS Intrusion
Detection System)
Validates the security
implementation in
Step 1
29
Secure
Security
Policy
Test
Monitor
Test Security
Validates
effectiveness of the
security policy through
system auditing and
vulnerability scanning Improve
Vulnerability scanning
tools such as SATAN,
Nessus, or NMAP are
useful for periodically
testing the network
security measures
30
Secure
Security
Policy
Test
Monitor
Secure
Improve Security
31
Security
Policy
Test
Monitor
32
33
Ope
ratin
g
Sec Syste
m
urity
Plat
form
Sec
urity
Netw
ork
Sec
urity
Phy
s ic a
l Se
curi
Pol
ty
icie
s an
dP
roc
edu
re s
34
www.saigonlab.vn