In order for a network to be secure it must follow a balance on the CIA. When analysing a problem of network security, the balance is controlled by Physical, Hardware, and Software solutions.
Physical, Hardware, and Software solutions
Differences between the IDS, IPS and Firewalls
VPNs, Encryption, and Intranets
Networks are vulnerable to malware and viruses that can be introduced through malicious emails, infected websites, or removable media. Once inside the network, malware can spread, disrupt operations, steal data or perform other malicious activities.
Ransomware
Blackmails you
Spyware
Steals your data
Adware
Spams you
with ads
Worms
Spreads across computers
Trojans
Sneak malware onto your computer
Botnets
Turns your PC into a zombie
Attackers may use social engineering techniques to manipulate individuals within the network to gain unauthorised access. This could include phishing emails, impersonation or exploiting human weaknesses to trick employees into revealing sensitive information.
Covid 19 sat a significant rise in people using devices for work and personal communication. This this came an increased risk of social engineering attacks. The most common form of attack was phishing.
Risk tolerance, also known as risk appetite, is determined by balancing the expense in terms of financial resources and usability of information assets against financial liability, loss of information assets and reputational damage if the risk is exploited.
The steps in determining unacceptable risk are as follows.
• When a flaw or weakness exists, reduce the chances of the vulnerability being exploited by implementing security controls.
• When the vulnerability can be exploited, prevent the opportunity for attack by applying changes in design or administrative controls, or increase protections.
• When an attacker’s gain is greater than the costs of attack, apply measures to increase the attacker’s costs or reduce the attacker’s gains so the gain is not worth the effort.
Passwords sufficiently complex and are two factor controlled.
Encrypt internal communications on a network to protect listening in on that network
Use IPS and IDS devices to alert and block suspicious activity. Create policy about logging access.
Primary purpose is to monitor and control incoming and outgoing transmissions based on security rules
Create policies to keep all devices' operating systems up to date (not necessarily upgraded) and schedule cloud backups
Protect the network from human error or mismanagement by training users. Address common attacks, safe browsing, and password control.