NETWORK SECURITY
NETWORK SECURITY
Network security protects networking infrastructure from data theft, unauthorized access, and manipulation.
It also includes network segmentation for security, which involves dividing your network into regions by using
firewalls as borders
Types Of Network Security
Physical Security:
• Protects the physical components of the network, such as routers, switches,
and servers, from damage or theft
Technical Security:
• Protects the network from unauthorized access and data breaches.
• Includes firewalls, intrusion detection and prevention systems, and encryption.
Organizational Security:
• Covers the policies and procedures to protect the network.
• Includes user access control, data classification, and incident response plans.
Now that we understand network security let us explore how it works.
A combination of:
• Exploiting zero-day vulnerabilities
«Gray»
• Social engineering and data obtained Unknown/new/evasive
from insiders
v
• APT & ransomware attacks
Targeted
• Supply-chain attacks ?
v Attacks
?
? ?
v
?
v «Good» Trusted
«Bad» &
Known malware v legitimate
v
Endpoints
Mail
Web
Network
External Attacks
• Malware. This threat represents installing malicious software to exploit and disrupt
systems without users’ knowledge.
• Ransomware. This attack encrypts sensitive data belonging to an individual or an
organization. Ransomware makes data unreadable until the ransom is paid.
• Phishing. This threat works by tricking individuals into sharing sensitive information such
as passwords or payment details via deceptive emails or websites.
• Man-in-the-middle (MitM) attacks. Man-in-the-Middle attacks intercept online
communication between individuals to steal or alter confidential data.
• Distributed denial of service (DDoS) attacks. DDoS attacks use compromised devices to
flood systems with traffic and exhaust their bandwidth and other resources.
External Attacks
• SQL injections. These attacks exploit databases to steal, alter, or delete the
information in them.
• Zero-day exploits. These exploits are instant attacks on detected hardware or
software vulnerabilities before the vendor gets the chance to remediate them.
• Credential stuffing. Credential stuffing is abusing previously leaked credentials on
multiple platforms expecting that individuals use the same ones on each site.
• Social engineering. Social engineering exploits human psychology to get them to share
confidential information or perform damaging activities to their organization and data.
• Drive-by downloads. Drive-by downloads are performed by downloading damaging
software to the users’ devices without their knowledge to perform attacks.
Employee theft:
• Insider threats. Insider threats are made by internal members of organizations who
abuse their access to sensitive information for malicious agendas.
• Privilege abuse: abuse it to satisfy their requirements or to destroy the organization
reputation.
• Equipment failure: in which any equipment can’t complete its intended task or
reason. It can also mean that the hardware has stopped working.
• Network Access Control (NAC). NAC is the process of leveraging security protocols
to maximize control over who or what can access a proprietary network.
• Service must be accessible to users.
• Prevent un-authorized access to resources.
• Firewalls. Protecting an organization’s internal from external attacks.
• Intrusion Detection. No longer would we need to protect our files and system. We
could just identify when someone was doing something wrong and stop them.
• Encryption. the process of converting information or data into a code, especially to
prevent unauthorized access.
• Virtual Private Network. Provide access control and data encryption between two
different computer on network.
• Identify Management. It is a term , related to how humans are identified and
authorized across computer network.
• Anti-Viruses Software.
• Necessary part of good security program.
• Anti viruses only protect organization from malicious programs.
Next-generation firewall (NGFW)
• For many organizations, the first line of network protection is a next-generation
firewall (NGFW).
• Like a traditional firewall, a NGFW inspects all incoming and outgoing network
traffic and creates a barrier between internal and external networks based on
trust principals, rules and other administrative settings.
• NGFW also includes additional features like application awareness and control,
intrusion prevention and threat intelligence services
Next-generation antivirus (NGAV)
• NGAV is a network security tool that uses a combination of artificial intelligence,
behavioral detection, machine learning algorithms and exploit mitigation, so known
and unknown threats can be anticipated and immediately prevented.
• NGAV is cloud-based, which allows it to be deployed quickly and efficiently, reducing
the burden of installing and maintaining software, managing infrastructure and
updating signature databases for the IT or information security team.
• Regular patching and software updates. System patching and software updates
are crucial for preventing threats that become more sophisticated as time
passes.
• Using firewalls. Firewalls serve as a barrier between trusted and untrusted
networks, which goes a long way in threat prevention.
• Using VPNs. VPNs ensure secure remote access to systems through encryption.
• Implementing multi-factor authentication (MFA). MFA requires several
confirmations of identity during logins to prevent unauthorized access.
• Creating regular backups. Organizations should backup all their data for easy
recovery in case of data losses.
Ways To Prevent Network Security Threats
•Data protection:
• Any enterprise network will likely want to maintain confidentiality of large amounts of non-customer-facing
data.
• A network security program can help protect confidential data by several of the methods listed above.
Keeping the right data behind closed doors also helps organizations adhere to more strict regulations like
the General Data Protection Regulation (GDPR).
EndPoint Security
• Endpoint security is a cybersecurity strategy focused on protecting
endpoints or entry points of end-user devices like desktops,
laptops, smartphones, and other devices from exploitation by
malicious actors.
Infrastructure
Security
Network
Endpoint Data
Security Security Security
√ Security Architecture. Infrastructure Security
Can be:
• Laptops
• Tablets
• Mobile devices
• Internet of things (IoT)
devices
• Point-of-sale (POS)
systems
• Switches
• Digital printers
• Other devices that
communicate with the
central network
√ Security Architecture. Infrastructure Security
Can be:
Workstation
Notebook
Thin Client
Pad / Smartphone
Home PC
Unknown PC
Why is Endpoint Security Important?
• As number of devices grows, so does attack surface for cybercriminals to exploit.
• Endpoints often hold critical data and directly access the corporate network, making
them attractive targets for attackers.
Eliminates Improves
Password Issues Business Agility
Enhances
User Experience Boosts Productivity
IAM
Centralizes
Access Control
Benefits Simplifies
Auditing and Reporting
Reduces Increases
Helpdesk Workloads End-user Visibility
IAM
Best Practices
Data
Classification
Understanding Data Classification
Data classification is the process of
organizing data into categories based on its
level of sensitivity and importance that
make it is easy to retrieve, sort and store for
future use.
• Intended for public use. For example, Service brochures, advertisements, job opening
announcements, and published press releases.
Need for Data Classification in Organization
When organization deals with multiple types of data. It’s important to classify our data to
protect sensitive information, meet legal and regulatory obligations, and manage data more
effectively.
Benefits of Data Classification:
• Well-Rounded Data Security:
• Data classification helps maintain confidentiality, integrity, and availability of data.
• Allows for tailored data protection and management of sensitive information like
Personally Identifiable Information (PII), or Protected Health Information (PHI) based
on its importance to the business.
• Regulatory Compliance: Helps businesses follow regulatory mandates such as HIPAA and
GDPR / DPDP Act 2023.
Need for Data Classification in Organization
• Cost Reduction: It can help reduce storage costs by applying tiered backup plans per
classification type.
• Improved User Productivity: By eliminating unnecessary data, it can boost productivity.
• Facilitates Decision Making: It helps businesses prioritize data protection efforts,
improving security and regulatory compliance.
Need for Data Classification in Organization
Despite these challenges, the benefits of data classification often outweigh the difficulties,
making it a crucial component of an organization’s data management strategy.
Data Classification Policy
Data Classification Policy provides a framework for classifying data based on
its sensitivity, value, and criticality to the organisation, so sensitive corporate
and data can be secured appropriately.
Key components of the policy:
These principles form the
• Principle 1 - Open by Default backbone of the data
classification policy and
• Principle 2 - Necessity and Proportionality guide how data is handled
within the organization. It’s
• Principle 3 - Timely Classification
important that all employees
• Principle 4 - Highest Level of Protection understand and adhere to
60
these principles to ensure the
• Principle 5 - Segregation of Duties effective management and
protection of the
• Principle 6 - Need to Know organization’s data.
• Principle 7 - Least Privilege
inderbarara @inderbarara inderbarara inderbarara
Facebook: InderBarara
Twitter Handle: @InderBarara
LinkedIn: Inder Barara Mobile: +919818005945
Website: https://www.cybersleuths.io/ Email: [email protected]