Are you aware about Network Security ?

By | November 26, 2015
(Last Updated On: November 26, 2015)

What is Network Security ?

Protection of Information Assets to ensure Confidentiality , Integrity and Availability

What are the Objectives of Network Security ?







Confidentiality : No Data or Information is made available to  any Person within or outside the organisation , other than the  persons who are authorized to use that data

Integrity: No Data/Information or program shall be allowed to be  modified by anyone without proper authority

Availability : All Information systems including Hardware , Communication Networks, software applications and the data they  hold , is available to authorised users to carry out business activities

What are the Threats to Network Security ?

While the internet links people together , it provides endless opportunities to to criminals seeking to exploit the vulnerabilities of network of other users. These are called cyber crimes. These types of crime are hard to solve and occur without the victim ever knowing anything illegal has taken place.

  1. Information Gathering by attackers through port scan,social engineering,malware like virus and worms
  2. Attackers can exploit the communication system vulnerabilities by microwave signal tapping, optical fiber,Zombies and Botnet, satellite signal tapping, wiretapping, eavesdropping etc.
  3. use of protocol flaws by attackers e.g FTTP transmit communication including user ID and Password in plain text.
  4. Attackers may use impersonation techniques e.g spoofing and masquerading,guessing of common passwords ,session Hijacking,Man in the Middle attack
  5. Attackers can track your message confidentiality  through traffic analysis ,temporary buffers in switches, routers , mis-dilvery of message due to congestion.
  6. Attackers can also change your messages  , redirect the message, destroy or delete the message through use of trojan horse, Active wiretap, impersonation etc.
  7. Attackers can use the code downloaded and executed in the browser of the client from websites.
  8. Attacker can use the denial of service attack which results into loss of network availability
  9. Attackers can exploit cookies, scripts and active/mobile code
  10. Attackers can also use malicious codes e.g viruses, worms, logic bombs, mobile active x
  11. Attackers can also exploit application vulnerabilities by SQL injection,Cross site Scripting,cross site request forgery
  12. Attackers can also use Advance persistent threat to send the malware to the victim computers . This malware sends small bit of information from the system to the attacker

What is Cyber Crime ?

Cyber crime encompasses any criminal act / unlawful activity dealing with computers and networks (called hacking). Additionally, cyber crime also includes traditional crimes conducted through the Internet.

For example; hate crimes, telemarketing and Internet fraud, identity theft, and credit card account thefts are considered to be cyber crimes when the illegal activities are committed through the use of a computer and the Internet



What the policies to be framed to ensure network Security  for the organisation ?

Make the following security policies for the Organisation

1. Data Classification and Privacy Policies
2.  Acceptable use of Information Assets Policy
3. Physical Access Security Policy
4. Asset Management policy
5. Business Continuity Management Policy
6. Network Security Policy
7. Password Policy

How to Classify the Information for network Security ?

1. Data Classification

2. Classification of Assets other than Data

How to Classify the data of the Company to ensure network Security?

  1. Information for Public Purposes  (No Protection required)
  2. Information for Internal Purposes  of the company (Minor protection required)
  3. Restricted Information (Modest Protection required)
  4. Highly Confidential or Top Secret (Critical Protection  required)


Information classification (1)

What is classification of Assets other than Data ?

There are numerous IT Assets for which protection is required some of them are listed below :-

1. Servers
3.Portable Devices
5.Network Devices
6. Unattended Equipment’s e.g ATM
without security guard by Banks

How to ensure Physical protection of Information Technology Assets ?

Following are the examples of some of the Physical Security control to protect IT Assets

1.Security Guards
4. Deadman Door
5.Bolting Door Locks
6.Cipher Locks
7.Electronic Door Locks
8. Biometric Door Locks
9.Video Camera
10.Alarm System
11.Electronic Logging by Swip of Card
12.Manual Logging by signing visitor log

How to protect IT Assets from the environmental risk e.g fire etc ? 

Following are the Environment  to protect the IT assets:-

1.Selecting and Designing a Safe Site
2.Facilities Planning (power, lights etc)
3.Training to staff
4.Power Supplies
6.Fire Resistant walls, floors, ceiling
7.Smoke Detectors
8.Water Dedectors
9.Fire suppression system
10. Fire Alarm

Why we need logical access controls ? 

To Protect attacks from :-
a) Masquerading : Attacker pretends to be an authorised user of system

b)Social Engineering
1.Phishing :user receive a link (appears real) on mail to provide  information e.g banks ID,Password etc
2.Key Logger:Attacker install software to caputre key sequence used  by user including login information

What are the Logical Access Controls ?

1. User Registration
2. User Access Management
3. Password Management
4. Review of User Access Rights
5. Segregation of Duties
6.Segregation of Networks
7.Network Connection and Routing control
8.Monitoring use of System
9.Database Access Control
10.Operating System Access Control
11. System configuration

How to protect the IT system from virus /Malicious codes ?

Following are the ways :-

  1. Installation of Anti Virus :
    1. Virus signatures should be updated regularly after installation
    2. Alters from Anti Virus are reviewed regularly for root cause
    3. schedule scan are regularly performed
  2. Continuous Training and Awareness of users
  3. Removable devices (PAN drives etc ) should be scanned before use
  4. Mail attachments from unknown sources should be handled with care
  5. Do not open insecure websites  or links
  6. use separate Segments for each functions e.g separate segments for web server , authentication server ,applications and database server
  7. Avoid Single Point of  Failure of any IT equipment
  8. use cryptography /Encryption
  9. Use firewalls
  10. use Intrusion Deduction system
Direct Taxes Ready Reckoner
Service Tax Ready Reckoner
Company Law Ready Reckoner
tax deduction at source
New Books Released on Tax , GST and law

Leave a Reply

Your email address will not be published. Required fields are marked *