Friday, 27 April 2012

Security policy

Security policy is a set of rules which people who are given access to the organization's technology and information must follow in order for the assets to have confidentiality, integrity and availability.
Security policy is created to have a baseline of the organization security posture, set the framework for the security implementation, to set a behavioral code, determine the procedures and tools, define roles and communicate consensus, and handle security incidents.
 There are two types of elements in security policy. Firstly, network design factors upon which security policies are based. Secondly, basic Internet threat vectors toward which security policies are written to mitigate.
As a continuous process of security policy, there is Network security which is done in four steps. 
Firstly, secure, where there are security solutions being implemented to prevent unauthorized persons to access the assets. Authentication, encryption, firewall and vulnerability patching are some security solutions.
Secondly, monitor, where system auditing and real-time intrusion detection is used so that violations to the security policy will be detected. This step authenticate the security implementation of the 'secure' step.
Thirdly, test, this shows the effectiveness of the policy.
Last but not least, improve, where the information that was gathered from the 'test' and 'monitor' steps are use to make improvements to the security implemented.

Common Networking Attacks Threats and Solution

Network attack is also known as threat or any other attack that cause the network to be unable to access information in the network. Some Network security threats have three primary flaws: technology weakness, configuration weakness and policy weakness.
An example of network attack is Reconnaissance attack. This is used to gather information on a specific network. This may look harmless but the information the hacker gathered might be used in other attacks like Denial of Service (DoS) attack. This cannot be prevented entirely. IDSs at the network and host level can inform an admin when this attack occur.
Another example is Packet Sniffer. This software application is use in a network adapter card in promiscuous mode, capturing all network packets. This attack can only be mitigated, by example authentication, switched infrastructure, anti-sniffer tools and cryptography.
Another example is Application Layer Attack. This attack exploit popular weakness (example protocols that are intrinsic to an application or system), uses ports that firewall allows, and can never be entirely eliminate. This attack can only be reduced by: analyzing operating system and network log files, keeping the OS and application with the latest and up-to-date patch,etc.
One more example is Unauthorized access. Which means people who are not authorized get access into the private network. There are many kinds of attacks that can cause this, like: password attacks. This can be mitigated by having a more complex password and taking away the ability of hackers to have access into the network.