ASM1 Demo
ASM1 Demo
ASM1 Demo
INFORMATION TECHNOLOGY
ASSIGNMENT 1
UNIT: Security
Student declaration
I certify that the assignment submission is entirely my own work and I fully understand the conse-
quences of plagiarism. I understand that making a false declaration is a form of malpractice.
Student’s signature:
Grading grid
P1 P2 P3 P4 M1 M2 D1 D2
Summative Feedbacks: Resubmission Feedbacks:
TABLE OF CONTENT.............................................................................................. 2
INTRODUCTION ...................................................................................................... 5
1.4 Propose a method to assess and treat IT security risks. (M1) .................... 10
1.4.1 Necessary methods for security threat assessment and some examples
of Monitoring Tools ..................................................................................................... 10
2.1.4 Show, using an example for each, how to implement a DMZ, static IP
and NAT in a network can improve Network Security. (P4) ........................................ 22
2.1.5 DMZ...................................................................................................... 22
2.2.2 Some of the networking monitoring software and discuss each ........... 27
CONCLUSION ........................................................................................................ 32
REFERENCES ....................................................................................................... 33
NorthStar Secure works with medium sized companies in the Vietnam, advising and
implementing technical solutions to potential IT security risks. Most customers have out-
sourced their security concerns due to lacking the technical expertise in house. As part of
your role, your manager Khuong, has asked you to create an engaging presentation to
help train junior staff members on the tools and techniques associated with identifying and
assessing IT security risks together with the organisational policies to protect business crit-
ical data and equipment.
Define:
Network security is a term that describes security tools, tactics, and policies de-
signed to monitor, prevent, and respond to network intrusions, and protect technical as-
sets. numbers, including network traffic. Cybersecurity encompasses hardware and soft-
ware technologies (including resources like savvy security analysts, hunters, incident re-
sponders, etc.) potential threats targeting your network.
In other words, it's a defense you use to keep wrong people out of your sensitive
data.
Cybersecurity exists to help your organization protect not only sensitive information,
but also performance, reputation, and even business viability. Continuity and integrity are
two key benefits of effective network security.
Cyber security hazards are dangers that can befall everyone who uses the internet
and are perpetrated by cybercriminals. Cybercriminals have the ability to attack anyone or
any organization.
There are many types of threats to cybersecurity, not to mention threats such as:
• Impersonation
• Eavesdropping
• Denial-of-service
• Packet replay
• Man-in-the-middle
• Packet modification
• Information theft
One of the most serious hazards to businesses is a security system with numerous
flaws and simple access for crooks. Criminals are attracted to data systems because they
have a lot of value. The data is not rigorously monitored, and it could have been caused by
employees who were complicit in the organization's attack.
1. The world's largest social network, Facebook, is expected to have a rocky year in
2018.
The first occurrence took occurred in mid-March 2018, when Facebook reported
that the Cambridge Analytica scandal had touched 87 million users worldwide, including
more than 420,000 in Vietnam. After exposing a security weakness in its "View As" feature
in September 2018, Facebook remained the center of public criticism. This flaw gave
hackers access to any associated accounts, including Instagram, Spotify, Tinder, Airbnb,
and others. It was estimated that around 50 million Facebook users were affected at the
time.At the end of December 2018, Facebook again announced that there was a vulnera-
bility that allowed more than 1,500 applications to access private photos of nearly 7 million
users. As noted, many Facebook users in Vietnam are affected by these security flaws.At
the end of December 2018, Facebook again announced that there was a vulnerability that
2. More than 35,000 smartphones in Vietnam are infected with GhostTeam virus
In January 2018, according to statistics from Bkav's virus monitoring system, more
than 35,000 smartphone devices in Vietnam were infected with GhostTeam virus and stole
Facebook passwords. This malicious code takes advantage of a series of popular Viet-
namese applications on Google Play to distribute. Hackers' attack methods are quite so-
phisticated, firstly, hackers put "clean" popular applications such as perpetual calendar,
flashlight, compass ... on Google Play for users to install. phone. After that, these applica-
tions will automatically download another malicious application, in order to trick the victim,
this "clean" application will display security warnings such as an infected phone or an in-
fected phone. slow… with instructions for handling. These are essentially fake warnings
and when following the instructions, the viruses will take control of the phone and steal the
password of the Facebook account that is using on the device.
• Multi-factor authentication
• User security training
• Web & eMail filtering
• Threats detection by installing additional detection applications
• Use Business Continuity Solution for continuous synchronization
• Information encryption
Information encryption is a method of converting data into a different form of data
that has a different meaning than the data before it was altered, with the goal of allowing
only a limited number of individuals to access it. Initially, by decoding the data that has
been transformed. Information encryption is a critical component of preventing data
breaches.
• Multi-factor authentication
Multi-Factor Authentication (MFA) protects your account, even if your password is
compromised. It combines something you know (your password) with something you have
(your phone). When you log in to your account, it will send your phone a code. If a cyber-
criminal breaks your password but doesn't have your phone, then they won't be able to ac-
cess your account. [2]
The nicest aspect about MFA is that it comes standard with most of your accounts,
such as Microsoft Office 365, Facebook, and LinkedIn. All you have to do now is enable it.
If you just remember one thing from this blog, make it to enable MFA for your personal
bank account. You only need one password to prevent fraudsters from stealing your life
savings.
• Threat detection
The firewall and antivirus program that we defend acts as a locked door, preventing
cybercriminals from entering and breaking in. Unfortunately, when a cybercriminal tries to
get access, this key is triggered. The threat detection solution functions similarly to your
company's alarm system. The solution checks your network and PC for threats on a regu-
lar basis and reports any suspicious discoveries to the threat intelligence service for re-
view. This service is offered by a group of security and artificial intelligence professionals
who will respond if a threat is detected.
• Data backup
Data backup is a form in which you copy the entire piece of data in your company or
organization and then store it in one or more other storage devices to make backup data.
this can avoid power outages or crashes due to hacker intrusion or a virus attack that
wipes out the company's data, avoiding heavy damage due to unreasonable causes.
1.4.1 Necessary methods for security threat assessment and some examples of
Monitoring Tools
Currently, information technology (IT) security operations are largely reactive, with
many organizations focusing on implementing security controls to detect attacker behavior.
Then there's the reaction when threat metrics are identified on corporate networks, which
have often been seen as a central element of security practices in recent years and earlier.
After looking for threats, we can build a network security assessment process as
follows:
Depending on the requirements of each person, each facility, conduct customer in-
terviews, learn and collect basic information about the network system and their needs.
The goal of preliminary research is to figure out what the nature of any lingering is-
sues in the customer's system is. This study is unique to each customer, thus there is no
standard format, but it is heavily influenced by the customer's existing system and the ex-
pert's prior experience with gathering preliminary data.
• Black box testing (BlackBox). Engineers act as users and will not be deeply
involved in the system. A black box assessment may not take as much time
and effort as a white box, but the results are incredibly important. The reason
is that Hacker basically starts out as a regular user as well. Vulnerabilities
and threats reported from black box testing are extremely important.
• White Box Testing. Evaluation engineers will be deeply involved and sys-
tematic, knowledgeable about the system. The assessment of risks will come
from inside and outside the system. Evaluation results from white box testing
are more comprehensive than black box. White box testing can include code
review.
• Confidentiality. Information must be kept confidential and used for the right
audience.
• Integrity. Information must be complete, structurally intact, and free from con-
tradictions.
• Ready. Information must always be readily accessible, to serve the right pur-
pose and in the right way.
• Accuracy. Information must be accurate and reliable.
• Non-repudiation (non-repudiation). The information is verifiable from the
source or the informant.
• The target threatens to attack. Examples are web services (www), domain
name services (dns), file services (ftp)... of customers.
• Threat of attack. is the subject of harm to the system, or the Hacker. This ob-
ject has different capabilities, is capable of finding holes in different systems,
has different purposes: deliberate, conquest, personal gain...
• Threats to attack. Taking advantage of access to system information, inten-
tionally or unintentionally changing system information, illegally accessing in-
formation, eavesdropping on information, stealing software or hardware.
• Classify threats. There is a purpose, there is no purpose, from the outside,
from within.
Engineers will develop a solution and to issue a plan to fix the network security vul-
nerabilities reported in step 4. Remedial measures may include:
After completing the above steps, based on the assessment in step 3 and the report
in step 4, remove threats and build defenses for the system.
Businesses must boost the protection of one of their most precious assets – data –
as the frequency of cyberattacks continues to rise. To do so, companies must first identify
their shortcomings before taking steps to address them.
• The computers in the enterprise's system can be controlled, infected with vi-
ruses, malicious code.
• Organization hacked Web server, FTP server, Email server.
• Organization suffers from a denial of service attack.
• Organization has a need to investigate the perpetrators of network attacks.
• Organization is smeared, defamed, impersonated on social networks, needs
to collect information about the perpetrator.
• Gamasec
Gamasec is a website scanning application that can analyze the whole file and
structure of a website. To avoid any security concerns, Gamasec scans and detects net-
work weaknesses and malware. This utility will export a report after the scan is completed
so that the administrator can comprehend the network state.
Symantec's Norton Safe Web is a dependable piece of software. This tool will de-
termine whether or not the website is safe for users and their computers to visit.
McAfee SiteAdvisor Software is a tool to help check for malicious code, malicious
java, and spyware that can harm your computer. Besides, this tool also helps Google give
warnings about unsafe websites.
This website security check tool allows to check the safety of the website. The task
of the tool is to see if the website has any risk of harming users
This is a free tool of McAfee that allows you to check the website's traffic and as-
sess the "health of the website" of the business.
For network administrators, finding security holes in the system is always the most
important thing. And Nessus is the most popular tool because Nessus has a large data-
base of security vulnerabilities. On the other hand, this tool can automatically update new
errors after checking.
Kali Linux is considered a perfect product to detect attack vulnerabilities in the net-
work. This is a free, open source tool that helps you penetrate many small systems at the
same time.
In fact, this Kali Linux System Security Tool is combined with 300 penetration test-
ing and security testing programs with a single Linux operating system. Thus, network ad-
ministrators can effectively check the risk, the threat of attack
2.1.1 Firewall
Figure 1 Firewall
A firewall is a network security system that can be based on hardware or software
that uses rules to control traffic entering and leaving the system. Firewalls act as a barrier
between a secure network and an insecure network. It controls access to network re-
sources through an active control model. That is, only traffic that conforms to the policy de-
fined in the firewall can access the network, and all other traffic will be rejected.
Any computer connected to the Internet needs a firewall, which helps to manage
what is allowed on the network and what is allowed out of the network.
Any computer connected to the internet needs a firewall to manage incoming and
outgoing information, because:
Firewall Effect:
Define:
IDS stands for Intrusion Detection System. These are software or tools that help
you secure your system and warn you when there is an intrusion. An IDS is usually part of
other security systems or software, accompanied by the task of protecting information sys-
tems.
The most important features of IDS include: monitoring network traffic and suspi-
cious activity; provides warnings about anomalies to systems and network administrators;
Combined with firewall, anti-virus software creates a complete security system.
Firewalls or anti-virus software are only a very small part of the entire security sys-
tem. As the size of the business grows, firewalls or anti-virus software are not enough to
protect the entire system from attacks.
You need to use IDS as an official part of the network. IDS can then be captured
system-wide, combined with AI and pre-configured configurations to track system anoma-
lies, determine when attacks occur, or analyze how attacks happen. [4]
Figure 4 IDS
Classification of intrusion detection systems
NIDS (Network intrusion detection system): Not only install on the machine but it
supports many devices in the network.
NNIDS (Network node Intrusion detection system): Combines the HIDS and NIDS.
Advantages:
• Suitable for collecting data and evidence for investigation and incident re-
sponse
• Giving a comprehensive and comprehensive view of the entire network
• Is a suitable tool for checking problems in the network.
Disadvantages:
The security system was greatly weakened when the ids and firewall were miscon-
figured. When the firewall is misconfigured, it is unable to validate the suitability of header
packets, and it fails to detect policies based on protocol types, source addresses, and des-
tination addresses, resulting in packets that do not match. Compliance with the policy will
not be refused; however, the consequences may result in the spread of viruses to our own
computers. It's difficult to evaluate the header and payload packets when the IDS is mis-
configured, and erroneous messages can lead to harmful data. Hackers will have an op-
portunity to attack our system now. Once this occurs, it may be too late to reverse the situ-
ation, and data theft or loss will almost certainly occur. So be careful in configuring firewall
and IDS.
2.1.4 Show, using an example for each, how to implement a DMZ, static IP and NAT
in a network can improve Network Security. (P4)
2.1.5 DMZ
Define:
The DMZ (Demilitarized Zone) is an area located between the Local Area Network
and the Internet. This is a place to host servers and provide services for hosts on LAN as
well as other hosts coming from outside LAN. The last step that data packets pass before
being transmitted out to the Internet. This is also the first place where packets arrive be-
fore they are entered on the LAN. [5]
Figure 6 DMZ
Perfomed Student: NguyenVanAnh 22
Its usage:
If we want to secure the local network and reduce damage to the hosts on the LAN,
then we use the DMZ. The DMZ will have different network lines or subnets from the local
network, so hosts from other LANs will not be able to access the LANs, but they can still
use the services that the DMZ provides.
In between the DMZ and the external network we can put a firewall. It will control
the connections from the external network to the DMZ. As for the internal network and the
DMZ, we can add another firewall to control the traffic from the DMZ to the internal net-
work.
A single firewall and a dual firewall are two common configurations. Devices con-
nected to the network interface card (NIC) of a single firewall will connect from the DMZ,
LAN, and Internet, respectively. There will be two firewall devices if dual firewall is used.
Each device will have two network interface cards (NICs). The first firewall will connect to
the Internet and the DMZ, while the second firewall will connect to the DMZ and the LAN.
In comparison to the first way, this strategy is relatively costly. It is, however, far more se-
cure than employing a single firewall.
The DMZ is created to secure the LAN network with two roles that are to provide
services to the host of the LAN and other hosts from other LANs, as well as to protect the
hosts on the LAN from being affected. Hackers attack from other LAN hosts.
2.1.6 Static IP
Define:
• Static IP address will help you connect to the Internet quickly without having
to re-issue a new IP address.
• Some services and games require a static IP address. That means the fixed
IP address does not change, even after rebooting the model.
2.1.7 NAT
Define: [6]
NAT (Network Address Translation) is a technique for converting from one IP ad-
dress to another. Typically, NAT is commonly used in networks using local addresses, re-
quiring access to the public network (Internet). The place where NAT is performed is the
edge router connecting the two networks.
In addition, many organizations can deploy the same IP together, NAT will be used
to solve problems when these organizations want to communicate with each other over the
network.
Figure 7 NAT
Perfomed Student: NguyenVanAnh 24
Usage of NAT:
Static NAT
Static NAT is used to permanently convert one IP address to another, usually from
a local address to a public address and the process is manually set, i.e. only mapping and
address mapping explicitly specify corresponding only.
Static NAT is very useful in cases where devices need a fixed address to be acces-
sible from outside the Internet. These devices are popular servers such as Web, Mail, ...
PAT (Port Address Translation) is a type of NAT that accomplishes the same thing.
Instead of only converting the IP address, the port address is now translated as well (as
determined by Router NAT), so the benefit of NAT is that it can use a public IP address
instead. many private IP addresses - effective for saving IP.
The Network Monitoring Tool is a program that gathers important data from various
portions of the network. It will aid in network management and control. Performance moni-
toring, error monitoring, and account monitoring will be the focus of network monitoring.
It's used to test things like apps, email servers, and so on. It sends a signal or Ping
to the system ports to test the network or its internals. The process of monitoring network
components such as routers, switches, firewalls, and servers is known as network monitor-
ing.
• Mastering tools, equipment, and software for monitoring work, including in-
ternal and open software
• Master the parts, units, systems, services and equipment for monitoring
• Methodically use tools and solutions to support the processing and analysis
of monitoring results. Some tools like Snort, Wireshark, Nessus, Nmap ...
• Make sure employees have good knowledge of this area
• Server – server
• Network infrastructure devices such as hubs, routers, switches.
• Workstation, workstation model
• Devices and systems for network monitoring
• Software and applications in workstations, servers.
SolarWinds Network Performance Monitor is easy to set up and can be ready out of
the box. The tool automatically detects network devices and deploys within an hour. Its
simple approach to monitoring the entire network makes it one of the easiest and most in-
tuitive user interfaces to use.
The product is highly customizable and the interface is easy to manage, changing
very quickly. You can customize web-based performance dashboards, charts, and views.
You can design the right topology for your entire network infrastructure. You can also cre-
ate custom dependency-aware smart alerts and more. [7]
PRTG Network Monitor software is commonly known for its advanced infrastructure
management capabilities. All devices, systems, traffic, and applications on your network
can be easily displayed in a hierarchical view that summarizes performance and alerts.
PRTG monitors IT infrastructure using technologies such as SNMP, WMI, SSH,
Flows/Packet Sniffing, HTTP requests, REST APIs, Pings, SQL and many more.
This is one of the best options for organizations with low network monitoring experi-
ence. The user interface is really powerful and very easy to use.
The solution can manage your network, servers, network configuration and errors &
performance; It can also analyze your network traffic. To run Manage Engine OpManager,
it must be installed in place.
The highlight of this product is that it comes with pre-configured network monitoring
device models. They contain predefined parameters and monitoring intervals for specific
types of devices. The Essential Edition product can be purchased for $595, allowing up to
25 devices.
Highlights of the latest 2017 Plus release are hybrid cloud monitoring, real-time per-
formance monitoring, automatic and manual failover, and expanded visibility for distributed
networks.
WhatsUp Gold is only supported for Windows operating system. The software
comes with different pricing plans to suit your network and wallet.
The network monitoring solution always provides timely notification of the connec-
tion information and the operating status of the devices and resources on the network,
without this solution, you will have to wait until someone among them Use complain with
you, then you will know how to fix the error.
If a device frequently stops working, or the bandwidth for a network segment is of-
ten in a critical condition, it must be changed… all the information that needs to be
changed or upgraded above is covered by the application. network monitoring application
allows you to know in time to make timely decisions.
One of your servers is not working properly, or users cannot access it from the In-
tranet… Without a network monitoring tool, you cannot be sure that the problem is with the
server, the device. switch to which the server is connected, or the router in the network.
Knowing exactly where the problem occurs will save you a lot of time.
Graphical reports will help you keep track of details about the status and activities
going on on the network. They are very useful tools to ensure the quality of services,
promptly indicating which equipment needs to be replaced.
With timely alertness, you have the time and conditions you need to migrate your
critical servers to a backup system until the main system is repaired and back to normal.
often. Without a network monitoring solution, you won't be able to keep up when some-
thing goes wrong and all efforts are already too late.
Many companies spend a lot of money on security hardware and software, but
without a network monitoring solution, you cannot be sure that the security devices are
working properly.
The nature of SIEM, also known as Security information and event management,
was created with the main purpose of collecting data and information about security
events. It ranges from terminals to centralized data storage. Thanks to the analysis results
of the network security system tool, we can detect the risks before the attack of hackers.
[8]
After completing this report, I have gathered my knowledge. I would like to give
special thanks to those who passed this knowledge on to me. And thank you for taking the
time to read my report.
In this assignment 1, I have presented the types of cyber security crimes, how to
fight crimes and protect the network for the company that has hired us as their cybersecu-
rity person. In addition, I also cover firewalls, intrusion detection systems, recent malicious
security incidents, present about DMZ, static IP, NAT, present Propose a method to as-
sess and treat IT security risks, discuss about network monitoring systems and a lot of
knowledge related to keeping the network secure.
[2]. Ruighaver, A.B., Maynard, S.B. and Chang, S., 2007. Organisational security culture: Extending
the end-user perspective. Computers & security, 26(1), pp.56-62.
[3]. Ioannidis, S., Keromytis, A.D., Bellovin, S.M. and Smith, J.M., 2000, November. Implementing a
distributed firewall. In Proceedings of the 7th ACM conference on Computer and communications securi-
ty (pp. 190-199).
[4]. Ashoor, A.S. and Gore, S., 2011. Importance of intrusion detection system (IDS). International
Journal of Scientific and Engineering Research, 2(1), pp.1-4.
[5]. Dart, E., Rotman, L., Tierney, B., Hester, M. and Zurawski, J., 2014. The science dmz: A network
design pattern for data-intensive science. Scientific Programming, 22(2), pp.173-185.
[6]. Egevang, K. and Francis, P., 1994. The IP network address translator (NAT) (pp. 1-10). RFC
1631, may.
[7]. Dauer, P., Khondoker, R., Marx, R. and Bayarou, K., 2015, June. Security analysis of software
defined networking applications for monitoring and measurement: sflow and bigtap. In The 10th international
conference on future internet (pp. 51-56).
[8]. Stolze, M., Pawlitzek, R. and Wespi, A., 2003. Visual problem-solving support for new event tri-
age in centralized network security monitoring: Challenges, tools and benefits. IT-incident management & IT-
forensics–IMF 2003.