Unit 2
Unit 2
Unit 2
Q2 what are the consideration for data security in regards with data backup ,archival and
disposal?
Ans: - Security of data means maintaining its confidentiality - Integrity- Availability (CIA)
properties, which requires certain points to be considered
• These data security considerations are related to
– Data backup,
– Data archival, and
– Data disposal
Data backup security
To manage data properly, we must consider data backup, which is the primarily used for the
purpose of data security against any kind of accident and loss of data due to some malicious
activities. Backup of data is nothing ,but storage of snapshot of data at certain points, and in case
of data is loss due to some reason ,you could restore the most recent form of data.
Data backup security considerations
• Should you consider backing your entire system or only a specific set of files
• Does the organization you are working for has some backup policy
• How frequently should your data be backed up
• Which storage media should you use for data backup
• In which format should you store your files
• Should you back up your files incrementally or differentially
• How should you validate your backup copies.
Data archival
The process separating older(or currently inactive)data from currently active ,new, and fresh data
is known as archival of data. The separated old data is moved to a different storage device so that
data can be retained for a long time and reference whenever required.
The process of data archival requires moving selected part of data to different location to reduce
cost, save storage space in online system, reduce access complexity and improve system
performance. Archived data is stored according to the object context and indexed so that finding
them become easy whenever required in future
Data Archival Security Considerations
• Longevity of storage solution
– long term objective be kept in mind. Changes should be incorporated easily
• Manageability of storage solution
• Amount of focus on intelligence of content
– importance to certain data is a critical matter.
• Optimization of total cost of ownership
– should provide technical and administrative functionalities that help in reducing
cost
• Type of available solution
– should be able to accommodate scaling needs and support third party product
integration
Data Disposal
Destruction of data means to completely wipe out the data from the storage media. This process of
wiping out the data completely is called data disposal.Data disposal is an act of permanently
deleting or destroying the data stored in media.
Sometimes require destroying the data permanently for some security or compliance
reasons.Whenever legacy or obsolete system and device are replaced ,removal of data stored in
those system and device at present is must.
Data Disposal Security Considerations
• Data stored in legacy and obsolete systems must be removed carefully.
• Data disposal methods are as follows:-
– Overwriting hard drives- device could be reused.
– Degaussing hard drives and backup tapes
– Destroying storage media-should be done with the help of scrappers only. All
devices should be converted into metal scrap.
• Formatting is not a good option since the data may be recovered with the help of certain
tools.
Q3:- Discuss the various types of firewall. How can we use firewall to secure our network
applications?
Ans: - In computing, a firewall is software or hardware-based network security system that
controls the incoming and outgoing network traffic based on applied rule set. A firewall establishes
a barrier between a trusted, secure internal network and another network (e.g., the Internet) that is
not assumed to be secure and trusted.
Types of firewall
• Packet filter
• Application level gateway(or proxy)
• Circuit level gateway
Packet-Filtering Router
A packet-filtering router applies a set of rules to each incoming and outgoing IP packet and then
forwards or discards the packet. The router is typically configured to filter packets going in both
directions (from and to the internal network). Filtering rules are based on information contained
in a network packet:
• Source IP address: The IP address of the system that originated the IP packet (e.g.,
192.178.1.1)
• Destination IP address: The IP address of the system the IP packet is trying to reach (e.g.,
192.168.1.2)
• Source and destination transport-level address: The transport level (e.g., TCP or UDP)
port number, which defines applications such as SNMP or TELNET
Application-Level Gateway
An application-level gateway, also called a proxy server, acts as a relay of application-level traffic.
The user contacts the gateway using a TCP/IP application, such as Telnet or FTP, and the gateway
asks the user for the name of the remote host to be accessed. When the user responds and provides
a valid user ID and authentication information, the gateway contacts the application on the remote
host and relays TCP segments containing the application data between the two endpoints.
Circuit-Level Gateway
A third type of firewall is the circuit-level gateway . This can be a stand-alone system or it can be
a specialized function performed by an application-level gateway for certain applications. A
circuit-level gateway does not permit an end-to-end TCP connection; rather, the gateway sets up
two TCP connections, one between itself and a TCP user on an inner host and one between itself
and a TCP user on an outside host. Once the two connections are established, the gateway typically
relays TCP segments from one connection to the other without examining the contents. The
security function consists of determining which connections will be allowed.
A firewall that implements the first policy allows all services to pass into the site by default, with
the exception of those services that the service access policy has identified as disallowed. A
firewall that implements the second policy denies all services by default, but then passes those
services that have been identified as allowed. This second policy follows the classic access model
used in all areas of information security.
The first policy is less desirable, since it offers more avenues for getting around the firewall, e.g.,
users could access new services currently not denied by the policy (or even addressed by the
policy) or run denied services at non-standard TCP/UDP ports that aren't denied by the policy.
Certain services such as X Windows, FTP, Archie, and RPC cannot be filtered easily, and are
better accommodated by a firewall that implements the first policy. The second policy is stronger
and safer, but it is more difficult to implement and may impact users more in that certain services
such as those just mentioned may have to be blocked or restricted more heavily.
The relationship between the high level service access policy and its lower level counterpart is
reflected in the discussion above. This relationship exists because the implementation of the
service access policy is so heavily dependent upon the capabilities and limitations of the firewall
system, as well as the inherent security problems associated with the wanted Internet services. For
example, wanted services defined in the service access policy may have to be denied if the inherent
security problems in these services cannot be effectively controlled by the lower level policy and
if the security of the network takes precedence over other factors. On the other hand, an
organization that is heavily dependent on these services to meet its mission may have to accept
higher risk and allow access to these services. This relationship between the service access policy
and its lower level counterpart allows for an iterative process in defining both, thus producing the
realistic and sound policy initially described.
The service access policy is the most significant component of the four described here. The other
three components are used to implement and enforce the policy. (And as noted above, the service
access policy should be a reflection of a strong overall organization security policy.) The
effectiveness of the firewall system in protecting the network depends on the type of firewall
implementation used, the use of proper firewall procedures, and the service access policy.
Ans: - Advantages
• Eliminating the need for expensive long-distance leased lines
• Reducing the long-distance telephone charges for remote access.
• Transferring the support burden to the service providers
• Less operational costs
Disadvantages
• VPNs require an in-depth understanding of public network security issues and proper
deployment of precautions
• Availability and performance depends on factors largely outside of their control
• VPNs need to accommodate protocols other than IP and existing internal network
technology
Q7 what is Intrusion Monitoring and Detection?
Ans: - Network monitoring refers to the process of tracking the activities that are being performed
in the network. This task of monitoring the activities of a network can be assigned to a specific
computer or a set of computers. The computers that act as a network monitoring system must
always be kept on consist of strong power lines and backup generators. The system performing the
task of monitoring the network sends a ping command to all computers that are available in the
network.
• An intrusion detection system always has a sensor as its core element that is used to
detect intrusion.
• The data received by these sensors is obtained from various sources such as IDS
knowledge database and audit trail
• IDS work similar to antivirus software. Some IDS detect malicious activities by
comparing traffic patterns against a baseline and look for anomalies.
Types of Intrusion Detection system
• Network based IDS
• Host based IDS
• Signature based IDS
• Statistical anomalies based IDS