Cyber Security 2
Cyber Security 2
KCA-A01
Cyber Security
Q2. Intrusion Detection is the backbone of Information System (IS). Justify this
statement.
Logical access control- This type of access control limits connection to computer
networks, system files, and data.
The more secure method for access control involves two - factor authentication. The
first factor is that a user who desires access to a system must show credential and the
second factor could be an access code, password, and a biometric reading.
Firewall match the network traffic against the rule set defined in its table. Once the
rule is matched, associate action is applied to the network traffic. For example,
Rules are defined as any employee from HR department cannot access the data from
code server and at the same time another rule is defined like system administrator
can access the data from both HR and technical department. Rules can be defined on
the firewall based on the necessity and security policies of the organization. From
the perspective of a server, network traffic can be either outgoing or incoming.
Firewall maintains a distinct set of rules for both the cases. Mostly the outgoing
traffic, originated from the server itself, allowed to pass. Still, setting a rule on
outgoing traffic is always better in order to achieve more security and prevent
unwanted communication. Incoming traffic is treated differently. Most traffic which
reaches on the firewall is one of these three major Transport Layer protocols- TCP,
UDP or ICMP. All these types have a source address and destination address. Also,
TCP and UDP have port numbers. ICMP uses type code instead of port number
which identifies purpose of that packet. Default policy: It is very difficult to
explicitly cover every possible rule on the firewall. For this reason, the firewall must
always have a default policy. Default policy only consists of action (accept, reject or
drop). Suppose no rule is defined about SSH connection to the server on the firewall.
So, it will follow the default policy. If default policy on the firewall is set to accept,
then any computer outside of your office can establish an SSH connection to the
server. Therefore, setting default policy as drop (or reject) is always a good practice.
(b) VPNS : VPN stands for Virtual Private Network. It refers to a safe and encrypted
network that allows you to use network resources in a remote manner. Using VPN,
you can create a safe connection over a less secure network, e.g. internet. It is a
secure network as it is completely isolated from rest of the internet. The government,
businesses, military can use this network to use network resources securely.
VPN is free to use and it uses site-to-site and remote access methods to work. It uses
an arrangement of encryption services to establish a secure connection. It is an ideal
tool for encryption; it provides you strong AES256 encryption with an 8192bit key.
VPN works by creating a secure tunnel using powerful VPN protocols. It hides your
IP address behind its own IP address that encrypts all your communication. Thus,
your communication passes through a secure tunnel that allows you use network
resources freely and secretly.
There are several different VPN protocols that are used to create secure networks.
Some of such protocols are given below;
IP security (IPsec)
Point to Point Tunneling Protocol (PPTP)
Layer 2 Tunneling Protocol (L2TP)
Secure Sockets Layer (SSL) and Transport Layer Security (TLS)