CDS are policies defined by management, therefore they must be in writing and easily understand.
All devices in a network must be able to achieve a required security level, if lower limits are breached then remediation must be found quickly.
Cisco has defined the security anatomy which must be followed, if not then the support calls will become harder. Although not strictly defined within a PRINCE2 Foundation project, Cisco would run it as such.
Physical security is broken into two Circumvented Phases, the first one is protecting network resources from physical theft.
Network security is the responsibility of every user using the network. This includes the use of password protection, use of firewalls, VPN, encryption and screening hardware.
When a user needs to secure personal data there are a number of ways, one such method being identity management.
Firstly, all the resources must be listed in someone’s access rights because having just one user account creates deployment and operation risks.
We have to send an authentication token to the user to authenticate their identity. Authentication tokens prevent unauthorized access to resources, which also gives the user account rights.
Network security management then checks that the user has the necessary rights to the resources they need.
Platform authentication is important because some users may be allowed to perform a certain operation only on a limited range of devices.
Different organizations within a company may have different security policies. All users must therefore be given the same level of protection to ensure that information is secure.
Different control objectives must then be followed, which include the following:
-Authentication of users to ensure that they are who they claim to be.-Identification of users to ensure that information is not compromised.-Confidentiality to ensure that the data is not compromised and is not confused with something else.- integrity to ensure that the data is not changed without authorization.-distribution control to ensure that messages are not routed to unauthorized users.
Operations Management
The use of Policies for Platform Authentication is important to ensure that passwords are kept secure and that operations are not being inhibited.
Personal Firewalls
It is important to have a firewall in place to protect user’s information from unauthorized access.
Penetration Testing
Penetration testing is a method used to breach security and access information in a system. The purpose of penetration testing is to identify any security vulnerabilities within the systems.
Management
The company use a number of devices to monitor and measure network security. Some of these devices are isolatedphysical devices such as surveillance cameras, which are placed to monitor the security of a specificrant·
Other more common devices include network intrusion detection appliances, such as honey pots, that are networked to other systems to monitor network traffic for passwords, operating system use, and file transfers.
The information is then sent to the proper place, which is then used to give information to the appropriate person.
Personnel are then hired to guess passwords or systems to see if someone can break into the network to access the information.
It is not known whether or not the company has been hacked due to this, but if there has been a breach the company should know about it.
This is how a company will find out if someone has breached its security systems and if the company’s network has been compromised.
Password Dynamics
A lot of small businesses have bad passwords and even worse practices when it comes to storing them.
During the information security review, password weaknesses were identified and new passwords were developed and practiced.
The study discovered that 15.3% of the accounts had seven or more characters and 52.8% had ten or more characters. However, only 47.4% of the accounts were longer than 13 characters.
A lot of the passwords were developed using a base meaning which makes it easy to remember them. For example, there are letters in base 16, letters in base 10, and letters in base 6. It is easy to remember these types of passwords especially if they are collected in one place.
Consistency is one of the characteristics of a strong password. A consistent password should not change over time, especially when the user becomes more aware of possible threats from malware.
A weak password may include real words, numbers, and symbols. It is important to keep passwords like this consistent to maintain safety.
Logins
Many times, a user needs to use the same login credentials across several online accounts. For example, a user may need to use the same login credentials to open his/her email account, to open a credit card account, to open an internet bank account, and to open another email account..
It is not recommended to use email passwords and usernames for multiple online accounts. An superior username/password combination is a strong one that is easy to remember across different applications.
We should always avoid using the same username and password for different applications.