Cyber Security & vulnerabilities and Cyber Security Safeguards
Cyber
Security & vulnerabilities and Cyber Security Safeguards
Overview:
Are weakness
of a system that Given threat the opportunity to compromise assets
All System
have Vulnerabilities even through the technologies are improving but the number
of vulnerabilities are increasing Sach a ten of millions of item of code many
Developer human weakness etc.
Vulnerabilities
mostly happened because of hardware & S\w
network and procedural vulnerabilities
Hardware
vulnerabilities : is a weakness which can use to
attack the system h/w through physically & remotely
Old version
of System & devices unprotected
storage unincited devices Etc.
Software
vulnerabilities
s/w error happened in development or configurated
such as the execution of it can violate the Security policies
look of
input valuation
unverified
upload
cross side
scripting
unencrypted
data etc.
network vulnerabilities
the
weakness happened in the organization operational methods
unprotected
communication
malware
medusoids s/w
social
engineering attacks
misconfigured
firewall
procedural vulnerabilities the weakness happened in an
organization methods
password
procedure: should follow the standard password policy
vulnerabilities
in a s/w system administration:
is a
responsible for managing & maintaining an organization it infrastructure
ensuring that h/w ran smoothly securely & efficiently
the key
responsible typically include:
System
installation & configuration:
· Salting up os application &
software tool
User
management:
· Create up ceding & managing user
Account permission & rule
Security
Administration:
· Implementing Security measure managing firewall and marketing for travel
Performance
mentoring & optimization:
· Ensuring system run efficiently
& troubleshooting issues
Backup
recovery :
·
Seating
up data backup and disaster recovery plans
Complex
network Architecture
Declare
and maintaining network is challenging process that requires integrating
various technologies such as : h/w and electrical System
Layered
: is a design framework used in
networking to organize & simplify the complex communication system
It divide
the networking process into different layer assign specific set of task and
responsibilities
The Structure approach ensure modularity
flexibilities and easer
The most
commonly used Architecture are OSI model
TCP/IP
Open System
interconnection model is a theoretical framework developed by ISO for
understanding & implementing network protocol consist of 7 layer
§ Physical layer
§ Data link layer
§ Network layer
§ Transport layer
§ Sebastian layer
§ Presentation layer
§ Application layer
TCP/IP:
Is a foundational
framework for Moden networking providing
a techitecture the underpin the internet most communication System
How data
is transmitted routed & recovered
accrossimplemented methods’
·
Application layer
·
Transport layer
·
Internet layer
·
Network access layer
Open access
organization Data
Refer to
the protective making data and another material easily accessible for both internal
& external participation
Open data
and data collaboration allow organization to share and access data that then
able them economical environmental benefit open organization week make their
data and other material easily accessible to both internal & external
participants
Weak Authentication:
Means
cryptographic authentication b/w previous unknown parties without relying on
trusted third parties
Toolbox:
Special Separation:
Ensure pear
to reliable via specific communication path
Physical contact
/network /path/ quality of a path
Terminal separation
Ensure pear
is still the same peer session /inner- session
Asymmetric
cast wars:
Cryptographic
semantics of identifiers
Weak authentication
refer to security measure that are insufficiently measure that are insufficicantly
robots to efficiently verify
the identify of user of a system
This leads
to understands access and potential security breahare near some key point above
weak authentication
Cyber Security Safeguards
A safeguards
is cyber security refer to combination
of measure implemented secure system and data from attacks and unfaith
raised access this measure are design to specify specification such as confidentiality in integrity and availability
of a system
Safeguards
is important at all level of system to system to insure max position against all possible type of
cyber threat
Access
control manage :
This is
define mechanism that restrict access to a system info. By unauthorized user at
inside authorization and accounting that
help to insure only authorized user have access to data and system
Firewalls
are the network security devices that monitor control network traffic &
help the block authorized access it one
of the most efficiencies safeguards in cyber Security
Vulnerabilities
Scanner:
Are tool
design to detect any vulnerabilities or weakness in a system that can be exploited
by attacker these tool help fix the
vulnerabilities to ensure the system can withstands attacks
Security
policies & procedures:
Are guidelines
are rule that are established to mitigate cyber threat that publicizes inside password
policies patch management incident response procedures and data backup and
recovery policies
Safeguarding
a system required a integration of
multiple security measure to aware protection max. awareness against Cyber
threat
Access
Control: is a security technologies
That regular
who can view user or access creation
measure with in an organization ‘
The Security
process ensure that sensitive area and
system are only available to authorized user
Physical access
control:
Manage enter
of physical location using tool like took biometric device or keywords
Layer access
control manage concentration to digital system including data access application
network
Access control
security combines these to aspect creating a robust framework for protecting assets
Access control
impact for security :
To minimize
risk and ensure compline its protective nature provide multiple benefits
Managing risk : prevent
unauthorized access to sensitive area and system
Enhancing
data security : protect critical info. For
benefits
Ensuring compliance:
align with religion lake GOPR And PCIDSS
It is
process of that combine use to conform that only the right people services and
app with a right permissions get organizational resources it is a important
part of cyber security because of bad actor number one policy to gain unauthorized access to system they do this by
stealing the username & passwords of user that do not access the
authorization process induce 3 primary steps
Identification
user establish who they are specially through username
Authorization
typically user prier they are who are by entering password sometime only user
they supported who know
Organization
also required that they identify with something they have or something
they are
The
system verify that the user have permission to the system they are attempting to
access
BIOMETRICS:
Is a measure
of biological or behavioral feature within or use for identification of
individual most of these feature and cannot be grossed and stolen
Biometric
System:
It
is a system that that is individual physical
behavioral or both traits as individual analysis and identifies the individual
as legate or user
Comments
Post a Comment