Network Security Breaches and Goals

Network security breach 

A security breach is any incident that results in unauthorized access of data, applications, services, networks and/or devices by bypassing their underlying security mechanisms

Example of Breaches 
  • Spear Phishing, aimed at individuals and are usually sent with forged emails, appearing like financial institutions or other legitimate businesses. 
Image result for facebook phishing kali linux
Image result for facebook phishing kali linux
  • Drive By Downloads,hacker finds a vulnerability, getting into the website dashboard, a malicious code can be implanted and anyone simply visiting the website will be infected
  • Flash Drive Infections, It's possible to place malicious programs on these drives and all you need to do is plug into your computer and it will load the program with an "autorun" feature as it can access the computer network and compromised the whole network business system 
  • Scanners,constantly on the lookout for servers with hidden vulnerabilities. You can have exceptional network system security but when someone is scanning your system on a regular basis, they may uncover new vulnerability issues
  • WiFi Invaders, no or simple passwor of a WiFi network  
Prevention: 
  • Make sure the link send are from legit email and not suspicous email 
  • make sure the network or website is up to do date 
  • Buy an authentic flash drive 
  • Constant schedule of scanning the system/network on daily basis 
  • Use strong password with using sotware like TCL/SSL cetificate, code signing and such 

Goals of Network Security 




  • Confidentiality
Confidentiality refers to the protection of data from unauthorized disclosure to a third party. Whether it is customer data or internal company data, a business is responsible for protecting the privacy of its data.
  • Integrity
Integrity refers to the assurance that data is not altered or destroyed in an unauthorized manner
  • Availability
Availability is defined as the continuous operation of computing systems. Applications require differing availability levels, depending on the business impact of downtime. For an application to be available, all components must provide continuous service. These components include application and database servers, storage devices, and the end-to-end network
The function of "Availability" in Network Security is to make sure that the Data, Network Resources or Network Services are continuously available to the legitimate users, whenever they require it.









Instantssl.com. (2018). Types of Network System Security Breaches | Data Protection. [online] Available at: https://www.instantssl.com/articles/common-network-system-security-breaches.php [Accessed 10 Oct. 2018].


Techopedia.com. (2018). What is a Security Breach? - Definition from Techopedia. [online] Available at: https://www.techopedia.com/definition/29060/security-breach [Accessed 10 Oct. 2018].


Omnisecu.com. (2018). Primary Goals of Network Security - Confidentiality, Integrity and Availability. [online] Available at: http://www.omnisecu.com/ccna-security/primary-goals-of-network-security.php [Accessed 10 Oct. 2018].


ExamCollection. (2018). Goals of Security Confidentiality, Integrity, and Availability. [online] Available at: https://www.examcollection.com/certification-training/security-plus-goals-of-security-confidentiality-integrity-availability.html [Accessed 10 Oct. 2018].


https://www.cisco.com/web/learning/netacad/demos/FNSDemo1_1/ch1/1_1_3/index.html






Comments

Popular Posts