Saturday, May 7, 2011

ICND 2

err.. salam..
da lama x post kat sini.. :P
busy skett..
bukan busy ape.. busy ber fb.. hehe
td pagi baru abeh bootcamp icnd..
adehh. 4 hari nk sumbat semua syllibus.. haihhh~
tapi ok gak la.. at least ley refreshh balik utk persediaan..
kalo x, x der nye aku nk ngadap nota nk tgok balik..
tima kaseh cik mimah..
lecturer yang berdedikasi...
susah payah cik prepare soalan suma..
suma sbb cik nak tgok student cik berjaya..
sama lah mcm netrider dulu..
penat lelah cik x penah peduli..
terima kasih..
preparation da buat..
skang ni atas diri sendiri plak nk ulangkaji balik..
err.. takott.
masa latihan x per la. byk masa nk jawab..
nnt..
dengan ketaqnya..
dengan kejar masa nyaa..
emm..
berserah je laa..
doakan yg terbaikk..
kita cuma merancang.. Tuhan yang menentukan.. ~
redho saja apa keputusannya nnt.
:)

Wednesday, April 13, 2011

F5108 -CHAPTER 1 -cont INTERNET SERVICES n ATTACK

INTERNET SERVICES


ELECTRONIC MAIL AND NEWS

  • ways for people exchanging information without requiring immediate n interactive response.

FILE TRANSFER

  • exchange files.

REMOTE ACCESS TO HOST

  • log on from a distant location

REAL TIME CONFERENCING SERVICES

  • Online (video conference)

+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++


ATTACK


1. information theft

:: allow attacker to get data without directly use our computers. ::


how >> - dumpster diving n steal email

used for>> - to access bank account or to make loan



2. unauthorized disclosure


::employees leaking confidential information to attacker or attacker planted spies in order to steal information ::


how>> -planting virus, trojan horse or snooping software



3. information warfare



::remotely disabling target using software , disinformation >> false /inaccurate information that is spread deliberately ::



4. Accidental data loss



::caused by coincidently delete wrong file , usually causing by careless employee or untrained employee::


++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++


SECURITY THREAT


categories :

  1. data disclosure - exposure data to third parties. key point to ensure that disclosure are relevant and necessary
  2. data modification
  3. data availability

activities :

  1. hacking - modifying computer hardware n software
  2. cracking -breaks into someone computers system pr bypass password or licence in computer programs.




F5108 -CHAPTER 1 -cont SECURITY MODEL

OPEN SECURITY MODEL

  • easy to implement
  • few security measures
  • simple password
  • assume all users are trusted protected asset minimal and threat are minimal.
  • free access for user
  • implement data backup system in most case.

RESTRICTIVE SECURITY MODEL

  • More difficult to implement
  • more security measures
  • firewall and identity server.
  • some user are not trustworthy , protected asset are substantial and threat are likely to occur
  • LAN that connected to WAN or internet usually use this type of model.

CLOSED SECURITY MODEL

  • most difficult to implement
  • all security measures
  • assume all user are not trustworthy, protected asset are premium
  • user access is difficult
  • organization require high number and trained network admin to maintain tight security
  • network admin need to have high skills and more time to administer

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

SECURITY METHOD


  • log on - log on form
  • File system - can access only certain file + encrypt data along transmission
  • Data Communication -encryption confidential data
  • Administrative -different level user have different privilege access + admin define the rules.


F5108 -CHAPTER 1 -cont definition of ASSET OF IDENTIFICATIN, VULNERABILITIES ASSESSMENT AND THREAT IDENTIFICATION

(asset identification :

  • tagging devices or intangible asset (database) with physical label (barcode) or Radio Frequency Asset
  • to avoid competitors take an advantages when asset lost

Vulnerability Assessment :

  • search for a weakness in order to apply a patch or fix to prevent a compromise
  • ways: eg- installing vendor patches and implementing or virus scanning software.

threat identification :

  • listing all possible threat that can be occur.

Tuesday, April 12, 2011

F5108 -CHAPTER 1

INTRODUCTION TO NETWORK SECURITY

definition :

- protection of network n their services
- protects from : unauthorized modification , destruction n disclosure
- ensure d network performs it function correctly n no harmful side effect. ~


concepts :

-start with authentication (user)
- Firewall enforces access policies (whether allowed or not )
- antivirus or IPS help to detect n inhibit action of such as malware.
-audit (for analysis purpose)
-communication in network must be encrypted.


goal:

  • confidentiality - privacy .
  • integrity
  • availability- ensure that network doesn't down n still up every time.
potential risk :

  • email attachment -open attachment n worms or virus will spread on to network
  • diversionary tactics - slip in attack another part of network while admin recovering the services
  • blended attack - virus or worm may be execute themself and attack more than one platform
  • renaming document - subject name changed causing the document can't be open by receiver.

Monday, April 11, 2011

Cisco Lifecycle Services

  • The Prepare Phase
- we must ensure that the network can be supported the goals of organization based on business case.
-establish financial justification for network strategy.. ~


  • The Plan Phase
- identifying initial network requirement based on goal, facilities, user need n other factors.

- characterizing sites n existing network (only it is for upgraded)

- A project plan is useful to help>>>> manage the tasks, responsibilities, critical milestones, and resources required to implement changes to the network.

- Project Plan should align with the scope, cost, and resource parameters established in the original business requirements.


  • The Design Phase

- Design based on information (goals, requirement n others) that are collected during prepare n plan phase. :)


  • The Implement Phase

- after design approved, implementing the network will be build. >> according to design specification...


  • The Operate Phase

-maintaining the netwirk day to day..


  • The Optimize Phase

-redesign the network if the network not supported the requirement needed n maybe doesn't meet the expectation...~


shortcuts ...= >>> PPDIOO :)