Thursday, 26 April 2012

Security Policy

Security Policy is defined as living documents which allow organization and management team to draw clear and understandable objectives, rules and formal procedures and goals that will help the overall security posture and architecture. Its main purpose is to explain what is deemed as allowable and what is not, engaging them in securing the company critical systems. It is also derived that policy practices with regard to integrity, confidentiality and availability.
Confidentiality is ensuring that the only people who can access to information are the authorized person. It’s to prevent information being exploited and this helps to keep valuable information only in the hands of those who can view it. Integrity is all about maintaining the state or value of information. It means that it is safely protected from unauthorized modification. This is to ensure that all the information are genuine and can’t be modified or destroyed. Availability is to ensure that all information system is always available when it is needed. This is to support the critical business processing.

Therefore by having a good security policy, it can react or recover from situations in the minimal time like risk assessment, disaster, administrative responsibility, password policy, user responsibilities, E-mail policy, internet policy and intrusion detection.

Common Networking Attacks Threats and Solution

Networking attack are defined as threat, intrusion, denial of service or any other attack that will probe your network to gain information or data to cause the network to become corrupted or crash. The attacker may not only be interested in exploiting the software application but they will try to obtain unauthorized access to the network devices. By doing that, they can take control the entire network of your computer. Here are some examples of threats that are commonly used in this society for network attack namely Spoofing, Sniffing, Trojans and Dos and DDos etc.

Spoofing:
IP spoofing makes any payload appear to come from any source which is difficult to find the host that sent the datagram. It takes place when internet connected device send IP datagram into the network. Such internet data packets will carry the sender’s IP address. If the attacker takes control over the software running on that network device, he can easily alter the device’s protocol to place random IP address into the data packet’s source address field.
In order to counter IP spoofing, we need to have ingress filtering. It is perform by routers. The router will check the IP addressing of incoming datagram and decide whether the source is known to be reachable via that interface or not. If it’s not in valid range, the packet will be discarded.