system and network defence

System and Network Defence

This article centers on the management of cybersecurity operations, encompassing activities such as designing, building, operating, and continuously enhancing an organization’s overall security capacity. The initial line of defense revolves around ensuring the physical security of network equipment. In parallel, there exist dedicated application security measures designed to safeguard software integrity. It’s crucial to acknowledge that network services and protocols carry their own set of vulnerabilities, necessitating specific protective measures tailored to their unique characteristics.

One effective strategy is network segmentation, which involves creating Virtual LANs (VLANS) to bolster network resilience. To enhance the security of your users’ wireless and mobile connections, it is advisable to implement one of the WPA standards. Moreover, numerous tools are available to fortify cybersecurity resilience within network design.

Furthermore, as a cybersecurity technician, it is imperative to recognize the interconnected nature of various devices, including medical equipment, automobiles, and drones.

These devices are susceptible to potential cyber threats and must be diligently shielded. Thus, it becomes paramount for every organization to establish multiple layers of security mechanisms and controls, enabling a proactive response to cybersecurity threats. This article will provide insights into the effective management and monitoring of these security layers to identify risks and safeguard against cyberattacks.

Physical Security

Physical Security is the first element of network security. It is the set of measures and safeguards put in place to protect the physical components and infrastructure of a computer network from unauthorized access, damage, theft, or any other physical threats. It involves implementing security controls and practices to ensure the physical integrity and confidentiality of network resources and data. Physical network security measures can include the use of access control systems, surveillance cameras, locks, keycards, biometric authentication, secure facility design, and other physical barriers to prevent unauthorized individuals from physically accessing network equipment, servers, data centers, and other critical network assets. The primary goal of physical network security is to mitigate risks and vulnerabilities associated with physical threats and to maintain the availability and reliability of network services.

Application Security

Application security, often abbreviated as “AppSec,” refers to the practice of safeguarding software applications and systems from security threats and vulnerabilities. It involves the implementation of protective measures and best practices throughout the software development lifecycle to prevent unauthorized access, data breaches, and malicious attacks. These measures include code reviews, penetration testing, encryption, authentication, and authorization mechanisms. The goal of application security is to ensure that software applications are robust, resilient, and resistant to exploitation, thus safeguarding sensitive data and preserving the integrity of the application and the user’s trust. Effective AppSec is essential in today’s digital landscape to counter evolving cyber threats.

Application Development

In order to uphold security throughout all phases of application development, it is crucial to adhere to a strong and comprehensive process. The development phases are following:

Developing and testing

Software undergoes its development and updates within a dedicated development environment, providing a controlled space for coding, testing, and debugging before deployment. This development environment is intentionally less restrictive and features lower security measures compared to the live environment. To keep track of alterations in the software code, version control software is employed, ensuring organized management of changes. Developers may also utilize a sandbox environment to prevent unintentional code overwrites while in the development phase.

During the testing phase, developers assess how the code interacts within the standard operating environment. Quality assurance (QA) actively identifies and reports any software defects. Addressing defects at this stage is considerably more efficient and less complex.

Staging and production

Staging environments should closely resemble the production environment used by the organization. By conducting tests within a staging environment, developers can ensure that the software operates within the specified security parameters. Once the developer has successfully tested the program’s security features, it can then be deployed into the production environment.

Provisioning and deprovisioning

Provisioning involves either creating or updating software, while deprovisioning entails its removal.

An organization can streamline software provisioning and deprovisioning by implementing a self-service portal for automation.

Security Coding Techniques

While coding applications, developers employ various methods to ensure that they have fulfilled all security prerequisites

Normalization

Normalization is a technique employed to structure data within a database, with the aim of preserving data integrity. It simplifies an input string to its most basic recognized form, ensuring that all strings possess distinct binary representations and enabling the detection of any potentially malicious input

Stored Procedure

A stored procedure comprises precompiled SQL statements stored within a database, designed to perform specific tasks. When employing a stored procedure to handle input parameters from clients with varying data inputs, you can minimize network traffic and achieve quicker results

Obfuscation and Camouflage

Developers can employ obfuscation and camouflage techniques to deter the reverse engineering of software. Obfuscation involves concealing genuine data with random characters or other data, while camouflage substitutes sensitive information with realistic yet fictitious data

Code Reuse

Code reuse involves the utilization of pre-existing software to construct new applications, resulting in time and cost savings in development. However, it’s essential to exercise caution to prevent the introduction of potential vulnerabilities.

SDKs

Third-party libraries and Software Development Kits (SDKs) serve as valuable sources of code that expedite and economize application development. However, it’s important to note that vulnerabilities within these SDKs or third-party libraries have the potential to impact numerous applications.

Input Validation

Effective control over the data input process is essential for upholding the integrity of a database. Databases frequently face attacks aimed at injecting malformed data, potentially leading to issues such as application confusion, crashes, or unintended disclosure of sensitive information to attackers. Below, you’ll find an example illustrating this scenario—an automated input attack.

In this scenario, customers utilize a web application form to subscribe to a newsletter. An automated database application promptly generates and dispatches email confirmations to these customers. However, attackers manipulate the URL links contained in these emails. These alterations can result in changes to customer usernames, email addresses, or subscription statuses when they click to confirm their subscription. Consequently, when the email returns to the host server, it receives inaccurate information, which may go unnoticed unless each email address is cross-checked against the subscription data.

Hackers can mechanize this attack, inundating the web application with a multitude of invalid subscribers in an attempt to compromise the newsletter database.

Validation Rules

A validation rule verifies that data aligns with the guidelines set by the database designer. It plays a crucial role in guaranteeing the thoroughness, correctness, and uniformity of data. The criteria considered within a validation rule encompass:

  1. Size – verifies the character count in a data entry.
  2. Format – ensures data adheres to a designated format.
  3. Consistency – checks for code uniformity among interconnected data elements.
  4. Range – confirms that data falls within a specified minimum and maximum range.
  5. Check digit – includes an additional calculation for generating a check digit, enhancing error detection.

Integrity Checks

Integrity Test
System and Network Defence 3

Data breaches pose a risk to the security of your devices and systems.

To safeguard data integrity, an integrity check assesses the consistency of information within a file, image, or record, ensuring it remains unaltered. This process employs a hash function to capture a data snapshot, subsequently verifying that the data remains unchanged. An example of such a hash function is a checksum.

How a checksum works

A checksum serves as a means to validate the integrity of files or strings of characters both before and after they are transferred between devices, whether it’s across a local network or the Internet. Checksums essentially convert each piece of data into a value and then calculate a total. When assessing data integrity, the receiving system replicates this process. If the two totals match, it signifies that the data is intact. Conversely, if they don’t match, it indicates that a modification has occurred somewhere during the transfer.

Hash Functions

Popular hash functions encompass MD5, SHA-1, SHA-256, and SHA-512. These employ intricate mathematical algorithms to evaluate data against a hashed value. For instance, once a file is downloaded, users can validate its integrity by comparing the hash values generated by a hash calculator with those provided by the source.

Version Control

Organizations employ version control to prevent unintended alterations by authorized users. Version control ensures that two users cannot simultaneously modify the same item, be it a file, database record, or transaction. To illustrate, when the first user opens a document, they have the authority to make changes. Meanwhile, if another individual attempts to access the document while the first user is editing it, they will only be able to view a read-only version

Backups

Reliable backups play a crucial role in preserving data integrity in case of data corruption. It’s essential for an organization to validate its backup procedures to guarantee the integrity of these backups.

Authorization

Authorization dictates access to an organization’s resources, following a ‘need-to-know’ principle. For instance, through file permissions and user access controls, only specific users with a legitimate reason can alter data. An administrator has the ability to designate a file as ‘read-only,’ meaning that any user trying to access it won’t be able to make any modifications.

Other Application Security Practices

How can you ensure the authenticity of software you’re installing or the security of your information while browsing the Internet?

Code Signing

Code signing serves as evidence that a software program is genuine.

Executable files created for installation and use on a device undergo digital signing, which confirms the identity of the author and guarantees that the software code remains unaltered since its signing.

Secure Cookies

Utilizing secure cookies safeguards the data stored in them from potential hackers.

When your client system communicates with a server, the server sends an HTTP response that directs your browser to generate one or more cookies. These cookies retain data for future requests while you navigate the website.

Web developers should employ cookies alongside HTTPS to enhance their security, ensuring that cookies are not transmitted via unencrypted HTTP.

Managing Threats to Applications


Organizations have the capability to put in place multiple strategies for handling risks within the application domain. They can get following measures

Unauthorized Access to Sever/System Room/Data Centers

Sever and System Up and Down Time

Network Operating System Vulnerability

Unauthorized Access of operating system

Data Loss

Software Development Vulnerabilities

Avatar of Asad Ijaz

Asad Ijaz

NetworkUstad's lead networking architect with CCIE certification. Specializes in CCNA exam preparation and enterprise network design. Authored 2,800+ technical guides on Cisco systems, BGP routing, and network security protocols since 2018. Picture this: I'm not just someone who writes about tech; I'm a certified expert in the field. I proudly hold the titles of Cisco Certified Network Professional (CCNP) and Cisco Certified Network Associate (CCNA). So, when I talk about networking, I'm not just whistling in the dark; I know my stuff! My website is like a treasure trove of knowledge. You'll find a plethora of articles and tutorials covering a wide range of topics related to networking and cybersecurity. It's not just a website; it's a learning hub for anyone who's eager to dive into the world of bits, bytes, and secure connections. And here's a fun fact: I'm not a lone wolf in this journey. I'm a proud member and Editor of Team NetworkUstad. Together, we're on a mission to empower people with the knowledge they need to navigate the digital landscape safely and effectively. So, if you're ready to embark on a tech-savvy adventure, stick around with me, Asad Ijaz Khattak. We're going to unravel the mysteries of technology, one article at a time!"