Assignment 1 Front Sheet: Qualification BTEC Level 5 HND Diploma in Computing Unit Number and Title
Assignment 1 Front Sheet: Qualification BTEC Level 5 HND Diploma in Computing Unit Number and Title
Student declaration
I certify that the assignment submission is entirely my own work and I fully understand the consequences of plagiarism. I
understand that making a false declaration is a form of malpractice.
Grading grid
P1 P2 P3 P4 M1 M2 D1
❒ Summative Feedback: ❒ Resubmission Feedback:
1, Define threats
A security threat is a malicious act that aims to seek to unlawfully access data, disrupt digital operations,
or damage information. Various actors, such as corporate spies, hacktivists, terrorist organizations, hostile
nation-states, criminal organizations, lone hackers, and disgruntled workers, might pose security threats.
2.3, Hackers
Hackers explore various cyber techniques to breach defenses and exploit vulnerabilities in a computer
system or network. They are motivated by personal gain, revenge, stalking, financial gain, and political
activism. For the joy of a challenge or for the sake of bragging rights within the hacker community,
hackers create new kinds of threats.
Figure 1
In this assignment, we will discuss different types of security threats to organizations will face, as
follows:
3.1, Malware attack
Malware attacks are frequent cyberattacks in which the victim's system is compromised by
malware, which is typically malicious software. Ransomware, malware, command and control, and other
specialized sorts of attacks are all included in malicious software, sometimes known as viruses.
Malware deployment has been linked to criminal organizations, governmental actors, and even
well-known corporations; in some situations, it has even been shown to have occurred. Some malware
attacks, like other cyberattacks, have a significant enough effect to make headline news.
3.2 Ransomware
In a ransomware attack, the victim's computer is usually encrypted and locked, preventing them
from accessing the system or the data that is stored on it. The victim is required to pay the hacker a
ransom, generally in a digital currency like Bitcoin, in order to recover access to the device or data.
Malicious email attachments, corrupted software programs, infected external storage devices, and hacked
websites may all transmit ransomware.
3.6 Phishing
Malicious emails are sent by cybercriminals that appear to be from reliable sources. The victim is
then duped into clicking the email's malicious link, which results in the installation of malware or the
revealing of private data like login passwords and credit card information.
3.7 SQL injection
A Structured Query Language (SQL) injection attack occurs when cybercriminals attempt to
access the database by uploading malicious SQL scripts. Once successful, the malicious actor can view,
change, or delete data stored in the SQL database.
3.9 Scareware
Scareware overwhelms victims with fake threats and misleading alarms. Users are tricked into
believing their computer is infected with malware, which requires them to install software that gives the
criminal remote access or to pay the criminal in a form of bitcoin in order to pay fines for crimes that the
criminal claims to have.
4, What are the recent security breaches? List and give examples with dates
A security breach is any incident that results in unauthorized access to computer data, applications,
networks, or devices. As a result, unapproved access to information occurs. Usually, it happens when a
hacker is able to get past security protocols.
There are some security breaches that were occurring at major organizations:
• Yahoo - After a phishing effort allowed hackers access to the network, 3 billion Yahoo user
accounts were hacked in 2013.
• Facebook - In 2018, Facebook had internal technical issues that resulted in the loss of 29
million users' sensitive data. Since the accounts that were compromised including the one
belonging to the company's CEO Mark Zuckerberg, this security breach was very embarrassing.
• LinkedIn - In June 2021, the dark web forum with 700 million LinkedIn members' personal
information was exposed, affecting over 90% of the company's user base.
• Sina Weibo - An attacker accessed a part of the company's database in March 2020,
affecting 538 million Weibo users' personal information, including actual names, site usernames,
gender, location, and phone numbers.
• Adobe - Early in October 2013, Adobe said that hackers had obtained login information for
an unknown number of user accounts, as well as almost three million encrypted consumer credit
card records.
• Financial loss: Inability to operate, failure to finish client work or commercial transactions,
decreased productivity, employee downtime, higher insurance premiums, and the expense of
attempting to retrieve lost information, equipment, or data can all result in loss of cash for the
company.
• Reputational harm: Clients expect high standards and a safe and secure working
environment from their application. A security breach will harm the company's reputation and can
drive away current and future customers.
• Breach of a legal obligation: The General Data Protection Regulation (GDPR) and Data
Protection Act 2018 require appropriate technical and organizational security. Fines, enforcement
notifications, or an investigation by the Information Commissioner's Office, the data protection
authority, may be issued for noncompliance. Regulation-related fines for non-compliance can
reach €20 million or 4% of the yearly worldwide revenue.
• Breach of contract: If a security breach causes a data loss, officials on panel appointments,
such as those with banks or public institutions, may be in violation of the contract and subject to
indemnity responsibilities to their clients.
• Keep the system and software updated: Your cyber security and digital safety are
significantly impacted by software and system updates. This is because they don't only bring new
features; they also fix bugs and aid in patching exploitable security holes and vulnerabilities.
• Use strong passwords: Simple passwords are no longer effective defenses against password
cracking due to the advancement of technology. Instead, you should implement multi-factor
authentication techniques and employ complex passwords to prevent hacking in your company.
• Reduce the attack surface: Your attack surfaces are the holes or weaknesses that malicious
hackers can utilize to get access to confidential information. They may include IoT devices,
software, online application systems, or even staff members who are frequently the targets of
social engineering attacks like phishing.
• Install firewall: A trustworthy system will successfully defend you from brute force attacks
or prevent security incidents that can cause irreversible damage. Additionally, firewalls keep an
eye on network traffic to detect any unusual activity that can endanger the security of your data.
They also support data privacy and stop sophisticated viruses from accessing your computers.
In order to make sure that information resource and technology security controls are
implemented, functional, and not being bypassed, the Security Monitoring method was
created. Early detection of wrongdoing or product security vulnerabilities is one
advantage of security monitoring. By spotting the problem early, it may be possible to
prevent harm from occurring or at the very least lessen its effects.
Objects of monitoring procedure include firewalls, access control, key information
routes, important servers, important devices, or important terminals.
Methods of monitoring: Monitoring is done through direct monitoring or indirect
monitoring.
Some of the best practices of patch management that will allow organizations to
enhance cybersecurity are:
• Understanding the importance of patch management –Knowing why patch
management is an important aspect of cybersecurity solutions is essential. Rapid
reaction to the most recent patch releases would prevent and protect vulnerable
systems from zero-day attacks.
• The outcome of delayed patch application - Major security breaches are driven
by patch application delays. The danger of not applying patch fixes to outdated
software was exposed by the Wannacry attack. The victims of Wannacry were
individuals who put off installing the Windows patch that fixed the SMB v1
protocol vulnerability, which led to data loss and economic losses.
• Deploying managed service providers' services - In order to meet the needs of
the business, managed service providers offer patch management software. While
the companies may concentrate on the management and revenue-generating
areas, MSPs take complete charge of the patch management process.
• Deploying patch testing - Some patches cause system crashes because they are
incompatible with specific operating systems or programs. Before applying fixes
to endpoint systems, IT administrators should execute a patch test.
The patch management life cycle:
• Update vulnerability details from software vendors.
• Scan the network of the company for vulnerabilities.
• Examine the Vulnerability and identify the missing patches.
• Deploy patches and validate patch installation.
• Generate Status Report on the latest patch update.
4. Define IDS, and its usage, and show it with diagrams and examples
4.1 What is an intrusion detection system (IDS)
An Intrusion Detection System (IDS) is a system that monitors network traffic for
suspicious activity and issues an alert when such activity is discovered. It is software that
analyzes a network for malicious activities or data breaches. Any illegal activity or
violation is often recorded either centrally using a security information and event
management (SIEM) system or notified to an administrator. A SIEM system combines
outputs from several sources and uses alarm filtering methods to distinguish between
valid and false alarms.
Figure 8: Intrusion Detection System
Host Intrusion Detection System (HIDS): Host intrusion detection systems run on
independent hosts or devices on the network. Only the incoming and outgoing packets
from the device are monitored by a HIDS, which notifies the administrator of any unusual
or malicious behavior. It compares the current snapshot of the system files with the
previous snapshot. An alert is given to the administrator to look into if the analytical
system files were modified or deleted. Mission-critical equipment, which is not
anticipated to modify its layout, is an example of HIDS usage.
Figure 10: HIDS diagram
Before arriving at the servers placed in the DMZ, incoming network packets are ensured by
a firewall or other security technologies thanks to the DMZ firewall setup. Therefore, even
if an attacker passed the first firewall, they would still need access to the protected services
in the DMZ in order to seriously harm a business.
Further, DMZs are proving useful in countering the security risks resulting from new
technology such as operational technology (OT) systems, which make production and
manufacturing smarter but create a vast threat surface. The reason for this is that OT
equipment has not been intended to cope with or recover from cyberattacks, which poses a
serious danger to organizations' important data and resources. A DMZ offers network
segmentation to reduce the possibility of an attack that might damage business
infrastructure.
• Access control: Organizations can give consumers access to services outside the
bounds of their network through the public internet. The DMZ enables access to
these services while implementing network segmentation to make it more difficult
for an unauthorized user to reach the private network. A proxy server, which
centralizes internal traffic flow and makes it easier to monitor and record that traffic,
may also be present in a DMZ.
• Preventing network reconnaissance: By providing a buffer between the internet and
a private network, a DMZ can prevent attackers from performing the reconnaissance
work they carry out in the search for potential targets. Although servers in the DMZ
are accessible to the public, a firewall that stops an attacker from seeing inside the
internal network provides another layer of security. Even if a DMZ system gets
compromised, the internal firewall separates the private network from the DMZ to
keep it secure and make external reconnaissance difficult.
2. Define and discuss with the aid of a diagram static IP
2.1 What is static IP
A static IP address is an IP address that never changes. In other words, once a device
receives a unique static IP address, that number stays with it until the network
architecture changes. Internet service providers (ISPs) typically provide static IP
addresses to servers and other crucial devices that must maintain the same addresses for
a long period of time.
2.2 Benefits of static IP
• Server hosting: Having a static IP address makes it simpler for clients to find you
via DNS whether you are operating a web server, email server, or any other form of
server. In real terms, this means that customers who have a static IP address will be
able to access your websites and services more quickly.
• Convenient remote access: Using a Virtual Private Network (VPN) or other remote
access software is made simpler with a static IP address.
• Faster: Devices assigned a static IP address often operate more quickly because
static IP addresses have fewer conflicts. This is especially beneficial if you are
constantly uploading and downloading files.
• More secure: Using a static IP can help you quickly identify which devices are
affecting your network so you can cut them off or isolate them from your network.
In contrast, devices with dynamic IPs will make it difficult to find vulnerabilities in
the network because the IP that DHCP provides to devices changes constantly.
2.3 How to set up static IP for the computer.
• Firstly, open Control Panel and click on “Network and Internet”
Figure 14: Set up static IP (1)
• Click on “properties”
Figure 17: Set up static IP (4)
The purpose of NAT is to enable multiple devices to access the Internet through a single
public address. To do this, a private IP address must be converted to a public IP address. A
technique known as Network Address Translation (NAT) transfers one or more local IP
addresses into one or more public IP addresses and vice versa in order to provide local
hosts access to the Internet.
3.2 How does NAT work?
In a basic, NAT is configured at the border router that has one interface in the local
network and another in the outside network. When a packet is transferred outside the
local network, NAT will immediately translate that private IP into a public IP. NAT also
converts the public IP into a private IP when a packet is sent to the local network.
3.3 Network address translation types
• Static NAT: Static NAT is used to manually convert one IP address to another,
usually from a private address to a public address, meaning one-to-one mapping
between private and public addresses. Static NAT is useful in cases where devices
need to have a fixed address to be accessible from outside the Internet. This type is
commonly used for servers such as Web, and Mail.
Figure 20: Static NAT
• NAT Overload: This type allows for the conversion of several private IP addresses
to a single registered IP address. To identify the traffic, or which traffic comes from
which IP address, port numbers are employed. This is the most popular method
since it saves money because hundreds of people may access the Internet with a
single public IP address.
Hendricks, B., n.d. Firewalls in Network Security: Features & Functions. [Online]
Available at: https://study.com/academy/lesson/firewalls-in-network-security-features-functions.html
[Accessed 9 8 2022].
Malviya, N., 2021. What is a firewall: An overview. [Online]
Available at: https://resources.infosecinstitute.com/topic/firewall-overview/
[Accessed 9 8 2022].
Rosencrance, L., n.d. Top 10 types of information security threats for IT teams. [Online]
Available at: https://www.techtarget.com/searchsecurity/feature/Top-10-types-of-information-security-
threats-for-IT-teams
[Accessed 9 8 2022].