M05 - Managing Network Security
M05 - Managing Network Security
M05 - Managing Network Security
Level-IV
Based on November 2023, Curriculum Version - II
November, 2023
Ababa, Ethiopia
Contents
Acknowledgment .............................................................................................................................. iii
Acronym ........................................................................................................................................... iv
Unit One : Define a Process for Designing Security ......................................................................... 1
1.1. Network Security Design Process .......................................................................................... 2
Self – Check 1.................................................................................................................................... 7
Unit Two: Threats to network security .............................................................................................. 8
2.2. Attacks of network security .................................................................................................... 9
2.2. Network vulnerabilities .........................................................................................................11
2.3. Threat model ......................................................................................................................... 13
Self - Check 2 .................................................................................................................................. 16
Unit Three: Analyze security risks .................................................................................................. 17
3.1. Elements of risk management ........................................................................................... 18
3.2. Assets that require protection ........................................................................................... 21
3.3. Creating a risk management plan ..................................................................................... 24
Self – Check 3.................................................................................................................................. 26
Unit Four: Create a security design ................................................................................................. 27
4.1. Attacker scenarios and threats .............................................................................................. 28
4.2. Designing security measures ................................................................................................ 30
4.3. Obtaining feedback on the designed security measures ....................................................... 33
4.4. Developing security policies ................................................................................................ 34
Self – Check 4.................................................................................................................................. 37
Unit Five: Design and implement responses to security incidents ................................................. 38
5.1. Auditing and incident response procedure............................................................................ 39
5.2. Document security incidents ................................................................................................ 41
5.3. Implement configurations for incident ................................................................................. 43
5.4. Test and Sign Off incident resolution process ...................................................................... 46
Self – Check 5.................................................................................................................................. 49
Reference ......................................................................................................................................... 50
Developers Profile ........................................................................................................................... 51
For effective use of this module trainees are expected to follow the following module instruction:
1. Read the information written in each unit
2. Accomplish the Self-checks at the end of each unit
3. Perform Operation Sheets which were provided at the end of units
4. Do the “LAP test” given at the end of each unit and
5. Read the identified reference book for Examples and exercise
Network security design is a strategic approach to creating a secure and resilient network
infrastructure. It involves planning, implementing, and managing various security measures to
protect data, systems, and communication within a network. Here's an introduction to key
considerations in network security design:
1. Risk Assessment:
• Identify and evaluate potential risks and threats to the network. This includes
understanding the value of assets, potential vulnerabilities, and the likelihood of various
security incidents.
2. Security Goals and Objectives:
• Define clear security goals and objectives aligned with the organization's overall business
objectives. These may include confidentiality, integrity, availability, and compliance with
industry regulations.
3. Defense-in-Depth Strategy:
• Implement multiple layers of security controls to create a defense-in-depth strategy. This
approach involves using a combination of technologies, policies, and procedures to
mitigate risks at various levels.
4. Segmentation:
• Divide the network into segments to contain and isolate potential security incidents.
Segmentation helps prevent lateral movement of attackers within the network and limits
the impact of security breaches.
5. Access Controls:
• Enforce strong access controls by implementing authentication and authorization
mechanisms. This includes user access policies, role-based access control (RBAC), and
least privilege principles.
6. Data Encryption:
• Use encryption protocols to protect sensitive data during transmission and storage. This is
crucial, especially for data traversing public networks or stored in the cloud.
7. Firewall Configuration:
• Deploy firewalls strategically to control and monitor incoming and outgoing network
traffic. Consider both hardware and software firewalls to provide a comprehensive defense
against unauthorized access.
8. Intrusion Detection and Prevention Systems (IDPS):
• Integrate IDPS to detect and respond to potential security incidents in real-time. These
systems can analyze network traffic, identify anomalies, and take proactive measures to
prevent or mitigate threats.
9. Virtual Private Networks (VPNs):
Network security design is an ongoing process that requires regular review and adaptation to
address emerging threats and changes in the organizational landscape. By adopting a
comprehensive and proactive approach, organizations can create a robust network security
framework to safeguard their digital assets.
1. Discuss the importance of using encryption protocols to protect sensitive data during
transmission and storage in network security. Provide examples of situations where data
encryption is crucial.
2. Outline the key components of a well-defined incident response plan in network security.
Discuss the roles and responsibilities, communication plans, and strategies for recovery
during a security incident.
3. Discuss the concept of continuous improvement in the context of network security design phases.
Network security attacks come in various forms, each aiming to exploit vulnerabilities in a system
or network to compromise its integrity, confidentiality, or availability. Here's an overview of some
common network security attacks:
1. Malware:
• Definition: Malicious software designed to harm or exploit systems.
• Types: Viruses, worms, trojan horses, ransomware, spyware.
• Impact: Unauthorized access, data theft, system disruption.
2. Phishing:
• Definition: Social engineering attack where attackers impersonate trustworthy
entities to trick individuals into revealing sensitive information.
• Forms: Email phishing, spear phishing, vishing (voice phishing), smishing (SMS
phishing).
• Impact: Unauthorized access, identity theft, financial loss.
3. Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) Attacks:
• Definition: Overloading a system, network, or service with excessive traffic to
disrupt normal functioning.
• Impact: Service outage, network slowdown, loss of availability.
4. Man-in-the-Middle (MitM) Attacks:
• Definition: Intercepting and potentially altering communication between two
parties without their knowledge.
• Forms: Eavesdropping, session hijacking, SSL stripping.
• Impact: Data interception, unauthorized access.
5. SQL Injection:
• Definition: Exploiting vulnerabilities in web applications by injecting malicious
SQL code into input fields.
• Impact: Unauthorized access to databases, data manipulation.
6. Cross-Site Scripting (XSS):
Page 9 of 57 Author/Copyright: Managing Network Security Level- III Version 1
Ministry of Labor and Skills November, 2023
• Definition: Injecting malicious scripts into webpages viewed by other users.
• Forms: Stored XSS, reflected XSS, DOM-based XSS.
• Impact: Cookie theft, session hijacking, defacement.
7. Zero-Day Exploits:
• Definition: Attacks that target undiscovered vulnerabilities (zero-day
vulnerabilities) before a patch or fix is available.
• Impact: Unauthorized access, data breaches, system compromise.
8. Brute Force Attacks:
• Definition: Repeatedly attempting various combinations of usernames and
passwords until the correct credentials are found.
• Impact: Unauthorized access, account compromise.
9. Eavesdropping (Packet Sniffing):
• Definition: Unauthorized interception and monitoring of network traffic.
• Impact: Unauthorized access to sensitive information.
10. DNS Spoofing:
• Definition: Redirecting DNS queries to malicious sites.
• Impact: Man-in-the-middle attacks, phishing, data theft.
11. Social Engineering:
• Definition: Manipulating individuals into divulging confidential information or
performing actions against their interests.
• Forms: Impersonation, pretexting, baiting.
• Impact: Unauthorized access, data breaches, compromised security.
12. Insider Threats:
• Definition: Malicious actions or negligence by individuals within an organization.
• Forms: Intentional data theft, accidental data exposure.
• Impact: Data breaches, compromised security.
To mitigate the risk of these network security attacks, organizations implement a
combination of technical controls (firewalls, intrusion detection/prevention systems,
encryption), security policies, user education, and regular security audits. Staying informed
1. Malware includes types such as viruses, worms, trojan horses, ransomware, and spyware.
2. Phishing attacks can take the form of vishing, which involves voice interactions.
3. Denial-of-Service (DoS) attacks aim to increase the availability of network services.
4. Man-in-the-Middle attacks may involve SSL stripping as one of their forms.
Part II : Multiple-Choice Questions:
1. Which type of attack involves overloading a system with excessive traffic to disrupt
normal functioning?
A) Phishing
B) Denial-of-Service (DoS)
C) Man-in-the-Middle
D) SQL Injection
2. What is the primary impact of Cross-Site Scripting (XSS) attacks?
A) Unauthorized access
B) Data manipulation
C) Cookie theft and session hijacking
D) System disruption
3. Which vulnerability involves exploiting weaknesses in web applications by injecting
malicious SQL code into input fields?
A) Weak Passwords
B) SQL Injection
C) Outdated Software
D) Phishing
Part III : Essay Questions:
1.Explain the potential impact of a Zero-Day Exploit on a network. How can organizations
prepare for such attacks?
2.Discuss the role of user and access controls in network security. How does the principle
of least privilege contribute to a more secure network environment?
3.Describe the steps involved in an effective incident response plan. How does it contribute
to minimizing the impact of security incidents on a network?
This unit is developed to provide you the necessary information regarding the following content
coverage and topics:
• Elements of risk management
• Assets that require protection
• Creating a risk management plan
This unit will also assist you to attain the learning outcomes stated in the cover page. Specifically,
upon completion of this learning guide, you will be able to:
• Identify Elements of risk management
• Explain Assets that require protection
• Explain Creating a risk management plan
Network security risk management involves identifying, assessing, and mitigating potential risks
to the security of an organization's computer networks. Here are the key elements of network
security risk management:
1. Risk Identification:
• Definition: The process of identifying potential threats and vulnerabilities in the
network environment.
• Activities:
➢ Network assessments and audits
➢ Vulnerability scanning
➢ Threat intelligence analysis
• Outcome: A comprehensive list of potential risks specific to the network.
2. Asset Valuation:
• Definition: Evaluating the value of network assets, including hardware, software,
data, and intellectual property.
• Activities:
➢ Asset inventory and categorization
➢ Assigning value to critical assets
• Outcome: Prioritization of assets based on their importance to the organization.
3. Risk Assessment:
• Definition: Evaluating identified risks in terms of their likelihood and potential
impact on the network.
• Activities:
➢ Quantitative risk analysis (assigning numerical values)
➢ Qualitative risk analysis (subjective assessments)
➢ Risk matrices and heat maps
• Outcome: Prioritized list of network risks based on likelihood and impact.
Identifying and protecting network assets is a crucial aspect of network security risk
management. Various assets within a network require protection to ensure the confidentiality,
integrity, and availability of information. Here are key network assets that typically need
safeguarding:
1. Hardware Assets:
• Servers: Critical systems that host applications, databases, and services.
• Routers and Switches: Network devices responsible for directing and controlling
data traffic.
• Firewalls: Devices that filter and control incoming and outgoing network traffic
based on predetermined security rules.
2. Software Assets:
• Operating Systems: The foundational software that manages hardware and
provides services for computer programs.
• Applications: Software programs and tools used for specific functions or tasks
within the network.
• Security Software: Antivirus, anti-malware, intrusion detection/prevention
systems, and other security tools.
3. Data Assets:
Certainly, let's explore more attacker scenarios and threats across various dimensions of
cybersecurity:
1. Social Engineering:
• Scenario: Attackers exploit human psychology to manipulate individuals into
divulging confidential information or performing actions that may compromise
security.
• Threats: Phishing, pretexting, baiting, quid pro quo, and other social engineering
techniques can lead to unauthorized access, data breaches, and system
compromise.
2. Credential Stuffing:
• Scenario: Attackers use previously stolen usernames and passwords to gain
unauthorized access to user accounts.
• Threats: Unauthorized access, identity theft, and potential for lateral movement
within a network.
3. Brute Force Attacks:
• Scenario: Attackers systematically try all possible combinations of passwords
until the correct one is found.
• Threats: Unauthorized access, account takeover, and potential compromise of
sensitive information.
4. Physical Security Threats:
• Scenario: Attackers gain access to physical infrastructure, such as data centers
or server rooms, to compromise network security.
• Threats: Theft of hardware, unauthorized access, and potential disruption of
services.
5. Wi-Fi Eavesdropping:
• Scenario: Attackers intercept and monitor Wi-Fi communications to gain
unauthorized access or gather sensitive information.
• Objective: Ensure that security policies align with relevant regulatory requirements and
industry standards.
• Action:
➢ Identify applicable laws, regulations, and industry standards that govern your
organization.
➢ Ensure that security policies address compliance requirements.
3. Risk Assessment:
1. Phishing is a social engineering technique that may lead to unauthorized access and data
breaches.
2. Credential stuffing involves using previously stolen usernames and passwords to gain
unauthorized access.
3. Brute force attacks systematically try all possible combinations of passwords to gain
unauthorized access.
Applying audit and incident response procedures involves implementing the outlined
processes in a systematic and consistent manner. Here's a step-by-step guide for applying
these procedures:
1. Apply Audit Procedure:
a. Risk Assessment:
• Regularly conduct risk assessments to identify potential threats and vulnerabilities.
• Use tools and methodologies to quantify and qualify risks.
b. Policy Review:
• Review and update information security policies based on the results of risk assessments
and changes in the organizational landscape.
• Communicate policy changes to relevant stakeholders.
c. Access Controls:
• Conduct periodic access reviews to ensure users have the appropriate level of access.
• Implement automated tools for access control monitoring.
d. Vulnerability Assessments:
• Schedule regular vulnerability assessments using reputable tools.
• Prioritize and remediate identified vulnerabilities based on risk assessments.
e. Incident Response Plan Review:
• Regularly review and update the incident response plan to align with emerging threats.
• Conduct tabletop exercises to ensure the plan is effective.
f. Compliance Checks:
• Regularly audit systems and processes to ensure compliance with relevant regulations.
• Document compliance status and address any non-compliance issues.
g. Security Awareness Training:
• Conduct ongoing security awareness training for employees.
• Utilize simulated phishing exercises to test and improve awareness.
h. Logging and Monitoring:
• Regularly review logs and implement automated alerting systems.
Testing and signing off on an incident involve validating that the incident response process was
effective, the security incident has been appropriately addressed, and the organization is ready to
resume normal operations. Here's a step-by-step guide for testing and signing off on an incident:
Testing the Incident Response:
1. Scenario Development:
• Create realistic scenarios based on different types of security incidents that could
impact the organization.
2. Tabletop Exercise:
• Conduct a tabletop exercise where incident response team members simulate
their responses to the identified scenarios.
• Discuss and validate the actions taken, communication protocols, and
coordination among team members.
3. Simulation Testing:
• Conduct more hands-on simulation testing, simulating an actual incident in a
controlled environment.
• Interact with real incident response tools, systems, and data as if it were a live
incident.
4. Evaluation:
By systematically testing the incident response plan and subsequently signing off on the incident,
organizations can enhance their overall cybersecurity posture. These processes contribute to
continuous learning, improvement, and readiness for future security incidents.
4. "Firewalls and Internet Security: Repelling the Wily Hacker" by William R. Cheswick and
Steven M. Bellovin -
6. "The Web Application Hacker's Handbook" by Dafydd Stuttard and Marcus Pinto -