SlideShare a Scribd company logo
1 of 29
1 hour ago
Srinivas Goud Thadakapally
week 3 discussion
COLLAPSE
Top of Form
Separation in a network is essential, of course. It would be more
annoyed with that much knowledgeability and security features
if it were only about security. However, it makes this network
much more flexible, and in some ways makes it more secure. It
reduces the potential for internal and external attacks on the
same network and makes it harder for someone to take over the
network. Furthermore, this separation keeps our data away from
third parties. Separation of access is essential in a network, for
example, to ensure that a user cannot access the whole network.
It is common for specific applications and software installations
on the personal computer to operate in the background. In this
regard, it is possible to customize the software operating mode
to make the software operation hidden to not be visible to the
user. No one server or group of servers is going to have to
withstand many other servers. The first line of defense in any IT
environment is resource partitioning to enable critical
infrastructure to handle all requests without overloading the
primary server (Jaeger et al., 2016).
Separation is basically the process of using multiple processes
with some type of separation for Process separation of access to
objects and data. Separation (or transient segregation) can occur
in both physical and logical network segments. The trick with
security is to keep it away from the IT infrastructure. For
example, a firewall is still strictly considered a technical
security tool because it is not supposed to affect business
activities. it is possible to separate administrative control,
physical systems, and data between those with different roles
within the organization. The behavior within the network is like
partitioning an IT environment into discrete services, although
some elements of this concept have not been adopted in Active
Directory–in particular, policies and modules. A system
administrator can move control of the administrative control of
physical systems or systems within the network to a different
server. However, when implementing security controls on
deployments, it becomes essential to understand the scale at
which the resources need to be distributed. Simply put,
separation makes IT more secure (Liu et al., 2019).
References
Jaeger, B., Kraft, R., Luhn, S., Selzer, A., & Waldmann, U.
(2016, August). Access Control and Data Separation Metrics in
Cloud Infrastructures. In 2016 11th International Conference on
Availability, Reliability, and Security (ARES) (pp. 205-210).
IEEE.
Liu, W., Zhang, K., Tu, B., & Lin, K. (2019, August). HyperPS:
A Hypervisor Monitoring Approach Based on Privilege
Separation. In 2019 IEEE 21st International Conference on
High-Performance Computing and Communications; IEEE 17th
International Conference on Smart City; IEEE 5th International
Conference on Data Science and Systems
(HPCC/SmartCity/DSS) (pp. 981-988). IEEE.
Bottom of Form
13 hours ago
BIPIN NEUPANE
Week3_Discussion
COLLAPSE
Top of Form
Before we look into how separation within a network is
facilitated, let’s look at two broader things – network
segmentation and separation. Network segmentation includes
the breaking down of the entire network structure into separate
bits and pieces that allow individual levels of security control.
On the other hand, network separation means using various
access controls and security measures to allow/disallow
connections among the segmented smaller networks.
If we look at it technically, we all know that we have firewalls
installed on our personal as well as corporate computers and
other devices. Similarly, servers hosting the internet at the
worksite also do have the software and hardware level firewalls
installed that offer added security. This firewall helps separate
custom separation and offers network separation. Separation
layers help keep the intruders away as well as promote safety
and limit the control of access and network movement over the
corporate network environment. The reduction of network
attacks and removal of unwanted access helps mute the risk of
system failures and security breaches.
Segmentation and separation not only limit attackers from
moving one sub-network to another using firewall separation
but also limit the scope of the security breach and buys
additional time for the corporate to deploy countermeasures, so
the rest of the network is not accessed (Metivier, 2017).
Another technical control is that by implementing the least
privilege policy, access can be given to employees only for
essential roles (Metivier, 2017). It helps prevent attacks from
insiders also. Additionally, events are logged, internal
connections (regardless of whether they were permitted) are
monitored, and suspicious behavior is attacked using firewalls.
Also, with the reduction of unwanted access and traffic, the
performance of network systems can be boosted (Metivier,
2017). With the introduction of IPv6, there are even better ways
to implement the network separation with the ‘Quarantine
Model’ that helps fit network nodes to individual network
segments and deploy different security policies on each sub-
network. Therefore, even as technology grows, adapted, and
updated versions of network segmentation can always be
achieved to arrive at the optimum security measures (Suzuki &
Kondo, 2005).
In my experience, a company that allows the network
connection to 7000 employees will have a challenging time
managing the security and firewall without segmentation and
separation. Only then management, diagnosis, individual
security measures can be implemented for the most optimum
protection and access sought by the company. Optimum network
separation helps motivate the practices of zero access by
default, least privilege policy, among many others, and helps
maintain security structure and rules to prevent security access,
monitoring, and unwanted access to computers, internal
systems, and private databases. Therefore, although there are a
few concerns such as operation costs, antispoofing concerns,
and concerns of encryption management with various models
such as the quarantine model, it is safe to say that network
separation is an exceptional technical control (Suzuki & Kondo,
2005).
References
Metivier, B. (2017). The Security Benefits of Network
Segmentation. https://www.tylercybersecurity.com/blog/the-
security-benefits-of-network-segmentation
Suzuki, S., & Kondo, S. (2005). Dynamic Network Separation
for IPv6 Network Security
Enhancement. https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&
arnumber=1619969
Bottom of Form
1
Copyright © 2012, Elsevier Inc.
All Rights Reserved
Chapter 3
Separation
Cyber Attacks
Protecting National Infrastructure, 1st ed.
2
• Using a firewall to separate network assets from
intruders is the most familiar approach in cyber
security
• Networks and systems associated with national
infrastructure assets tend to be too complex for
firewalls to be effective
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
h
a
p
te
r 3
–
S
e
p
a
ra
tio
n
Introduction
3
• Three new approaches to the use of firewalls are
necessary to achieve optimal separation
– Network-based separation
– Internal separation
– Tailored separation
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
h
a
p
te
r 3
–
S
e
p
a
ra
tio
n
Introduction
4
Fig. 3.1 – Firewalls in simple and
complex networks
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
h
a
p
te
r 3
–
S
e
p
a
ra
tio
n
5
• Separation is a technique that accomplishes one of
the following
– Adversary separation
– Component distribution
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
h
a
p
te
r 3
–
S
e
p
a
ra
tio
n
What Is Separation?
6
• A working taxonomy of separation techniques: Three
primary factors involved in the use of separation
– The source of the threat
– The target of the security control
– The approach used in the security control
(See figure 3.2)
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
h
a
p
te
r 3
–
S
e
p
a
ra
tio
n
What Is Separation?
7
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
h
a
p
te
r 3
–
S
e
p
a
ra
tio
n
Fig. 3.2 – Taxonomy of separation
techniques
8
• Separation is commonly achieved using an access
control mechanism with requisite authentication and
identity management
• An access policy identifies desired allowances for
users requesting to perform actions on system
entities
• Two approaches
– Distributed responsibility
– Centralized control
– (Both will be required)
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
h
a
p
te
r 3
–
S
e
p
a
ra
tio
n
Functional Separation?
9
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
h
a
p
te
r 3
–
S
e
p
a
ra
tio
n
Fig. 3.3 – Distributed versus centralized
mediation
10
• Firewalls are placed between a system or enterprise
and an un-trusted network (say, the Internet)
• Two possibilities arise
– Coverage: The firewall might not cover all paths
– Accuracy: The firewall may be forced to allow access that
inadvertently opens access to other protected assets
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
h
a
p
te
r 3
–
S
e
p
a
ra
tio
n
National Infrastructure Firewalls
11
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
h
a
p
te
r 3
–
S
e
p
a
ra
tio
n
Fig. 3.4 – Wide area firewall
aggregation and local area firewall
segregation
12
• Increased wireless connectivity is a major challenge
to national infrastructure security
• Network service providers offer advantages to
centralized security
– Vantage point: Network service providers can see a lot
– Operations: Network providers have operational capacity
to keep security software current
– Investment: Network service providers have the financial
wherewithal and motivation to invest in security
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
h
a
p
te
r 3
–
S
e
p
a
ra
tio
n
National Infrastructure Firewalls
13
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
h
a
p
te
r 3
–
S
e
p
a
ra
tio
n
Fig. 3.5 – Carrier-centric network-based
firewall
14
• Network-based firewall concept includes device for
throttling distributed denial of service (DDOS) attacks
• Called a DDOS filter
• Modern DDOS attacks take into account a more
advanced filtering system
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
h
a
p
te
r 3
–
S
e
p
a
ra
tio
n
DDOS Filtering
15
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
h
a
p
te
r 3
–
S
e
p
a
ra
tio
n
Fig. 3.6 – DDOS filtering of inbound
attacks on target assets
16
• SCADA – Supervisory control and data acquisition
• SCADA systems – A set of software, computer, and
networks that provide remote coordination of
control system for tangible infrastructures
• Structure includes the following
– Human-machine interface (HMI)
– Master terminal unit (MTU)
– Remote terminal unit (RTU)
– Field control systems
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
h
a
p
te
r 3
–
S
e
p
a
ra
tio
n
SCADA Separation Architecture
17
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
h
a
p
te
r 3
–
S
e
p
a
ra
tio
n
Fig. 3.7 – Recommended SCADA system
firewall architecture
18
• Why not simply unplug a system’s external
connections? (Called air gapping)
• As systems and networks grow more complex, it
becomes more likely that unknown or unauthorized
external connections will arise
• Basic principles for truly air-gapped networks:
– Clear policy
– Boundary scanning
– Violation consequences
– Reasonable alternatives
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
h
a
p
te
r 3
–
S
e
p
a
ra
tio
n
Physical Separation
19
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
h
a
p
te
r 3
–
S
e
p
a
ra
tio
n
Fig. 3.8 – Bridging an isolated network
via a dual-homing user
20
• Hard to defend against a determined insider
• Threats may also come from trusted partners
• Background checks are a start
• Techniques for countering insider attack
– Internal firewalls
– Deceptive honey pots
– Enforcement of data markings
– Data leakage protection (DLP) systems
• Segregation of duties offers another layer of
protection
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
h
a
p
te
r 3
–
S
e
p
a
ra
tio
n
Insider Separation
21
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
h
a
p
te
r 3
–
S
e
p
a
ra
tio
n
Fig. 3.9 – Decomposing work functions
for segregation of duty
22
• Involves the distribution, replication, decomposition,
or segregation of national assets
– Distribution: creating functionality using multiple
cooperating components that work together as distributed
system
– Replication: copying assets across components so if one
asset is broken, the copy will be available
– Decomposition: breaking complex assets into individual
components so an isolated compromise won’t bring down
asset
– Segregation: separation of assets through special access
controls, data markings, and policy enforcement
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
h
a
p
te
r 3
–
S
e
p
a
ra
tio
n
Asset Separation
23
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
h
a
p
te
r 3
–
S
e
p
a
ra
tio
n
Fig. 3.10 – Reducing DDOS risk through
CDN-hosted content
24
• Typically, mandatory access controls and audit trail
hooks were embedded into the underlying operating
system kernel
• Popular in the 1980s and 1990s
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
h
a
p
te
r 3
–
S
e
p
a
ra
tio
n
Multilevel Security (MLS)
25
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
h
a
p
te
r 3
–
S
e
p
a
ra
tio
n
Fig. 3.11 – Using MLS logical separation
to protect assets
26
• Internet separation: Certain assets simply shouldn’t
be accessible from the Internet
• Network-based firewalls: These should be managed
by a centralized group
• DDOS protection: All assets should have protection in
place before an attack
• Internal separation: Critical national infrastructure
settings need an incentive to implement internal
separation policy
• Tailoring requirements: Vendors should be
incentivized to build tailored systems such as firewalls
for special SCADA environments
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
h
a
p
te
r 3
–
S
e
p
a
ra
tio
n
National Separation Program

More Related Content

Similar to 1 hour agoSrinivas Goud Thadakapally week 3 discussionCOLL.docx

Employee trust based industrial device
Employee trust based industrial deviceEmployee trust based industrial device
Employee trust based industrial deviceIJNSA Journal
 
EMPLOYEE TRUST BASED INDUSTRIAL DEVICE DEPLOYMENT AND INITIAL KEY ESTABLISHMENT
EMPLOYEE TRUST BASED INDUSTRIAL DEVICE DEPLOYMENT AND INITIAL KEY ESTABLISHMENTEMPLOYEE TRUST BASED INDUSTRIAL DEVICE DEPLOYMENT AND INITIAL KEY ESTABLISHMENT
EMPLOYEE TRUST BASED INDUSTRIAL DEVICE DEPLOYMENT AND INITIAL KEY ESTABLISHMENTIJNSA Journal
 
IMPROVED IDS USING LAYERED CRFS WITH LOGON RESTRICTIONS AND MOBILE ALERTS BAS...
IMPROVED IDS USING LAYERED CRFS WITH LOGON RESTRICTIONS AND MOBILE ALERTS BAS...IMPROVED IDS USING LAYERED CRFS WITH LOGON RESTRICTIONS AND MOBILE ALERTS BAS...
IMPROVED IDS USING LAYERED CRFS WITH LOGON RESTRICTIONS AND MOBILE ALERTS BAS...IJNSA Journal
 
the_role_of_resilience_data_in_ensuring_cloud_security.pdf
the_role_of_resilience_data_in_ensuring_cloud_security.pdfthe_role_of_resilience_data_in_ensuring_cloud_security.pdf
the_role_of_resilience_data_in_ensuring_cloud_security.pdfsarah david
 
Access Control For Local Area Network Performance Essay
Access Control For Local Area Network Performance EssayAccess Control For Local Area Network Performance Essay
Access Control For Local Area Network Performance EssayDotha Keller
 
Secure modelling schema of distributed information
Secure modelling schema of distributed informationSecure modelling schema of distributed information
Secure modelling schema of distributed informationiaemedu
 
Secure modelling schema of distributed information access management in cloud...
Secure modelling schema of distributed information access management in cloud...Secure modelling schema of distributed information access management in cloud...
Secure modelling schema of distributed information access management in cloud...iaemedu
 
Secure modelling schema of distributed information access management in cloud...
Secure modelling schema of distributed information access management in cloud...Secure modelling schema of distributed information access management in cloud...
Secure modelling schema of distributed information access management in cloud...iaemedu
 
Secure modelling schema of distributed information access management in cloud...
Secure modelling schema of distributed information access management in cloud...Secure modelling schema of distributed information access management in cloud...
Secure modelling schema of distributed information access management in cloud...iaemedu
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)irjes
 
Single sign on mechanism for distributed computing
Single sign on mechanism for distributed computingSingle sign on mechanism for distributed computing
Single sign on mechanism for distributed computingeSAT Publishing House
 
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...IRJET Journal
 
A Brief Survey on Various Technologies Involved in Cloud Computing Security
A Brief Survey on Various Technologies Involved in Cloud Computing SecurityA Brief Survey on Various Technologies Involved in Cloud Computing Security
A Brief Survey on Various Technologies Involved in Cloud Computing SecurityAssociate Professor in VSB Coimbatore
 
A Database System Security Framework
A Database System Security FrameworkA Database System Security Framework
A Database System Security FrameworkMaria Perkins
 
A DATABASE SYSTEM SECURITY FRAMEWORK
A DATABASE SYSTEM SECURITY FRAMEWORKA DATABASE SYSTEM SECURITY FRAMEWORK
A DATABASE SYSTEM SECURITY FRAMEWORKijcsit
 
Causes And Consequences Of Data Leakage
Causes And Consequences Of Data LeakageCauses And Consequences Of Data Leakage
Causes And Consequences Of Data LeakagePatty Buckley
 
Security Landscape of a Strong Ecosystem to Protect Sensitive Information in ...
Security Landscape of a Strong Ecosystem to Protect Sensitive Information in ...Security Landscape of a Strong Ecosystem to Protect Sensitive Information in ...
Security Landscape of a Strong Ecosystem to Protect Sensitive Information in ...IRJET Journal
 
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...IRJET Journal
 
High security mechanism: Fragmentation and replication in the cloud with auto...
High security mechanism: Fragmentation and replication in the cloud with auto...High security mechanism: Fragmentation and replication in the cloud with auto...
High security mechanism: Fragmentation and replication in the cloud with auto...CSITiaesprime
 

Similar to 1 hour agoSrinivas Goud Thadakapally week 3 discussionCOLL.docx (20)

Employee trust based industrial device
Employee trust based industrial deviceEmployee trust based industrial device
Employee trust based industrial device
 
EMPLOYEE TRUST BASED INDUSTRIAL DEVICE DEPLOYMENT AND INITIAL KEY ESTABLISHMENT
EMPLOYEE TRUST BASED INDUSTRIAL DEVICE DEPLOYMENT AND INITIAL KEY ESTABLISHMENTEMPLOYEE TRUST BASED INDUSTRIAL DEVICE DEPLOYMENT AND INITIAL KEY ESTABLISHMENT
EMPLOYEE TRUST BASED INDUSTRIAL DEVICE DEPLOYMENT AND INITIAL KEY ESTABLISHMENT
 
network security.pdf
network security.pdfnetwork security.pdf
network security.pdf
 
IMPROVED IDS USING LAYERED CRFS WITH LOGON RESTRICTIONS AND MOBILE ALERTS BAS...
IMPROVED IDS USING LAYERED CRFS WITH LOGON RESTRICTIONS AND MOBILE ALERTS BAS...IMPROVED IDS USING LAYERED CRFS WITH LOGON RESTRICTIONS AND MOBILE ALERTS BAS...
IMPROVED IDS USING LAYERED CRFS WITH LOGON RESTRICTIONS AND MOBILE ALERTS BAS...
 
the_role_of_resilience_data_in_ensuring_cloud_security.pdf
the_role_of_resilience_data_in_ensuring_cloud_security.pdfthe_role_of_resilience_data_in_ensuring_cloud_security.pdf
the_role_of_resilience_data_in_ensuring_cloud_security.pdf
 
Access Control For Local Area Network Performance Essay
Access Control For Local Area Network Performance EssayAccess Control For Local Area Network Performance Essay
Access Control For Local Area Network Performance Essay
 
Secure modelling schema of distributed information
Secure modelling schema of distributed informationSecure modelling schema of distributed information
Secure modelling schema of distributed information
 
Secure modelling schema of distributed information access management in cloud...
Secure modelling schema of distributed information access management in cloud...Secure modelling schema of distributed information access management in cloud...
Secure modelling schema of distributed information access management in cloud...
 
Secure modelling schema of distributed information access management in cloud...
Secure modelling schema of distributed information access management in cloud...Secure modelling schema of distributed information access management in cloud...
Secure modelling schema of distributed information access management in cloud...
 
Secure modelling schema of distributed information access management in cloud...
Secure modelling schema of distributed information access management in cloud...Secure modelling schema of distributed information access management in cloud...
Secure modelling schema of distributed information access management in cloud...
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)
 
Single sign on mechanism for distributed computing
Single sign on mechanism for distributed computingSingle sign on mechanism for distributed computing
Single sign on mechanism for distributed computing
 
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
 
A Brief Survey on Various Technologies Involved in Cloud Computing Security
A Brief Survey on Various Technologies Involved in Cloud Computing SecurityA Brief Survey on Various Technologies Involved in Cloud Computing Security
A Brief Survey on Various Technologies Involved in Cloud Computing Security
 
A Database System Security Framework
A Database System Security FrameworkA Database System Security Framework
A Database System Security Framework
 
A DATABASE SYSTEM SECURITY FRAMEWORK
A DATABASE SYSTEM SECURITY FRAMEWORKA DATABASE SYSTEM SECURITY FRAMEWORK
A DATABASE SYSTEM SECURITY FRAMEWORK
 
Causes And Consequences Of Data Leakage
Causes And Consequences Of Data LeakageCauses And Consequences Of Data Leakage
Causes And Consequences Of Data Leakage
 
Security Landscape of a Strong Ecosystem to Protect Sensitive Information in ...
Security Landscape of a Strong Ecosystem to Protect Sensitive Information in ...Security Landscape of a Strong Ecosystem to Protect Sensitive Information in ...
Security Landscape of a Strong Ecosystem to Protect Sensitive Information in ...
 
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
 
High security mechanism: Fragmentation and replication in the cloud with auto...
High security mechanism: Fragmentation and replication in the cloud with auto...High security mechanism: Fragmentation and replication in the cloud with auto...
High security mechanism: Fragmentation and replication in the cloud with auto...
 

More from croftsshanon

1) Discuss in detail how computer databases and information netw.docx
1) Discuss in detail how computer databases and information netw.docx1) Discuss in detail how computer databases and information netw.docx
1) Discuss in detail how computer databases and information netw.docxcroftsshanon
 
1)What is involved in collecting requirements for a project Why is .docx
1)What is involved in collecting requirements for a project Why is .docx1)What is involved in collecting requirements for a project Why is .docx
1)What is involved in collecting requirements for a project Why is .docxcroftsshanon
 
1- After Each question, write down references2- 300 minimum wo.docx
1- After Each question, write down references2- 300 minimum wo.docx1- After Each question, write down references2- 300 minimum wo.docx
1- After Each question, write down references2- 300 minimum wo.docxcroftsshanon
 
1) Create a chart using a tool of your choice.Include anno.docx
1) Create a chart using a tool of your choice.Include anno.docx1) Create a chart using a tool of your choice.Include anno.docx
1) Create a chart using a tool of your choice.Include anno.docxcroftsshanon
 
1,  Define and elaborate on examples of narrowcasting and broadcasti.docx
1,  Define and elaborate on examples of narrowcasting and broadcasti.docx1,  Define and elaborate on examples of narrowcasting and broadcasti.docx
1,  Define and elaborate on examples of narrowcasting and broadcasti.docxcroftsshanon
 
1) Describe the challenges and opportunities of human resources..docx
1) Describe the challenges and opportunities of human resources..docx1) Describe the challenges and opportunities of human resources..docx
1) Describe the challenges and opportunities of human resources..docxcroftsshanon
 
1) Describe the price-earnings ratio.  What can investors learn from.docx
1) Describe the price-earnings ratio.  What can investors learn from.docx1) Describe the price-earnings ratio.  What can investors learn from.docx
1) Describe the price-earnings ratio.  What can investors learn from.docxcroftsshanon
 
1)Briefly explain what are the steps involved to develop a Websi.docx
1)Briefly explain what are the steps involved to develop a Websi.docx1)Briefly explain what are the steps involved to develop a Websi.docx
1)Briefly explain what are the steps involved to develop a Websi.docxcroftsshanon
 
1) Sequential pattern mining is a topic of data mining concerned wit.docx
1) Sequential pattern mining is a topic of data mining concerned wit.docx1) Sequential pattern mining is a topic of data mining concerned wit.docx
1) Sequential pattern mining is a topic of data mining concerned wit.docxcroftsshanon
 
1).Over the last few centuries numerous historical events have t.docx
1).Over the last few centuries numerous historical events have t.docx1).Over the last few centuries numerous historical events have t.docx
1).Over the last few centuries numerous historical events have t.docxcroftsshanon
 
1)Many of the New World’s early explorers were looking for a.docx
1)Many of the New World’s early explorers were looking for a.docx1)Many of the New World’s early explorers were looking for a.docx
1)Many of the New World’s early explorers were looking for a.docxcroftsshanon
 
1). Using the Web or other resources, write a brief paper about .docx
1). Using the Web or other resources, write a brief paper about .docx1). Using the Web or other resources, write a brief paper about .docx
1). Using the Web or other resources, write a brief paper about .docxcroftsshanon
 
1). Using the Web or other resources, write a brief paper about RSA,.docx
1). Using the Web or other resources, write a brief paper about RSA,.docx1). Using the Web or other resources, write a brief paper about RSA,.docx
1). Using the Web or other resources, write a brief paper about RSA,.docxcroftsshanon
 
1)Does Facebook have the constitutional right to deny someone from p.docx
1)Does Facebook have the constitutional right to deny someone from p.docx1)Does Facebook have the constitutional right to deny someone from p.docx
1)Does Facebook have the constitutional right to deny someone from p.docxcroftsshanon
 
1)  Your Research Project on the surveillance state consists of .docx
1)  Your Research Project on the surveillance state consists of .docx1)  Your Research Project on the surveillance state consists of .docx
1)  Your Research Project on the surveillance state consists of .docxcroftsshanon
 
1) Describe the price-earnings ratio.  What can investors learn .docx
1) Describe the price-earnings ratio.  What can investors learn .docx1) Describe the price-earnings ratio.  What can investors learn .docx
1) Describe the price-earnings ratio.  What can investors learn .docxcroftsshanon
 
1)what the Internet is and how it has changed the world.  ( 500 word.docx
1)what the Internet is and how it has changed the world.  ( 500 word.docx1)what the Internet is and how it has changed the world.  ( 500 word.docx
1)what the Internet is and how it has changed the world.  ( 500 word.docxcroftsshanon
 
1)  What are anabolic steroids Why are they abused2) Why do .docx
1)  What are anabolic steroids Why are they abused2) Why do .docx1)  What are anabolic steroids Why are they abused2) Why do .docx
1)  What are anabolic steroids Why are they abused2) Why do .docxcroftsshanon
 
1)Why are informal settings such as dinners useful2)Could t.docx
1)Why are informal settings such as dinners useful2)Could t.docx1)Why are informal settings such as dinners useful2)Could t.docx
1)Why are informal settings such as dinners useful2)Could t.docxcroftsshanon
 
1)  you are the web master for the Republican Party National Committ.docx
1)  you are the web master for the Republican Party National Committ.docx1)  you are the web master for the Republican Party National Committ.docx
1)  you are the web master for the Republican Party National Committ.docxcroftsshanon
 

More from croftsshanon (20)

1) Discuss in detail how computer databases and information netw.docx
1) Discuss in detail how computer databases and information netw.docx1) Discuss in detail how computer databases and information netw.docx
1) Discuss in detail how computer databases and information netw.docx
 
1)What is involved in collecting requirements for a project Why is .docx
1)What is involved in collecting requirements for a project Why is .docx1)What is involved in collecting requirements for a project Why is .docx
1)What is involved in collecting requirements for a project Why is .docx
 
1- After Each question, write down references2- 300 minimum wo.docx
1- After Each question, write down references2- 300 minimum wo.docx1- After Each question, write down references2- 300 minimum wo.docx
1- After Each question, write down references2- 300 minimum wo.docx
 
1) Create a chart using a tool of your choice.Include anno.docx
1) Create a chart using a tool of your choice.Include anno.docx1) Create a chart using a tool of your choice.Include anno.docx
1) Create a chart using a tool of your choice.Include anno.docx
 
1,  Define and elaborate on examples of narrowcasting and broadcasti.docx
1,  Define and elaborate on examples of narrowcasting and broadcasti.docx1,  Define and elaborate on examples of narrowcasting and broadcasti.docx
1,  Define and elaborate on examples of narrowcasting and broadcasti.docx
 
1) Describe the challenges and opportunities of human resources..docx
1) Describe the challenges and opportunities of human resources..docx1) Describe the challenges and opportunities of human resources..docx
1) Describe the challenges and opportunities of human resources..docx
 
1) Describe the price-earnings ratio.  What can investors learn from.docx
1) Describe the price-earnings ratio.  What can investors learn from.docx1) Describe the price-earnings ratio.  What can investors learn from.docx
1) Describe the price-earnings ratio.  What can investors learn from.docx
 
1)Briefly explain what are the steps involved to develop a Websi.docx
1)Briefly explain what are the steps involved to develop a Websi.docx1)Briefly explain what are the steps involved to develop a Websi.docx
1)Briefly explain what are the steps involved to develop a Websi.docx
 
1) Sequential pattern mining is a topic of data mining concerned wit.docx
1) Sequential pattern mining is a topic of data mining concerned wit.docx1) Sequential pattern mining is a topic of data mining concerned wit.docx
1) Sequential pattern mining is a topic of data mining concerned wit.docx
 
1).Over the last few centuries numerous historical events have t.docx
1).Over the last few centuries numerous historical events have t.docx1).Over the last few centuries numerous historical events have t.docx
1).Over the last few centuries numerous historical events have t.docx
 
1)Many of the New World’s early explorers were looking for a.docx
1)Many of the New World’s early explorers were looking for a.docx1)Many of the New World’s early explorers were looking for a.docx
1)Many of the New World’s early explorers were looking for a.docx
 
1). Using the Web or other resources, write a brief paper about .docx
1). Using the Web or other resources, write a brief paper about .docx1). Using the Web or other resources, write a brief paper about .docx
1). Using the Web or other resources, write a brief paper about .docx
 
1). Using the Web or other resources, write a brief paper about RSA,.docx
1). Using the Web or other resources, write a brief paper about RSA,.docx1). Using the Web or other resources, write a brief paper about RSA,.docx
1). Using the Web or other resources, write a brief paper about RSA,.docx
 
1)Does Facebook have the constitutional right to deny someone from p.docx
1)Does Facebook have the constitutional right to deny someone from p.docx1)Does Facebook have the constitutional right to deny someone from p.docx
1)Does Facebook have the constitutional right to deny someone from p.docx
 
1)  Your Research Project on the surveillance state consists of .docx
1)  Your Research Project on the surveillance state consists of .docx1)  Your Research Project on the surveillance state consists of .docx
1)  Your Research Project on the surveillance state consists of .docx
 
1) Describe the price-earnings ratio.  What can investors learn .docx
1) Describe the price-earnings ratio.  What can investors learn .docx1) Describe the price-earnings ratio.  What can investors learn .docx
1) Describe the price-earnings ratio.  What can investors learn .docx
 
1)what the Internet is and how it has changed the world.  ( 500 word.docx
1)what the Internet is and how it has changed the world.  ( 500 word.docx1)what the Internet is and how it has changed the world.  ( 500 word.docx
1)what the Internet is and how it has changed the world.  ( 500 word.docx
 
1)  What are anabolic steroids Why are they abused2) Why do .docx
1)  What are anabolic steroids Why are they abused2) Why do .docx1)  What are anabolic steroids Why are they abused2) Why do .docx
1)  What are anabolic steroids Why are they abused2) Why do .docx
 
1)Why are informal settings such as dinners useful2)Could t.docx
1)Why are informal settings such as dinners useful2)Could t.docx1)Why are informal settings such as dinners useful2)Could t.docx
1)Why are informal settings such as dinners useful2)Could t.docx
 
1)  you are the web master for the Republican Party National Committ.docx
1)  you are the web master for the Republican Party National Committ.docx1)  you are the web master for the Republican Party National Committ.docx
1)  you are the web master for the Republican Party National Committ.docx
 

Recently uploaded

Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024Janet Corral
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 

Recently uploaded (20)

Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 

1 hour agoSrinivas Goud Thadakapally week 3 discussionCOLL.docx

  • 1. 1 hour ago Srinivas Goud Thadakapally week 3 discussion COLLAPSE Top of Form Separation in a network is essential, of course. It would be more annoyed with that much knowledgeability and security features if it were only about security. However, it makes this network much more flexible, and in some ways makes it more secure. It reduces the potential for internal and external attacks on the same network and makes it harder for someone to take over the network. Furthermore, this separation keeps our data away from third parties. Separation of access is essential in a network, for example, to ensure that a user cannot access the whole network. It is common for specific applications and software installations on the personal computer to operate in the background. In this regard, it is possible to customize the software operating mode to make the software operation hidden to not be visible to the user. No one server or group of servers is going to have to withstand many other servers. The first line of defense in any IT environment is resource partitioning to enable critical infrastructure to handle all requests without overloading the primary server (Jaeger et al., 2016). Separation is basically the process of using multiple processes with some type of separation for Process separation of access to objects and data. Separation (or transient segregation) can occur in both physical and logical network segments. The trick with security is to keep it away from the IT infrastructure. For example, a firewall is still strictly considered a technical security tool because it is not supposed to affect business activities. it is possible to separate administrative control, physical systems, and data between those with different roles
  • 2. within the organization. The behavior within the network is like partitioning an IT environment into discrete services, although some elements of this concept have not been adopted in Active Directory–in particular, policies and modules. A system administrator can move control of the administrative control of physical systems or systems within the network to a different server. However, when implementing security controls on deployments, it becomes essential to understand the scale at which the resources need to be distributed. Simply put, separation makes IT more secure (Liu et al., 2019). References Jaeger, B., Kraft, R., Luhn, S., Selzer, A., & Waldmann, U. (2016, August). Access Control and Data Separation Metrics in Cloud Infrastructures. In 2016 11th International Conference on Availability, Reliability, and Security (ARES) (pp. 205-210). IEEE. Liu, W., Zhang, K., Tu, B., & Lin, K. (2019, August). HyperPS: A Hypervisor Monitoring Approach Based on Privilege Separation. In 2019 IEEE 21st International Conference on High-Performance Computing and Communications; IEEE 17th International Conference on Smart City; IEEE 5th International Conference on Data Science and Systems (HPCC/SmartCity/DSS) (pp. 981-988). IEEE. Bottom of Form 13 hours ago BIPIN NEUPANE Week3_Discussion COLLAPSE
  • 3. Top of Form Before we look into how separation within a network is facilitated, let’s look at two broader things – network segmentation and separation. Network segmentation includes the breaking down of the entire network structure into separate bits and pieces that allow individual levels of security control. On the other hand, network separation means using various access controls and security measures to allow/disallow connections among the segmented smaller networks. If we look at it technically, we all know that we have firewalls installed on our personal as well as corporate computers and other devices. Similarly, servers hosting the internet at the worksite also do have the software and hardware level firewalls installed that offer added security. This firewall helps separate custom separation and offers network separation. Separation layers help keep the intruders away as well as promote safety and limit the control of access and network movement over the corporate network environment. The reduction of network attacks and removal of unwanted access helps mute the risk of system failures and security breaches. Segmentation and separation not only limit attackers from moving one sub-network to another using firewall separation but also limit the scope of the security breach and buys additional time for the corporate to deploy countermeasures, so the rest of the network is not accessed (Metivier, 2017). Another technical control is that by implementing the least privilege policy, access can be given to employees only for essential roles (Metivier, 2017). It helps prevent attacks from insiders also. Additionally, events are logged, internal connections (regardless of whether they were permitted) are monitored, and suspicious behavior is attacked using firewalls. Also, with the reduction of unwanted access and traffic, the performance of network systems can be boosted (Metivier, 2017). With the introduction of IPv6, there are even better ways to implement the network separation with the ‘Quarantine Model’ that helps fit network nodes to individual network
  • 4. segments and deploy different security policies on each sub- network. Therefore, even as technology grows, adapted, and updated versions of network segmentation can always be achieved to arrive at the optimum security measures (Suzuki & Kondo, 2005). In my experience, a company that allows the network connection to 7000 employees will have a challenging time managing the security and firewall without segmentation and separation. Only then management, diagnosis, individual security measures can be implemented for the most optimum protection and access sought by the company. Optimum network separation helps motivate the practices of zero access by default, least privilege policy, among many others, and helps maintain security structure and rules to prevent security access, monitoring, and unwanted access to computers, internal systems, and private databases. Therefore, although there are a few concerns such as operation costs, antispoofing concerns, and concerns of encryption management with various models such as the quarantine model, it is safe to say that network separation is an exceptional technical control (Suzuki & Kondo, 2005). References Metivier, B. (2017). The Security Benefits of Network Segmentation. https://www.tylercybersecurity.com/blog/the- security-benefits-of-network-segmentation Suzuki, S., & Kondo, S. (2005). Dynamic Network Separation for IPv6 Network Security Enhancement. https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=& arnumber=1619969 Bottom of Form
  • 5. 1 Copyright © 2012, Elsevier Inc. All Rights Reserved Chapter 3 Separation Cyber Attacks Protecting National Infrastructure, 1st ed. 2 • Using a firewall to separate network assets from intruders is the most familiar approach in cyber security • Networks and systems associated with national infrastructure assets tend to be too complex for firewalls to be effective Copyright © 2012, Elsevier Inc. All rights Reserved C h a p te r 3
  • 6. – S e p a ra tio n Introduction 3 • Three new approaches to the use of firewalls are necessary to achieve optimal separation – Network-based separation – Internal separation – Tailored separation Copyright © 2012, Elsevier Inc. All rights Reserved C h a p te r 3
  • 7. – S e p a ra tio n Introduction 4 Fig. 3.1 – Firewalls in simple and complex networks Copyright © 2012, Elsevier Inc. All rights Reserved C h a p te r 3 – S e p
  • 8. a ra tio n 5 • Separation is a technique that accomplishes one of the following – Adversary separation – Component distribution Copyright © 2012, Elsevier Inc. All rights Reserved C h a p te r 3 – S e p a ra tio
  • 9. n What Is Separation? 6 • A working taxonomy of separation techniques: Three primary factors involved in the use of separation – The source of the threat – The target of the security control – The approach used in the security control (See figure 3.2) Copyright © 2012, Elsevier Inc. All rights Reserved C h a p te r 3 – S e p a ra
  • 10. tio n What Is Separation? 7 Copyright © 2012, Elsevier Inc. All rights Reserved C h a p te r 3 – S e p a ra tio n Fig. 3.2 – Taxonomy of separation techniques
  • 11. 8 • Separation is commonly achieved using an access control mechanism with requisite authentication and identity management • An access policy identifies desired allowances for users requesting to perform actions on system entities • Two approaches – Distributed responsibility – Centralized control – (Both will be required) Copyright © 2012, Elsevier Inc. All rights Reserved C h a p te r 3 – S e p a ra
  • 12. tio n Functional Separation? 9 Copyright © 2012, Elsevier Inc. All rights Reserved C h a p te r 3 – S e p a ra tio n Fig. 3.3 – Distributed versus centralized mediation
  • 13. 10 • Firewalls are placed between a system or enterprise and an un-trusted network (say, the Internet) • Two possibilities arise – Coverage: The firewall might not cover all paths – Accuracy: The firewall may be forced to allow access that inadvertently opens access to other protected assets Copyright © 2012, Elsevier Inc. All rights Reserved C h a p te r 3 – S e p a ra tio n National Infrastructure Firewalls
  • 14. 11 Copyright © 2012, Elsevier Inc. All rights Reserved C h a p te r 3 – S e p a ra tio n Fig. 3.4 – Wide area firewall aggregation and local area firewall segregation 12 • Increased wireless connectivity is a major challenge
  • 15. to national infrastructure security • Network service providers offer advantages to centralized security – Vantage point: Network service providers can see a lot – Operations: Network providers have operational capacity to keep security software current – Investment: Network service providers have the financial wherewithal and motivation to invest in security Copyright © 2012, Elsevier Inc. All rights Reserved C h a p te r 3 – S e p a ra tio n National Infrastructure Firewalls
  • 16. 13 Copyright © 2012, Elsevier Inc. All rights Reserved C h a p te r 3 – S e p a ra tio n Fig. 3.5 – Carrier-centric network-based firewall 14 • Network-based firewall concept includes device for throttling distributed denial of service (DDOS) attacks
  • 17. • Called a DDOS filter • Modern DDOS attacks take into account a more advanced filtering system Copyright © 2012, Elsevier Inc. All rights Reserved C h a p te r 3 – S e p a ra tio n DDOS Filtering 15 Copyright © 2012, Elsevier Inc. All rights Reserved
  • 18. C h a p te r 3 – S e p a ra tio n Fig. 3.6 – DDOS filtering of inbound attacks on target assets 16 • SCADA – Supervisory control and data acquisition • SCADA systems – A set of software, computer, and networks that provide remote coordination of control system for tangible infrastructures • Structure includes the following – Human-machine interface (HMI) – Master terminal unit (MTU)
  • 19. – Remote terminal unit (RTU) – Field control systems Copyright © 2012, Elsevier Inc. All rights Reserved C h a p te r 3 – S e p a ra tio n SCADA Separation Architecture 17 Copyright © 2012, Elsevier Inc. All rights Reserved
  • 20. C h a p te r 3 – S e p a ra tio n Fig. 3.7 – Recommended SCADA system firewall architecture 18 • Why not simply unplug a system’s external connections? (Called air gapping) • As systems and networks grow more complex, it becomes more likely that unknown or unauthorized external connections will arise • Basic principles for truly air-gapped networks: – Clear policy
  • 21. – Boundary scanning – Violation consequences – Reasonable alternatives Copyright © 2012, Elsevier Inc. All rights Reserved C h a p te r 3 – S e p a ra tio n Physical Separation 19 Copyright © 2012, Elsevier Inc.
  • 22. All rights Reserved C h a p te r 3 – S e p a ra tio n Fig. 3.8 – Bridging an isolated network via a dual-homing user 20 • Hard to defend against a determined insider • Threats may also come from trusted partners • Background checks are a start • Techniques for countering insider attack – Internal firewalls
  • 23. – Deceptive honey pots – Enforcement of data markings – Data leakage protection (DLP) systems • Segregation of duties offers another layer of protection Copyright © 2012, Elsevier Inc. All rights Reserved C h a p te r 3 – S e p a ra tio n Insider Separation 21
  • 24. Copyright © 2012, Elsevier Inc. All rights Reserved C h a p te r 3 – S e p a ra tio n Fig. 3.9 – Decomposing work functions for segregation of duty 22 • Involves the distribution, replication, decomposition, or segregation of national assets – Distribution: creating functionality using multiple cooperating components that work together as distributed system
  • 25. – Replication: copying assets across components so if one asset is broken, the copy will be available – Decomposition: breaking complex assets into individual components so an isolated compromise won’t bring down asset – Segregation: separation of assets through special access controls, data markings, and policy enforcement Copyright © 2012, Elsevier Inc. All rights Reserved C h a p te r 3 – S e p a ra tio n Asset Separation
  • 26. 23 Copyright © 2012, Elsevier Inc. All rights Reserved C h a p te r 3 – S e p a ra tio n Fig. 3.10 – Reducing DDOS risk through CDN-hosted content 24 • Typically, mandatory access controls and audit trail hooks were embedded into the underlying operating system kernel
  • 27. • Popular in the 1980s and 1990s Copyright © 2012, Elsevier Inc. All rights Reserved C h a p te r 3 – S e p a ra tio n Multilevel Security (MLS) 25 Copyright © 2012, Elsevier Inc. All rights Reserved C h
  • 28. a p te r 3 – S e p a ra tio n Fig. 3.11 – Using MLS logical separation to protect assets 26 • Internet separation: Certain assets simply shouldn’t be accessible from the Internet • Network-based firewalls: These should be managed by a centralized group • DDOS protection: All assets should have protection in place before an attack • Internal separation: Critical national infrastructure settings need an incentive to implement internal separation policy
  • 29. • Tailoring requirements: Vendors should be incentivized to build tailored systems such as firewalls for special SCADA environments Copyright © 2012, Elsevier Inc. All rights Reserved C h a p te r 3 – S e p a ra tio n National Separation Program