See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/363566821 Network Security: Case Study Analysis Technical Report · September 2022 DOI: 10.13140/RG.2.2.21160.44800 CITATIONS READS 0 1,655 1 author: Chamoth Madushan Jayasekara University of Plymouth 35 PUBLICATIONS 1 CITATION SEE PROFILE Some of the authors of this publication are also working on these related projects: New Innovation Ideas View project Plymouth University View project All content following this page was uploaded by Chamoth Madushan Jayasekara on 15 September 2022. The user has requested enhancement of the downloaded file. NETWORK SECUIRTY Network Security: Case Study Analysis By: GPDCM Jayasekara GPDCM JAYASEKARA 1 NETWORK SECUIRTY Case Overview To provide a course of study leading to an understanding of the theory and practical issues that are involved with securing computer networks; and an understanding of key security techniques employed within personal and professional computer networks. Hypothetical Case Study Details XYZ Enterprises is one of the leading groups of companies in Sri Lanka. They are running businesses in different areas and fields. XYZ Enterprises has branch offices in different countries. Due to COVID-19 pandemic situation, all the countries in the world have faced many problems in running their business. The management of this group of companies has decided to automate the entire operations provided by all companies in the group. The automation also targets to improve all the internal operations and the public services which provide online access to their customers and their remote employees. The group of companies have World-wide branch network. All the companies and branches are connected to the corporate office which is in Colombo. They are running business such as Finance (private banks, etc.), Manufacturing and selling networking equipment’s, electrical and electronic appliances, Providing Cloud and Data Centre facilities. Most of their companies interact with customers, distributors, dealers, remote employees via internet. Following key functionality and task to be consider in establishing the security infrastructure. 1. Customers, distributers, dealers, remote employees should be able to seek following through online (web/mobile) systems. • Customers should be able view their products • Customers should be place online orders and make online payments • Submit all the related documents online and download all relevant documents • Distributers and dealers should be able check their stock levels and place online orders • Certificate verification to identify legitimate business entities. • People should be able to perform their financial transactions securely • Customers should ably reserve transport facilities and track the goods • Maintain continues communication with remote employees and their offices • People can purchase Cloud and Data Centre facilities. 2. The corporate office will maintain and host all their internal systems in a private cloud infrastructure environment and external systems in a public cloud. 3. One company of the group runs a medium scale business of providing Cloud & Data Centre services 4. The companies will maintain direct connectivity to following key organizations to precede their business. • Foreign Authorities • Shipping companies • Partners • Board of Investments of Sri Lanka • Local and Oversea Banks • Sri Lanka Customs 5. The security infrastructure must consider all related threats from inside, outside as well as the connected institutions & The security infrastructure must be able to build and enhance the trust in public to use the facility and must reflect in providing the services. GPDCM JAYASEKARA 2 NETWORK SECUIRTY Task Develop a comprehensive security infrastructure plan providing answers to following key questions. 1. Identify potential risks/threats to the above system. 2. Identify key security requirements on applications /users/ infrastructure. 3. Identify all the key features /components of the security infrastructure plan to address all the aboveidentified items. 4. Explain how you can address number 5 of the above. Give a detail approach and steps you will carry out to enhance the public trust highlighting both technical and nontechnical steps. Note: The report can exclude the implementation of application-level security related to the development platform or related technology. All the security threats must be identified and must be clearly identified the applicationlevel implementation requirements. The core equipment, technologies and infrastructure components must be address in detail. GPDCM JAYASEKARA 3 NETWORK SECUIRTY Acknowledgement First, I would like to show my deepest gratitude & respect to Mr. Harshapriya Rajakaruna, for helping & guiding me throughout this research. The completion of this research report gives me much fascination, as it would not have been successful without the hard work, dedication & determination that has been put into this. I was able to provide with optimum commitment to the research. Thank you, dear sir for making this a success! GPDCM JAYASEKARA 4 NETWORK SECUIRTY Table of Contents Case Overview ................................................................................................................................... 2 Acknowledgement .............................................................................................................................. 4 XYZ Enterprises Security System ..................................................................................................... 6 1) Potential Risks/Threats Towards The Security System .............................................................. 6 2) Potential Key Security Requirements On Applications/Users/Infrastructure ................................. 8 3) Identify All The Key Features/Components Of The Security Infrastructure Plan To Address All The Above-Identified Items ............................................................................................................. 9 4) Explain How You Can Address Number 5 Of The Above. Give A Detail Approach & Steps You Will Carry Out To Enhance The Public Trust Highlighting Both Technical & Nontechnical Steps. ........ 11 About Author ................................................................................................................................... 12 END REPORT ................................................................................................................................. 13 GPDCM JAYASEKARA 5 NETWORK SECUIRTY XYZ Enterprises Security System 1) Potential Risks/Threats Towards The Security System “We have identified 22 security threats that would adversely affect the company and its branches.” • As the management of this group has decided to automate the entire company provided by all companies in the group, so during this period all operations must be put on hold. If any company during in this period is in operation, then it has higher chance of the security of being breached. Due to the worldwide branch network, there are possibilities that a series of cyber-attacks may occur towards the XYZ enterprises. • As they run businesses based on finance, so basically there is huge monetary involvement and therefore if there is a man-in-middle attack during financial transactions, it may lead to a financial downfall. • If the system lacks confidentiality, then unauthorized parties maybe able to view the customer’s products and if the system lacks integrity, if a series of man-in-middle attacks, there will be ability for attackers to modify the details of orders, stocks, transport information etc. • If the system lacks non-repudiation, if a man-in-middle attack occurs, there would be a misuse of the transactions between the company and users as attackers would satisfy their monetary goals by modifying the values of transactions without users’ and recipient knowledge. • If the company stores the customers’ credit card details into their main system, and if there is an attack occurs, customer’s confidential information at a risk as they can even steal that information. This would lead the business to heavy fines by law and lead it into bankruptcy and if the system gets compromised by hackers using infect scripts on the company’s website, and they will replace an infected link that motivates users to submit their documents online resulting it going to the unauthorized parties. • The download link for download the relevant documents also can be compromised by intruders embedding malicious codes on the download link to motivate the users to download the infected files without users’ knowledge on their computers resulting that attackers will try to target the users’ computer to try and gain access to their sensitive information via infected downloaded files. • If the company made a deal with a legitimate looking business entity but holding fraudulent certifications will put the company at the risk. GPDCM JAYASEKARA 6 NETWORK SECUIRTY • When the system lacks poor security frameworks and lacks poor security standards, that may results data breaches & If the system only encrypts the card holder data but if not secure other non-sensitive data like address, contact, these non-sensitive data would be enough for an attacker to gain the access which has been encrypted. It is usually, to fulfil the tracking, the business should have to add the customers’ private information like address details, if an attack happens, attackers are willing to steal that personal information of users’ as it is same as stealing an identity of a user. • Since the business starts to communicate with remote employees, there is high chance that one of the remote employees being affected by an attack, if that case happens that would be a huge threat to whole network because just a single employee’s computer has enough information to make an attack and unauthorized intruders like attackers may impersonate as an employee and gain access to the internal workspace. • Usually, a public cloud is maintaining by the service provider and the company. This would be less secure than private cloud. Attackers can gain access by phishing emails to employees to gain the access to service provider and they able to access the customers’, distributors’, dealers’ etc. data and information that leads to occur tons of data breaches. • As this is the main centralized system, it should have high security as if any physical threats occur, then whole system will be crashed down and if their physical data centres get destroyed by natural disasters or if an attacker deletes and modifies the data or if service provider/customer deletes their data without their consent, this will lead to loss of the data. As all the companies and branches are connected to the corporate office located in Colombo, which has a centralized system, so if a particular cyber-attack launched toward the system in all the companies and branches will get compromised. • Since they start providing cloud and data service, if a single vulnerability of a software can let the attackers get in the cloud and exploit data of customers who are using the same service and when people buy clouds from the company, there might be risks occurred like if a breach of a client's data can be devastating as per the extent of the breach. This will result is higher investigation and resolving cost of the breach and associated legal expenses. This might also lead to a loss of company's reputation which might even make the company to shut down its doors. • If an employee who works on the cloud service providing, has access to the cloud can consider as a security threat as if that employee turned into an attacker surely, he or she can launch the unsecured codes on the infrastructure of the software that can allow for a series of unethical hackings. GPDCM JAYASEKARA 7 NETWORK SECUIRTY 2) Potential Key Security Requirements On Applications/Users/Infrastructure • During any automation or upgrading of the internal system all the services and operations must be remain offline. • The business should never store credit card information on their internal servers and ensure their payment gateways security is not at risk. • The business should use the latest proven security measures like factor-based authentication to ensure the confidentiality. • The company can implement one way hash to ensure the integrity by sending the specific set of specific information towards the authorized parties and expect no feedbacks. • Using signature-based schemes and factor-based authentication system can ensure the nonrepudiation in the system. • Using secured protocols on the networks, standards and certificates can keep the website away from security threats. • By checking the certifications of other business before getting partnered can avoid the fake and illegal partners • Making sure to encrypt all the customers’ private information and insert them into a secured database would help to not to leave the unencrypted data for hackers. • By keeping the database software and operating system up to date would help to maximize security of the users’ data. • By advising the users to keep the eye on their private information, to use the strong passwords, to keep update the firewalls and some warnings like fake emails can prevent the identity theft of the users. • Developing the policy to ensure the safety of the remote employees stating guidelines like to update the firewalls and protocols. • Private clouds give the access to trusted parties like admin and high ranked employee by using the server-side authentication for access the control. • Should advise the staff who are responsible for physical data centres, to do the constant monitoring and configuring, to ensure the existence of the private cloud especially when using centralized computer system. • By motivating developers to find the vulnerabilities of the software(s) can help the system not to leave any backdoors for hackers. • To prevent that attacks that would cause from insiders like employees, the company should advise the insiders to use strong authentication system with multi factor authentication enabled and should use physical modern authentication systems like biometrics scanning. GPDCM JAYASEKARA 8 NETWORK SECUIRTY 3) Identify All The Key Features/Components Of The Security Infrastructure Plan To Address All The Above-Identified Items • As people should be able to perform to perform their financial transactions, the company can use third party payment processing systems to bring on the process off-premises. Sample options like Sampath Vishwa, PayPal, etc. • As if the customers able to view their details like order details, transport, stock etc without witnessing by unauthorized parties, the company should provide a 2- factor authentication system to make sure their accounts secured. • As if the customer placing online orders without unauthorized altering by man-in-middle attack, the company can ensure the non-repudiation by using digital signatures and multi factor authentications, by doing this company can ensure that the customers place online orders correctly. • As if the user submits the documents online and the user download the documents via links without getting infected, the company needs to secure the website by using a secured link protocol called HTTPS, a security certificate SSL, and few standards. • Data should be protected and backed up regularly at the end of the day, by using incremental backups, and updated new or modified data by using differential backups and at the end of the year a full and complete backup of the entire system should be made. • Can implement frameworks like public key infrastructures frameworks to ensure the confidentiality. • To avoid partnering with illegal companies, the company can check their certificate details by contacting relevant authorities like certificate authority. • As the company maintain and host all their external system in public cloud securely, the company must choose a trusted cloud service provider that has more security features, and the company has a partial control over their public cloud, with that, they can use firewalls, intrusion prevention system (IPS), secured protocols, anti-virus, and anti-malware to secure their external system. • The company could use recognised standards such as ISO 27001 as it has been prepared for Implementing, Operating, Monitoring, Reviewing, Maintaining, and improving an Information Security Management System (ISMS). • Also the company could implement ISO/IEC 27002 as this provides the best solutions as recommended on Information security of the ISMS as it provides Risk Assessment , Security Policy, Organization of Information Security , Asset Management, Human Resources Security, Physical and Environmental Security , Communications and Operations Management, Access Control, Information Systems Acquisition, development and maintenance, Information Security Incident Management, Business Continuity Management and Compliance. GPDCM JAYASEKARA 9 NETWORK SECUIRTY • They can use other standards like: ➢ ISO/IEC 27004:2009 - Information Security Management Measurement Standard ➢ ISO/IEC 27005:2011 -Information Security Risk Management Standard ➢ ISO/IEC 27007:2011 -Auditing Information Security Management Systems ➢ ISO/IEC 27032:2012 - Cybersecurity ➢ ISO/IEC 27033 - IT Network Security (Parts 1, 2 & 3 Are Published) ➢ ISO/IEC 27035:2011 - Information Security Incident Management ➢ ISO/IEC 27037 – Digital Evidence ➢ ISO/IEC 27039 - Intrusion Detection & Prevention Systems • As the company stores and manage their internal system inside their private cloud system, the company should be aware of legal risks in future when establishing the data centres. It is better to check whether that if data centres violate the legal procedures or not. • Next-Generation-Firewall (NGFW) can provide as a more secure option as traditional firewalls are only intended to grant access or revoke. These kinds of firewall solution are inherent as they rely on policies and limitations that has been programmed. If the company successfully set the updated policies so these firewalls can deny the access of new and unknown threats. However, if not yet, the company can use additional tools such as AMP and NGIPS with using NGFW, so it can provide control, automation, and penetrations. • As one of the companies of the group runs a medium scale business providing cloud and data services securely, the company need to make sure to secure as they are providing the public cloud services that are using shared technology where public can reach. Due to public reach, there would be high chance of being attacked, to prepare for that, the business should automate the software and cover the vulnerabilities so their customers can receive best secured cloud services. • Malwares can be in any form of Viruses, Trojans, Worms, Spyware, Rootkits, Adware, etc. The best security requirement to prevent from these malwares is to install an anti-virus software as it scans the computer to detect and clean the malwares and provides automatic updates to provide more protection. Also, by placing a firewall it will prevent all unauthorized access from private computer networks. Therefore, these anti-virus software and firewalls will bring an extra barrier for malwares to attack the computers. GPDCM JAYASEKARA 10 NETWORK SECUIRTY 4) Explain How You Can Address Number 5 Of The Above. Give A Detail Approach & Steps You Will Carry Out To Enhance The Public Trust Highlighting Both Technical & Nontechnical Steps. • Public trust is an essential component for every internet based digital business. Trust can be change according to reviews, rating, and recent highlights of the company. If the company’s history is not good enough to establish the trust, then it should identify what was wrong and recover it as there is no successful digital based business without strong public trust. Initially, Authentication and Authorization can use as a primary security feature so they are significant to gain the public trust, with this, signature-based schema like digital signatures can be used here as it is a modern technical solution that help to maximize the trust among the customers and users. Therefore, it is required to use identity certificates to merge the authentication services but using identity certificates are known as impractical solutions. To recover this, a key infrastructure, public key infrastructure (PKI) can be use here, as it contributes to bear the confidentiality, integrity, and non-repudiation of the system. • Next, it is required to make the transactions between users and company secure and confidential. The company and the customer should make sure whether their requests are compromise or not. In a transaction between the customer and company, man-middle-attacks can cause compromises, in this kind of sense, non-repudiation will be the critical role to consider and to ensure it company can implement the key infrastructure frameworks and modern authentication systems. Additionally, the company can partner with trusted and secured third party services, as this is also widely used modern technical solution. • As a company, to avoid the collapse of public trust because of insider attacks, they should understand that most of insider attacks are caused by internal employees. Therefore, both of technical and nontechnical solution can be provide here. Using physical intrusion detection systems like security cameras, using devices that able to lock the assets without being stolen, training employees, and using physical authentication systems like biometric scanning, etc can be provide as non-technical solution and firewalls can use as a technical solution to protect all the assets of this enterprise’s network, without being attacked that able to pull the company away from the public trust. • Then, when establishing the connection with other institutions, it is better to partner with most trusted and legal institutions. However, due to the highly competence between companies in the modern world, this company must need to protect their information as they should consider the information as an important factor to make sure to keep the public trust. As customers’ information reside in the company, it is required to protect them by providing more secure access methods and controls, using encryption methods, and monitoring network for potential threats can be use as technical solution and educate to use strong authentication codes and security can be use as a non-technical solution, so the customers’ and employee cannot share their passwords among the networks. GPDCM JAYASEKARA 11 NETWORK SECUIRTY About Author Personal Quote “You'll never get what you want if you don't pursue it. If you don't ask, you'll always get a no. If you don't move forward, you remain stationary.” Who Is GPDCM Jayasekara? “My name is GPDCM Jayasekara, I consider myself an optimistic & creative individual who has passion in the field of computer networks & automation & hope to create a difference in the industry. I am a smart and diligent collaborator who enjoys exceeding targets. I am also enthusiastic and willing to learn new things that would challenge me both personally and academically, which would help me be a better version of myself. Personal Objective To carve a niche for myself as a professional in the computer network industry with a reputed and well-managed organization where my potential is utilized to the fullest, thereby leading to the growth of both the organization as well as my career in the organization. Further, I’m interested in pursuing higher studies in computer security in which I can help improve my knowledge for the betterment of the organization and our society. GPDCM JAYASEKARA 12 NETWORK SECUIRTY END REPORT GPDCM JAYASEKARA View publication stats 13