Information Security
Total Page:16
File Type:pdf, Size:1020Kb
Cyber Security Audit in Business Environments Kemal Hajdarevic II Cyber Security Audit in Business Environments Kemal Hajdarevic Sarajevo, 2018 III Author: Dr. Kemal Hajdarević Proofreading Pat Allen & Ana Tankosić Publisher: International Burch University Editor-in-Chief: Dr. Kemal Hajdarević Reviewed by: Prof. Dr. Colin Pattinson Prof. Dr. Mario Spremić DTP & Design: Dr. Kemal Hajdarević DTP and Prepress: International Burch University Circulation: Electronic document Place of Publication: Sarajevo Copyright: International Burch University, 2018 Reproduction of this Publication for educational or other non-commercial purposes is authorized without prior permission from the copyright holder. Reproduction for resale or other commercial purposes prohibited without prior written permission of the copyright holder. Disclaimer: While every effort has been made to ensure the accuracy of the information, contained in this publication, International Burch University will not assume liability for writing and any use made of the proceedings, and the presentation of the participating organizations concerning the legal status of any country, territory, or area, or of its authorities, or concerning the delimitation of its frontiers or boundaries. ----------------------------------- CIP - Katalogizacija u publikaciji Nacionalna i univerzitetska biblioteka Bosne i Hercegovine, Sarajevo 004.056:658 HAJDAREVIĆ, Kemal Cyber security audit in business environments [Elektronski izvor] / Kemal Hajdarevic. - El. knjiga. - Sarajevo : International Burch University, 2018, XVI,160 str. : ilustr. ; 25cm About author: str. 161. Način dostupa (URL): http://eprints.ibu.edu.ba/3776/1/Cyber%20Security%20Audit%20in%20Business%2 0Environments_ 12.12.2018.pdf. - Nasl. sa nasl. ekrana. - Opis izvora dana 19. 12. 2018. ISBN 978-9958-834-64-6 COBISS.BH-ID 26733830 ----------------------------------- IV V VI Table of Contents Author’s Preface .......................................................................................................XIII ORGANISATION OF BOOK SECTIONS ....................................................................... XV LEARNING TRACKS ............................................................................................... XVI IMPORTANT DEFINITIONS ..................................................................................... XVI 1. Introduction ......................................................................................................... 1 CHAPTER ABSTRACT .................................................................................................. 1 ONE VIEW ON THE HISTORY OF DOCUMENTING PAST EVENTS.................................. 1 ONE VIEW ON DIGITAL TRANSFORMATION ............................................................... 3 DIGITAL TRANSFORMATION CYBER SECURITY CHALLENGES .................................... 5 PURPOSE OF THIS BOOK .............................................................................................. 6 CYBER SECURITY ........................................................................................................ 8 CYBER SECURITY MANAGEMENT ............................................................................... 9 SUMMARY ................................................................................................................ 10 KNOWLEDGE ACQUIRED .......................................................................................... 11 REVIEW QUESTIONS.................................................................................................. 11 FURTHER READINGS ................................................................................................. 11 2. Security of cyber and information system components ............................... 13 CHAPTER ABSTRACT ................................................................................................ 13 NETWORK COMPONENTS AND INFRASTRUCTURE ................................................... 13 NETWORK RELIABILITY REQUIREMENTS .................................................................. 14 COMMUNICATION MODEL ....................................................................................... 14 OSI REFERENCE MODEL AND TCP/IP SUITE ........................................................... 15 TCP/IP protocol suite .......................................................................................... 15 ISO / OSI reference model ................................................................................... 16 NETWORK TOPOLOGIES ........................................................................................... 17 CLIENT – SERVER COMMUNICATION MODEL .......................................................... 18 VII PEER-TO-PEER COMMUNICATION MODEL ............................................................... 19 INFRASTRUCTURE AND AD-HOC COMMUNICATION MODEL................................... 19 NETWORK COMMUNICATION MEDIA ...................................................................... 20 Wired communication media ............................................................................... 20 Wireless communication media ........................................................................... 22 Weaknesses associated with communication media ............................................. 22 NETWORK COMMUNICATION DEVICES ................................................................... 23 Hubs ..................................................................................................................... 23 Bridges ................................................................................................................. 23 Switches ............................................................................................................... 24 Network TAPs ..................................................................................................... 25 Routers ................................................................................................................. 26 Firewalls ............................................................................................................... 26 Intrusion detection and prevention systems ........................................................ 27 VOIP and PBX .................................................................................................... 27 NETWORK TYPES ...................................................................................................... 28 BAN ..................................................................................................................... 28 PAN ..................................................................................................................... 28 LAN ..................................................................................................................... 28 SAN ..................................................................................................................... 28 WAN .................................................................................................................... 28 MAN .................................................................................................................... 29 NETWORK TERMINAL DEVICES ................................................................................ 29 Supercomputers ................................................................................................... 29 Mainframes .......................................................................................................... 29 High-end and midrange servers ........................................................................... 29 Personal computers .............................................................................................. 30 Thin client computers .......................................................................................... 30 Laptop computers ................................................................................................. 30 Smartphones and handheld computers ................................................................ 30 IoT ........................................................................................................................ 31 NETWORK SERVICES ................................................................................................. 31 NFS ...................................................................................................................... 31 DHCP .................................................................................................................. 31 E-mail ................................................................................................................... 32 Print service ......................................................................................................... 33 VIII RAS ...................................................................................................................... 34 Directory services................................................................................................. 34 Peer-to-Peer services and applications ................................................................. 35 FTP ...................................................................................................................... 35 Telnet ................................................................................................................... 36 VPN ....................................................................................................................