(Information Security) : (Assignment 2)
(Information Security) : (Assignment 2)
(Information Security) : (Assignment 2)
[Assignment 2]
[11579425]
TASK 1
WHAT IS REMEDIATION?
Remediation is the process of stopping Information security and compliance risks from growing to a
point where they can no longer be managed and are nothing but harmful to computer systems within
organisations. The process aids in defence against any data breaches disallowing any private or
sensitive data to be attacked, which will conclude in the containment of risk and its eventual removal.
Blind SQL injections are a type of SQL injection which attack a system via the use of true or false
queries. It is an attacking style mostly used on web pages, however, for my report, I will portray how it
can target an operating system and how to prevent it with remediation.
A remediation strategy to prevent any potential Blind SQL attacks is configuring a firewall. The reason
I have to choose this strategy is that a firewall will provide a set of rules to reject any dangerous or
potentially dangerous web request. This will catch and detect any attempt to try to sneak a SQL
through a web channel.
Within my Virtual Machine, I decided to install an Uncomplicated Firewall (UFW). The screenshots
below will detail how I installed this firewall onto my Linux Virtual Machine, and the necessary
configurations I made to it.
As a UFW was not pre-installed onto my Linux software, I had to issue this command ‘sudo apt-get
install ufw -y’. This command was used to install UFW on the system.
The UFW has now been installed onto my system and has been made active shown by the results of
the 'sudo ufw status' command. However, it was installed with the default policy, which allows access
to all incoming traffic. Therefore, the next step in the installation process would be to configure it to
deny all external traffic.
The command has now been specified to only allow computers with the IP address shown above, in
addition to this I added the command sudo ‘ufw deny in on enp0s3 to any port ssh’ to deny incoming
traffic from the external interface.
Wireshark is the industry standard for network packet capture. Wireshark will assist you in capturing
network packets and displaying them in detail. Users can use these packets for real-time or offline
analysis once they have been broken down. The Wireshark application allows you to examine your
network traffic under a microscope, filtering and drilling down into it to find the source of issues,
assisting with network analysis and, ultimately, network security.
A print screen to display how many packets were captured. The source destination can be seen on the
print screen. As I was running the attack on my computer the IP displayed is the IP address for my pc.
The source and destinations menu has been used to identify the address with the highest count and
label them as the intruder to my system. The method I just displayed for DDOS attacks on the network
is too lengthy and isn't an automated process. Ideally, you would want to trigger an alert within the
system to spot this automatically.
Youtube
- https://www.wireshark.org/lists/wireshark-users/201201/msg00048.html