Download as pdf or txt
Download as pdf or txt
You are on page 1of 85

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/339723265

CYBER SECURITY ANALYSIS USING POLICIES & PROCEDURES

Thesis · March 2020

CITATIONS READS
0 384

1 author:

Ashad Qureshi
National Institute of Technology, Kurukshetra
39 PUBLICATIONS   2 CITATIONS   

SEE PROFILE

All content following this page was uploaded by Ashad Qureshi on 05 March 2020.

The user has requested enhancement of the downloaded file.


CYBER SECURITY ANALYSIS USING POLICIES & PROCEDURES

ACKNOWLEDGEMENT

I hereby take a chance to express my sense of extreme gratitude towards my Master of


Technology Guide Er. Sarvesh Rai, Assisstant Professor (CS/IT), for his suggestions and
constant inspiration at every stage of the research.

He is an extremely sympathetic and principle-centered person. His skills, as a researcher and guide
helped me to overcome all the hurdles. Without his constant support and encouragement, I would
not have been able to complete my research work successfully.

I owe a debt of gratitude to Dr.D.Rai, Director & Dr.Shishir Jain, Principal, Infinity Management
& Engineering College (IMEC Sagar) for encouragement & the Head of Department
Mrs.Navdeep Saluja.

My parents have their own share in my success. I firmly believe that their blessings always
enlighten my path ahead. I hereby take a chance to salute my father Mr. Shami Ullah Qureshi
and mother Mrs. Afrose Qureshi. Without all above support and sacrifice this thesis would not
have been possible for me. At last, I thank the one and all, for the divine blessings.

Ashad Ullah Qureshi

By: Dr. Ashad Ullah Qureshi


Contact: 6260651575, 9179357477
Email: conceptsbookspublication@gmail.com
Web: https://researchitout.blogspot.com/
CYBER SECURITY ANALYSIS USING POLICIES & PROCEDURES

CERTIFICATE

I hereby certify that Er. Ashad Ullah Qureshi has completed his Master of Technology
Dissertation titled “Analysis of Network Security Through VAPT and Network Monitoring”
under my guidance.

I further certify that the whole work, done by him is of his own, original and tends to general
advancement of knowledge. According to the best of my knowledge, I also certify that he has not
been conferred any degree, diploma and distinction by either the Infinity Management &
Engineering College or any other university for this thesis.

Date: 15/03/2016 (Er. Sarvesh Rai)

By: Dr. Ashad Ullah Qureshi


Contact: 6260651575, 9179357477
Email: conceptsbookspublication@gmail.com
Web: https://researchitout.blogspot.com/
CYBER SECURITY ANALYSIS USING POLICIES & PROCEDURES

DECLARATION

I, Er. Ashad Ullah Qureshi hereby declare that my Master of Technology dissertation titled
“Cyber Security Analysis Using Policies & Procedures” is written as a partial fulfillment of the
requirement for a degree on this topic. The complete study is based on literature survey, study of
periodicals, journals and websites and building a model for proving the concept studied and
designed.

I further declare that the complete thesis work, including all analysis, hypothesis, inferences and
interpretation of data and information, is done by me and it is my own and original work.
Moreover, I declare that no degree, diploma or distinction has been conferred on the basis of this
thesis by the Rajiv Gandhi Technical University, Bhopal (M.P.) or any other university to me
before.

Date: 15/03/2016 (Ashad Ullah Qureshi)

By: Dr. Ashad Ullah Qureshi


Contact: 6260651575, 9179357477
Email: conceptsbookspublication@gmail.com
Web: https://researchitout.blogspot.com/
CYBER SECURITY ANALYSIS USING POLICIES & PROCEDURES

ABSTRACT

Internet provided us unlimited options by enabling us with constant & dynamic information that
changes every single minute through sharing of information across the globe many organizations
rely on information coming & going out from their network Security of the information shared on
the global.

Networks give birth to the need of the cyber security. Cyber security means the security of the
information residing in your cyberspace from unwanted & unauthorized persons. Through
different-different policies & procedures we can prevent our information from both locally &
globally active invaders (Hackers).

Cyber security is a proactive step to prevent data assets. The policies & procedures, helps us to
assess off activeness & ineffectiveness of the security maintained so far by the organizations.
Policies & procedures ensures that a standalone PC & a networked PC can be provided in a very
off active manner. This Thesis describes the methodologies & techniques involved in policies &
procedures along with its benefits & precision.

The main objective of the proposed work is to lay down a secure & authentic network so that no
intruder can gain unauthorized access.The proposed technique concentrates and supports to the
basic security principle like authorization, integrity, dynamization and confidentiality during
analysis and implementation of the whole process. The level of security & its implementation
requires skills & proper monitoring of the system as a whole. Thesis aims at creating a security
mesh to explain the importance of computer security to different organizations.

By: Dr. Ashad Ullah Qureshi


Contact: 6260651575, 9179357477
Email: conceptsbookspublication@gmail.com
Web: https://researchitout.blogspot.com/
CYBER SECURITY ANALYSIS USING POLICIES & PROCEDURES

List of Figures

Chapter 1. Introduction

Chapter 2. Literature Survey

Chapter 3. Implementation

3.1 Component Services

3.1.1 SSDP Discover Services

3.1.2 Remote Registry

3.1.3 Routing & Remote Access

3.1.4 Telnet

3.2 Local Security Settings

3.2.1 Account Policies

3.2.2 Local Policies

3.2.3 Public Key Policies

3.2.4 Software Restoration Policies

3.2.5 IP Security Policies on Local Computer

Chapter 4. Result Analysis

4.1 Tabular Analysis

4.1.1 Speed of Access

4.1.2 Security Instances


By: Dr. Ashad Ullah Qureshi
Contact: 6260651575, 9179357477
Email: conceptsbookspublication@gmail.com
Web: https://researchitout.blogspot.com/
CYBER SECURITY ANALYSIS USING POLICIES & PROCEDURES

4.1.3 Authentication Process

4.1.4 Mishap/Hacked/Slow events per week

4.1.5 Ease of Use

4.1.6 Overall

4.2 Graphical Analysis

4.2.1 Speed of Access

4.2.2 Security Instances

4.2.3 Authentication Process

4.2.4 Mishap/Hacked/Slow events per week

4.2.5 Ease of Use

4.2.6 Overall

By: Dr. Ashad Ullah Qureshi


Contact: 6260651575, 9179357477
Email: conceptsbookspublication@gmail.com
Web: https://researchitout.blogspot.com/
CYBER SECURITY ANALYSIS USING POLICIES & PROCEDURES

CONTENTS
Chapter 1. Introduction 1-3

1.1 Product Perspective

1.2 Motivation

1.3 Objective

1.4 Problem Domain

1.5 Organization of the Dissertation

Chapter 2. Literature Survey 4 - 21

2.1 Vulnerability Analysis

2.2 Cyber Security Policies

2.3 Areas of Breaches in Computer Security

& Measures to Overcome

2.4 Cyber Audit

2.5 Literature Survey: Existing Work

Chapter 3. Analysis –Proposed Work 22 - 33

3.1 Introduction

3.2 Proposed Work

3.3 Testing

Chapter 4. Result Analysis 49 - 51

4.1 Performance Analysis

By: Dr. Ashad Ullah Qureshi


Contact: 6260651575, 9179357477
Email: conceptsbookspublication@gmail.com
Web: https://researchitout.blogspot.com/
CYBER SECURITY ANALYSIS USING POLICIES & PROCEDURES

4.2 Tabular Analysis

4.3 Graphical Analysis

Chapter 5. Conclusion and Future Enhancement 49 - 51

5.1 Conclusion

5.2 Application

5.3 Limitations

5.4 Future Enhancement

Appendix A: References 52 – 54

Appendix B: Screen Shots 52 – 54

Appendix C: List of Publications 74

By: Dr. Ashad Ullah Qureshi


Contact: 6260651575, 9179357477
Email: conceptsbookspublication@gmail.com
Web: https://researchitout.blogspot.com/
CYBER SECURITY ANALYSIS USING POLICIES & PROCEDURES

CHAPTER 1

INTRODUCTION

1.1 Product Perspective

Cyber security through polices & procedures are intended to define a development methodology
beginning with the step by step solution to the problem of cyber & local security. The protection
of our information is flowing in the networks, this poses information at risk. Through certain
policies & procedures can prevent cyberspace as well as local space.

It serves as a clear & effective measure to prevent and solve the problems of unwanted &
unauthorized access to network.

The proposed concept thoroughly explains the polices & activities & configuration of operating
system according to the present & future possibilities & How to tackle them effectively

1.2 Motivation

Cyber security is one of the major issues of commercial Information Systems (IS). The growing
connectivity of computers through internet, increasing number of systems such as mobiles, tablets
& other devices combined with their exponential growth in size and complexity of the systems
have made cyber security a very big problem now a days.

1.3 Objective

Prime objective of the proposed research is to analyze, assess and implement efficient and highly
secured, maintained Information Systems for the organizations.
The proposed technique concentrates and supports to the basic security principle like authorization,
integrity, dynamization and confidentiality during analysis and implementation of the whole
By: Dr. Ashad Ullah Qureshi
Contact: 6260651575, 9179357477
Email: conceptsbookspublication@gmail.com
Web: https://researchitout.blogspot.com/
CYBER SECURITY ANALYSIS USING POLICIES & PROCEDURES

process. The concept of cyber security through policies & procedures is simple & sound enough
to implement. The objective of the report is to develop a secured Information System through
which no unauthorized & unwanted access will occurs. A secured and tested approach with user
& network engineer-friendly environment.

1.4 Problem Domain

Computer has now become an initial & indispensable part of our systems. They are used for
tasks ranging from routine office work like would processing to complex & operational \
crucial tasks like data fusion & data mining so, on, the protection of our information flowing
in & out of the networks, this poses a challenge to cyber security. To take advantage of IT
revolution & its application the organizations needs to focus on cyber security this will ensure
protection of its information & systems assets against debate branches as well as failures
arising out of negligence & accidents since both equally damaging & their prevention of
paramount importance.

1.5 Organization of the Dissertation

This project work has been organized into following five chapters.
Yields the structure of the project work.
Presents detailed description of cyber security and related work. Literature survey of
existing work is also illustrated.
Propose a strategy for policies & procedures of cyber security.
Gives onto the experimental evolution of the research? In this, performance of proposed
configuration & policies will be evaluated.
Provide a conclusion of this project & look into future works on this topic.

By: Dr. Ashad Ullah Qureshi


Contact: 6260651575, 9179357477
Email: conceptsbookspublication@gmail.com
Web: https://researchitout.blogspot.com/
CYBER SECURITY ANALYSIS USING POLICIES & PROCEDURES

CHAPTER 2
LITERATURE SURVEY

2.1 Vulnerability Analysis

Vulnerability Analysis systems shall be used in addition to firewalls for all WAN\LANs & servers.
These are systems that sit on the edge of the WAN/LANs & scrutinize all incoming traffic, for any
known hustle/hazardous data patterns & the firewall system to take the next appropriate action in
case of detection.

The Vulnerability Analysis system should have the capability to detect intrusion & sound or audio
alarms as well as gives details of the intrusion. Auditing & forensic analysis tools are also very
useful.

The design & implementation of computer security measures depend on the type & complexity of
computer system. Broadly, the types of information/computer system & networks for computer
system and network for this purpose are classified as follows:

2.1.1 Stand Alone Computers

The security management of stand-alone. Computer & peer-to-peer networks will be responsibility
of authorized persons in whose charge the machine is designated to work.

2.1.2 Computer Peripherals

This encompasses all the peripherals being utilized routinely by the various branches. Which
includes scanners, printers, CD writers & photocopies etc?

These machines should be installed in crypto-centers, centralized facilities to enable close super
vision over transmission. These equipments should be held on the personal charge of an authorized
employee of the organization.

By: Dr. Ashad Ullah Qureshi


Contact: 6260651575, 9179357477
Email: conceptsbookspublication@gmail.com
Web: https://researchitout.blogspot.com/
CYBER SECURITY ANALYSIS USING POLICIES & PROCEDURES

2.1.3 Local Area Networks LANs

The security management of LAN will be the responsibility of the System Administrator of the
LAN. The decision of system administrator of these networks shall cover the length & breadth of
the network beginning form the clients through the wireless links, via the hubs/routers/ other access
or network devices, till the access point of the WAN (if the subject network is connected to the
WAN).

Information systems are composed of heterogeneous components interacting through some form
of communication media. The assorted security and protection required for these holes in
information systems can provide and overall assessment of system integrity. Vulnerability analysis
and risk assessment needs to be carried out periodically to identify security problems and non
compliance to lie down security policy. All vulnerabilities detected during analysis must be
brought formally to the notice of the controlling authority & corrective action must be initiated
immediately. These vulnerability tools are of following types:-

2.1.4 Audit Trails.

To carry out a system audit and generate an audit report specifying weaknesses notice,
unauthorized activities and areas to be addressed.

2.1.5 Intrusion Detection

To detect unauthorized access to the information/network systems.

2.1.6 Event Log

To generate a log of all activities taking place on the network at the specified frequency in order
to monitor the network.

By: Dr. Ashad Ullah Qureshi


Contact: 6260651575, 9179357477
Email: conceptsbookspublication@gmail.com
Web: https://researchitout.blogspot.com/
CYBER SECURITY ANALYSIS USING POLICIES & PROCEDURES

2.1.7 Penetration Testing/Detection

To test the strength of our networks against an unauthorized intrusion or cyber attack.

The full details of security threats to computer networks can be addressed under the following
heads

2.1.8 Physical Threat

This is by way of contact by unauthorized persons with in the network server, work stations,
cabling, jacks and connectors, usage by unauthorized person of data displayed on LAN server or
the screen or the screen of a work station which is logged on to the network or theft of component
of work stations etc.

2.1.9 Electronic Threat

This is affected by introduction of logic bombs, Trojan house or virus programs, manipulation of
files, alteration of size, file corruption, changing of passwords, access control and software security
breaking codes and encryption by system antic hacking, taping of inter-connecting electronic
cabling etc. Network communications is another area of security concern. This concern consists
primarily of the following two types of attack – ‘Tapping’ and ‘Spoofing’. Wire tapping poses a
high risk for attack on any system which uses. Telephone or wire communication, Spoofing is
pretending to be a server or peer.

There are multiple kinds of “Spoofs” that can be employed. A program can be put in place to
replace the login program and of other user names and passwords. Another spoof can be
implemented between servers, where one server identifies itself to anther server for routing and
communications. If the first server begins using the spoofing server, all information routed through
it can be captured.

By: Dr. Ashad Ullah Qureshi


Contact: 6260651575, 9179357477
Email: conceptsbookspublication@gmail.com
Web: https://researchitout.blogspot.com/
CYBER SECURITY ANALYSIS USING POLICIES & PROCEDURES

2.1.10 Procedural Threat

Threat can occur due to lack of LAN document, faulty maintenance document, improper
classification of data and irregular assignment of access permits, lack of policy and SOP, on LAN
security, lack of security training of the users and operators, not laying down clear cut
responsibility and not nominating a qualified LAN administrator.

2.1.11 Cyber Attacks

The Growing number of networks and reliance on computer based system for sharing information
have made us vulnerable to cyber Attacks by adversaries. Securing endpoints without impacting
efficiency and system performance demands a highly flexible solution that takes into account the
necessity of cyber security measures and the dynamics of our specific work environment.

2.2 Cyber Security Policies

Cyber Security Policy covers the following issues:

2.2.1 Safeguarding of Classified & Confidential Information

Classified and sensitive confidential information shall be safe guarded at all times. Necessary
safeguards in terms of passwords and authentication systems shall be applied so that such
information accessed only by authorized persons and retains its content integrity

2.2.2 Safeguarding of Information & Information Systems (IS) Resources

Information and its resources shall always be safeguarded against sabotage, tampering denial of
service espionage fraud, misapplication, misuse & release to unauthorized persons. This shall be
accomplished through the continuous employment of safeguards consisting of administration,
procedural, and physical means.

By: Dr. Ashad Ullah Qureshi


Contact: 6260651575, 9179357477
Email: conceptsbookspublication@gmail.com
Web: https://researchitout.blogspot.com/
CYBER SECURITY ANALYSIS USING POLICIES & PROCEDURES

2.2.3 Networking of Different Information Systems

When Information Systems are managed by different administrators are interfaced on networked.
Compatible accreditation requirements will be vowed.

The details will includes description and classification of data, clearance levels of the users;
designation of the administrator who shall resolve conflicts if any and safeguards to be
implemented before interfacing the IS.

2.2.4 Internet Access

A networked computer will not be connected or used to access the Internet. Stand-alone PCs
having no classified data can only be used to access - Internet where were the competent authority
has accorded such permission. No information of value will be passed during Internet usage as a
media. These PCs should be on the charge of an officer like manager or other administrative post
that use P C for internet. The downloaded data should be scanned before copying it on a C D.
Internet PCs too should have an updated licensed anti-virus. Adequate defensive measures are to
be taken while reconfiguring to internet P C for use on personal internet & vice versa.

Such shifting of computers between two Networks will be done only after the permission of an
officer. In no case will a computer be shifted without formatting it. In case of computer from the
personal internet is being shifted for internet peer to formatting the computer complete data will
be securely erased. The source of most viruses and malicious codes is the internet; hence all users
should take adequate caution. While browsing sites or downloading material/software. Certain
precaution if observed will greatly reduce risk of infection:-

a) Software downloads should be avoided. However if it is necessary only download from


trusted site like “inet.com” that certify their downloads. Before clicking on a link it is
advisable to let the mouse pointer hover on it for a few seconds. If it is a certified sale the
certain logo will appear.

By: Dr. Ashad Ullah Qureshi


Contact: 6260651575, 9179357477
Email: conceptsbookspublication@gmail.com
Web: https://researchitout.blogspot.com/
CYBER SECURITY ANALYSIS USING POLICIES & PROCEDURES

b) All articles and other documents, pdf or word should be downloaded and then scanned
(Right-click scan with) before opening.
c) Internet browsing should only be done from a user account, which has limited rights for
installing and running “exe” files program file since all malware programs, the malicious
code can get executed automatically on downloaded by administrator.
d) No document with confidential information should be stored on internet PC, because
security of data on hard disc cannot be assumed as full proof.

2.2.5 Use of Commercial off Shelf Security Software

Commercial off the shelf security software will be used only after permission from higher authority
the encryption software / system to be used will be specifically developed and will be subject to
evaluation by the supervisor of that department. The data of higher security classified should not
be stored in and electronic or magnetic other reproducible form whatsoever.

2.2.6 External Storage Devices

All types of external storage devices other Ethernet based hard disk devices issued by the
organization are prohibited. From LANs must be exploited to the fullest and consequently, use of
CDs & pen drives should be reduced to minimum. Private storage media and wireless devices such
as TATA PHOTON/INTERNET DONGLES will not be used within the organization.

No external storage media will be carried out of the office premises. If inescapable, written
sanction of the concerned branch head or above should be obtained. External storage media
(Ethernet based HDD) containing classified data would be marked as such these would be treated
as classified document and their document handling and transmission done in accordance with
classification and handling of classified documents. The following additional actions are
mandatory:-

(i) Authorized manager will create an administrator account and a user account in all
PCs of organization the administrator account will be password protected and will
By: Dr. Ashad Ullah Qureshi
Contact: 6260651575, 9179357477
Email: conceptsbookspublication@gmail.com
Web: https://researchitout.blogspot.com/
CYBER SECURITY ANALYSIS USING POLICIES & PROCEDURES

be used to disable the option to connect and removable storage device to USB
ports. This is done by modifying windows OS registry settings. This will not affect
functioning of other peripherals such as keyboards. Printers and mouse.
(ii) Procurement of only Ethernet based removable HDDs is ensured. The number of
these HDD being procured will be kept under the custody of the branch heads.

2.2.7 Cyber Audit

Cyber audit will be conducted regularly to ensure that there is no breach of security. Detailed
instructions on conduct of cyber audit are must be followed.

2.2.8 Damage Contains/Disaster Records

Storable measure will be initiated in the departments to ensure minimum damage to networks/data
in case of any eventuality and there after record maximum data in minimum time. Regular backups
at periodicity of once in a weak or whoever significant charges are affected of critical essential
data will be ensured and stored physically AT A DIFFERENT LOCATION. Information system
instruction must cater or information system crisis management organisation specifically detailed
by name. These teams would be responsible for implementation of security infrastructure, carryout
periodic vulnerability analysis, react on security related incidents & help in restoration of
information systems during crisis emergency.

By: Dr. Ashad Ullah Qureshi


Contact: 6260651575, 9179357477
Email: conceptsbookspublication@gmail.com
Web: https://researchitout.blogspot.com/
CYBER SECURITY ANALYSIS USING POLICIES & PROCEDURES

2.2.9 Repair & Maintenance of Computer

(i) Routine check-up of computer for its error free service to be carried out daily before
‘start up’ to prevent breakdown of computers. A dust free environment prevents
failure.
(ii) Computer may however require periodic service/repair by other agency. Following
precautions will be taken prior to dispatch of computer for repair/review.
a. If the problem is not with the disk, then it will be removed and retained by the respective
unit for safe custody.
b. If it is a problem of hard disk failure and it happens to contains classified or confidential
data, one authorized person accompany the computer to the vendor shop and ensure
that the computer is attended by him all the time during the period of repair it no
occasion he will allow the repair agency to look at the data contained in the hard disk.
2.2.10 Formatting of PCs

No PCs will be formatted without prior permission of the manager.

2.2.11 IT Equipment disposal

IT equipment often contains parts which cannot simply be thrown away. Hard drives, USB
drives, CD-ROMs and other storage media that contains various kinds of data, some of which
is considered sensitive.

In order to protect our constituents data, all storage, mediums must be destroyed before being
disposed of simply deleting or even formatting data is not considered sufficient when deleting
files or formatting a device, data is marked for deletion are still accessible.

By: Dr. Ashad Ullah Qureshi


Contact: 6260651575, 9179357477
Email: conceptsbookspublication@gmail.com
Web: https://researchitout.blogspot.com/
CYBER SECURITY ANALYSIS USING POLICIES & PROCEDURES

2.2.12 Documents

To ensure accountability at various levels proper document is essential. All departments are
required to maintain up to date document at all times. The list of various documents to be
maintained is as under.

(i) Cyber security – Standard Order procedure


(ii) Password Register
(iii) User allotment/Handing/Taking over Register
(iv) CD/DVD Control Register
(v) Quarterly Audit Register
(vi) Training Register
(vii) Monthly/Quarterly Stock taking of IT assets
(viii) Ledger of all IT equipments
(ix) Log Book of all IT ASSETS
(x) Control Registers of Printers, Scanner, Photo copies, CD Writer and Fax
2.3 Areas of Breaches in computer security & measures to overcome

The areas where breaches in computer security may access are outline as under:-

(i) Personal security


(ii) Physical security
(iii) Hardware security
(iv) Software security
(v) Database security
(vi) Communication security
(vii) Network security
(viii) Miscellaneous

By: Dr. Ashad Ullah Qureshi


Contact: 6260651575, 9179357477
Email: conceptsbookspublication@gmail.com
Web: https://researchitout.blogspot.com/
CYBER SECURITY ANALYSIS USING POLICIES & PROCEDURES

2.3.1 Personal Security

User accounts on official computer systems are to be used only for official purpose and not to
be used for personal activities. Unauthorized use of the system may be in violation of the rule.
Constructors theft and can be punishable by company law. Therefore unauthorized use of the
official computing system & facilities may constitute data of great importance.

The following aspects are of prime attention for users:-

a) Users are personally responsible for protecting all confidential information used
and or stored on their accounts. This includes their logon Ids and passwords.
Furthermore copies of such documents or distributing it to unauthorized persons.
b) User shall not purposely engage in activity with the intention to verses other users
degrade the performance of the system divert system resource to their even use or
gain access to other system for which they do not have authorization.
c) Users shall not attach unauthorized devices on their PCs or work stations, unless
they received specific authorization from the authority.

2.3.2 Physical security

Physical protection of permission of housing the computer hardware and software systems
and data contained there is absolutely essential. Thus requires better techniques than those for
conventional office security and documents. Certain aspects for specific attention are as
under:-

a) Premises, where computers are kept should be locked and secured when unattended.
Intrusion of Sensors placed at vital places can augment the guards and trigger alarm
on detection motion.
b) An officer should be nominated formally and be responsible and accountable for the
physical security, custody & functioning of each computer.

By: Dr. Ashad Ullah Qureshi


Contact: 6260651575, 9179357477
Email: conceptsbookspublication@gmail.com
Web: https://researchitout.blogspot.com/
CYBER SECURITY ANALYSIS USING POLICIES & PROCEDURES

c) Each computer should be password protected. Computers that are left unattended for
any period of time be it a few minutes or parts thereof, should have the provision of
being barred access by way of password such as ones provided by screensaver
software, etc.
d) LAN and WAN nodes should preferably be located in well – protected areas. Tap
detectors can sense any identification by the system administrator.
e) Fire protection and alarm sys should be installed in LAN and WAN nodes and also for
system as identified by the system administrator.
f) Biometric Security: Biometric systems are based on unique characteristics of human
being. These provide extra protection for PCs and laptops. These can also be used to
control access to sensitive areas like the server room. Fingerprint locks are an
invaluable tool for high security centers. They are virtually unbreakable and
customizable. They allow control of who can access what areas when and knowledge
of who was trying to access them without the proper authorization. Max computers
and networks should be protected with these systems.
g) Chassis Lock: Chassis lock should be used to avoid change of password though
removal and reinsertion of CMOS Battery.

It is extremely necessary to cater for accidental or deliberate hardware crashes and


breakdowns leading to failures. Certain measures that are relevant in this regard are as follow:-

a) Critical servers, at all nodes must always run with hot staidly system. Other servers
must provision backup of their data through auxiliary storage devices, wherever
possible. All networks computer data storage devices and those of stand-alone
Computers should have hard disk crash guard software on their system to
prevent accidental deliberate damage or loss of data on the storage devices.
b) All computer system must always run with UPS. Online UPS must be used for all
access/control equipment at all computer nodes and other types of UPS may be
used for other computers.
By: Dr. Ashad Ullah Qureshi
Contact: 6260651575, 9179357477
Email: conceptsbookspublication@gmail.com
Web: https://researchitout.blogspot.com/
CYBER SECURITY ANALYSIS USING POLICIES & PROCEDURES

c) All types of security storage whether blank or otherwise will be properly acct for
and stored under lock and key in a fireproof cabinet.
d) Good electrical earthling, incorporating best practices for installation of all
electrical/ electronic appliances and system in the LAN-WAN environment will
be ensured.
e) Structured cabling, as per international standards such as cat 5 etc, in specially laid
out conduits shall be done in all premises.

2.3.3 Software Security

a) Only licensed and proprietary version of the software shall be used. And a regular
patch management should be ensured for reducing operating system and anti-virus
vulnerabilities.
b) In a LAN, networks operating system software will be held centrally by the system
administrator and no client can connect to the network without the express
permission/authorization of the system administrator and without the authorized and
licensed network Operating System (NOS).
c) Application software, that shall traverse and shall use the network, may be run by the
client/ users of a network, but only after prior clearance by the LAN administrator.
d) System and network management files, which control issues such as access rights for
classified info or data and the authentication procedure should not be accessible to
any user other the sys administrator.
e) The network mgt sys installed for LAN should be capable of testing the network
comps like switches, routers, firewalls etc for their vulnerabilities; ‘Auto Update’ is a
desirable feature to enable concurrent updates.

By: Dr. Ashad Ullah Qureshi


Contact: 6260651575, 9179357477
Email: conceptsbookspublication@gmail.com
Web: https://researchitout.blogspot.com/
CYBER SECURITY ANALYSIS USING POLICIES & PROCEDURES

2.3.4 Database Security

The need for security arises once the databases house information that can be accessed across
the network. Security of databases, need to be taken into acct while conceptualizing and
creating them. Entry into databases needs to be rigidly controlled. Access right must include
who can read, modify, create, delete, take printouts and for what duration the access be
allowed. Management of the central agency which developed or introduced it for use.

2.3.5 Communication Security

Security for communication which carries data networks will be as follows:-

a) Within a LAN data should flow with customized software based secrecy
depending upon the important factor of the document.
b) Between adjacent WAN nodes an additional hardware bases secrecy system will
be used for encryption of the channel or media.

2.3.6 Network Security

Security measured used to ensure network security are largely software based. These includes
following:-

a) Methods must be instituted to prevent unauthorized access to network/system


implemented through system administrator by means of authentication procedures.
b) Use of non-repudiation feature through the use of digital signatures procured through
the official channels for accountable document transactions.
c) Registered audit should be carried out to ascertain breaches in security on the LANs.

By: Dr. Ashad Ullah Qureshi


Contact: 6260651575, 9179357477
Email: conceptsbookspublication@gmail.com
Web: https://researchitout.blogspot.com/
CYBER SECURITY ANALYSIS USING POLICIES & PROCEDURES

2.3.7 Miscellaneous

Firewalls
Firewalls shall be used by all WAN/LAN servers. The WAN/LAN administrator will
provide firewalls. The default PC windows firewall should be enabled. Firewall will be
used as under:-
a) All inward and outward traffic must pass through the firewall.
b) Type of traffic and persons permitted to originate such traffic will be defined by the local
security considerations.
c) Firewalls must be made immune to penetration by installation of system.
d) Enforcement of strong authentication.

2.4 Cyber Audit

2.4.1 Responsibility

Cyber security can be ensured only if everyone in the organization is security conscious. The
responsibility begins with the individual who is handling the computer on a daily basis. It
should be his/her responsibility to ensure that all the points mentioned below. Conduct of cyber
Audit will be.

Auditing of computers is a very technical process and hence requires tools and practical
knowledge to be effectively carried out. Certain tools that can be used by the committee of
managers Auditing of computers is a detailed process and hence requires checklists, tools and
practical knowledge to be effectively carried out. Certain tools as follows.

2.4.2 Frequency

Cyber audit should be conducted at each level. It is recommended that the units conduct the
audit on a monthly basis. A certificate along with observation if any will be issued by the

By: Dr. Ashad Ullah Qureshi


Contact: 6260651575, 9179357477
Email: conceptsbookspublication@gmail.com
Web: https://researchitout.blogspot.com/
CYBER SECURITY ANALYSIS USING POLICIES & PROCEDURES

committee for every department fwd to this HQ on completion of cyber audit. No feedback is
required for the monthly audits; however a record needs to be maintained at the unit level.

2.4.3 Corrective Action

Corrective/disciplinary action as deemed appropriate will be taken by respective heads on any


lapses brought to their notice by the audit team. Record of all such audits should be maintained
by the IS administrators along with corrective / disciplinary actions initiated. Any breach of
computer security related to any aspects will be reviewed and appropriate actions/measures
should be taken.

2.4.4 Check Sheet for Cyber Audit

1. All PCs installed with secured Disk, Eraser, and True Crypt. (Y/N)
2. All PCs protected with BIOS window and screen saver password. (Y/N)
3. Enabling of personal/Network fire wall. (Y/N)
4. Antivirus updated. (Y/N)
5. Disabling of USB ports except for mouse/key board. (Y/N)
6. Hard Disk Drive in personal custody of Br heads, if any. (Y/N)
7. Standard and user acct exists. (Y/N)
8. No confidential data & documents (Y/N)
9. Maintenance of password log register. (Y/N)
10. Nominated owner of computer (Y/N)
11. Password being changed every week. (Y/N)
12. Window hardening utility installed. (Y/N)
13. Proper storage of HDDs & DVDs (Y/N)
14. Use of UPS. (Y/N)
15. Record of all breaches of computer security. (Y/N)
16. Important documents must not be shared on LAN (Y/N)
17. Disabling of CD/DVD drive for security reasons. (Y/N)
By: Dr. Ashad Ullah Qureshi
Contact: 6260651575, 9179357477
Email: conceptsbookspublication@gmail.com
Web: https://researchitout.blogspot.com/
CYBER SECURITY ANALYSIS USING POLICIES & PROCEDURES

18. PC connected to :
(a) LAN. (Y/N)
(b) Internet. (Y/N)
(c) Stand Alone. (Y/N)
19. No pen drives held. (Y/N)
20. Responsibility of Officers for security. (Y/N)
21. Physical Security (Y/N)
22. Network Security. (Y/N)
23. Backup & recovery. (Y/N)
24. Hosting of Services. (Y/N)
25. Repair & Maintenance record. (Y/N)
26. Password protection :
(a) Eight character Alpha-Numeric password (Y/N)
(b) Passwords not being reused. (Y/N)
(c) Account lockout policy exists. (Y/N)
27. Auto run features have been disabled. (Y/N)
28. Following services have been disabled :
(a) SSDP. (Y/N)
(b) Remote Registry. (Y/N)
(c) Telnet. (Y/N)
(d) Remote assistance. (Y/N)
29. The following window OS polices have been implemented:
(a) Acct policy (Password policy, acct lockout policy). (Y/N)
(b) Local policy. (Y/N)
(c) Public key policy. (Y/N)
(d) Software restoration policy. (Y/N)
(e) IP Security policy. (Y/N)

By: Dr. Ashad Ullah Qureshi


Contact: 6260651575, 9179357477
Email: conceptsbookspublication@gmail.com
Web: https://researchitout.blogspot.com/
CYBER SECURITY ANALYSIS USING POLICIES & PROCEDURES

30. Sharing folder/file removed. (Y/N)

2.5 Literature Survey

There are many different techniques for securing the cyber space and Networks. Transmitted data
may have different applications, such as commercial, military or medical applications, so it is
necessary to encrypt/secure data before sending it over the network to preserve its security and
to prevent unauthorized access.

If we will implement foreign software and securing algorithms. It will consume time and will
provide lesson level of security than it promises to give.

[1] Atul M. Tonge. Suraj s. Kature, Surbhi R . Chaudhari “Cyber Security: Challenges for Society
– Literature Review”. IOSR Journal of computer Engineering Issue 2 May-June pages 67-75.

Explained the cyber security challenges & their feasible solution with the ways to overcome
them. They stated the procedure of protecting information and explained the imported of Cyber
Security.

[2] Mohd. Shanui B. Hashi, “Malaysia’s national Cyber Security policy:. The Country’s Cyber
Defence Initialises”. Government & Multination Engagement, Cyber Security, Malaysia 2013.

Discussed the National Cyber Security Policy (NCSP) of Malaysia and emphasized over the
growth of cyber threats that are endangering the E-sovereignty of the nation in the same way.

[3] Ankita Gupta, Kavita Kirandeep kaur, “Vulnerability Assessment and Penetration Testing”.
International Journal of Engineering Trends and Technology – Volume 4 Issue 3-2013.

Discussed the vulnerability Assessment and penetration Testing (VAPT) and explained that it
is the most comprehensive service for auditing penetration testing and reporting method VAPT
are of different approach to access the security posture of an information system’s Network.

By: Dr. Ashad Ullah Qureshi


Contact: 6260651575, 9179357477
Email: conceptsbookspublication@gmail.com
Web: https://researchitout.blogspot.com/
CYBER SECURITY ANALYSIS USING POLICIES & PROCEDURES

[4] Kranthi Kumar K, K. Srinavasa Rao, “A latest Approach to cyber security analysis using
vulnerability Assessment and penetration testing”. International Journal of Emerging Research
in Management & Technology, volume 3. Issue 4 April 2014.

Discussed the latest approach to cyber security Analysis using vulnerability Assessment and
penetration testing that VAPT helps to assess the effectiveness’ and ineffectiveness of the
security, which in the enables the organizations to install patches and adopt required security
measures to safeguard themselves from various cyber attacks.

[5] Sugandha Shah, B.M. Mehtre, “vulnerability Assessment and penetration. Testing for cyber
Defence”. University of Hyderabad

Explained about the techniques for Cyber Defence through VAPT. They have discussed about
the various models, methodologies and techniques for condition VAPT & explained about the
various standards end strategies those are followed by the global VAPT testers.

[6] Sugandha Shah, B.M. Mehtre, “A modern Approach to Cyber Security Analysis. Using
Vulnerability Assessment and Penetration Testing”. International Journal of Electronics
Communication and Computer Engineering. Volume 4 Issue 6 May 2013.

They have discussed the other generalized fact of analysis of cyber security using VAPT and
explained the benefits and preparations the all they emphasized over the cyber security
awareness and importance at all levels of an organization, enabling to adopt required up-to-date
security measures prospected from various cyber attacks.

[7] The World Bank Group, “Cyber Security A new Model for Protecting the Network”.Global
ICT Department.

This report explains the expert panel’s view about various aspects of cyber security and their
risks invaded, CERTs and other Red/Blue teams to tackle these things on primary level. If has

By: Dr. Ashad Ullah Qureshi


Contact: 6260651575, 9179357477
Email: conceptsbookspublication@gmail.com
Web: https://researchitout.blogspot.com/
CYBER SECURITY ANALYSIS USING POLICIES & PROCEDURES

been noted that the functions of the network model also helps in cyber security and risk
management.

[8] Indian computer Emergency Response Team (CERT-IN) “Information security policy for
protecting of critical information infrastructure CERT-IN/NISA/Issue, May 2006. Department
of Information Technology Govt. of India

Information Security policy for protection of critical Information Infrastructure in 2013 and they
have them our discuses about recognizing the growing network native of the computing
environment in government as well as critical sect oral organizations Hence National Cyber
security Policy 2013 (NCSP-2013). Government of India cyber security in India, because of its
rapid growth of Information & communication Technology. In this policy the objective, was to
create a secure cyber eco system in the country and to generate adequate trust & confidence in
IT systems & transactions in cyberspace and thereby enhance adoption of IT in all sectors of
the economy. Through this policy a 24x7 mechanism is required to form a National state wide
level at all government and defense organizations [13] centre for the protection of National
Infrastructure Homeland security elaborated this fact of about the assessment process of cyber
security in that readers and other technical experts’ lean plan out cyber security for their
networks.

By: Dr. Ashad Ullah Qureshi


Contact: 6260651575, 9179357477
Email: conceptsbookspublication@gmail.com
Web: https://researchitout.blogspot.com/
CYBER SECURITY ANALYSIS USING POLICIES & PROCEDURES

CHAPTER 3

ANALYSIS-PROPOSED WORK
3.1 Introduction of Proposed Work

Implementation of Policies & Procedures to protect our systems & networks.

A Cyber Security Standard Order & Procedure is a formal set of rules by which those people who
are given access to it equipment and information assets must abide. The security Standard order &
procedure lays down basic steps in ensuring cyber security measures by all users and basic checks
to conduct a cyber security audit.

These policies for Windows Operating system are guide lines for Administrator to lay down how
each PC in the network shall be configured thereby institute greater checks and monitor all the
computers in the Department. These should be implemented in conjunction with the cyber security
Policy.

3.2 Windows OS Policies

Under the control panel Administrative active tools, there are a number of tools that help to monitor
activity on the various computers. Components are given below.

COMPONENT Services.
Computer Management.
Data Sources (ODBC)
Event Viewer
ISCSI Initiator
Local security Policy
Performance Monitor
Print Management
Services

By: Dr. Ashad Ullah Qureshi


Contact: 6260651575, 9179357477
Email: conceptsbookspublication@gmail.com
Web: https://researchitout.blogspot.com/
CYBER SECURITY ANALYSIS USING POLICIES & PROCEDURES

System Configuration
Task Schedules
Windows Firewall with Advanced Security
Windows Memory Diagnostic

3.2.1 OS Policies & Protocols

Console Root – Services (LOCAL) the following services will be disabled:

i. SSDP discover Services


ii. Remote Registry
iii. Routing & Remote access
iv. Telnet /Telephony

3.2.2 Local Security Settings

The local security setting is the most important policy aspect that deserves greater attention.

Under this the following options are:

i. Account Policies
ii. Local Policies
iii. Public Key Policies
iv. Software Restriction Policies
v. IP security Policies on local Computers

By: Dr. Ashad Ullah Qureshi


Contact: 6260651575, 9179357477
Email: conceptsbookspublication@gmail.com
Web: https://researchitout.blogspot.com/
CYBER SECURITY ANALYSIS USING POLICIES & PROCEDURES

3.2.2 Account Policies

Password Policy: Under this, choose the ‘R’ setting by right clicking on each option-selecting
properties and there after choosing the given setting and applying it. The following settings are as
follows:

-Account Lockout Policy

This policy ensures that the user will not be able to get in without assistance from the administrator
in case he fails to log in successfully thrice consequently. The settings of all procedures are given
in the screen shot.

3.2.3 Local Policies

i. Audit Policy:

These lay down auditing policies and help the administrator to generate log of various
activities/event, a study of which will provide him useful information about security breach in the
network.

ii. Security Options:

Under local security\ Local Policies\Security options the following options to be selected as under.

a) Guest Account – DISABLED

If the guest account is disabled and the security option Network Access: sharing and security model
for local accounts is set to guest only network log-ons, such as those performed by the Microsoft
Network server (SMB service) will fail.

By: Dr. Ashad Ullah Qureshi


Contact: 6260651575, 9179357477
Email: conceptsbookspublication@gmail.com
Web: https://researchitout.blogspot.com/
CYBER SECURITY ANALYSIS USING POLICIES & PROCEDURES

b) Administrative Account – DISABLED

Disabling the administrator account can become a maintenance issue under certain circumstances
for example – In a domain environment if the secure channel that constitutes your join fails for a
reason, and these restart in safe mode to fix the problem this is easing your join status to be broken.
Under safe mode boot, the Administrator account is always enabled, regardless of this setting.

If you try to re-enable the Administrator account after it has been disabled, and if the current
Administrator password hence you cannot re-enable the account.

In this Case, an alternative member of the administrators group must reset the password on the
Administrator account.

c) Shutdown: Clear Virtual Memory – ENABLED

Virtual memory support uses a system page file to swap pages of memory to disk when they are
not used on a running system, this page file is opened exclusively by the operating system & it is
well protected.

However, systems that are configured to allow booting to other operating systems right have to
make sure that the system page file is wiped clean when the system shuts down.

This ensures that sensitive information from process memory that might go into the page file is
not available to an unauthorized user who manages to directly access the page file to be cleared
upon clear shutdown. If you enable the security option, the hibernation files (hiber file system) is
also zeroed out when hibernation is disabled on operable computer system.

iii. User Right Assignment:

In user rights assignments create a token object field which is to be accessed while managing the
policy with respect to the security policies setting.

By: Dr. Ashad Ullah Qureshi


Contact: 6260651575, 9179357477
Email: conceptsbookspublication@gmail.com
Web: https://researchitout.blogspot.com/
CYBER SECURITY ANALYSIS USING POLICIES & PROCEDURES

3.2.4 Public Key Policies

Under local security settings – Public key policies in windows domain, an administrator can
automatically issue certificates to computers manage encrypted data recovery agents, create
certificate trust list, or auto, established trust of certificating authority it is not necessary to use
these public key policy settings in Group Policy to deploy a public key infrastructure in the
organization.

However, these settings are additional flexibility and control when you establish trust in
certification authorities issue certificate to computers and deploy EFS According to a domain you
can set various policies if required using the under mentioned options.

Microsoft Management Console → Public Key


How to ← Policies

Path to implement policy & management console/Policies for the following issues may be laid
down by the administrator.

a) Software Restriction Policies


b) IP security policies on local computer

3.2.5 Component Services

Under the component services the event viewer is of consequence from security point of view.
Using the event logs in Event Viewer, You can gather information about hardware, software and
system problems. You can also monitor Windows security events. The event log service starts
automatically when you start windows.

All users can view Application log and System logs. Only administrator can gain access to security
logs. By default, security logging is turned off. You can use Group policy to enable security
logging the administrator should also set auditing policies in the registry the cause the system to

By: Dr. Ashad Ullah Qureshi


Contact: 6260651575, 9179357477
Email: conceptsbookspublication@gmail.com
Web: https://researchitout.blogspot.com/
CYBER SECURITY ANALYSIS USING POLICIES & PROCEDURES

halt when the security log is full. Computers running any version of Windows record the following
kinds of logs.

a) Application Log

The application log contains events logged by applications or programs.

For example, a database program might record a file error in the application log, program
developers decide which events to monitor

b) Security Log

The security log records events such as valid and invalid logon attempts, as well as events
related to resource use such as creating, opening, or deleting files or other objects. An
administrator can specify what events are recorded in the security log.

For example – If you have enabled logon auditing, attempts to log on the system are recorded
in the security log.

c) System Log

The system log contains events logged by windows by Windows XP/7 system components to
load during start-up is recorded in the system log. The event types logged by system
components are predetermined by window XP/Win 7.

d) DNS Server Log

The DNS - server log contains events logged by the windows DNS service. Event associated
with resolving DNS names to Internet Protocol (IP) addresses are recorded in this log.

e) Success Audit

An audited Security access attempt that succeeds.

By: Dr. Ashad Ullah Qureshi


Contact: 6260651575, 9179357477
Email: conceptsbookspublication@gmail.com
Web: https://researchitout.blogspot.com/
CYBER SECURITY ANALYSIS USING POLICIES & PROCEDURES

For example – A user’s successful attempt to log on to the system will be logged as a success
audit event.

f) Failure Audit

An audited security access attempts that fails.

For example – If a user tries to access a network drive, and fails, the attempt will be logged as
a failure Audit event.

3.3 Testing

The goals of testing can generally be described as assessing the level of security and/or
identifying vulnerabilities for remediation. Vulnerabilities can be identified by attacking the
system as a hacker would or by evaluating the system.

A vulnerability assessment simply identifies and reports noted vulnerabilities and security
weaknesses in the target system.

A penetration tests attempts to duplicate the actions of an attacker.

3.3.1 Impacts of testing

Typical penetration tests look for known IT vulnerabilities that can be exploited (often with
published exploits) to gain unauthorized network access. Penetration testers usually attempt to
actually exploit the vulnerabilities to break into the system. The significance of the
unauthorized access is determined by the impact on three defined security objectives for
information and information systems: confidentiality, integrity and availability (CIA).
According to a Federal Information Processing Standard, (Publication 199) a loss of
confidentiality is the unauthorized information, and a loss of availability is the disruption of
access to or use of information or an information system. For typical IT systems, the security

By: Dr. Ashad Ullah Qureshi


Contact: 6260651575, 9179357477
Email: conceptsbookspublication@gmail.com
Web: https://researchitout.blogspot.com/
CYBER SECURITY ANALYSIS USING POLICIES & PROCEDURES

goals of CIA are listed in order of importance, with confidentiality considered the most
important.

In general, the most significant difference between the proposed policy and corporate IT
domains is the high availability requirement for monitoring and control functionalities,

Cyber security is the protection of information transmitted and stored over a computer network.
The objectives of cyber security are to:

Protect confidentiality of private information;


Ensure availability of information to authorized users on timely basis (authentication,
non-repudiation);
Protect the integrity of information (i.e., accuracy, reliability and validity).

These objectives can be prioritized differently depending on the physical system under control
and the functionality provided by the individual component.

3.3.2 Types of cyber security testing

The goals of testing can generally be described as assessing the level of security and/or
identifying vulnerabilities for remediation/mitigation. Vulnerabilities can be identified by
attacking the systems as a hacker would or by evaluating the system.

A vulnerability assessment simply identifies and reports noted vulnerabilities and security
weaknesses in the target system. The assessment team generally reviews code, settings, etc for
known security weaknesses. Many security tools and techniques used by penetration tester’s
level of vulnerability verification. For example, practices known to lead to vulnerabilities can
be identified of remediation to decrease assessment costs, increase vulnerability identification
coverage, and maximize the security of the system.

By: Dr. Ashad Ullah Qureshi


Contact: 6260651575, 9179357477
Email: conceptsbookspublication@gmail.com
Web: https://researchitout.blogspot.com/
CYBER SECURITY ANALYSIS USING POLICIES & PROCEDURES

A penetration test attempts to duplicate the actions of an attacker. The goal of external
penetration testing is the find weaknesses in the company’s network that could allow an
attacker to access the enterprise environment from the Internet. Internal testing attempts to find
and exploit vulnerabilities to determine whether unauthorized access or other malicious
activity is possible form inside the target network.

This can give an indication of the system’s ability to withstand attack originating at the location
the test team is given access, not including any components that were defined as off limits.
Vulnerabilities that were exploited to meet the objective of the test will be identified, but this
method does not identify a high percentage of vulnerabilities.

The organizations security team can be taste while gaining experience by actively defending
against penetration testers in exercises. Exercises have the goals of improved readiness of the
organization, better training for defensive practitioners and inspection of current performance
levels. Independent teams can provide valuable objectivity regarding both the existence of
vulnerabilities and the efficacy of defenses and mitigating controls already in place and even
those planned for future implementation. As in a real attack, testers attempt test. Team
exercises may include social engineering attacks, which are attempts to trick employees into
divulging security information. Testers may call unsuspecting employee pretending to be
someone in a position of authority, and convincing the trusting employee to divulge
information later used to infiltrate into the system. Social engineering tests may include
phishing attacks, where the tester sends legitimate looking e-mails to employees requesting
information or containing ling to malicious websites.

By: Dr. Ashad Ullah Qureshi


Contact: 6260651575, 9179357477
Email: conceptsbookspublication@gmail.com
Web: https://researchitout.blogspot.com/
CYBER SECURITY ANALYSIS USING POLICIES & PROCEDURES

CHAPTER 4
RESULT ANALYSIS

4.1 Performance Analysis

This section presents the results of evaluating the efficiency of the proposed policies &
procedures that is bases on selected parameters.

Selected parameters are as follows:

i. Speed of Access
ii. Security Instances/week
iii. Authentication Process
iv. Mishap / Hacked / show/ Hang type events/week
v. Ease of Use
vi. Overall experience (secure/Unsecure)

4.1.1 Speed of Access

Though the speed of access during the initial phase is bit slow & because of the authentication
process it takes time to enter password & user Id, at different level of accessing the secured
system.

In comparison to normal unsecured computer has high or fast speed of accessing, but once
operator/user get used to, it takes less time of access as earlier.

4.1.2 Security Instances per Week

Security instance per week is a very important parameter to analyze the performance of any
system.

Instance security Group notified the controlling & managing these problems.

By: Dr. Ashad Ullah Qureshi


Contact: 6260651575, 9179357477
Email: conceptsbookspublication@gmail.com
Web: https://researchitout.blogspot.com/
CYBER SECURITY ANALYSIS USING POLICIES & PROCEDURES

The average organizations face almost 1,000,000 security events per week. Control systems
are being monitored.

i. Deleting Intrusion & security events.


ii. Security event monitoring (SEM).
iii. Managed security services providers.

4.1.3 Authentication Process

It is the process of determining whether someone or something is, in fact, who or what it is
declared to be logically authentication precedes authorization.

{The process of an administrator granting rights and the process of hacking use account.
Permissions for accessing the resources are both referred to as authorization}

4.1.4 Mishapening & other events occurring /week

Week wise monitoring of different suspicious event is required

i. Mishapening – Automatic restart, shutdown etc


ii. Hacked – Service issue regarding security of suspicion
iii. Slow processing – Response time of the system
iv. Hang – System is getting stuck at some point every now & then

4.1.5 Ease of Use

Ease of use is very much required when operating any computing device. People are
generally creatures of habit. They are reluctant to embrace charge, and will look for
reasons why they should not change. Thus if user find a new system difficult to use they
will be reluctantly to change from their old ways of working. These procedures are change
for security.But once they will get use to the system, they won’t find it difficult to use
which leaves or concludes the moment as No pain No gain!

By: Dr. Ashad Ullah Qureshi


Contact: 6260651575, 9179357477
Email: conceptsbookspublication@gmail.com
Web: https://researchitout.blogspot.com/
CYBER SECURITY ANALYSIS USING POLICIES & PROCEDURES

4.2 Tabular Analysis

In this comparison between the cyber secured system & the normal computer results are
presented in the form of tables.

4.2.1 Speed of Access:


ASPECT WEEK 1 WEEK 2 WEEK 3

CYBER
SECURED 4 6 5
(Proposed)
NORMAL
COMPUTER 2 3 4
(Existing)
CYBER secured has minimum or NEGLIGIBLE
RESULT security
instances as COMPARED to NORMAL computer

4.2.2 Security Instances:

ASPECT WEEK 1 WEEK 2 WEEK 3

CYBER
SECURED 1 3 3
(Proposed)
NORMAL
COMPUTER 2 6 8
(Existing)
CYBER secured has minimum or NEGLIGIBLE
RESULT security
instances as COMPARED to NORMAL computer

By: Dr. Ashad Ullah Qureshi


Contact: 6260651575, 9179357477
Email: conceptsbookspublication@gmail.com
Web: https://researchitout.blogspot.com/
CYBER SECURITY ANALYSIS USING POLICIES & PROCEDURES

4.2.3 Authentication Process:


ASPECT WEEK 1 WEEK 2 WEEK 3

CYBER
SECURED 4 8 5
(Proposed)
NORMAL
COMPUTER 2 2 2
(Existing)
CYBER secured has minimum or NEGLIGIBLE
RESULT security
instances as COMPARED to NORMAL computer

4.2.4. Ease of Use:

ASPECT WEEK 1 WEEK 2 WEEK 3

CYBER
SECURED 3 4 5
(Proposed)
NORMAL
COMPUTER 8 7 6
(Existing)
CYBER secured has minimum or NEGLIGIBLE
RESULT security
instances as COMPARED to NORMAL computer

4.2.5 Mishap / Hacked / show/ Hang type events/week:


ASPECT WEEK 1 WEEK 2 WEEK 3

CYBER
SECURED 2 4 3
(Proposed)

By: Dr. Ashad Ullah Qureshi


Contact: 6260651575, 9179357477
Email: conceptsbookspublication@gmail.com
Web: https://researchitout.blogspot.com/
CYBER SECURITY ANALYSIS USING POLICIES & PROCEDURES

NORMAL
COMPUTER 4 6 8
(Existing)
CYBER secured has minimum or NEGLIGIBLE
RESULT security
instances as COMPARED to NORMAL computer

4.2.6 Overall Performance:


ASPECT WEEK 1 WEEK 2 WEEK 3

CYBER
SECURED 6 7 7
(Proposed)
NORMAL
COMPUTER 6 4 3
(Existing)
CYBER secured has minimum or NEGLIGIBLE
RESULT security
instances as COMPARED to NORMAL computer

By: Dr. Ashad Ullah Qureshi


Contact: 6260651575, 9179357477
Email: conceptsbookspublication@gmail.com
Web: https://researchitout.blogspot.com/
CYBER SECURITY ANALYSIS USING POLICIES & PROCEDURES

4.3 Graphical Analysis

In this comparison between the cyber secured system & the normal computer results are
presented in the form of graphs in order to compare the proposed work & the exixting
work.

4.3.1 Speed of Access

4
CYBER SECURED
3 (Proposed)
NORMAL COMPUTER
2 (Existing)

0
WEEK 1 WEEK 2 WEEK 3

Fig 4.3.1 Speed of Access

Access speed of application


Access speed of sending information
Access speed of reading
Access speed of general purpose work

By: Dr. Ashad Ullah Qureshi


Contact: 6260651575, 9179357477
Email: conceptsbookspublication@gmail.com
Web: https://researchitout.blogspot.com/
CYBER SECURITY ANALYSIS USING POLICIES & PROCEDURES

4.3.2 Security Instances per Week

9
8
7
6
5
Series1
4
Series2
3
2
1
0
1 2 3

Fig 4.3.2Security Instances per Week

Malware detected
Virus been found
Worms in the system
Login failure physical security

By: Dr. Ashad Ullah Qureshi


Contact: 6260651575, 9179357477
Email: conceptsbookspublication@gmail.com
Web: https://researchitout.blogspot.com/
CYBER SECURITY ANALYSIS USING POLICIES & PROCEDURES

4.3.3 Authentication Process

9
8
7
6
5
CYBER SECURED
4 (Proposed)
3 NORMAL COMPUTER
(Existing)
2
1
0
WEEK 1 WEEK 2 WEEK 3

Fig 4.3.3 Authentication Process

Bios. Password
Screen saver password
Account password
User password

By: Dr. Ashad Ullah Qureshi


Contact: 6260651575, 9179357477
Email: conceptsbookspublication@gmail.com
Web: https://researchitout.blogspot.com/
CYBER SECURITY ANALYSIS USING POLICIES & PROCEDURES

4.3.4 Mishapening & other events occurring /week

9
8
7
6
5
CYBER SECURED
4 (Proposed)
3 NORMAL COMPUTER
(Existing)
2
1
0
WEEK 1 WEEK 2 WEEK 3

Fig 4.3.4 Mishapening & other events occurring /week

Access denied
File corruption
Software application crash
Window crash
Sudden restart

By: Dr. Ashad Ullah Qureshi


Contact: 6260651575, 9179357477
Email: conceptsbookspublication@gmail.com
Web: https://researchitout.blogspot.com/
CYBER SECURITY ANALYSIS USING POLICIES & PROCEDURES

4.3.5 Ease of Use

9
8
7
6
5
CYBER SECURED
4 (Proposed)
3 NORMAL COMPUTER
(Existing)
2
1
0
WEEK 1 WEEK 2 WEEK 3

Fig 4.3.5 Ease of Use

Ease of using the software


Ease of sending information
Ease of maintaining records
General purpose

By: Dr. Ashad Ullah Qureshi


Contact: 6260651575, 9179357477
Email: conceptsbookspublication@gmail.com
Web: https://researchitout.blogspot.com/
CYBER SECURITY ANALYSIS USING POLICIES & PROCEDURES

4.3.6 Overall Performance

4 CYBER SECURED
(Proposed)
3
NORMAL COMPUTER
2 (Existing)

0
WEEK 1 WEEK 2 WEEK 3

Fig 4.3.6 Overall Performance

Integration of all above parameters

By: Dr. Ashad Ullah Qureshi


Contact: 6260651575, 9179357477
Email: conceptsbookspublication@gmail.com
Web: https://researchitout.blogspot.com/
CYBER SECURITY ANALYSIS USING POLICIES & PROCEDURES

CHAPTER 5
CONCLUSION & FUTURE ENHANCEMENTS

5.1 Conclusion

Guidelines to caution the user while using various value-added services and additional
measures bases on the environment existing at respective location must be issued by the
respective department/units. Each department is required to examine its information
system infrastructure and analysis what assets it has, what kind of networks are in
place/planned, what are the vulnerabilities of infrastructure (network, software computing
resources etc) to the external/internal attacks and safeguards/precautionary measures
would be needed to control and contain, mitigate or eliminate the threats identified and
accordingly frame the security instructions.

Although added services give distinct edge in office efficiency, slightest oversight lapse
in security aspects associated with their use can have far-reaching and damaging effects.

Therefore the necessity for flawless vigilance needs no emphasis.

5.2 Applications

A policy & procedure based analysis has several advantages in different field of operation.
Some of them are summed up as follows.

5.2.1 Defense/National Security

Indian defense system is the second largest system present is this world. Geographically
the area is too wide and information sharing needs to be done at a very vast level.

Cyber security is very much required and needs to be implemented on ground. Every
individual working must be aware and must be the follower of these policies & procedures.

By: Dr. Ashad Ullah Qureshi


Contact: 6260651575, 9179357477
Email: conceptsbookspublication@gmail.com
Web: https://researchitout.blogspot.com/
CYBER SECURITY ANALYSIS USING POLICIES & PROCEDURES

5.2.2 Medicinal Research

Government spend ample amount of memory for the research facilities. These facilities
contain important data that may lead to epidemic to a revolutionary miracle. Information
security and network security plan should be followed by the scientist to confine & protect
the information.

5.2.3 Company/Organizational Security

Organizational security that means security of the information that is confidential to


respective official. All organizations are connected with different networks and network
contains the flow of data, Now days Information security is very much required by
organization to maintain the confidentiality.

We can protect sensitive data and communications by securing our entry points, whether
a device or someone logging in. We can start from scratch or integrate with existing
security systems. Following are some examples of the types of cyber security applications.

Mobile

Company provides the user with multiple devices and types will auto enrol all of them
with ease. Each device is digitally registered and keyed to a particular user and can be
instantly reported lost or stolen. If reported, counter measures are initiated and if found
can be easily re-enrolled for continued service.

Strong Authentication

Management and auditing of both user and device identities, allowing granular control
over who, or what, accuses the services, data and digital assets on your internal /external
internet resources.

By: Dr. Ashad Ullah Qureshi


Contact: 6260651575, 9179357477
Email: conceptsbookspublication@gmail.com
Web: https://researchitout.blogspot.com/
CYBER SECURITY ANALYSIS USING POLICIES & PROCEDURES

Virtual Private Networks

Connection by issuing certificate to your VPN routers such as. Open VPN, Cisco, jouper
etc, and client VPN access with certificate in users VPN clients.

Secure Communication

Solid connections between SSL/TLS servers and SSL/TLS clients for your internal private
networks

The cost is factional compared to buying vendor provisioned digital certificates.

Online Validation

Automatic strong authentication validate the status of every secure connection request,
whether logging, into a remote application or opening a file on your local computer or
device. The online service can process thousand of requests per second.

Secure Email

Prevent tampering of email content proves message origin, prevent exposure of email.
Content with encryption flexible and secure communication seamlessly integrates with
your email clients and web hosted email applications.

By: Dr. Ashad Ullah Qureshi


Contact: 6260651575, 9179357477
Email: conceptsbookspublication@gmail.com
Web: https://researchitout.blogspot.com/
CYBER SECURITY ANALYSIS USING POLICIES & PROCEDURES

5.3 Limitations

Every system has its own limitations, though in this they are very less but those are as
follows:

5.3.1 Firewalls

Firewalls can be difficult to configure correctly. Incorrectly configured firewalls may


block users from performing certain actions on the network, until the firewall makes the
system slower before.

5.3.2 Software Updation

Antivirus and other utility software requires constant updation. Updating the new software
in order to keep security up to date is required.

5.3.3 Hacking

Improved hacker speed and ability to penetrate the system. It is the challenge because of
more annuities between hackers.

5.3.4 Cyber Warfare

Another limitation is the increase in “cyber Warfare” china most probably is the biggest
threat to our national & organizational security at cyber space.

By: Dr. Ashad Ullah Qureshi


Contact: 6260651575, 9179357477
Email: conceptsbookspublication@gmail.com
Web: https://researchitout.blogspot.com/
CYBER SECURITY ANALYSIS USING POLICIES & PROCEDURES

5.4 Future Enhancements.

Cyber security is a very best field of study and requires implementation on ground. As for as the
future enhancements are concerned in this particular dissertation following are the aspects on which
enhancements can be done.

5.4.1 Customized Cyber secured operating system

Operating system is the main system software, the only way to penetrate the system is OS
only if these policies and procedures can be implemented or tailored onto an independent
operating system platform can change the whole scenario.

5.4.2 Ready Mode Custom policies and procedures

Readymade package of these policies and procedure can be made to facilitate the user in a
very easy and effective manner.

5.4.3 Use of MFA

Multi-factor authentication is also a very good future enhancement of human interface and
biometric access which is getting its rapid speed of use.

5.4.4 Automated Intrusion Detection system (IDS)

Automated Intrusion Detection system can be used to minimize the manual monitoring.

5.4.5 Practical Validation

As future work, the proposed framework can be applied to larger networks. A validation
in context of any system can be done including the authorization & all authentication
process.

By: Dr. Ashad Ullah Qureshi


Contact: 6260651575, 9179357477
Email: conceptsbookspublication@gmail.com
Web: https://researchitout.blogspot.com/
CYBER SECURITY ANALYSIS USING POLICIES & PROCEDURES

5.4.6 New Properties

Future work can be conducted to take or extended proposed work for the advancement and
other additional properties can also be added.

Example – SMS verification for classified access or communication.

5.4.7 Hardware Implementation

Another challenging issue is the hardware implementation, such as configuring farewells


and applying all windows policies.

By: Dr. Ashad Ullah Qureshi


Contact: 6260651575, 9179357477
Email: conceptsbookspublication@gmail.com
Web: https://researchitout.blogspot.com/
CYBER SECURITY ANALYSIS USING POLICIES & PROCEDURES

APPENDIX-A
REFERENCES

[1] Atul M. Tonge, Suraj S. Katare, Surbhi R. Chaudhari, “cyber security: challenges for
society – literature review”. IOSR Journal of computer Engineering Issue 2
may-Junes pages 67-75.

[2] Mohd. Shanui B. Hashi, “Malaysia’s national Cyber Security policy:. The Country
Cyber Defence Initialises”. Government & Multination Engagement, Cyber
security Malaysia 2013.

[3] Ankita Gupta, Kavita Kirandeep kaur, “Vulnerability Assessment and penetration
Testing”. International Journal of Engineering trends and technology – volumes 4
Issue 3-2013.

[4] Kranthi Kumar K, K. Srinavasa Rao, “A latest Approach to cyber security analysis using
vulnerability Assessment and penetration testing”. International Journal of emerging
Research in Management & Technology, volume 3. Issue 4 April 2014.

[5] Sugandha Shaf, B.M. Mehtre, “vulnerability Assessment and penetration. Testing for
cyber Defence”. University of Hyderabad.

[6]Sugandha Shad, B.M. Mehtre, “A modern Approach to cyber security Analysis. Using
vulnerability Assessment and penetration testing”. International Journal of electronics
communication and computer engineering. Volume 4 Issue 6 May 2013.

[7] The world Bank Group, “Cyber Security A new modal for protecting the Network”.
Global ICT Department.

By: Dr. Ashad Ullah Qureshi


Contact: 6260651575, 9179357477
Email: conceptsbookspublication@gmail.com
Web: https://researchitout.blogspot.com/
CYBER SECURITY ANALYSIS USING POLICIES & PROCEDURES

[8] Indian computer Emergency Response Teams, “Information security policy for
protecting of critical information infrastructure CERT-IN/NISA/Issue, May 2006.

[9] Ministry of communication and information Technology Department of Electronics and


Information. Technology. “National cyber security Policy – 2013 (NCSP-2013)” cert-
in- July 2013.

[10] Yusuf Nadui saghar Amay Singhai, “Multi factor authentication API”, Georgia
Institute of Technology.

[11] Ashwak M. AL Abiachi, faudziah ahmed, Ku Ruhana, “A competitive study of


cryptography Techniques over Block cipher”, 13th IEEE International conference on
modelling and simulation, 2011 UKSIM.

[12]SEYED Hossein Kamali, Reza Shakerian, Maysam Hedagati, Mohsen Rahmani, “A


New modified version of Advanced encrypting standard based algorithmic for Image or
data Encryption”. IEEE International Conference on Electronic and Information
Engineering IEEE 2010.

[13] Homeland security “Cyber security Assessment of Industrial control systems” centre
for the protection of national Infrastructure Nov 2010.

[14] RSA Security. http:// www.rsasecurity.com/raslabs/fag/3-2-6.htm.

[15] B.Slide share, applied cryptography John Wiley & Sons, New York 1994.

[16] www.slideshare.net/shruths 2890/software-engineering.

[17] William Stallings, cryptography and Network security, Pearson. Education, Asia, 2000.

[18] William Stallings, Network security Essentials, Pearson Education Asia 2000.

By: Dr. Ashad Ullah Qureshi


Contact: 6260651575, 9179357477
Email: conceptsbookspublication@gmail.com
Web: https://researchitout.blogspot.com/
CYBER SECURITY ANALYSIS USING POLICIES & PROCEDURES

APPENDIX-B
SCREEN SHOTS

1. Administrative Tools

By: Dr. Ashad Ullah Qureshi


Contact: 6260651575, 9179357477
Email: conceptsbookspublication@gmail.com
Web: https://researchitout.blogspot.com/
CYBER SECURITY ANALYSIS USING POLICIES & PROCEDURES

2. SSDP

By: Dr. Ashad Ullah Qureshi


Contact: 6260651575, 9179357477
Email: conceptsbookspublication@gmail.com
Web: https://researchitout.blogspot.com/
CYBER SECURITY ANALYSIS USING POLICIES & PROCEDURES

3. Remote Registry

By: Dr. Ashad Ullah Qureshi


Contact: 6260651575, 9179357477
Email: conceptsbookspublication@gmail.com
Web: https://researchitout.blogspot.com/
CYBER SECURITY ANALYSIS USING POLICIES & PROCEDURES

4. Routing & Remote Access

By: Dr. Ashad Ullah Qureshi


Contact: 6260651575, 9179357477
Email: conceptsbookspublication@gmail.com
Web: https://researchitout.blogspot.com/
CYBER SECURITY ANALYSIS USING POLICIES & PROCEDURES

5. Telnet

By: Dr. Ashad Ullah Qureshi


Contact: 6260651575, 9179357477
Email: conceptsbookspublication@gmail.com
Web: https://researchitout.blogspot.com/
CYBER SECURITY ANALYSIS USING POLICIES & PROCEDURES

6. Local Security

By: Dr. Ashad Ullah Qureshi


Contact: 6260651575, 9179357477
Email: conceptsbookspublication@gmail.com
Web: https://researchitout.blogspot.com/
CYBER SECURITY ANALYSIS USING POLICIES & PROCEDURES

7. Password Policy

By: Dr. Ashad Ullah Qureshi


Contact: 6260651575, 9179357477
Email: conceptsbookspublication@gmail.com
Web: https://researchitout.blogspot.com/
CYBER SECURITY ANALYSIS USING POLICIES & PROCEDURES

8. Password Policy Encryption

By: Dr. Ashad Ullah Qureshi


Contact: 6260651575, 9179357477
Email: conceptsbookspublication@gmail.com
Web: https://researchitout.blogspot.com/
CYBER SECURITY ANALYSIS USING POLICIES & PROCEDURES

9. Account Lockout Policy

By: Dr. Ashad Ullah Qureshi


Contact: 6260651575, 9179357477
Email: conceptsbookspublication@gmail.com
Web: https://researchitout.blogspot.com/
CYBER SECURITY ANALYSIS USING POLICIES & PROCEDURES

10. Audit Policy Change

By: Dr. Ashad Ullah Qureshi


Contact: 6260651575, 9179357477
Email: conceptsbookspublication@gmail.com
Web: https://researchitout.blogspot.com/
CYBER SECURITY ANALYSIS USING POLICIES & PROCEDURES

11. Create a token Object

By: Dr. Ashad Ullah Qureshi


Contact: 6260651575, 9179357477
Email: conceptsbookspublication@gmail.com
Web: https://researchitout.blogspot.com/
CYBER SECURITY ANALYSIS USING POLICIES & PROCEDURES

12. User Rights Assignment

By: Dr. Ashad Ullah Qureshi


Contact: 6260651575, 9179357477
Email: conceptsbookspublication@gmail.com
Web: https://researchitout.blogspot.com/
CYBER SECURITY ANALYSIS USING POLICIES & PROCEDURES

13. Guest Account Status

By: Dr. Ashad Ullah Qureshi


Contact: 6260651575, 9179357477
Email: conceptsbookspublication@gmail.com
Web: https://researchitout.blogspot.com/
CYBER SECURITY ANALYSIS USING POLICIES & PROCEDURES

14. Local Policies

By: Dr. Ashad Ullah Qureshi


Contact: 6260651575, 9179357477
Email: conceptsbookspublication@gmail.com
Web: https://researchitout.blogspot.com/
CYBER SECURITY ANALYSIS USING POLICIES & PROCEDURES

15. Security Options

By: Dr. Ashad Ullah Qureshi


Contact: 6260651575, 9179357477
Email: conceptsbookspublication@gmail.com
Web: https://researchitout.blogspot.com/
CYBER SECURITY ANALYSIS USING POLICIES & PROCEDURES

16. Administrative Account

By: Dr. Ashad Ullah Qureshi


Contact: 6260651575, 9179357477
Email: conceptsbookspublication@gmail.com
Web: https://researchitout.blogspot.com/
CYBER SECURITY ANALYSIS USING POLICIES & PROCEDURES

17. Shut Down Clear Virtual Memory

By: Dr. Ashad Ullah Qureshi


Contact: 6260651575, 9179357477
Email: conceptsbookspublication@gmail.com
Web: https://researchitout.blogspot.com/
CYBER SECURITY ANALYSIS USING POLICIES & PROCEDURES

18. Public Key Policies

By: Dr. Ashad Ullah Qureshi


Contact: 6260651575, 9179357477
Email: conceptsbookspublication@gmail.com
Web: https://researchitout.blogspot.com/
CYBER SECURITY ANALYSIS USING POLICIES & PROCEDURES

APPENDIX – C

LIST OF PUBLICATION

[1] “Cyber Security Analysis Using Policies & Procedures”, IMRF Journals, Volume 4
Issue 1, Page No.46-50, March 2015.

[2] “Cyber Security Analysis Using Policies & Procedures” International Conference
on Advances in Mathematical Sciences, Page. No.11, March 2015.

[3] “A Reliable Strategey for Tracing an Unauthorized User Using VAPT Tools &
Technology” International Journal of Science & Innovative Engineering & Technology, May
2015.

By: Dr. Ashad Ullah Qureshi


Contact: 6260651575, 9179357477
Email: conceptsbookspublication@gmail.com
Web: https://researchitout.blogspot.com/
CYBER SECURITY ANALYSIS USING POLICIES & PROCEDURES

By: Dr. Ashad Ullah Qureshi


Contact: 6260651575, 9179357477
Email: conceptsbookspublication@gmail.com
Web: https://researchitout.blogspot.com/
CYBER SECURITY ANALYSIS USING POLICIES & PROCEDURES

By: Dr. Ashad Ullah Qureshi


Contact: 6260651575, 9179357477
Email: conceptsbookspublication@gmail.com
Web: https://researchitout.blogspot.com/
CYBER SECURITY ANALYSIS USING POLICIES & PROCEDURES

By: Dr. Ashad Ullah Qureshi


Contact: 6260651575, 9179357477
Email: conceptsbookspublication@gmail.com
Web: https://researchitout.blogspot.com/
CYBER SECURITY ANALYSIS USING POLICIES & PROCEDURES

By: Dr. Ashad Ullah Qureshi


Contact: 6260651575, 9179357477
Email: conceptsbookspublication@gmail.com
Web: https://researchitout.blogspot.com/
CYBER SECURITY ANALYSIS USING POLICIES & PROCEDURES

By: Dr. Ashad Ullah Qureshi


Contact: 6260651575, 9179357477
Email: conceptsbookspublication@gmail.com
Web: https://researchitout.blogspot.com/
CYBER SECURITY ANALYSIS USING POLICIES & PROCEDURES

By: Dr. Ashad Ullah Qureshi


Contact: 6260651575, 9179357477
Email: conceptsbookspublication@gmail.com
Web: https://researchitout.blogspot.com/
CYBER SECURITY ANALYSIS USING POLICIES & PROCEDURES

By: Dr. Ashad Ullah Qureshi


Contact: 6260651575, 9179357477
Email: conceptsbookspublication@gmail.com
Web: https://researchitout.blogspot.com/
CYBER SECURITY ANALYSIS USING POLICIES & PROCEDURES

By: Dr. Ashad Ullah Qureshi


Contact: 6260651575, 9179357477
Email: conceptsbookspublication@gmail.com
Web: https://researchitout.blogspot.com/

View publication stats

You might also like