Home

Based on the white paper provided? What are the four goals of effective metrics as defined in the paper. In your own words explain your understanding of the metric and where and how it can be beneficial. (25 pts per goal clarified). IDS is a device or software application that monitors network and/or system activities for malicious activities, or policy viol

WILMINGTON UNIVERSITY
COLLEGE OF TECHNOLOGY
SEC 6040: Web and Data Security
Week 4 – IDS Review Assignment
Pts: 100 pts

For this assignment, you will be required review the additional reading assignment. 

1)      Based on the white paper provided?  What are the four goals of effective metrics as defined in the paper.  In your own words explain your understanding of the metric and where and how it can be beneficial. (25 pts per goal clarified).

IDS is a device or software application that monitors network and/or system activities for malicious activities, or policy violations and produces reports to a management station. Management teams need quality metrics. Consistently, security departments are taking directions from management teams that may have very little knowledge about the attacks the environment endures on a daily basis. In some cases IDS metrics will need to be combined with qualitative or quantitative data, such as the number of investigations assigned to a security team, to create a better picture of the security stance in the organization. By creating metrics designed for this audience, the security team can equip leaders to make informed decisions about the security of organization.
The four goals of effective metrics are as below:
1.      Depth of System’s Detection Capability
A detection capability metric can be defined as the number of attack signature patterns and/or behavior models known to a sensor technology. This metric can indicate if the IDS infrastructure is identifying all that it is expected to identify. About this metric understanding, it can show data about the team missing attacks because the IDS capability is lacking. As the result it can be beneficial to make decision that could be made to investigate newer technologies to increase the visibility expectations. Additionally, more information can be gained into how the sensor technology is currently providing security and can be contrasted with other competing products can be shown.

2.      False Negative Ratio
Another goals of effective metrics is to get false negative ratio which is the ratio of successful attacks not detected by the IDS. For the false positive rate, the security team may be reacting to incidents not captured by the sensor infrastructure. The organization may have other security technologies in place such as anti-malware, firewalls, data leak prevention, application whitelisting or a honeypot that has revealed an intrusion. As part of incident response tasks, security teams can research whether the sensors can identify or producing an alert for the intrusion as it crossed the sensor. As a result, more understanding on the data can be collected and be used to generate the False Negative Ratio. This I it can be more beneficial metric that can visualize if the current IDS is the correct solution for the environment, if the team is utilizing the technology correctly, or if more security staff should be monitoring the sensor data.
3.      Reliability of Attack Detection
The reliability metric can be defined as the ratio of false positives to total alarms raised. An analyst may be researching incidents to determine later that the event was a false positive. The data can be collected from the team’s ticketing system and used to produce a metric. Thus, it could be advantage to identify if the sensor infrastructure is to undergo a reconfiguring exercise, determine if the IDS solution is correct solution for the environment or have staff be allocated to perform sensor tuning to an acceptable level.
4.      Compromise Cost Analysis
The compromise metric is the ability to report the extent of damage and compromise due to intrusions identified by the security program. Time is being spent on remediating successful intrusions and a monetary figure could be calculated to aide management in decision making. This monetary figure could be shifted elsewhere to better protect the organization, possibly with intrusion detection







For this assignment you will be required review the additional reading assignment. 1) Based on the white paper provided? What are the four goals of effective metrics as defined in the paper. In your own words explain your understanding of the metric and where and how it can be beneficial. (25 pts per goal clarified).

WILMINGTON UNIVERSITY
COLLEGE OF TECHNOLOGY
SEC 6040: Web and Data Security
Week 4 – IDS  Review Assignment
Pts: 100 pts

For this assignment you will be required review the additional reading assignment. 

1)      Based on the white paper provided?  What are the four goals of effective metrics as defined in the paper.  In your own words explain your understanding of the metric and where and how it can be beneficial. (25 pts per goal clarified).



For this assignment you will be required to run Wireshark to complete the assignment and also view the following video on YouTube

WILMINGTON UNIVERSITY
COLLEGE OF TECHNOLOGY
SEC 6040: Web and Data Security
Week 3 – Wireshark Review Assignment
Monitoring the Network Exercise
Pts: 100 pts

For this assignment you will be required to run Wireshark to complete the assignment and also view the following video on YouTube.
http://www.youtube.com/watch?v=qzonPrKNhwc

1)      When monitoring one port on the network switch, what kind of traffic if predominantly observed?  What other traffic can be seen when port mirroring is turned on?  (10 Points)

            As we know that, port mirroring is used on a network switch to send a copy of network packets seen on one switch port to a network monitoring connection on another switch port. It generally indicates the ability to copy the traffic from a single port to a mirror port but disallows any type of bidirectional traffic on the port. Port mirroring allows a particular computer to see the network traffic, which is normally hidden from it.

            When monitoring one port on the traffic on a network switch, we can be observed that the broadcast traffic and the additional packets that are neither for you nor from you will show up because the switched trying to flush out its buffer so that it can handle and begin to switch again the data appropriately. When port mirroring is turned on, we can observe broadcast traffic in the switch.

2)      During the video, the presenter observes in a greater detail the DNS record packet.  How many records did the presenter observe? ____________   In your capture on the Wireshark install did you monitor any DNS records and if so how many did you observe? ___________ (15 points)

            DNS records are basically mapping files that tell the DNS server which IP address each domain is associated with, and how to handle requests sent to each domain.
In the video above the presenter observes 13 DNS packets used in communication within the network. In my capture of the Wireshark there are no DNS records as show below.

3)      What is the issue with spanning tree protocol as discussed by the presenter and how would you deal with the issues identified? (25 ports)

            Spanning tree protocol is a layer 2 protocol in the open system interconnect model that works by communicating data back and forth with an aim of finding out how the switches are arranged on the network and then using all the information gathered it can create a logical tree.

            The presenter in the video discussed the issues with STP and misconfiguration. The presenter in the video identified the issue with the Spanning Tree Protocol is that when one switch is talking to another switch then spanning tree misleads the switch traffic flow. There may be a change of sending data packets to another switch which causes misconfiguration and vulnerability.

            This cause many security issues. The better way to approach the issue is by maintain the records of misconfiguration switches and analyzing the issues using the sniffer like Wireshark.  The network engineering team should track the issues and analyze frequently until resolved.


4)      While your Wireshark is running in capture mode.  Visit a specific website.  Please ensure that the website is not running https.  Once you have done, that, using Wireshark’s capture find the packets that identify the network traffic that pertains to the website you visited.   Please provide the name of the site that was visited and the screen shot of the captured traffic. (50 points)

To study the traffic of the network using Wireshark, I visited http://www.neb.gov.np  which is the official website of Nepal Examination Board of Nepal and not using an https website.

The TCP packets that identify the network traffic when I visited the above website.

Review NIST SP 800-30 Rev1. Please review this document. Based on the review answer the following questions What are the five tasks required to get ready for a risk assessment?

WILMINGTON UNIVERSITY
COLLEGE OF TECHNOLOGY
SEC 6040: Web and Data Security
Week 2 – Review Assignment
Risk Analysis Exercise
Pts: 100 pts

Review NIST SP 800-30 Rev1. Please review this document.  Based on the review answer the following questions:

1)      What are the five tasks required to get ready for a risk assessment?   Explain each one in your own terms and why the task is important. (25 points)

Risk assessment is the process of identifying risks to organizational operations, organizational assets, individuals, other organizations, and the Nation, resulting from the operation of an information system. It is the part of the risk management, incorporates threat and vulnerability analyses, and considers mitigations provided by security controls planned or in place. In a nutshell, risk assessment is the overall process of threat identification, risk analysis, and risk evaluation.
Here are the five tasks that are required to get ready for a risk assessment:
i.                     Identify the Threats
Identify the threats means anything that may cause harm. We can find out by doing different survey on the organization operations, assets, and with the employees. We can also simply ask the employees and walk round the workplace to identify the threats.

ii.                   Analyze the Risk
Once we identified many threats, then we need to understand the consequences of it. What is the weighted risk factor based on the threat, short and long - term impacts based on the probability from the threat.

iii.                 Evaluate the Risk
After identifying the threats and analyzing it, we should then require protecting the people and the physical assets from harm. The threats can either be removed completely or the risks controlled so that the injury is unlikely. Precisely, in this task, we should identify actions necessary to eliminate the threat, or control the risk using the hierarchy or risk control methods and evaluate to confirm if the threat has been eliminated or if the risk is appropriately controlled.

iv.                 Record the Risk
In this task, we keep any documents that may be necessary. Documentation may include detailing the process used to assess the risk, outlining any evaluations, or detailing how conclusions were made. Once we established the priorities, the organization can decide on ways to control each specific threat. Threat controls methods can be grouped into categories like elimination, engineering controls, administrative controls and personal protective equipment’s.

v.                   Monitor and Review the Risk
This task is about to know either the risk assessment was complete and accurate or not. Similarly, this task helps to find out that any changes in the workplace have not introduced new threats or changed threads that were once ranked as lower priority to higher priority.

2)      Discuss the threats associated with privileged user accounts?  Please support your views from sources other than the assigned reading and also the text book. (25 points)

Privileged user accounts are the insiders of the organization who are in the superior place of their field. They are usually the most trusted ones and have a full control over their systems, putting them in the best position to commit malicious actions. What makes privileged accounts dangerous is not the extent of their access, but rather how easy it is for them to perform malicious action and how hard it can be to detect those. Some of the threats associated with privileged user accounts are:
-          Elevated level of privileges allows users to perform a wide variety of malicious actions, form data misuse to completely compromising the system.
-          Privileged users may use their administrative access to steal sensitive client data and financial information to sell it or even simply leak it online.
-          Privileged accounts can also be used to modify or delete sensitive data, opening possibilities for fraud.
-          Tech savvy users use such accounts to install backdoors or exploits allowing them full access to the system.
-          Disgruntled employees can even bring the whole system down, by altering critical settings.
-          If perpetrators will manage to use social engineering or hacking to obtain a privileged account, it will give them access to the whole system.









3)      Using fig 3 – the generic risk model in the document and the threat identified in question 2.  Identify the risks at the Organizational level, business process level and information system level.  (25 points)
From the threat identified on the question number 2, the risks at the organizational level are:
-          Disgruntled employees can even bring the whole system down, by altering critical settings.
-          It’s very hard to find out the real problem creating.
-          Organization is losing it’s plus part slowly.

The risks at the business process level are:

-          Sensitive financial and personal information of the business might be leaked.
-          It takes long time to find what’s going wrong until that time business is in great loss.
-          Great loss of money.

The risks at the information system level are:
-          All the one who are related to access and manage databases, perform setup and maintenance of the information system are in the risks like share of the passwords, data and important information to others. There will be risk of steal of sensitive information.


4)      Based on the risks identified, recommend the information system policies that would be required.  You do not need to write the policy in detail, simply provide the title and one sentence describing the policy. (25 points)
Policy Title: Privilege Users Accounts
Description: Privilege users can be classified on to different accounts such as personal, administration, service, emergency in the information system where they have to handle the sensitive information of the organization.

Policy Title: Privilege User Access Control
Description: Privilege users are controlled when the access control and purpose are categorized from the management and will allow to protect from the unauthorized access and precisely identify anyone who uses such accounts.







References
Gogan Marcell, G.M., (2016), The Threat of Privileged User Access- Monitoring and Controlling Privilege Users, SC Media, Referred from https://www.scmagazineuk.com/the-threat-of-privileged-user-access--monitoring-and-controlling-privilege-users/article/568624/




Using the diagram Provided please identify the routers and the switches? (10 points) Here are 2 routers and 2 switches in the network diagram.

WILMINGTON UNIVERSITY
COLLEGE OF TECHNOLOGY
SEC 6040: Web and Data Security
Week 1 – Review Assignment
Network Review
Pts: 100 pts

1)      Using the diagram Provided please identify the routers and the switches? (10 points)
   Here are 2 routers and 2 switches in the network diagram.
-          Router 1 is connected to the Switch 1 of Subnet-A and Router 2.
-          Router 2 is connected to Router 1, switch 2 and internet.
-          Switch 1 connects Subnet A and Router 1
-          Switch 2 connects Subnet B, wireless access point, network admin system and router 2.
2)      Please Assign IP addressing to each of the devices shown.  If a device is meant to be a DHCP client, then indicate as such.  For each system, please include the subnet mask and gateway for each system.  If a system does not have a gateway address, indicate by not applicable.  (Add additional rows as needed) (50 points)

For SUBNET-A, router 1 in the given diagram acts as the gateway for subnet A. Let’s assign 192.168.10.0/27 as the IP address for the Router 1. As shown in the diagram, three PCs were connected through the switch 1 in subnet A. Here down table provides the IP address assigned for the Subnet A elements which includes the Switch 1, PC 1, PC 2, and PC 3.

Subnet  A
System
IP Address
Subnet Mask
Gateway Address
Switch 1
192.168.10.2
255.255.255.224
192.168.10.1
PC-1
192.168.10.3
255.255.255.224
192.168.10.1
PC-2
192.168.10.4
255.255.255.224
192.168.10.1
PC-3
192.168.10.5
255.255.255.224
192.168.10.1

For SUBNET-B,  router 2 in the given diagram acts as the gateway for subnet B. Let’s assign 192.168.10.8/27 as the IP address for the Router 2. As shown in the diagram, three PCs and the network admin system are connected through the switch 2 in subnet B. Here down table provides the IP address assigned for all the elements of Subnet B which includes the Switch 2, PC 4, PC 5, PC 6 and Network Admin System.

Subnet  B
System
IP Address
Subnet Mask
Gateway Address
Switch-2
192.168.10.9
255.255.255.224
192.168.10.8
PC-4
192.168.10.10
255.255.255.224
192.168.10.8
PC-5
192.168.10.11
255.255.255.224
192.168.10.8
PC-6
192.168.10.12
255.255.255.224
192.168.10.8
Network Admin System
192.168.10.13
255.255.255.224
192.168.10.8

For SUBNET-C, same router 2 acts as the gateway. Let’s assign s192.168.10.16/27 as the IP address for Subnet C. Here down diagram is the full illustration of IP address assigned for the Subnet C which includes the access point, laptop ad tablet.  

Subnet  C
System
IP Address
Subnet Mask
Gateway Address
Access Point
192.168.10.17
255.255.255.224
192.168.10.16
Laptop
192.168.10.18
255.255.255.224
192.168.10.16
Tablet
192.168.10.19
255.255.255.224
192.168.10.16


3)      Identify what additional devices are needed (but not necessarily shown) for the basic functioning of a network.  For each additional device that is identified please provide the necessary network information. This does not include – User file server, printers, scanners, etc. (15 points)

We do not need any additional devices for the basic functioning of given network diagram. The given network diagram is itself a better functioning diagram, but we can add the repeater for to boost the signal with a device and bridges to pass packets of information to the correct location and to manages the traffic to maintain optimum performance on both sides of the network.

4)      For the wireless portion of the network, identify additional details required for its proper functionality.  (25 points)

           For the proper functionality for the wireless portion of the network should have:
-          High capacity load balancing.
-          Smarter way of managing the entire network from a centralized point.
-          Role based access control based on who, what, where, when and how a user or device is trying to access the network.
-          Ability to measure performance from the end-user’s perspective.
-          Mobile device management.
-          Roaming and redundancy


References:
                  Florida Center for Instructional Technology, Chapter 3: Hardware, Retrieved from https://fcit.usf.edu/network/chap3/chap3.htm


                   Mareco, D.M., (2017), 17 Features Every Fast, Secure Wireless Network Should Have, Secure Edge Networks, Retrieved from https://www.securedgenetworks.com/blog/11-features-every-secure-wireless-network-should-have

Content


  • Substation
  • Hydro Power Plant
  • Voltage Control
  • Transmission
  • Distribution
  • Generation
  • Switch-gear and Protection
  • Electrical Power System
  • Text Books
  • Video



Potential Transformer


  • Potential transformer is the step-down transformer with voltmeter in secondary side. It is same as the power transformer but rating is small. 

  • The potential transformer are employed for voltage above 400 V to feed the potential coil of indicating and metering device and relay. 

  • These transformer make ordinary low voltage instrument suitable for measurement of high voltage and insulated them from high voltage. 



  • The primary winding of the potential transformer is connected directly to the power circuit between two phase or between a phase and ground depending on the rating of transformer and its application. 



  • In the secondary winding various indicating and metering device and relay are connected. The primary winding has large number of turns and the secondary winding which has a much smaller number of turns is  coupled magnetically through magnetic circuit to the primary winding. The ratio of primary to secondary voltage is known as Turn ratio. 



  • The theory of operation of Potential transformer is essentially same as that of power transformer. The main difference between a potential transformer and power transformer is due to fact that the land current.

Outdoor Substation: its type and site selection

Outdoor Substation are erected outside in open air. So for the protection of outdoor substations lighting arr-esters are installed over the High Tension line to protect the transformer form the surges. Earthing must be done in two or more phases. High tension fuse unit is installed for protection of high tension side and to control low tension side iron clad low tension switch of suitable capacity with fuses is installed.

This can be sub-divided into two types;

1. Pole Mounted Substations:

They are erected for distribution of power in localities. They can be 1 stout pole or H- pole and 4 pole structures with suitable platforms employed for transformers of capacity up to 25KVA, 125 KVA, and above 125KVA ( up to 250KVA) respectively.

Pole Mounted Substations are step down substations i.e. distribution transformer of capacity 250KVA where all the equipment is mounted on poles. This substation is used whenever a high voltage line is running and from it a small  load such as a village or a small locality or factory is to be supplied. This substation are quite simple and cheap as no building for housing as in indoor substation. The equipment is required but because of increase in number of transformers, total KVA is increased, no load losses increases and the cost per KVA is thus more.

2. Foundation Mounted Substations:

Foundation Mounted Substations are normally for voltage 33 KV and above. This is recommended because large air clearances is required for above 33 KV.  This substation are either situated near a power station i.e. Step-Up Substation or near a large load center i.e. Step-Down Substation. In this substation all equipment lies open in the air. This is usually enclosed by a fence from the point of view of safety.

Site Selection:
Following points should be keep in mind while selection of site for Outdoor Substations:

a. There must be easy access for heavy transport.
b. The clearances and spacing are not only to be governed by the operating voltage but also from the consideration of encroachment from outside. 

Classification of Substation on the basis of Nature of Duties

As we know that Substation serve as sources of energy supply for the local areas of distribution in which these are locates. Substation can be divided into three parts on the basis of their Nature of Duties. They are briefly describes below:

 1. Step- Up or Primary Substations;

Primary Substations are usually associated with generating stations. As we are familiar that the generation of electric power is basically in low voltage but we have to transfer electric power in High Voltage due to many reasons like low voltage loss, high efficiency, high reliability and many more. So in this substation generated voltage which is usually low i.e 3.3 kv, 6.6 KV, 11 Kv or 33 Kv is steeped up to primary transmission voltage so that huge blocks of power can be transmitted over long distance to the load centers economically.

2. Primary Grid Substations:

Primary Grid Substations are located at suitable load centers along the primary transmission lines. The primary transmission voltage is stepped down to different suitable secondary voltage. The secondary transmission lines are carried over to the secondary substations situated at the load centers where the voltage is further stepped down to sub- transmission or primary distribution voltages.

3. Step-Down or Distribution Substations;

Distribution Substation are located at the load centers where the sub-transmission or primary distribution voltage is stepped down to secondary distribution voltage (400/240 V ). This substation feed the consumers through distribution network and service lines.


Classification of Substation in Hydro Power Plant

Substation serve as sources of energy supply for the local areas of distribution in which these are located. Their main functions are to receive energy transmitted at high voltage from the generating stations reduce the voltage to a value appropriate for local distribution and provide facilities for switching. Some are:
 1. Simply Switching Stations
 2. Converting Substation
 3. Points for safety devices
 4. Feeders
 5. Synchronous Condensers
 6. Street lighting equipment

Classification of Substation can be done by different criteria, which are describes below :

1. According to Nature of Duties
        i. Step-Up or Primary Substation
       ii. Primary Grid Substation
      iii. Step- Down or Distribution Substations
2. According to Service Rendered
        i. Transformer Substations
       ii. Switching Substations
      iii. Converting Substations
3. According to Operating Voltage
        i. High Voltage Substation
       ii. Extra High Voltage Substation
      iii. Ultra High Voltage Substation
4. According to Importance
        i. Grid Substations
       ii. Tower Substations
5. According to Design
       i. Indoor Substations
      ii. Outdoor Substations
              a. Pole Mounted Substations
              b. Foundation Mounted Substations.