Saturday, 24 March 2018

KERTAS PENERANGAN KSK 7023 (K4)




Muhamad Razak bin Teridi

             KERTAS PENERANGAN
KOD DAN NAMA  PROGRAM /
PROGRAM’S CODE & NAME
IT-030-4:2013 COMPUTER NETWORK ADMINISTRATION
TAHAP / LEVEL
L 4
KOD DAN TAJUK UNIT KOMPETENSI  /
COMPETENCY UNIT CODE AND TITLE
C03  computer NETWORK SECURITY DEPLOYMENT
NO. DAN PENYATAAN AKTIVITI KERJA / WORK ACTIVITIES NO. AND STATEMENT

1.    ANALYSE COMPUTER NETWORK SECURITY REQUIREMENT
2.    PLAN COMPUTER NETWORK SECURITY DEPLOYMENT
3.    EXECUTE COMPUTER NETWORK SECURITY DEPLOYMENT
4.    PRODUCE  COMPUTER NETWORK SECURITY DEPLOYMENT REPORT

NO. KOD  / CODE NUM.
 IT-030-4:2013-C03/P(4/4)
   Drpd/of        :  19























TAJUK:             4.1       Document management system
                           4.2       Computer network security deployment manual
                           4.3       Network troubleshoot report
                           4.4       Network security deployment report


TUJUAN :

Kertas penerangan ini adalah bertujuan untuk menerangkan semua yang berkaitan dengan dokumentasi iaitu: definisi, jeni, keperluan, tujuan, prinsip, kepentingan, carta alir proses kawalan dokumen dan data, keselamatan dokumen dan sistem dokumentasi , fasa pembangunan penyediaan dokumentasi dan penyediaan dokumen.Juga menerangkan tentang Computer network security deployment manual iaitu S.O.P pelancaran keselamatan rangkaian atau manual pelancaran ciri-ciri atau fitur keselamatan rangkaian merangkumi perisian dan perkakasan, langkah-langkah terperinci berbantu rajah. Laporan troubleshoot sebarang permasalahan yang berlaku semasa dan selepas pelancaran ciri keselamatan juga diterangkan sama ada yang berjaya diselesaikan atau tidak juga diterangkan di dalam kertas ini begitu juga dengan Laporan pelancaran keselamatan rangkaian.






PENERANGAN:

Semua dokumentasi yang mengandungi maklumat berkaitan dengan penggunaan dan pemasangan peralatan dan perisian. Ia juga meliputi data dalam semua bentuk media seperti salinan kekal, salinan elektronik, transparencies, risalah dan slides. Rujukan terhadap dokumentasi yang boleh membantu seperti polisi dan prosedur mengenai pengkhususan sistem maklumat atau peraturan-peraturan keselamatan yang sepatutnya dilakukan terhadap pengguna.  
Data dan maklumat merupakan dokumen, salinan maklumat dan intelectual document, koleksi fakta-fakta dalam bentuk kertas atau mesej elektronik  yang mengandungi maklumat-maklumat untuk digunakan untuk mencapai misi dan objektif organisasi. Contohnya seperti dokumentasi sistem, prosedur operasi, rekod-rekod perniagaan, profil pelanggan, pangkalan data dan fail-fail data, maklumat-maklumat arkib dan lain-lain.

DEFINISI DOKUMENTASI
                                   
Dokumen adalah maklumat yang diwujudkan, sama ada dalam bentuk kertas, atau imej yang diimbas atau secara elektronik, yang masih boleh dipinda atau diubah. Dokumen yang telah dimuktamadkan mungkin berakhir sebagai rekod jika dokumen tersebut merupakan bukti transaksi urusan kerajaan. Oleh itu, boleh dikatakan bahawa rekod bermula daripada dokumen. Namun, bukan semua dokumen akan berakhir sebagai rekod. Pemusnahan dokumen tidak tertakluk kepada mana-mana perundangan.
Dokumentasi dapat dianggap sebagai bahan yang bertulis atau sesuatu yang menyediakan informasi tentang sesuatu subjek. Dokumentasi adalah meliputi tentang deskripsi-deskripsi penjelasan-penjelasan, carta alir, daftar-daftar, cetakan hasil komputer, contoh –contoh objek dari sistem informasi. Dokumentasi juga merupakan bahan yang penting dan perlu dimuatkan dalam sesebuah buku ilmiah dan buku pengajian tinggi ialah rujukan, nota, kutipan dan bibliografi.








JENIS DOKUMENTASI

Dokumen/Suratan Rasmi
·         Fail-fail, surat-surat, borang-borang yang telah diisi, disket yang mengandungi maklumat rasmi termasuk soalan peperiksaan.

Dokumen Terperingkat
·         Dokumen / surat rasmi yang dikelaskan kepada Rahsia Besar, Rahsia, Sulit dan Terhad.

KEPERLUAN DOKUMENTASI

Suatu proses pelaksanaan pengurusan penting untuk implementasi suatu program atau sistem. Pada suatu bahagian sistem informasi, menaikkan kualitas proses biasanya melibatkan
elemen berikut ini :

a.    Metodologi .
Suatu cara, kaedah, untuk mencapai tujuan. Kaedah yang dilakukan secara umum dengan sistem dokumentasi dan digunakan sebagai landasan setiap projek. Ada beberapa kaedah khas untuk beberapa jenis projek yang khusus seperti metodologi untuk Internet atau Intranet.

b.    Dokumentasi .
Dokumen khusus, yang pada awal proyek akan menerangkan secara garis besar.

c.    Standard.
Panduan yang disusun dan digunakan pada suatu institusi untuk menyelesaikan suatu pekerjaan. Contoh standard ini adalah : kesepakatan penamaan untuk berbagai macam kod, kesepakatan layar GUI, kesepakatan data modelling. Standard ini penting karena merupakan landasan pengembangan sebagai kerangka kerja, komunikasi. Juga untuk mengontrol kualitas serta menjaga kontinuitas pengembangan.

TUJUAN DOKUMENTASI

1.    Arus Komunikasi
·         Komunikasi berlaku dalam tiga cara iaitu :
-       Memberi arahan.
-       Membuat laporan.
-       Memberi cadangan/pendapat.

2.    Memberi Maklumat
·         Memberi maklumat/ informasi secara berterusan tentang segala perubahan dalam pekerjaan yang telah ditetapkan adalah sangat penting.

3.    Membuat Identifikasi / Kenal Pasti
·         Beberapa dokumentasi dirancang untuk mengidentifikasi dan mengenal pasti.

4.    Menetapkan Prosedur Dan Standard
·         Prosedur menentukan rangkaian kegiatan yang akan dilaksanakan, manakala standard menentukan aturan yang akan dilaksanakan dalam menjalankan prosedur tersebut.


5.    Membuat Catatan
·         Dokumentasi akan diperlukan untuk memantau peralatan, sistem dan sumber manusia. Berdasarkan dokumentasi ini, pengurusan dapat memutuskan atau menilai sama ada sesebuah organisasi tertentu dapat memenuhi atau mencapai tujuannya dalam skala waktu yang ditetapkan. Selain itu, pengurusan juga dapat mengukur kualiti kerja iaitu memastikan hasil/output sesuai dengan spesifikasi dan standard yang telah ditetapkan.

6.    Memberi Instruksi / Arahan
·         Dokumntasi yang baik akan membantu dalam proses latihan kakitangan, sama ada pelaksanaan latihan untuk tujuan mengatasi instalasi baru atau untuk tujuan promosi.

PRINSIP DOKUMENTASI

1.    Kaedah (Metode)
·         Sesuatu komunikasi yang baik mestilah perlu menetapkan dan memelihara saluran komunikasi serta menetapkan kawalan yang memastikan saluran komunikasi adalah terbaik.

2.    Jumlah Dokumentasi
·         Pengurus operasi harus mengenalpasti dokumentasi supaya dapat mencapai keseimbangan antara jumlah yang terlalu banyak dan terlalu sedikit.

3.    Kesederhanaan
·         Dokumentasi harus bersifat sederhana, sehingga ia dapat dilengkapi secara mudah dan dapat difahami secara langsung. Hal ini dapat meningkatkan ketepatan maklumat.

4.    Bentuk Rancangan (Design Form)
·         Merancang sejumlah form untuk digunakan mengikut kepentingan atau kegunaan kita sendiri.
·         Dalam merancang sebuah form untuk dokumentasi perlu dipertimbangkan hal-hal berikut :
-       Typeface
-       Tatabahasa
-       Warna
-       Rujukan
-       Identifikasi/ kenal pasti
KEPENTINGAN DOKUMENTASI

Kepada Pembaca

          membantu para pembaca mengetahui sumber yang digunakan oleh penulis
          Membantu pembaca membuat rujukan tambahan
          Membantu pembaca mendapatkan bahan tersebut dengan mudah.

Kepada Penulis

          menjamin kredibiliti pengarang
          Menguatkan hujah
          Pengarang tidak dituduh menyalin hasil kerja orang lain
          Memastikan keaslian hasil penulisan ilmiah


CARTA ALIR PROSES KAWALAN DOKUMEN DAN DATA


TidakLulus

TAMAT

Lulus

MULA

Mengenalpasti Dokumen

Pengeluaran & Penjagaan

Pindaan

Kelulusan Pindaan Yang Dicadangkan


Penyimpanan Data Elektronik
 
























































KESELAMATAN DOKUMEN DAN SISTEM DOKUMENTASI

Bagi memastikan integriti maklumat, semua pengguna perlu mengambil langkah-langkah berikut: -

a.    Memastikan sistem dokumentasi atau penyimpanan maklumat adalah selamat dan terjamin.
b.    Mengawal dan merekodkan semua aktiviti capaian dokumentasi sedia ada.
c.    Setiap dokumen hendaklah di fail dan dilabelkan mengikut klasifikasi keselamatan seperti Terbuka, Terhad, Sulit, Rahsia atau Rahsia Besar.
d.    Pergerakan fail dan dokumen hendaklah direkodkan dan perlulah mengikut prosedur Arahan Keselamatan.
e.    Kehilangan dan kerosakan ke atas semua jenis dokumen perlu dimaklumkan mengikut prosedur Arahan Keselamatan.
f.     Pelupusan dokumen hendaklah mengikut prosedur keselamatan seperti mana Arahan Keselamatan, Arahan Amalan (Jadual Pelupusan Rekod) dan tatacara Jabatan Arkib Negara.
g.    Menggunakan penyulitan (encryption) ke atas dokumen rahsia rasmi yang disediakan dan dihantar secara elektronik.

Langkah-langkah pencegahan seperti berikut hendaklah di ambil untuk memastikan kerahsiaan, integriti dan kebolehsediaan maklumat yang di simpan dalam media storan adalah terjamin dan selamat :
a.    Menyediakan ruang penyimpanan dan bekas-bekaskeselamatan yang mempunyai ciri-ciri keselamatan bersesuaian dengan kandungan maklumat.
b.    Menghadkan akses kepada pengguna yang dibenarkan sahaja.
c.    Sebarang pelupusan hendaklah merujuk kepada tatacara pelupusan.
d.    Mengadakan sistem pengurusan media termasuk inventori, pergerakan, pelabelan dan backup/restore.

Fasa Pembangunan Penyediaan Dokumentasi

          Aktiviti merekodkan segala fakta dan spesifikasi sebuah sistem maklumat untuk rujukan pada masa akan datang.
          Satu aktiviti yang penting.
          Dokumentasi semua perubahan dan aktiviti yang dilakukan sepanjang pembangunan sistem maklumat.
        
          Dokumentasi pengurusan
        Tidak menunjukkan gambaran sistem secara teknikal.
        Mengandungi gambaran sistem secara menyeluruh, objektif dan maklumat sistem, contoh-contoh laporan, kos perlaksanaan serta jadual pembangunan.

          Dokumentasi pengguna
        Ditulis dalam bentuk yang mudah difahami oleh pengguna.
        Merujuk kepada bahan-bahan tulisan berkaitan dengan sistem.
        Dikenali sebagai manual pengguna.
        Penggunaan ilustrasi merupakan pendekatan bagi menyampaikan mesej dengan jelas.

          Dokumentasi pengaturcara program
        Ditulis untuk pengaturcara program.
        Mengandungi penerangan teknikal berkaitan dengan sistem.
        Contoh: penerangan program, spesifikasi rekabentuk seperti rajah, kod sumber, rancangan pengujian, laporan-laporan, lakaran rekabentuk skrin dan skima pangkalan data.

          Dokumentasi operasi
        Berperanan membantu kakitangan operasi menjalankan program-program berkaitan dengan perjalanan sistem.
        Kepentingan - untuk mengetahui keperluan ruang storan, keperluan salinan pendua (back up), kekerapan operasi sistem dan pengurusan laporan sistem yang perlu dicetak.
        Mengandungi manual perjalanan sistem.


PENYEDIAAN DOKUMEN

Semua pegawai Jabatan perlulah mematuhi prosedur berikut dalam menyediakan dokumen/suratan terperingkat :

a.    Dokumen tersebut hendaklah ditentukan taraf keselamatan terlebih dahulu sama ada rahsia besar, rahsia, sulit atau terhad sebelum dokumen tersebut disediakan.
b.    Sekiranya dokumen tersebut boleh dikategorikan sebagai dokumen terperingkat, dokumen tersebut hendaklah dikemukakan kepada Bahagian Khidmat Pengurusan dan Sumber Manusia untuk tujuan pengkelasan. Walau bagaimanapun jika dokumen tersebut telah ditentukan taraf keselamatannya di atas arahan yang telah diberikan atau berdasarkan fail yang digunakan, pengkelasan tidak perlu dilakukan.
c.    Semua draf dan salinan yang tidak diperlukan hendaklah dimansuhkan mengikut kesesuaiannya.
d.    Bilangan salinan dokumen yang disediakan hendaklah seboleh-bolehnya menepati jumlah yang diperlukan sahaja.
e.    Pegawai/staf yang mengendalikan dokumen dalam kategori rahsia besar dan rahsia hendaklah telah lulus tapisan keselamatan halus dan bagi pegawai-pegawai/staf yang mengendalikan kategori sulit, hendaklah telah lulus tapisan keselamatan kasar.











DEFINISI MANUAL
Manual merujuk secara khusus kepada dokumen rujukan yang memberikan maklumat terperinci mengenai operasi dan penyelenggaraan sesuatu produk atau perkara. Pengeluar atau pembuat dasar akan sering memberikan manual rasmi untuk produk atau perkara penting yang perlu dilalkukan untuk memberikan bantuan kepada pemilik atau penggunanya atau pelaksana sesuatu dasar/perkara: kereta, contohnya, biasanya datang dengan manual pemilik, jentera dengan manual pengendali, dan dokumentasi rasmi untuk program Unix dengan halaman manual.

Contoh manual yang di dapati dari internet :

Information Technology Cyber Security Policy
(Insert Name of Organization)
(Insert Date)


(NAME OF ORGANIZATION HERE)
POLICY MANUAL

Subject: CYBER SECURITY POLICY

Approved:             (Signature Line)                   Effective Date: (Insert Date)

1              DEFINITION
The use of the term “company” is in reverence to the following organization: (Insert Organization Name).
2              INTRODUCTION
This Cyber Security Policy is a formal set of rules by which those people who are given access to company technology and information assets must abide. 

The Cyber Security Policy serves several purposes. The main purpose is to inform company users: employees, contractors and other authorized users of their obligatory requirements for protecting the technology and information assets of the company.  The Cyber Security Policy describes the technology and information assets that we must protect and identifies many of the threats to those assets.

The Cyber Security Policy also describes the user’s responsibilities and privileges. What is considered acceptable use? What are the rules regarding Internet access? The policy answers these questions, describes user limitations and informs users there will be penalties for violation of the policy. This document also contains procedures for responding to incidents that threaten the security of the company computer systems and network.
3              WHAT ARE WE PROTECTING
It is the obligation of all users of the company systems to protect the technology and information assets of the company.  This information must be protected from unauthorized access, theft and destruction. The technology and information assets of the company are made up of the following components:

              Computer hardware, CPU, disc, Email, web, application servers, PC systems, application software, system software, etc.
              System Software including: operating systems, database management systems, and backup and restore software, communications protocols, and so forth.
              Application Software: used by the various departments within the company.  This includes custom written software applications, and commercial off the shelf software packages.
              Communications Network hardware and software including: routers, routing tables, hubs, modems, multiplexers, switches, firewalls, private lines, and associated network management software and tools.
 





3.1          Classification of Information
User information found in computer system files and databases shall be classified as either confidential or non-confidential. The company shall classify the information controlled by them. The (company designee) is required to review and approve the classification of the information and determine the appropriate level of security to best protect it. Furthermore, the (company designee) shall classify information controlled by units not administered by a (company designee).

3.2          Classification of Computer Systems

Security Level Description Example
RED       This system contains confidential information – information that cannot be revealed to personnel outside of the company.  Even within the company, access to this information is provided on a “need to know” basis.

The system provides mission-critical services vital to the operation of the business.  Failure of this system may have life threatening consequences and/or an adverse financial impact on the business of the company.     Server containing confidential data and other department information on databases.  Network routers and firewalls containing confidential routing tables and security information.
GREEN  This system does not contain confidential information or perform critical services, but it provides the ability to access RED systems through the network.    User department PCs used to access Server and application(s).  Management workstations used by systems and network administrators.
WHITE  This system is not externally accessible. It is on an isolated LAN segment, unable to access RED or GREEN systems.  It does not contain sensitive information or perform critical services.     A test system used by system designers and programmers to develop new computer systems.
BLACK This system is externally accessible.  It is isolated from RED or GREEN systems by a firewall.  While it performs important services, it does not contain confidential information.            A public Web server with non-sensitive information.


3.3          Local Area Network (LAN) Classifications
A LAN will be classified by the systems directly connected to it. For example, if a LAN contains just one RED system and all network users will be subject to the same restrictions as RED systems users. A LAN will assume the Security Classification of the highest level systems attached to it.

4              DEFINITIONS
Externally accessible to public.  The system may be accessed via the Internet by persons outside of the company without a logon id or password. The system may be accessed via dial-up connection without providing a logon id or password. It is possible to “ping” the system from the Internet. The system may or may not be behind a firewall. A public Web Server is an example of this type of system.

Non-Public, Externally accessible.  Users of the system must have a valid logon id and password. The system must have at least one level of firewall protection between its network and the Internet. The system may be accessed via the Internet or the private Intranet. A private FTP server used to exchange files with business partners is an example of this type of system.

Internally accessible only.  Users of the system must have a valid logon id and password. The system must have at least two levels of firewall protection between its network and the Internet. The system is not visible to Internet users. It may have a private Internet (non-translated) address and it does not respond to a “ping” from the Internet. A private intranet Web Server is an example of this type of system.

Chief Information Officer.  The Director of the Department of Information Technology (IT) shall serve as the Chief Information Officer. Security Administrator.  An employee of IT shall be designated as the Security Administrator for the company.




 









5              Threats to Security

5.1          Employees
One of the biggest security threats is employees.  They may do damage to your systems either through incompetence or on purpose.  You have to layer your security to compensate for that as well.  You mitigate this by doing the following.

             Only give out appropriate rights to systems. Limit access to only business hours. 
             Don’t share accounts to access systems.  Never share your login information with co-workers.
             When employees are separated or disciplined, you remove or limit access to systems.
             Advanced – Keep detailed system logs on all computer activity.
             Physically secure computer assets, so that only staff with appropriate need can access.

5.2          Amateur Hackers and Vandals.
These people are the most common type of attackers on the Internet.  The probability of attack is extremely high and there is also likely to be a large number of attacks. These are usually crimes of opportunity.  These amateur hackers are scanning the Internet and looking for well known security holes that have not been plugged.  Web servers and electronic mail are their favorite targets.  Once they find a weakness they will exploit it to plant viruses, Trojan horses, or use the resources of your system for their own means.  If they do not find an obvious weakness they are likely to move on to an easier target.
5.3          Criminal Hackers and Saboteurs.
The probability of this type of attack is low, but not entirely unlikely given the amount of sensitive information contained in databases.  The skill of these attackers is medium to high as they are likely to be trained in the use of the latest hacker tools.  The attacks are well planned and are based on any weaknesses discovered that will allow a foothold into the network.
6              User Responsibilities
This section establishes usage policy for the computer systems, networks and information resources of the office.  It pertains to all employees and contractors who use the computer systems, networks, and information resources as business partners, and individuals who are granted access to the network for the business purposes of the company.
6.1          Acceptable Use
User accounts on company computer systems are to be used only for business of the company and not to be used for personal activities.  Unauthorized use of the system may be in violation of the law, constitutes theft and can be punishable by law.  Therefore, unauthorized use of the company computing system and facilities may constitute grounds for either civil or criminal prosecution.

Users are personally responsible for protecting all confidential information used and/or stored on their accounts.  This includes their logon IDs and passwords. Furthermore they are prohibited from making unauthorized copies of such confidential information and/or distributing it to unauthorized persons outside of the company.

Users shall not purposely engage in activity with the intent to: harass other users; degrade the performance of the system; divert system resources to their own use; or gain access to company systems for which they do not have authorization.

Users shall not attach unauthorized devices on their PCs or workstations, unless they have received specific authorization from the employees’ manager and/or the company IT designee.
Users shall not download unauthorized software from the Internet onto their PCs or workstations.

Users are required to report any weaknesses in the company computer security, any incidents of misuse or violation of this policy to their immediate supervisor.
6.2          Use of the Internet
The company will provide Internet access to employees and contractors who are connected to the internal network and who has a business need for this access.  Employees and contractors must obtain permission from their supervisor and file a request with the Security Administrator.

The Internet is a business tool for the company.  It is to be used for business-related purposes such as: communicating via electronic mail with suppliers and business partners, obtaining useful business information and relevant technical and business topics. 





 

The Internet service may not be used for transmitting, retrieving or storing any communications of a discriminatory or harassing nature or which are derogatory to any individual or group, obscene or pornographic, or defamatory or threatening in nature for “chain letters” or any other purpose which is illegal or for personal gain.
6.3          User Classification
All users are expected to have knowledge of these security policies and are required to report violations to the Security Administrator.  Furthermore, all users must conform to the Acceptable Use Policy defined in this document. The company has established the following user groups and defined the access privileges and responsibilities:


User Category      Privileges & Responsibilities
Department Users (Employees)        Access to application and databases as required for job function. (RED and/or GREEN cleared)
System Administrators       Access to computer systems, routers, hubs, and other infrastructure technology required for job function. Access to confidential information on a “need to know” basis only.
Security Administrator       Highest level of security clearance. Allowed access to all computer systems, databases, firewalls, and network devices as required for job function.
Systems Analyst/Programmer          Access to applications and databases as required for specific job function.  Not authorized to access routers, firewalls, or other network devices.
Contractors/Consultants    Access to applications and databases as required for specific job functions. Access to routers and firewall only if required for job function. Knowledge of security policies. Access to company information and systems must be approved in writing by the company director/CEO.

Other Agencies and Business Partners             Access allowed to selected applications only when contract or inter-agency access agreement is in place or required by applicable laws.
General Public      Access is limited to applications running on public Web servers. The general public will not be allowed to access confidential information.
6.4          Monitoring Use of Computer Systems
The company has the right and capability to monitor electronic information created and/or communicated by persons using company computer systems and networks, including e-mail messages and usage of the Internet.  It is not the company policy or intent to continuously monitor all computer usage by employees or other users of the company computer systems and network.  However, users of the systems should be aware that the company may monitor usage, including, but not limited to, patterns of usage of the Internet (e.g. site accessed, on-line length, time of day access), and employees’ electronic files and messages to the extent necessary to ensure that the Internet and other electronic communications are being used in compliance with the law and with company policy.
7              Access Control
A fundamental component of our Cyber Security Policy is controlling access to the critical information resources that require protection from unauthorized disclosure or modification.  The fundamental meaning of access control is that permissions are assigned to individuals or systems that are authorized to access specific resources.  Access controls exist at various layers of the system, including the network.  Access control is implemented by logon ID and password.  At the application and database level, other access control methods can be implemented to further restrict access.  The application and database systems can limit the number of applications and databases available to users based on their job requirements.
7.1          User System and Network Access – Normal User Identification
All users will be required to have a unique logon ID and password for access to systems.  The user’s password should be kept confidential and MUST NOT be shared with management & supervisory personnel and/or any other employee whatsoever. All users must comply with the following rules regarding the creation and maintenance of passwords:

              Password must not be found in any English or foreign dictionary.  That is, do not use any common name, noun, verb, adverb, or adjective.  These can be easily cracked using standard “hacker tools”.
              Passwords should not be posted on or near computer terminals or otherwise be readily accessible in the area of the terminal.
              Password must be changed every (# of days). 
              User accounts will be frozen after (# of days) failed logon attempts.
              Logon IDs and passwords will be suspended after (# of days) days without use.

Users are not allowed to access password files on any network infrastructure component. Password files on servers will be monitored for access by unauthorized users.  Copying, reading, deleting or modifying a password file on any computer system is prohibited.

Users will not be allowed to logon as a System Administrator. Users who need this level of access to production systems must request a Special Access account as outlined elsewhere in this document.



 

Employee Logon IDs and passwords will be deactivated as soon as possible if the employee is terminated, fired, suspended, placed on leave, or otherwise leaves the employment of the company office.

Supervisors / Managers shall immediately and directly contact the company IT Manager to report change in employee status that requires terminating or modifying employee logon access privileges.

Employees who forget their password must call the IT department to get a new password assigned to their account.  The employee must identify himself/herself by (e.g. employee number) to the IT department.

Employees will be responsible for all transactions occurring during Logon sessions initiated by use of the employee’s password and ID.  Employees shall not logon to a computer and then allow another individual to use the computer or otherwise share access to the computer systems.
7.2          System Administrator Access
System Administrators, network administrators, and security administrators will have (type of access) access to host systems, routers, hubs, and firewalls as required to fulfill the duties of their job.

All system administrator passwords will be DELETED immediately after any employee who has access to such passwords is terminated, fired, or otherwise leaves the employment of the company.
7.3          Special Access
Special access accounts are provided to individuals requiring temporary system administrator privileges in order to perform their job.  These accounts are monitored by the company and require the permission of the user’s company IT Manager.  Monitoring of the special access accounts is done by entering the users into a specific area and periodically generating reports to management.  The reports will show who currently has a special access account, for what reason, and when it will expire.  Special accounts will expire in (X # of) days and will not be automatically renewed without written permission.
7.4          Connecting to Third-Party Networks
This policy is established to ensure a secure method of connectivity provided between the company and all third-part companies and other entities required to electronically exchange information with company.

“Third-party” refers to vendors, consultants and business partners doing business with company, and other partners that have a need to exchange information with the company.  Third-party network connections are to be used only by the employees of the third-party, only for the business purposes of the company.  The third-party company will ensure that only authorized users will be allowed to access information on the company network.  The third-party will not allow Internet traffic or other private network traffic to flow into the network.  A third-party network connection is defined as one of the following connectivity options:

              A network connection will terminate on a (to be specified) and the third-party will be subject to standard company authentication rules.

This policy applies to all third-party connection requests and any existing third-party connections.  In cases where the existing third-party network connections do not meet the requirements outlined in this document, they will be re-designed as needed.

All requests for third-party connections must be made by submitting a written request and be approved by the company.
7.5          Connecting Devices to the Network
Only authorized devices may be connected to the company network(s).  Authorized devices include PCs and workstations owned by company that comply with the configuration guidelines of the company.  Other authorized devices include network infrastructure devices used for network management and monitoring.

Users shall not attach to the network: non-company computers that are not authorized, owned and/or controlled by company.  Users are specifically prohibited from attaching (specify) to the company network.

NOTE: Users are not authorized to attach any device that would alter the topology characteristics of the Network or any unauthorized storage devices, e.g. thumb drives and writable CD’s.
7.6          Remote Access
Only authorized persons may remotely access the company network. Remote access is provided to those employees, contractors and business partners of the company that have a legitimate business need to exchange information, copy files or programs, or access computer applications.  Authorized connection can be remote PC to the network or a remote network to company network connection.  The only acceptable method of remotely connecting into the internal network is using a secure ID.



7.7          Unauthorized Remote Access
The attachment of (e.g. hubs) to a user’s PC or workstation that is connected to the company LAN is not allowed without the written permission of the company. Additionally, users may not install personal software designed to provide remote control of the PC or workstation. This type of remote access bypasses the authorized highly secure methods of remote access and poses a threat to the security of the entire network.
8              Penalty for Security Violation
The company takes the issue of security seriously.  Those people who use the technology and information resources of company must be aware that they can be disciplined if they violate this policy.  Upon violation of this policy, an employee of company may be subject to discipline up to and including discharge.  The specific discipline imposed will be determined by a case-by-case basis, taking into consideration the nature and severity of the violation of the Cyber Security Policy, prior violations of the policy committed by the individual, state and federal laws and all other relevant information.  Discipline which may be taken against an employee shall be administrated in accordance with any appropriate rules or policies and the company Policy Manual.

In a case where the accused person is not an employee of company the matter shall be submitted to the (company designee).  The (company designee) may refer the information to law enforcement agencies and/or prosecutors for consideration as to whether criminal charges should be filed against the alleged violator(s).
9              Security Incident Handling Procedures
This section provides some policy guidelines and procedures for handling security incidents.  The term “security incident” is defined as any irregular or adverse event that threatens the security, integrity, or availability of the information resources on any part of the company network.  Some examples of security incidents are:
              Illegal access of a company computer system.  For example, a hacker logs onto a production server and copies the password file.
              Damage to a company computer system or network caused by illegal access.  Releasing a virus or worm would be an example.
              Denial of service attack against a company web server.  For example, a hacker initiates a flood of packets against a Web server designed to cause the system to crash.
              Malicious use of system resources to launch an attack against other computer outside of the company network.  For example, the system administrator notices a connection to an unknown network and a strange process accumulating a lot of server time.
Employees, who believe their terminal or computer systems have been subjected to a security incident, or has otherwise been improperly accessed or used, should report the situation to their (company designee) immediately.  The employee shall not turn off the computer or delete suspicious files.  Leaving the computer in the condition it was in when the security incident was discovered will assist in identifying the source of the problem and in determining the steps that should be taken to remedy the problem.
 




































































































Perkara yang dicadangkan untuk ada di dalam laporan troubleshoot sesuatu rangkaian :

a.    Penggunaan CPU untuk Switch/Router
Petunjuk biasa penggunaan CPU yang tinggi dalam switch atau router termasuk:
»Peratusan tinggi dalam proses pameran output arahan cpu
» Menurunkan baris giliran
»Prestasi perlahan
» Perkhidmatan seperti Telnet, respons konsol, tindak balas ping, atau kemas kini gagal
»Fail buffer yang tinggi.

 Jika anda boleh menyambung ke router, maka anda boleh menggunakan arahan show processes untuk (Ciscorouters) untuk memeriksa sama ada penggunaan CPU tinggi kerana gangguan yang tidak dikenali atau proses.

Arahan:


* Boleh disimulasikan dengan penggunaan Packet Tracer 7 di dalam kelas.











b.    Penggunaan blok memori untuk Switch/Router
Memori adalah sumber yang terhad pada semua peranti rangkaian dan mesti dikawal dan dipantau untuk membantu memastikan pemanfaatan disimpan. Kegagalan peruntukan memori bermaksud sama ada peranti rangkaian telah menggunakan semua memori yang tersedia, atau memori telah berpecah sehingga peranti tidak dapat mencari blok memori yang boleh digunakan.
Untuk router Cisco, gejala kegagalan peruntukan memori termasuk, tetapi tidak terhad kepada:
1.    Mesej yang tertera di konsol atau mesej log: “%SYS-2-MALLOCFAIL: Memory allocation of 1028 bytes failed from 0x6015EC84, Pool Processor, alignment 0.
2.    Sesi Telnet yang dinafikan/refused.
3.    Arahan show processes tertera secara automatic tanpa mempedulikan semua arahan lain yang di taip di konsol.
4.    Tiada output yang dijana bagi sesetengah arahan ‘show’.
5.    Mesej ‘Low on memory’ tertera.
6.    Mesej di konsol tertera - “Unable to create EXEC - no memory or too many processes”
7.    Router ‘hang’ atau tiada respons/tindakbalas.

c.    Penggunaan interfaces/bandwith.
Pemantauan penggunaan jalur lebar keseluruhan untuk menentukan sama ada menghadapi masalah atau tidak adalah cara terbaik untuk memastikan kelangsungan rangkaian. Banyak sumber terbuka atau alat percuma dari pembekal pengurusan rangkaian wujud di pasaran yang sangat memudahkan proses pengumpulan data penggunaan jalur lebar dan membentangkannya dalam format grafik yang mudah digunakan. Contoh : SolarWind Real-Time Bandwith Monitor seperti di rajah bawah.



Atau dengan jika menggunakan ciscorouter, boleh dicari penggunaan bandwith ini melalui arahan ‘show interfaces’
* Boleh disimulasikan dengan penggunaan Packet Tracer 7 di dalam kelas.

Juga boleh memantau ip flow di dalam router.

* Boleh disimulasikan dengan penggunaan Packet Tracer 7 di dalam kelas.




               Di dalam sesebuah laporan keselamatan rangkaian mesti ada :


·         Struktur pecahan Kerja
Senarai kerja-kerja pelaksanaan ciri keselamatan yang perlu dilakukan bermula dengan fasa:
1.    analisa keperluan keselamatan,
2.    Perancangan (termasuk penentuan ciri keselamatan yang akan diimplemen, tarikh ujilari, tarikh audit)
3.    Kerja melancarkan/implementasi ciri keselamatan.
4.    Uji lari.
5.    Pengawasan/audit selepas implementasi.
Semua 1-5 mesti disertakan dengan tindakan oleh siapa.



·         Jadual dan garis masa
Carta gantt bagi setiap aktiviti. Yang dirancang dan juga sebenar.


·         Dokumentasi konfigurasi
Mesti terperinci beserta dengan semua langkah-langkah yang diambil dan gambar.

·         Senarai semak Kerja
Merangkumi semua kerja yang dilakukan.

·         Senarai risiko keselamatan rangkaian
1.    Apakah risiko-risiko yang telah di dapati dari analisa pemula sebelum ciri-ciri keselamatan dipilih.
2.    Apakah risiko-risiko baru yang di dapati setelah audit penggunaan.
3.    Cadangan mengatasi risiko-risiko yang baru.

































SOALAN:  

  1. Nyatakan definisi dokumentasi.









  1. Senaraikan prinsip-prinsip dokumentasi.























RUJUKAN:

  1. Laman web berkaitan :

·         eprints.utm.my/9495/1/AzhariAhmadMFSKSM2008.pdf
·         (Dewan Bahasa & Pustaka, 1987, hlm.131), definisi dokumentasi
·         ymukhlis.staff.gunadarma.ac.id/.../Dokumentasi.pdf
·         http://ms.wikipedia.org/wiki/Dokumen
·         http://www.pnm.my/pnmv3/upload_documents/DasarPengurusanDokumenTerperingkat.pdf