Preview

Identifying Potential malicious Attacks

Satisfactory Essays
Open Document
Open Document
609 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Identifying Potential malicious Attacks
Tiffany Kearse
Identifying Potential Malicious Attacks, Threats and Vulnerabilities
CIS/333
Robert Whale
November 2, 2014

With any network organization you want to make sure that you keep on top of vulnerabilities of anything that reaches out to the internet. Computers and servers that touch the internet are ones that must be scanned. As a company you have to make sure that you configure the security settings for the operating system, internet browser and security software. As a company you also want to set personal security policies for online behavior. There also needs to be an antivirus installed on the network like Norton or Symantec which blocks threats targeting the vulnerabilities. With the firewalls you want to configure them in the reputable internet security program to block unsolicited request communication. Email server needs to be sure that spam doesn’t get through the network. The ways that spam works is unwanted email messages get solicited to a large number of recipients.
Spam should be a major concern in your infrastructure since it can be used to deliver email which can include Trojan horses, viruses, worms’ spyware and targeted attacks aimed specifically in obtaining sensitive and personal identification information. Microsoft Outlook has some known security risks. However, “most of the security configurations would be set on the Exchange server and passed down to all client. With the organization running Windows 2008 domain controllers with an integrated Active Directory and an Exchange server for email functions, there are risks associated specifically to those types of operating systems. If you do not keep on top of the systems and do the necessary protocols, you may be at risk.
The security controls that I would consider implementing are physical computer security policies such as physical access controls, computer security management and policies, and contingency disaster and recovery plans and tests. For



References: Kim, D., & Solomon, M. (2013). Fundamentals of information systems security (2nd ed.). Sudbury, MA: Jones and Bartlett. http://malwarelist.net/2014/11/02/serious-vulnerability-in-sony-playstation-network/ http://www.syndicateinfo.com/data-loss-and-data-theft/

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Finally, the system/application domain would require virtual testing of everything before any implementation, hardening of all servers, and keeping up with patches and updates regularly after testing has been completed. Some of the more efficient ways to implement better access controls in a company would start with the proper level of authorization policies including physical controls for facilities. The authorization policy would appropriate entry system access controls that specify what areas are to be locked at all times and what type of locking mechanism should be implemented. It would also include the implementation of secondary locks on specific equipment and storage cabinets…

    • 439 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Educate facility not to open email from unknown users and not to click on links in emails from unknown users.…

    • 508 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    It244 R Appendix E

    • 650 Words
    • 3 Pages

    Describe the policies for securing the facilities and the policies of securing the information systems. Outline the controls needed for each category as relates to your selected scenario.…

    • 650 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    For the LAN domain, inform employees about email scams. Most users know not to open emails when on our system. Spam filters can help control junk email, so there is less risk of opening emails containing malware.…

    • 337 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    A lot of networks have an email service, which allows people to communicate with each other. For a company, this is an advantage because employees can share sensitive information privately within the network.…

    • 1327 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    Nt2580 Project 1

    • 492 Words
    • 2 Pages

    For the LAN domain, we need to have annual training about fictitious emails. Most users know not to access unknown emails when on our system but a brief training course will assist in this matter. Also, adding spam filters will help rid of most junk email, so there is less risk of employees opening emails which may contain malware. In the LAN-to-WAN domain, we need to power off FTP servers running then switch over to the use of secure FTP servers so that only users allowed on our system can access them.…

    • 492 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    It255 Project Part 1

    • 634 Words
    • 3 Pages

    References: David Kim., and Michael G. Solomon. Fundamentals of Information Systems Security , 2012: Sudbury, MA 2012…

    • 634 Words
    • 3 Pages
    Better Essays
  • Good Essays

    Apply email server and attachment antivirus/malware and email quadrating for unknown file types. Disable for ping, probing, and port scanning on all exterior IP devices. Denying of outbound traffic using source IP addresses. Apply file transfer monitoring, scanning and alarming for unknown file types. Web Surfing should be monitored by filtering out any unknown IP address with trusted cites. Apply domain-name content filtering at the internet entry/access point as well.…

    • 313 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Mis 589 11 & 12 Mini Cases

    • 1102 Words
    • 5 Pages

    Then I would identify the assets. In this case, the assets I worry about most are hardware, network software, client software, data and mission critical applications. The hardware that I am concentrated on is the mail servers, web servers, and client computers and ATMs connected to them. As far as network software, I look at the application software (mail server and web server) along with server operating systems and system settings. With client software, it’s the overall operating systems and system settings. Organizational data and storage is the focus; the databases with records. The mission critical applications are the company website and financial database with spreadsheets/personal history/ applications and appraisals; along with transaction history. At the top of the list; is the mission critical applications necessary to conduct business/ for business survival. Next, is the organizational data, client software, hardware, and network software. As far as threats, the biggest threats in order of dollar loss and likelihood of occurrence are intrusion (internal, external and eavesdropping/hacking), sabotage, fraud, theft of information, denial of service, virus, theft of equipment and finally…

    • 1102 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    Project Pt 1

    • 338 Words
    • 2 Pages

    6.) WAN Domain proposal: Scan all e-mail attachments for type, antivirus, and malicious software at the LAN-to-WAN Domain. Isolate and quarantine unknown file attachments until further security review is conducted. Provide security awareness training to remind employees of dangers…

    • 338 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    lab 2

    • 398 Words
    • 2 Pages

    3. If you were using corporate e-mail for internal and external communications but did not want to encrypt an e-mail message, what other security countermeasure can you deploy to ensure message integrity?…

    • 398 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT2580

    • 526 Words
    • 5 Pages

    Introduction to Information Security © ITT Educational Services, Inc. All rights reserved. Page 2 Key Concepts  Attacks, threats, and vulnerabilities in a typical IT infrastructure …

    • 526 Words
    • 5 Pages
    Satisfactory Essays
  • Good Essays

    References: Johnson, Rob. with Merkow, Mike. Security Policies and Implementation Issues. First Edition. Copyright © 2011by Jones & Bartlett Learning, LLC, an Ascend Learning company…

    • 577 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    War Driving Attack

    • 4214 Words
    • 17 Pages

    The organisational security is locked down. No more false alarms at 4:00am, of an impending internet intrusion. Thanks to a well-configured firewall, you 're stopping a large percentage of the causes of network breaches -- but despite the organisational security precautions. The problem is not with your firewall, these network-level security devices are designed for perimeter protection, and by definition they cannot stop attacks that originate inside your network!…

    • 4214 Words
    • 17 Pages
    Powerful Essays
  • Satisfactory Essays

    The company should make sure that their system is protected and safe from any viruses, so the company must install anti-virus software and do regular update for it to ensure that their system is safe well. Also the company should always make a back-up for its data and never switch off the firewall.…

    • 1044 Words
    • 5 Pages
    Satisfactory Essays