Preview

IS3110 U5D1

Good Essays
Open Document
Open Document
712 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
IS3110 U5D1
Risk Assessment and Risk Mitigation Control
By
Thomas Fletcher
IS3110

There are several different types of controls that you can take advantage of for securing your servers. Below are official guidelines from the (National Institute for Standards and Technology), or NIST.

Securing the Server Operating System
This is extremely important. If an OS has a know vulnerability and is not patched, it could lead to many problems. Once an OS is installed, applying needed patches or upgrades to correct for known vulnerabilities is essential. Any known vulnerabilities an OS has should be corrected before using it to host a server or otherwise exposing it to malicious users. Below are some ways to harden the server OS.

Remove unnecessary services, applications, and network protocols to reduce exploits on applications you commonly are not using.
Configure OS user authentication to minimize unwanted intrusion.
Configure resource controls appropriately to ensure that information is going to whom it should go to.

Securely Installing Server Software
This is a lot like hardening the OS in respect that you are making sure that software stays up to date to ensure that known exploits are being addresses. Any unnecessary applications, services, or scripts that are installed should be removed immediately once the installation process is complete. Below are some things that you can do to harden software.

Install the server software either on a dedicated host or on a dedicated guest OS if virtualization is being employed.
Apply any patches or upgrades to correct for known vulnerabilities in the server software.
Create a dedicated physical disk or logical partition (separate from OS and server application) for server data, if applicable.
Remove or disable all services installed by the server application but not required (e.g., gopher, FTP, HTTP, remote administration)

Install and Configure Additional Security Controls
This could be anything that you would like to

You May Also Find These Documents Helpful

  • Powerful Essays

    Privileged Users will be presented the ROB for Users with Privileged Access to Information Systems. Non-Privileged Users are required to select the appropriate ROB at first login per database prior to receiving access to the application. If a user elects to decline the ROB, access to…

    • 1211 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    IS3445 Project Part 5

    • 343 Words
    • 2 Pages

    There is also principle that should be followed when securing an application. They are minimize attack surface area, establish secure defaults, employ the principles of least privilege and defense in depth, fail securely, and not trusting services. There are also principles such as having a policy of separation of duties, avoiding security by obscurity, keeping security simply, and fixing security issues correctly.…

    • 343 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    ISSC 363 Week 2 Quiz

    • 320 Words
    • 2 Pages

    After implementing several security controls, what should be done to ensure the controls are performing as expected?…

    • 320 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Scenario Three

    • 791 Words
    • 4 Pages

    Proper operating system patching would have to be done as well to reduce the risk of software vulnerabilities. Patching could be done from an internal update server like Microsoft’s WSUS server so that a connected system would contact the internal server at a scheduled time and pull down the appropriate updates it needs for the software that is installed. There are also many third party tools, like GFI’s LanGuard, that can be used to scan systems for vulnerabilities and patches and install them on demand without having to wait for a scheduled time to download (GFI, 2012).…

    • 791 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    The basic strategies of attack surface reduction are to reduce the amount of code running, reduce entry points available to untrusted users, and eliminate services requested by relatively few users. One approach to improving information security is to reduce the attack surface of a system or software. By turning off unnecessary functionality, there are fewer security risks. By having less code available to unauthorized actors, there will tend to be fewer failures. Although attack surface reduction helps prevent security failures, it does not mitigate the amount of damage an attacker could inflict once a vulnerability is found.[3]…

    • 348 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Hardening servers, desktops, laptops and mobile devices through their configuration by turning off unused services. Constraining remote access and other convenience features; setting administrator and user identities; defining execution policy for required applications.…

    • 746 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Information Technology

    • 389 Words
    • 2 Pages

    Services that do not authenticate clients, services that use insecure protocols, or services that run with too much privilege are risks. If you do not need them, do not run them. By disabling unnecessary services you quickly and easily reduce the…

    • 389 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Starting with the first action, installing firewalls and anti-virus, the article "Firewalls" goes in-depth about how these are important here "While firewalls filter and limit incoming transmission of data that tries to access the system, anti-virus software looks at how the data affects your system". This shows why it's critical to have both a firewall and anti-virus software installed. If you install only a firewall then as soon as its been breached, whoever invaded your system has access to all of your files and personal info with no anti-virus to stop them. It's the same for firewalls, if you are without one, the virus can access your device much easier than a device with both anti-virus and a firewall installed. It's very important to have both installed for maximum security to deter hackers, scammers, and spy…

    • 601 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    iss project0

    • 376 Words
    • 1 Page

    2. Other than installing virus and worm control software, what can SLS do to prepare for the next…

    • 376 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    The measures could be to use firewalls; a firewall is either a software application or a hardware device. It acts as a shield between your computer/s and the rest of the Internet. The purpose of this is to control and keep safe of all the incoming and outgoing network traffic by carefully checking the data packets and…

    • 522 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    3. Where possible use secure methods for remote access. I.E. Use SSH in place of Telnet, secure web servers, SCP in place of FTP.…

    • 254 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Pci Quick Guide

    • 7658 Words
    • 31 Pages

    The intent of this document is to provide supplemental information, which does not replace or…

    • 7658 Words
    • 31 Pages
    Powerful Essays
  • Good Essays

    Malware

    • 483 Words
    • 2 Pages

    For maximum security, create an "air gap" between sensitive data and the Internet. To protect confidentiality and integrity, do not connect computers that store sensitive information to the Internet or other public networks. Any computer connected to the Internet is exposed and possibly vulnerable to a huge number of attacks.…

    • 483 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Fix Open Vulnerabilities –These vulnerabilities are in operating systems, applications, web browsers, and virtualized platforms. If you can stay on top of the vulnerabilities that are critical to your organization then you can mitigate a lot of the risk of outside attackers targeting insiders.…

    • 962 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    With the choices of vendors available (Red Hat, Novell, or Canonical/Unbuntu), there are only two that do a great job regarding the customization for enterprise-ready systems; Red Hat and Unbutu. With these distribution-specific kernels, security issues that are related to them vary. With that now mentioned, you may not want to do a recent security update as soon as it comes available, as it may not be needed in your network environment. The main thing that cannot be stress enough (with both vendor –specific distributions & stock kernels) is that updates need to be thoroughly tested within a “test” environment. Prior to testing, a plan needs to be written up and discussed so that all possible threats are exposed to the system, so that these can be confirmed as mitigated. The key is to test, test, & test the updates prior to rolling them out to a production environment.…

    • 266 Words
    • 1 Page
    Satisfactory Essays