Preview

is4680 lab #2

Good Essays
Open Document
Open Document
630 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
is4680 lab #2
Is4680 Week 1 Lab Executive Summery
Lab #2: Executive Summary
Windows Hardening Defense, starts with the basics, Log in with least amount of privileges. Always use Firewall and AV. Monitor channels for security advisories and alerts. Know your system(s). Patch early and patch often, Unpatched Systems are the lowest of low hanging fruit. Have a patch policy documented and stick with it. Review patches as they are released and determine criticality based on the exploit, threat footprint for your system(s), and whether or not there is a POC or fully weapon exploit in the wild. When possible, test patches before rolling out in production on servers. Most clients should have automatic updates enabled for the OS and any application listening on a socket or used with untrusted data (java, adobe, browsers, etc...) Servers should be updated during maintenance windows if possible and depending on criticality (of threat and server).
Security Technical Implementation Guide is a Compendium of DOD Policies, Security Regulations and Best Practices for Securing an IA or IA-Enabled Device (Operating System, Network, Application Software, etc.) A Guide for Information Security. Mandated in DODD 8500.1, DODI 8500.2 and endorsed by CJCSI 6510.01, AR 25-2, and AFI 33-202. The goals of STIG are to provide Intrusion Avoidance, Intrusion Detection, Security Implementation Guidance, Response and Recovery.
DISA STIGs offers configuration guides and checklists for: Databases, Operating Systems, Web Servers, Etc... Also provides standard “findings” and impact ratings CAT I, CAT II, CAT III. First draft November 2006; first release July 2008. 129 requirements covering: Program Management, Design & Development, Software Configuration Management, Testing and Deployment. ASD STIG applies to “all DoD developed, architected, and administered applications and systems connected to DoD networks”. Essentially anything plugged into DoD. Requirements can be extremely broad: APP3510: The Designer



Citations: http://www.disa.mil/ and http://iase.disa.mil/stigs/index.html#

You May Also Find These Documents Helpful

  • Satisfactory Essays

    IT220 Lab 7

    • 303 Words
    • 2 Pages

    The benefits of a partial in the cost and a full meh would be required where large sums of money and data are exchanged and can have almost none down time.…

    • 303 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Is589

    • 325 Words
    • 2 Pages

    #1: Now we need to find out how long does it take to transmit one label over the cell network, assuming that the cell phone network operates at 14 kbps:…

    • 325 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Netw 310 Lab #1

    • 257 Words
    • 2 Pages

    1. There are three patterns outlined on the screen. Which one of these is identifying the noise floor?…

    • 257 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Hollis IS3230 Unit 3 Lab3

    • 766 Words
    • 4 Pages

    1. What is the Data Classification Standard used in the U.S. Department of Defense (DoD)/Military?Google “Data Classification Standard + DoD”. Summarize the different data classifications.…

    • 766 Words
    • 4 Pages
    Good Essays
  • Better Essays

    SANS - Information Security Resources | Information Security Policy Templates |. (n.d.). Retrieved from http://www.sans.org/security-resources/policies/…

    • 4134 Words
    • 12 Pages
    Better Essays
  • Satisfactory Essays

    Is418 Lab8

    • 309 Words
    • 2 Pages

    How can one ensure a download tar ball is legitimate and hasn’t been tampered with?…

    • 309 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    RLOT2 Task 2 B rev 1

    • 569 Words
    • 2 Pages

    The only zero cost opportunity, standardizing polices and procedures, is also the most difficult. Processes for incident response, patch management, and preventative maintenance must be developed, refined and communicated to the appropriate staff. Incident response processes must further be exercised so all incident responders know exactly what to do in the event of a (D)DoS. Development and deployment policies must be developed defining the process for development and deployment and use of University owned and managed computing devices. Security must be forefront-outlining security in the software development life cycle (SDLC) for both University developed applications and off the shelf applications.…

    • 569 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    IS4560 part 6

    • 474 Words
    • 2 Pages

    My defense plan at AHC will include a counter attack from external and internal threats; the vulnerability and security threats that exist inside AHC IT infrastructure. In order the deal with these kinds of threats, we will need to train and create and incident report and handling plan with our IT management. I will also help them to create and implement a more secure and dependable Disaster recovery plan that will be available somewhere offsite. My team will setup an incident guideline and procedure that AHC can follow whenever the system is breach or any kind of natural disaster occurred. Some of these examples are Malware, viruses, worms, Trojans and hacking attacks take place or security breach from an inside employee. The external attackers can be counter by our Intrusion detection systems but can be block by our firewall and Intrusion prevents systems. We will fortify our application securities as well with the implementation of a strong access control list. This is an outline we will Use TCP/IP and IPsec filters for defense in depth. Configure IDS to prevent information disclosure through banner grabbing. Use IDS that can be configured to pick up foot printing patterns and reject suspicious traffic. You can put tight constraints on user inputs. But the best method of preventing SQL injection is to avoid the use of dynamically generated SQL in your code. Instead use stored or canned procedures. Raising security awareness also help members of an organization possess regarding the protection of the physical and especially, information assets of that organization. Many organizations require formal security awareness training for all workers when they join the organization and periodically thereafter, usually annually. I will set the router and firewall ACLs to block all inbound access that is not specifically required, especially to the windows specific ports. Always ensure that…

    • 474 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt2580 Project 1

    • 492 Words
    • 2 Pages

    For the systems/application domain, we must lessen chances for attacks on our servers. This shall be done by figuring out which ports and services are not being used and shutting them off. This gives hackers less ways onto our system. Also needed is to make sure all servers have the latest patches and updates. These updates provide the latest security patches with less likelihood of vulnerabilities.…

    • 492 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    FunSec2 SLM Lab04 Final

    • 295 Words
    • 2 Pages

    4. What sources could you use as a source to perform the MBSA security state?…

    • 295 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    CMGT582 Wk2 IA

    • 1133 Words
    • 4 Pages

    A Security Technical Implementation Guide (STIG) is a systematized secured installation and maintenance approach to computer hardware and software. DISA which designs configuration documents in support of DoD, had first coined the phrase under instructions by DoD.…

    • 1133 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    IS3440 Lab 1

    • 364 Words
    • 2 Pages

    For this kind of scenario, I would have to create a server from scratch so I can be able to identify any types of vulnerabilities on any of these server requirements stated below. Any of these can be at risk at any time, so creating a new server from scratch would be most recommended. Because it is kind of safer than Windows because most viruses and worms are written for Windows but it doesn’t mean Linux can be attacked.…

    • 364 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    IS3120 Unit 3

    • 650 Words
    • 2 Pages

    speeds of at least 100 megabits per second and actual upload speeds of at least 50…

    • 650 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    USASOC Pam 25-3, DCSIM User’s Reference Guide. d. USASOC Pam 25-4, Hardware and Software Standards for Desktop and Portable computers. e. USASOC Reg 25-70, ASOCNet Security. f. USASOC Reg 25-71, Redistribution and Reporting Excess Information Mission Area Equipment. g. USASOC Reg 380-3, Malicious Software.…

    • 2469 Words
    • 13 Pages
    Powerful Essays
  • Satisfactory Essays

    Srs - Bb

    • 13822 Words
    • 56 Pages

    The Software Requirement Specifications (SRS) provide detailed information regarding the functionality of the software. These requirements are based on the intended uses detailed in Appendix F and the Safety Critical Requirements detailed in Appendix G. A variety of tools are available for use in meeting these specifications. In general, the data dictionary for specific files provides a great deal of control through the data type, pattern matches, and input transform requirements. However, specific algorithms have been included in the software routines where appropriate and Kernel Security and Menu Management provides additional tools (i.e., menu access and security keys for meeting the specifications). As with the file structure and the rest of…

    • 13822 Words
    • 56 Pages
    Satisfactory Essays