Preview

Nt1310 Unit 3 Data Management Information System

Good Essays
Open Document
Open Document
1000 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Nt1310 Unit 3 Data Management Information System
Using weak passwords, Unencrypted data storage, passing clear text credentials over the network, using weak authentication mechanisms, allowing prolonged session lifetime Access to credentials through data theft, access to authenticated user session, attacker can do network eavesdropping, brute force attacks, dictionary attacks, cookie replay attacks Use strong password policies, do not store credentials in insecure manner, use authentication mechanisms, encrypt communication channels, use secure HTTP(HTTPS) only with Forms authentication cookies Storing secrets in clear text in files, registry, or configuration, Passing sensitive data in clear text over networks, Storing secrets when you do not need to Attacker Network eavesdropping, configuration file sniffing, attacker can read sensitive data out of memory or from local files Confidentiality Do not store secrets in software, Encrypt sensitive data over the network, Secure the channel, Encrypt sensitive data in configuration files Outdated security patch, using vulnerable old version of software, downloading from or browsing un-trusted web-sites, antivirus without latest updates, disabled firewall Hacker Stealing or hacking of personal devices, malware or virus, eavesdropping, sniffing through endpoints, web Session Hijacking Device management …show more content…
Use least-privileged accounts, consider the granularity of access, enforcing separation of privileges, secure the system resources against system identities DB system having multiple administrators Using insecure custom administration interfaces, insecure configuration of files on the server, storing sensitive information in the clear text form, using overprivileged process accounts and service accounts Hacker Unauthorized access to configuration stores, Retrieval of clear text configuration secrets Encrypt sensitive sections of configuration files, secure settings for various operations of web services using configuration files, usage of access control lists

You May Also Find These Documents Helpful

  • Good Essays

    Nt1330 Unit 1 Case Study

    • 776 Words
    • 4 Pages

    Security: Web applications are typically deployed on dedicated servers, which are monitored and maintained by experienced server…

    • 776 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    | * Patch history * VPN * Firewall * Stateful Inspection * Whitelists-Blacklists * Boundary Encryption * Backups and archiving…

    • 409 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Lab 7 & 8

    • 1094 Words
    • 5 Pages

    4. What is a recommended best practice when implementing a Remote Access Policy server user authentication service?…

    • 1094 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    In the WAN domain, enforce encryption, and VPN tunneling for remote connections. Configure routers, and network firewalls to block Ping requests to reduce chance of Denial of Service attacks. Deployment of…

    • 386 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    * Remote access must be secure and strictly controlled. Enforcement of control will be via password authentication or private/public keys with strong pass-phrases.…

    • 399 Words
    • 2 Pages
    Good Essays
  • Better Essays

    VUT2 Task 1 Memo CheckList

    • 1884 Words
    • 7 Pages

    password sniffer, data extractor, ransom hijacker, and so much more) on the user’s computer (keeping in…

    • 1884 Words
    • 7 Pages
    Better Essays
  • Satisfactory Essays

    week 3 lab

    • 350 Words
    • 2 Pages

    1. Enforce Password. This makes it so you cannot use the same password more than once or more than 10 times, etc. When you change your password, it cannot be the password you were just using.…

    • 350 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    First and for most this process I found out seems like a whole lot of hassle so I don’t understand why people would do this and just get caught in the end. But I will be listing 5 general phases of a computer attack that one would have to go through to be successful in other words jumping through hoops that are on fire.…

    • 377 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Week 5 Quiz

    • 531 Words
    • 3 Pages

    Limit what services are running on the server to only what is absolutely needed, use unique id/strong password in combination with principle of least privilege to help prevent unauthorized access, use up-to-date anti-malware software, use firewalls to prevent unauthorized access, use intrusion detection software to monitor for unauthorized access…

    • 531 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    up north fishing

    • 544 Words
    • 3 Pages

    Keep up to date software and use methods when coding to prevent attacks. Test the server for vulnerabilities weekly. Configure the web services using best practices.…

    • 544 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    1. File and share permissions that give up everything to everyone -- This is easily the biggest vulnerability I'm seeing with Windows systems regardless of the type of system or Windows version. Users who create shares to make their local files available across the network are typically the culprits. Sometimes it's careless admins; other times they're honest mistakes. Unfortunately, all too often the "Everyone group" is given full access to every file on the system. Then, all it takes is for an insider to search for sensitive keywords stored in .pdf, .xls, .doc and other file formats using a text search tool such as Effective File Search or FileLocator Pro. Odds are -- nearly 100% of the time -- the attacker will come across sensitive information (SSNs, credit card numbers, you name it) that they shouldn't have access to. Best case scenario, this is an identity theft in the making. Worst case, this becomes a serious breach that…

    • 2361 Words
    • 7 Pages
    Powerful Essays
  • Powerful Essays

    Cyber Espionage

    • 3589 Words
    • 15 Pages

    | involves the unauthorized probing to test a target computer’s configuration or evaluate its system defenses, or the unauthorized viewing and copying of data files.…

    • 3589 Words
    • 15 Pages
    Powerful Essays
  • Good Essays

    o Altering of software settings and/or intentional introduction of malicious software in order to circumvent network security.…

    • 855 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    IT personnel, students, and staff are also considered security risks and therefor the proper level of user security awareness training, workshops, and seminars should be provided to users on the network. Other security measures such as an acceptable usage policy and password policies should be properly implemented to ensure users are responsible for and understand their actions on the network. In addition, it would be best practice to implement the…

    • 341 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Computer Security

    • 768 Words
    • 4 Pages

    There are several sources of computer threats. According to Fleegar (2007), the sources these threats could either be internal or external. The threats circumvent computers security without prior authorization by rightful user. Internal security risks mainly arise from viruses and physical compromise of storage system (Gasser, 2008) e.g. damaged hard disk. External security risks are mainly from a third person e.g. hacker or a thief. There are mainly three aspects of information that can be compromised. These are Confidentiality, integrity and Availability. These aspects have been discussed below with respect to aim of security, possible attacks and their sources and counter attack measures that should be employed.…

    • 768 Words
    • 4 Pages
    Powerful Essays