Preview

NT2580

Satisfactory Essays
Open Document
Open Document
331 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
NT2580
NT2580: Unit 5 Security Audits and Assessments
Nishaka Wickrama Arachchi
ITT Technical Institute
Torrance
NT2580 Fundamentals of Network Security
04/19/2015

Security Audits and Assessments
Identify at least two types of security events and baseline anomalies that might indicate suspicious activity.
* Authentication failures are one type of security event. A baseline anomalies that may indicate suspicious activity are unauthorized access attempts that can be found within log files. The log files contain records of all types of security events such as logon events, changes in system configuration and attempted violations of policy as well as system events like service startups and closures, errors and system warnings.
* A second security event could be a sudden increase in overall traffic. It could simply mean that your website has been mentioned by a popular source, or it could mean that someone is trying to cause harm to your site.
Given a list of policy violations and security breaches, select three breaches, and consider the best options for controlling and monitoring each incident. Identify the methods to mitigate risk and minimize exposure to threats or vulnerabilities.
* Problem: Removable storage drives introduce malware filtered only when crossing the network.
Solution: Limit user privileges that only include those that are required by the duties that are assigned to that individual. This will hopefully make it clear that no removable storage devices are to be connected to the network, no matter the circumstances unless they are screened first.
* Problem: Predictable passwords meet minimum requirements but remain easily guessable.
Solution: Create a recurring change of passwords, say once every few months, for your company. Have the passwords require a combination of numbers and letters, as well as a special character.
* Problem: Sensitive laptop data is unencrypted and susceptible to physical theft.
Solution: An obvious

You May Also Find These Documents Helpful

  • Satisfactory Essays

    This is when the hacker places a back door that could be done by installing a program that can give the hacker unlimited access to the database anytime which could compromise any important data such as customer personal information or even company information.…

    • 255 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT2670 Lab 5

    • 88 Words
    • 1 Page

    2. No you need to configure the URL and path for the media you want to show.…

    • 88 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    NT1430

    • 285 Words
    • 1 Page

    a. Sharing a Linux printer using Samba allows Windows and OS/2 clients to send print jobs to the printer.…

    • 285 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    NT1430

    • 369 Words
    • 2 Pages

    A bash script is a file containing a list of commands to be executed by the bash shell. Bash scripts have many uses that they can be used for. For example, you could write a simple bash script that will change the background color on your screen. Also with bash scripts, you can run them when you want to. They don’t have to be run right away, you have the freedom to do it when you want to.…

    • 369 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The next feature that I will suggest to Richman Investment would be Access control. Access control restricts access to network resources and would require the user to have privileges to the resources. This would go hand and hand with the first feature that I suggested. You will need this for the first feature that I picked to give the users proper permissions to resources and this will help keep users out that should not have access to the resource.…

    • 444 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Identify risks that could lead to an information security breach, Identify vulnerabilities in system security, software operation, network design or employee procedures that could lead to a network failure.…

    • 339 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Is3110 Week5 Quiz

    • 218 Words
    • 2 Pages

    4. As much as 80% of all incidents are a result of internal attacks. List four inappropriate usages from users.…

    • 218 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    NT1430

    • 942 Words
    • 4 Pages

    Students search and explore in the following places, finding resources that help them understand mail services in Linux.…

    • 942 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Lab 9

    • 1001 Words
    • 3 Pages

    1. What are some common risks, and vulnerabilities commonly found in the System/Application Domain that must be mitigated with proper security countermeasures?…

    • 1001 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    References: Johnson, Rob. with Merkow, Mike. Security Policies and Implementation Issues. First Edition. Copyright © 2011by Jones & Bartlett Learning, LLC, an Ascend Learning company…

    • 577 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    CompTIA A+ chapter 11

    • 723 Words
    • 3 Pages

    13. Which log in event viewer would you use to find out about attempted log ins to a computer?…

    • 723 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Security Breach Examples

    • 321 Words
    • 2 Pages

    Nowadays, security breaches are prevalent in our environment, both physical and logical. Different types of unauthorized access are conducted by different groups of individuals for different purposes.…

    • 321 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    We’re secure! We use passwords!” How many of us have heard this claim? Or even – “We’re secure! We have a password policy!” Use a password or to calculate the world today, the password policy is not enough. To set a password in most cases the first line of defence, and much more. “A recent survey by Rainbow Technologies Inc. indicates that the use of insecure passwords can be costly -- and potentially risky -- for corporate data.”[Rosencrance] This paper focuses on the use of passwords and password policy good aspects and bad aspects, set of defined passwords according to password polices scenario that arise…

    • 2513 Words
    • 11 Pages
    Powerful Essays
  • Powerful Essays

    Bibliography: American National Standards Institute. ANSI. Retrieved September 14, 2003 from the World Wide Web: http://www.ansi.org/…

    • 11231 Words
    • 85 Pages
    Powerful Essays
  • Powerful Essays

    projects in the area are presented. Finally, we outline the main challenges to be dealt with…

    • 8698 Words
    • 46 Pages
    Powerful Essays