Port 443- HTTPS
To run port scans all you need is access to the LAN and/or subnet
Technet.microsoft.com/en-us/security/advisory
Mitigate vulnerabilities
Threats are things you have to respond to effectively.
Threats are controllable
Risks are manageable
Vulnerabilities can be mitigated
All affect the CIA triad
Not all threats are intentional
Confidentiality, integrity, accessibility = CIA
Starting on pg 161
DAC- only as secure as the individuals understanding. Access determined by owner.
MAC- access determined by data classification itself. data itself has a classification. Need to be cleared to the level of the data security. Also has a “need to know” aspect to it.
Non DAC- third party determines the permissions.
Role based- pg 166. Access determined on the job of the user.
Rule based- variation of DAC. Rules are created and access is based on the rules created.
Week of 4/17/13
Starts on pg 146
Project- search SSCP CBK on the library under 24/7
Each of the 7 domains, vulnerabilities in each, security used in each to control,
For lab 5---
Make 4 types of connections. 2 secure 2 not secure. telnet, securenet, ssh, and ftp.
Will need 3 machines.
Student, Target, ubuntu 1
Wireshark setting to capture a file in promiscuous mode on student. Do an FTP to target windows.
Command prompt from student to ubuntu. Try to log in.
Do questions. Question 9, focus on SSH and what traffic you are getting.
Assignments—
Week of 5/1/13
Acronyms-
Pg263
BCP- Business Continuity Plan
DRP- Disaster Recovery Plan
Pg266
BIA- Business Impact analysis
Pg256
SRE
ARO
ALE
Pg258
Dealing with risk
BCP A plan designed to help an organization continue to operate during and after a disruption Covers all functions of a business, IT systems, facilities, and personnel Generally includes only mission-critical systems
BCP Elements Purpose and scope Assumptions and planning