Preview

NT2580 Unit 5 Testing and Monitoring Security Controls

Good Essays
Open Document
Open Document
563 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
NT2580 Unit 5 Testing and Monitoring Security Controls
Testing and Monitoring Security Controls

A few different types of security events and baseline anomalies that might indicate suspicious activity

Different traffic patterns or influx in bandwidth usage can be considered suspicous activity. Or sevices changing port usage, in turn creating variaitons in normal patterns. A sudden increase in overall traffic. This may just mean that your web site has been mentioned on a popular news site, or it may mean that someone is up to no good. A sudden jump in the number of bad or malformed packets. Some routers collect packet-level statistics; you can also use a software network scanner to track them.

Large numbers of packets caught by your router or firewall's egress filters. Recall that egress filters prevent spoofed packets from leaving your network, so if your filter is catching them you need to identify their source, because that's a clear sign that machines on your network has been compromised. Unscheduled reboots of server machines may sometimes indicate their compromise. You should be already be watching the event logs of your servers for failed logons and other security-related events.

Log Files contain complete records of all security events (logon events, resource access, attempted violations of policy, changes in system configuration or policies) and critical system events (service/daemon start/stop, errors generated, system warnings) that can allow a admin to quickly discover the root cause of any issues.

Predictable passwords could be an issue too. User passwords are probably one of the most vulnerable ways to have a security breach. It is mostly due to weak passwords. Weak passwords being a minimum or 8 characters and not requiring a number and/or a special character. Ensure you emplement “strickt” password complexity standards.

Limit unauthorized use of network resources by allowing access during businiess hours only. Do not allow remote access permitions to anyone, except those that

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Lock the servers into their own room with keycard or fingerprint access only. Only authorized IT staff shall have access. Management, vendors and all other authorized guest shall be escorted by an authorized IT staff member. Video surveillance should be maintained and monitored at all access…

    • 424 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    You must demonstrate the various methods for using the runas utility to allow administrators to reduce the exposure of administrative accounts.…

    • 322 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Nt2580 Unit 2 Lab 1

    • 581 Words
    • 3 Pages

    With Google, it’s a little more complicated. There didn't used to be a single locker but now the Big G has taken care of that one with the launch of the Google Drive. You get 5GB of space plus 1GB of Picasa storage for free along with any space in your Docs and Gmail section. There's an apparent maximum storage space on the Google Drive itself up to 100GB but you can rent more space from…

    • 581 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Lab 1

    • 414 Words
    • 2 Pages

    Answer: Most likely the Hdrives and USB storage devices and/or any other computer hardware on the network.…

    • 414 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Lab 9

    • 1001 Words
    • 3 Pages

    Unauthorized access to data centers, computer rooms and wiring closets, servers must be shut down occasionally for maintenance causing network downtime, data can be easily lost or corrupt and recovering critical business functions may take too long to be useful.…

    • 1001 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    NT2580

    • 940 Words
    • 4 Pages

    The use of the company network, internet, and email services by Richmond Investments employees is permitted and encouraged where the use supports the goals and objectives of the business. However, Richmond Investments has a policy for the acceptable use of the network, internet, and email services where the employee must ensure that they:…

    • 940 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    For example, humans can inadvertently shut down a Web server or corporate gateway router by starting a computationally intensive application. An OLAP application that uses the operational DBMS can consume so many DBMS resources that order-entry transactions cannot get through. Denial-of-service attacks can be launched maliciously. A malicious hacker can flood a Web server, for example, with millions of bogus service requests that so occupy the server that it cannot service legitimate requests. Computer worms can infiltrate a network with so much artificial traffic that legitimate traffic cannot get through. Finally, natural disasters may cause systems to fail, resulting in denial of service.…

    • 4641 Words
    • 19 Pages
    Powerful Essays
  • Satisfactory Essays

    For users to remotely access data safely on company networks and computers it it important to have an…

    • 430 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Since the PBU network team discovered that a password sniffer application was somehow installed on a large portion of the computers in various university computer labs, and the attack came from inside the network as a User Datagram Protocol (UDP), then the team will need to concentrate on the data packets that were already sent through the UDP protocol and the packets that had already been processed as soon as the receiving system received the packets. Therefore, the whole system has been already compromised and the network specialist will need work on fixing the issue.…

    • 660 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Virus Essay

    • 437 Words
    • 2 Pages

    Identifying suspicious behavior from any computer program which might show infection. Such analysis may include data captures, port monitoring and other methods.…

    • 437 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    3) [3] Prasanta GogoiB, Borah,D K Bhattacharyya, Anomaly Detection Analysis of Intrusion Data using Supervised & Unsupervised Approach, Journal of AICIT, AICIT, vol.5, no.1, pp.95-111, 2010.…

    • 8046 Words
    • 32 Pages
    Powerful Essays
  • Satisfactory Essays

    Access Control List

    • 330 Words
    • 2 Pages

    All network users will be required to be authorized. This will be established by use of password and access restriction levels.…

    • 330 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Put Up Security Measures Such As Firewall & Proxy To Limit Access To Certain Networks.…

    • 329 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Computer Worms

    • 594 Words
    • 3 Pages

    Worms are one of the most ill-defined concepts in Network Security and are among the most common types of malware. They spread over computer networks by finding operating system vulnerabilities. Worms typically cause harm to their host networks by consuming bandwidth and shorting out web servers. Generally, the intent of the worm is to be malicious. There are some worms however, which do not have malicious intent. They are referred to as anti-worms.…

    • 594 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    security threats

    • 629 Words
    • 5 Pages

    Table 1 - Table identifying the top threats to the new customer rewards program at Kudler Fine Foods…

    • 629 Words
    • 5 Pages
    Satisfactory Essays