Application of Security

Only available on StudyMode
  • Download(s) : 207
  • Published : October 29, 2012
Open Document
Text Preview
Unit 2: Application of Security Countermeasures to Mitigate Malicious Attacks

Learning Objective

Describe how malicious attacks, threats, and vulnerabilities impact an IT infrastructure.

Key Concepts

Attacks, threats, and vulnerabilities in a typical IT infrastructure

Common security countermeasures typically found in an IT infrastructure

Risk assessment approach to securing an IT infrastructure

Risk mitigation strategies to shrink the information security gap

Reading

Kim and Solomon, Chapter 3: Malicious Attacks, Threats, and Vulnerabilities.

Kim and Solomon, Chapter 4: The Drivers of Information Security Business.

Keywords

Use the following keywords to search for additional materials to support your work:

Common Vulnerabilities and Exposures (CVE)

Risk Management

Risk Mitigation

Security Countermeasures

Window of Vulnerability (WoV)

Servers to have running
* Windows DHCP
* Server 2003 Target
* Ubuntu Desktop
* Ubuntu Server

-------------------------------------------------
Week 2
Assignment
* Calculate the Window of Vulnerability (See Below)
* Microsoft Environment Analysis (See Below)
Lab
* Conduct a Vulnerability Assessment Scan Using Nessus®
* Lab book pages 15 – 27
* Screenshots and answer questions on pages 26-27
Project (Part 2 Due Week 11)
* Project Part 2. Student SSCP® Domain Research Paper
-------------------------------------------------

Unit 2 Assignment 1: Calculate the Window of Vulnerability

Learning Objectives and Outcomes

You will learn how to calculate a window of vulnerability (WoV).

Assignment Requirements

You are reviewing the security status for a small Microsoft workgroup LAN. The workgroup contains many distinct separations in the network determined by group memberships. An example of the network divisions is as follows:

Windows laptops: Traveling salespeople, remote suppliers, branch offices

Windows desktops: Accounting group, developer group, customer service group

Windows servers: Administrative server, Microsoft SharePoint server, Server Message Block

(SMB) server

A security breach has been identified in which the SMB server was accessed by an unauthorized user due to a security hole. The hole was detected by the server software manufacturer the previous day. A patch will be available within three days. The LAN administrator needs at least one week to download, test, and install the patch. Calculate the WoV for the SMB server.

Required Resources

None

Submission Requirements

Format: Microsoft Word

Font: Arial, Size 12, Double-Space

Length: 1 page

Due By: Unit 3

Self-Assessment Checklist

I have accurately calculated the WoV.

Unit 2 Assignment 2: Microsoft Environment Analysis

Learning Objectives and Outcomes

You will learn how to analyze a mixed-version Microsoft Windows environment and to identify the issues described in Microsoft Security Advisories.

Assignment Requirements

You are reviewing the security status for a small Microsoft workgroup LAN. The workgroup contains many distinct separations in the network as determined by group memberships. The network consists of computers working on a variety of client platforms, such as Windows XP, Windows Vista, and Windows 7, and server products in a single environment. An example of the network divisions is as follows:

Windows laptops: Traveling salespeople, remote suppliers, branch offices

Windows desktops: Accounting group, developer group, customer service group

Windows servers: Administrative server, Microsoft SharePoint server, Server Message Block

(SMB) server

Microsoft Common Vulnerability and Exposures (CVEs) are addressed through security advisories with a corresponding advisory ID. Other CVE sources attach a CVE ID to advisories. Go through the archive of...
tracking img