Preview

Application of Security

Powerful Essays
Open Document
Open Document
1506 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Application of Security
Unit 2: Application of Security Countermeasures to Mitigate Malicious Attacks

Learning Objective

 Describe how malicious attacks, threats, and vulnerabilities impact an IT infrastructure.

Key Concepts

 Attacks, threats, and vulnerabilities in a typical IT infrastructure

 Common security countermeasures typically found in an IT infrastructure

 Risk assessment approach to securing an IT infrastructure

 Risk mitigation strategies to shrink the information security gap

Reading

 Kim and Solomon, Chapter 3: Malicious Attacks, Threats, and Vulnerabilities.

 Kim and Solomon, Chapter 4: The Drivers of Information Security Business.

Keywords

Use the following keywords to search for additional materials to support your work:

 Common Vulnerabilities and Exposures (CVE)

 Risk Management

 Risk Mitigation

 Security Countermeasures

 Window of Vulnerability (WoV)

Servers to have running * Windows DHCP * Server 2003 Target * Ubuntu Desktop * Ubuntu Server

-------------------------------------------------
Week 2
Assignment
* Calculate the Window of Vulnerability (See Below) * Microsoft Environment Analysis (See Below)
Lab
* Conduct a Vulnerability Assessment Scan Using Nessus® * Lab book pages 15 – 27 * Screenshots and answer questions on pages 26-27
Project (Part 2 Due Week 11) * Project Part 2. Student SSCP® Domain Research Paper
-------------------------------------------------

Unit 2 Assignment 1: Calculate the Window of Vulnerability

Learning Objectives and Outcomes

 You will learn how to calculate a window of vulnerability (WoV).

Assignment Requirements

You are reviewing the security status for a small Microsoft workgroup LAN. The workgroup contains many distinct separations in the network determined by group memberships. An example of the network divisions is as follows:  Windows laptops: Traveling salespeople,

You May Also Find These Documents Helpful

  • Better Essays

    In order for ZXY Inc. to make sure that their entire organization is secure, some proposals have been put into place to protect the company. The company needs to make sure that the network, their employee’s, company devices, and communications are secure from the outside world. The proposals that have been put into place cover such areas as: access control methods, authentication, user’s accounts and passwords, cryptography, remote access, network attack mitigation, malware and device vulnerabilities, and web and e-mail attack mitigation. These proposals when combined together help form an entire security policy for ZXY Inc. to use in order to protect all company assets.…

    • 3217 Words
    • 13 Pages
    Better Essays
  • Satisfactory Essays

    Lab 2 Instructions

    • 389 Words
    • 2 Pages

    You are reviewing the security status for a small Microsoft workgroup LAN. The workgroup contains many distinct separations in the network as determined by group memberships. The network consists of computers working on a variety of client platforms, such as Windows XP, Windows Vista, and Windows 7, and server products in a single environment. An example of the network divisions is as follows:…

    • 389 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Safeguarding Case Study

    • 615 Words
    • 3 Pages

    1. Leroy may be the victim of neglect as there is evidence that his parents are persistently failing to meet his basic physical and psychological needs and that this is likely to cause impairment to his health and development. HM Government (2006). Maccoby and Martin (1983) assert that a child may suffer neglect if that child’s needs form a low priority within the family unit. In addition to neglect, Leroy may well be the experiencing emotional abuse. Emotional abuse involves the “persistent maltreatment of a child such as to cause severe and persistent effect on their emotional development.” HM Government (2006:39). This may include conveying a feeling of worthlessness; being unloved; inappropriate expectations of a child’s ability or level of responsibility, which are out of kilter with that child’s age and stage and being witness to the maltreatment and abuse of others.…

    • 615 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Security and Privacy

    • 1863 Words
    • 6 Pages

    The cleaning staff was scene reading documents that were thrown in the trash while performing their cleaning duties. Technically the cleaning staff was not violating any laws because the printouts were tossed into the trash which makes them public information. With that being said the cleaning staff should be…

    • 1863 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    Safeguarding Case Study

    • 378 Words
    • 2 Pages

    Therefore, it is Chris’s duty as a teaching assistant to follow the procedures regarding suspected abuse.…

    • 378 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    In this lab, you implemented a portion of your organization’s BCP. Based on the BIA, the…

    • 314 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    A security breach has been identified within a small Microsoft workgroup LAN. The workgroup consists of three primary workgroups which contain group membership lists of users within the Active Directory infrastructure that currently exists on the SMB Server that is located within the confines of the LAN structure. The security breach, which is defined as any event that results in a violation of any of the CIA (confidentiality, integrity, availability) security principles, was caused by the SMB server being accessed by an unauthorized user due to a security hole that was detected by the server software manufacturer the previous day. The security patch will not be available until possible as long as three days, but hopefully within that timeframe. In addition, the LAN administrator needs at least one week (minimum) to download, test, and install the patch.…

    • 606 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Risk Threat Vulnerability

    • 719 Words
    • 3 Pages

    The following risks, threats, and vulnerabilities were found in an IT infrastructure. Consider the scenario of a Healthcare provider under HIPPA compliance law and what compliance to HIPPA involves.…

    • 719 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Lab 2 Answers Nessus

    • 628 Words
    • 3 Pages

    This lab demonstrates the first 3 steps in the hacking process that is typically performed when conducting ethical hacking or penetration testing. The first step in the hacking process is to perform an IP host discovery and port/services scan (Step 1: Reconnaissance & Probing) on a targeted IP subnetwork using ZenMap GUI (Nmap) security scanning software. The second step in the hacking process is to perform a vulnerability assessment scan (Step 2: Scanning) on the targeted IP subnetwork using Nessus® vulnerability assessment scanning software. Finally, the third step in the hacking process (Step 3: Enumeration) is to identify information pertinent to the vulnerabilities found in order to exploit the vulnerability.…

    • 628 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Security

    • 409 Words
    • 2 Pages

    Michael Nhan SE578-Practices for Administration of Physical & Operations Security Prof: Rodney Smith How do Administrative, Technical, and Physical Controls introduce a false sense of security? According to research and studies, the leading broadband providers have accumulated a total of over 17.4 million high-speed Internet subscribers in the US” This means that in the United States alone there are more than 17 million computers with fast connections most of which are connected to the Internet 24 hours a day, 7 days a week and that number continues to grow. Having a false sense of security is very common among consumers who own and operate a PC within their homes. Nothing is ever secured. I would never say something is secured within the terms of information security. Administrative, Technical, and Physical introduce a false sense of security by the idea of what we use to safeguard sensitive data and protect consumers’ privacy. The idea of purchasing a virus protection identifies that all personal information will be safeguarded and protected, which gives consumers a false sense of security. Having a false sense of security means that I entrust beliefs that I’m guaranteed protection at all times and, that I should not be concerns about my computer being compromised because I took the necessary precautions in purchasing a virus protection. What are the consequences to the strategy if there are no verification practices? disclosure of proprietary corporate information. What can a firm do to bolster confidence in their Defense-in-Depth strategy? How do these activities relate to “Best Practices”? How can these activities be used to demonstrate regulatory compliance? Sarbanes-Oxley_Act. (n.d.). Wikipedia, the free encyclopedia. Retrieved September 21, 2008, from Reference.com website: http://dictionary.reference.com/browse/Sarbanes-Oxley_Act M2PressWIRE; 08/12/2008 Dublin: “Data New Report Details the Data Center Automation Solutions Market for 2007-2010"…

    • 409 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 2 Assignment 2

    • 257 Words
    • 2 Pages

    1. The five vulnerabilities that exist for this LAN based workgroup are 2755801, 2501696, 2588513 2639658, 2659883.…

    • 257 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Security Awareness

    • 1637 Words
    • 7 Pages

    The Brightington Academy Change Management Plan specifies actions to handle all changes affecting resources, costs, and time. Also, the Change Management Plan concentrates on how the Brightington Academy project will…

    • 1637 Words
    • 7 Pages
    Powerful Essays
  • Powerful Essays

    Privacy and Security

    • 4774 Words
    • 20 Pages

    Appraise the issues raised in the article by Moglen (2013) as they affect individuals, organizations and society…

    • 4774 Words
    • 20 Pages
    Powerful Essays
  • Good Essays

    Five vulnerabilities for the workgroup LAN based on the Microsoft Security Advisories are 2755801, 2719662, 2854544, 2846338, and 2847140. 2846338 involves privilege elevation, vulnerability in Microsoft Malware Protection Engine Could Allow Remote Code Execution, and is a high priority.…

    • 551 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Security Assessment

    • 824 Words
    • 4 Pages

    Choose one of the Facts for Consideration sections from Ch. 3 of the text and list the page number for the section you chose. Then, complete the following table. List five threats appropriate to the environment from the section you chose. Rate the risk for each threat from 0 (low) to 10 (high). Then, list five appropriate countermeasures. Once you complete the table, write a brief explanation of the countermeasures for the two threats with the highest risk total, stating how the countermeasure reduces the risk associated with that threat.…

    • 824 Words
    • 4 Pages
    Good Essays