Preview

Application of Security

Powerful Essays
Open Document
Open Document
1506 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Application of Security
Unit 2: Application of Security Countermeasures to Mitigate Malicious Attacks

Learning Objective

 Describe how malicious attacks, threats, and vulnerabilities impact an IT infrastructure.

Key Concepts

 Attacks, threats, and vulnerabilities in a typical IT infrastructure

 Common security countermeasures typically found in an IT infrastructure

 Risk assessment approach to securing an IT infrastructure

 Risk mitigation strategies to shrink the information security gap

Reading

 Kim and Solomon, Chapter 3: Malicious Attacks, Threats, and Vulnerabilities.

 Kim and Solomon, Chapter 4: The Drivers of Information Security Business.

Keywords

Use the following keywords to search for additional materials to support your work:

 Common Vulnerabilities and Exposures (CVE)

 Risk Management

 Risk Mitigation

 Security Countermeasures

 Window of Vulnerability (WoV)

Servers to have running * Windows DHCP * Server 2003 Target * Ubuntu Desktop * Ubuntu Server

-------------------------------------------------
Week 2
Assignment
* Calculate the Window of Vulnerability (See Below) * Microsoft Environment Analysis (See Below)
Lab
* Conduct a Vulnerability Assessment Scan Using Nessus® * Lab book pages 15 – 27 * Screenshots and answer questions on pages 26-27
Project (Part 2 Due Week 11) * Project Part 2. Student SSCP® Domain Research Paper
-------------------------------------------------

Unit 2 Assignment 1: Calculate the Window of Vulnerability

Learning Objectives and Outcomes

 You will learn how to calculate a window of vulnerability (WoV).

Assignment Requirements

You are reviewing the security status for a small Microsoft workgroup LAN. The workgroup contains many distinct separations in the network determined by group memberships. An example of the network divisions is as follows:  Windows laptops: Traveling salespeople,

You May Also Find These Documents Helpful

  • Good Essays

    The Workstation Domain includes all workstations approved on the company network. No personal devices or removable media may be used on this network. All devices and removable media will be issued by the company for official use only. To access any workstation, a user will need to be first verified, then setup with an account to be logged in with a username and pass code adhering to the IT departments set standards. All systems will undergo regular updates and be provided with anti-virus and anti-malware software for system monitoring. Access Control Lists (ACLs) will be drawn up to appropriately define what access each individual will have. Any violations will cause an immediate suspension of privileges and again the person(s) in violation will be subject to company executives decisions and/or the authorities for punitive action.…

    • 471 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    1. What vulnerabilities exist for this workgroup LAN based on the advisories? List five of them.…

    • 290 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    NT 2580 Introduction To Information Security Teacher : Mr. Timothy Tacker Unit 10 Assignment 1 Examine Real-World Applications of Security Standards ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++…

    • 493 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Lab 2 Instructions

    • 389 Words
    • 2 Pages

    You are reviewing the security status for a small Microsoft workgroup LAN. The workgroup contains many distinct separations in the network as determined by group memberships. The network consists of computers working on a variety of client platforms, such as Windows XP, Windows Vista, and Windows 7, and server products in a single environment. An example of the network divisions is as follows:…

    • 389 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    What vulnerabilities exist for this workgroup LAN based on the advisories? List five of them.…

    • 286 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    A security breach has been identified within a small Microsoft workgroup LAN. The workgroup consists of three primary workgroups which contain group membership lists of users within the Active Directory infrastructure that currently exists on the SMB Server that is located within the confines of the LAN structure. The security breach, which is defined as any event that results in a violation of any of the CIA (confidentiality, integrity, availability) security principles, was caused by the SMB server being accessed by an unauthorized user due to a security hole that was detected by the server software manufacturer the previous day. The security patch will not be available until possible as long as three days, but hopefully within that timeframe. In addition, the LAN administrator needs at least one week (minimum) to download, test, and install the patch.…

    • 606 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Security Assessment

    • 824 Words
    • 4 Pages

    Choose one of the Facts for Consideration sections from Ch. 3 of the text and list the page number for the section you chose. Then, complete the following table. List five threats appropriate to the environment from the section you chose. Rate the risk for each threat from 0 (low) to 10 (high). Then, list five appropriate countermeasures. Once you complete the table, write a brief explanation of the countermeasures for the two threats with the highest risk total, stating how the countermeasure reduces the risk associated with that threat.…

    • 824 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Quiz: Security Program

    • 357 Words
    • 2 Pages

    | The main objective of information security is to preserve the availability, integrity, and confidentiality of information and knowledge of an organization.Answer…

    • 357 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Safeguarding Case Study

    • 615 Words
    • 3 Pages

    1. Leroy may be the victim of neglect as there is evidence that his parents are persistently failing to meet his basic physical and psychological needs and that this is likely to cause impairment to his health and development. HM Government (2006). Maccoby and Martin (1983) assert that a child may suffer neglect if that child’s needs form a low priority within the family unit. In addition to neglect, Leroy may well be the experiencing emotional abuse. Emotional abuse involves the “persistent maltreatment of a child such as to cause severe and persistent effect on their emotional development.” HM Government (2006:39). This may include conveying a feeling of worthlessness; being unloved; inappropriate expectations of a child’s ability or level of responsibility, which are out of kilter with that child’s age and stage and being witness to the maltreatment and abuse of others.…

    • 615 Words
    • 3 Pages
    Good Essays
  • Good Essays

    To understand the importance of physical security is the security of people and technology. The use of physical security consists if a series if actions that are used to protect someone against unwanted or illegal invasion. There are three levels of physical security which are the security practitioner should be concerned with. They are the outer perimeter, inner perimeter, and the interior.…

    • 707 Words
    • 3 Pages
    Good Essays
  • Better Essays

    In order for ZXY Inc. to make sure that their entire organization is secure, some proposals have been put into place to protect the company. The company needs to make sure that the network, their employee’s, company devices, and communications are secure from the outside world. The proposals that have been put into place cover such areas as: access control methods, authentication, user’s accounts and passwords, cryptography, remote access, network attack mitigation, malware and device vulnerabilities, and web and e-mail attack mitigation. These proposals when combined together help form an entire security policy for ZXY Inc. to use in order to protect all company assets.…

    • 3217 Words
    • 13 Pages
    Better Essays
  • Powerful Essays

    References: D 'Arcy, J., Hovav, A., & Galletta, D. (2009). User awareness of security countermeasures and its impact on information systems misuse: a deterrence approach.. Information Systems Research, 20(1), 79-98.…

    • 1465 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    Ip Networking

    • 327 Words
    • 2 Pages

    The LAN domain includes all data closets and physical as well as logical elements of the LAN. This domain needs strong security, being that it is the entry and exit points to the wide area network, and makes private information easily accessible to anyone. Users will be screened and authorized by the IT department head and given a special access code. The biggest threat to the LAN domain is unauthorized access. This will be monitored closely to make sure all policies are being followed.…

    • 327 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Privacy and Security

    • 4774 Words
    • 20 Pages

    Appraise the issues raised in the article by Moglen (2013) as they affect individuals, organizations and society…

    • 4774 Words
    • 20 Pages
    Powerful Essays
  • Powerful Essays

    Assignment On Safeguarding

    • 2018 Words
    • 9 Pages

    Safeguarding children is high priority within professional practices to ensure that all children are supported and have the right to reach full potential (Lindon, 2008). In order to show and understand how safeguarding is applied, a residential setting providing specialist care for children with autistic spectrum disorder (ASD) will be considered. The current legislation including Helping Children Achieve More will be explained to show how the multidisciplinary team around the child maintain standards and meet Ofsted requirements (Grigg, 2010). Other policy’s that are put in place by the specialist provider will also be considered to better understand how staff implement procedures and how best practice is carried out. The effectiveness…

    • 2018 Words
    • 9 Pages
    Powerful Essays