Preview

Information Security: Testing and Monitoring Security Controls 

Good Essays
Open Document
Open Document
607 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Information Security: Testing and Monitoring Security Controls 
NT 2580
Introduction To Information Security
Teacher : Mr. Timothy Tacker
Unit 5 Assignment 1 : Testing and Monitoring Security Controls April 25, 2015

Network baselining is the process of interpreting and understanding of data called baseline analysis. It allows you to discover the true performance and operation of the network. To determine whether a network could deliver a particular policy you need to measure the network’s current performance. By obtaining a baseline of system or network behavior I would need NBAD or Network Behavior Anomaly Detection. NBAD is an integral part of Network Behavior Analysis which offers security and it continuously monitoring the network for any unusual events or trends. A malicious abuse is the number one cause of today’s internet traffic. Anomalies such as worms, port scans, denial of service attacks, etc., these we could found at any time in the network traffic. These anomalies are waste network resources which can cause performance ruin of network devices and end hosts. It may lead to security issues concerning all internet users. Suppose an attacker intrudes on one of the servers. The first place to check is the Log Files for administrative issues and security activity. Log Files contains complete records of all security events, e.g. log one events, resource access, attempted violations of policy and changes in system configuration or policies. And also, Critical System events that can follow admin to quickly discover the root that causes the issue. We can also identify bad system or network activities by observing anomalies from baseline behavior or identifying certain suspicious actions. Monitoring the individual network subscribers by having NBAD or Network Behavior Anomaly Detection, this can tracks also the critical network characteristics in real time and it generates an alarm if a strange event or trend is detected that could indicate the presence of a threat. Need to consider that even legitimate

You May Also Find These Documents Helpful

  • Better Essays

    An essential part of network security is knowing what the characteristics of an attack are, so they can be countered or prevented. When the university suffered an overwhelming internal DDoS attack, it required administrators to reevaluate its security guidelines based on what was known about the attack.…

    • 1279 Words
    • 6 Pages
    Better Essays
  • Powerful Essays

    Continuing of Richman Investments has expanded with more offices, locations and clients, which the needs of protection for assets are greater. I have decided to implement the following policy for removable media: Richman Investments staff may only use Richman Investments’ removable media in their work computers. Richman Investments removable media may not be connected to or used in computers that are not owned or leased by the Richman Investments without explicit permission of the Richman Investments IT manager. Sensitive information should be stored on removable media only when required in the performance of your assigned duties or when providing information required by other state or federal agencies. When sensitive information is stored on removable media, it must be encrypted in accordance with the Richman Investments’ Acceptable Encryption Policy. Security assurance and user-friendly sites are required if Richman Investments is to be successful at attracting customers to their Internet sites. It is therefore important to be able to understand the business requirements and be able to translate these into a public network presence with security in mind. The Digital revolution of the 21st Century has not been achieved without its consequences. Real time business requirements and economic drivers have forced rapid changes to the methods used to conduct business-to-business and business to client communication. The Internet has now become a convenient and economic deployment medium for global business. For Richman Investments Computer User’s Policy, although employees are given PCs so they can deliver the task that they are assigned, it must be understood that these PCs are property of Richman Investments and must not be abused for personal use. Computer resources are expensive and so offensive material must not be…

    • 1444 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    NT 2580 Introduction To Information Security Teacher : Mr. Timothy Tacker Unit 10 Assignment 1 Examine Real-World Applications of Security Standards ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++…

    • 493 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    In this lab, you implemented a portion of your organization’s BCP. Based on the BIA, the…

    • 314 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Note. The Week Two assignment has been identified as a tool to assist in the university’s Programmatic Assessment Project. As such, completed student assignments may be periodically sampled for program analysis purposes. To assist in maintaining the integrity of the data collected, do not change the content of this assignment. Please delete this note before submitting to students.…

    • 627 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    serve as important clues in sensing invasion or intrusion that can harm a network. Network probes are not actual intrusions, although, they could be potential causes of actual intrusions. Port scans and ping sweeps can lead to an intrusion of companies network system, however, with today’s technological advancements, these activities can be detected and prevented.…

    • 449 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Testing and monitoring security controls can come in different factors. Monitoring security is by far important because you need to know what’s going on before you can announce it. Networking abuse is by far the biggest baseline anomaly. For employees who have access to the internet, the network can be used to stream media, to access social websites and to download unauthorized software or free software which has vulnerabilities a long with that.…

    • 564 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    The latest trends ensure that the networks are monitored externally to be able to capture most external threats. By establishing a remote control, the administrators can block any back door that hackers can use to gain entry into their system by testing for possible loopholes from outside the organization. Organizations have also developed network intelligence to help create defenses that would be able to spot any threat before it takes place or before it causes extensive damage. The expanding network perimeter is another way of creating efficiency in networks. All network perimeters have been expanded to accommodate more features and more elements that would help with security (Wang et al.…

    • 366 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Security Controls

    • 467 Words
    • 2 Pages

    There are a number of Information Technology security controls. The three most common are: physical, technical, and administrative controls; however, many organizations break down administrative controls into two separate categories: procedural and legal controls. "Security controls are the means of enforcing security policies that reflect the organization's business requirements, " (Johnson). Security controls are implemented to guarantee the information security C-I-A triad. Furthermore, security controls fall into three types of control classifications, they are: preventive, detective and corrective. These classifications are used to specify when a security control applies.…

    • 467 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    You will learn how to match common risks or threats within the seven domains of a typical IT…

    • 1423 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    Defining policies for every domain of an IT infrastructure breaks down in depth how each entity should be properly used. The policies should also identify the key players that will play a key role in ensuring optimum use of all devices, as well as establishing and maintaining security throughout the process of information traveling through the Infrastructure. Here are some best practices to keep in mind when defining policies for a few of the domains within the infrastructure:…

    • 545 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Network Behavior Analysis (NBA): examines network traffic to identify threats that generate unusual traffic flows, such as distributed denial of service (DDoS) attacks, certain forms of malware, and policy violations.…

    • 467 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Nms Best Practice

    • 8626 Words
    • 35 Pages

    Introduction Network Management Fault Management Network Management Platforms Troubleshooting Infrastructure Fault Detection and Notification Proactive Fault Monitoring and Notification Configuration Management Configuration Standards Configuration File Management Inventory Management Software Management Performance Management Service Level Agreement Performance Monitoring, Measurement, and Reporting Performance Analysis and Tuning Security Management Authentication Authorization Accounting SNMP Security Accounting Management NetFlow Activation and Data Collection Strategy Configure IP Accounting NetPro Discussion Forums − Featured Conversations Related Information…

    • 8626 Words
    • 35 Pages
    Powerful Essays
  • Good Essays

    Honeypots

    • 1901 Words
    • 8 Pages

    Nowadays networks which are connected to the Internet are under permanent attack by intruders and automated attacks of worms. A variety of detection tools exist such as Intrusion Detection Systems (IDS) and firewalls, but the main problem is that they only react on preconfigured and known attacks.…

    • 1901 Words
    • 8 Pages
    Good Essays
  • Powerful Essays

    Network security management is equivalent to managing a computerised network against security threads, unauthorised access, misuse and modifications. In today’s interconnected society the protection of confidential data, business continuity, availability and integrity became of great importance to any organisation. This document aims to provide you with a better understanding of network security in terms of history, network security policies, prevention systems and detection systems available on the market that may help secure your computer network.…

    • 1334 Words
    • 6 Pages
    Powerful Essays