Preview

Key Terms Unit5 Exchange Server 2007

Good Essays
Open Document
Open Document
322 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Key Terms Unit5 Exchange Server 2007
Unit 5 Assignment 1: Testing and Monitoring Security Controls
Log files would be the first place one would look to check for suspicious activity in the event of a crime. They can help you understand where something went wrong. Creating a timeline, of before and after the performance problem or incident. The way traffic moves through a network, especially when the computers are only used for certain things, creates baseline behavior. When something is out of place, such anomalies seem suspicious; but legitimate traffic could be used in illegitimate ways and legitimate traffic can at times seem illegitimate. By consistently monitoring the network, and observing all the possibilities, the anomalies of legitimate traffic wont seem that abnormal and one can focus on the real problems. Predictable passwords that meet minimum length requirements but remain easily guessable is a hazard that could affect a network with a weak password. If that is a problem, one should probably change the password every so often. It would be in everyone’s best interest if the password security level was increased, and that they would expire after a certain amount of time. Removable storage devices that might contain malware, filtered only when passing through the network could be a problem but by limiting the privileges of users, adapted to the duties assigned to the individual. Making it clear that no removable storage devices are to be brought into the network under no circumstance unless necessary and properly screened first. If an unencrypted laptop with sensitive information was to fall in the wrong hands, it would be likely that there would be some sort of damage. To prevent that from happening it is important to encrypt the drives and other sensitive information, have a lockout procedure where you had to put the password in again after a certain amount of time or to view critical data, and to make sure that the device could be potentially monitored.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Unit 7 P4 Business

    • 360 Words
    • 2 Pages

    The ordering process can sometimes be a source of unnecessary costs. This might happen as OBS deals with too many suppliers and there is no clear ordering policy or guidelines as ordering is not centralised. Thus there are insufficient internal controls against mistakes and/or fraud. Reducing the number of suppliers that OBS deal with can often result in savings, especially if it gives you the opportunity to improve relationships with the remaining suppliers and negotiate lower prices and better payment terms.…

    • 360 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Looking at the network diagram provided I determined that the user, workstation, LAN, LAN-to-WAN, and system/application domains involved in the company should be redesigned to implement better access controls to provide multi-layered security. The most important access control implementation would be the user domain where the company should put emphasis on training; how to recognize social engineering attacks, how to create strong passwords, and how often they should be changed. The workstation domain should focus security via virus and malware scanning, operating system patching, and other types of application-level firewalls. To achieve a multi-layered security approach in the LAN domain I would recommend using an intrusion detection system (IDS) and an intrusion prevention system (IPS) to prevent unauthorized access. Security for the LAN-to-WAN domain should be implemented through the use of a firewall or DMZ to also prevent unauthorized access into the company’s network.…

    • 439 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    In the workstation domain, we need to make sure that each of the workstations, whether desktop or laptop, has antivirus and malware protection installed on them. Laptops are very vulnerable for loss or theft, so all company laptops should have an encrypted hard drive so that if they are stolen, the data contained on them is not recovered by anyone but the owner.…

    • 512 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    You Decide- Sec572 Week 2

    • 577 Words
    • 3 Pages

    To develop network security strategies that will ensure that the organization's network is protected from both internal and external security risks. A summary of the steps I can take to mitigate the risk in the following areas: Denial-of-Service attacks (DoS), Distributed Denial-of-Service attacks (DDoS), Masquerading and IP Spoofing, Smurf attacks, Land.c attacks, Man-in-the-Middle attacks.…

    • 577 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Nt2580 Project 1

    • 492 Words
    • 2 Pages

    In the workstation domain, we need to make sure that all workstations have antivirus and malware protection installed on them. Laptops and portable devices are very vulnerable to theft…

    • 492 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Laptops and workstations have their own set of security risks associated with them. They are vulnerable to being compromised by malware, spyware, or even hackers that take advantage of certain exploits. Laptops, workstations and mobile devices are susceptible to malicious software attacks, theft or loss. Viruses and malware can affect these devices and are usually acquired through contaminated email attachments and hyperlinks that redirect the user to exploited web sites or are transferred through USB storage devices. Viruses and malware can also be acquired by downloading infected files or programs that are designed by hackers. Because of the need to protect systems against threats, all workstations and laptops should be secured with antivirus and firewall software and updated and patched on a regular basis to fix vulnerabilities with the software that hackers may exploit. Since the laptops are mobile by nature they are at risk of being stolen along with all of the data saved on their hard drives. The best security method for this would be to encrypt the hard drives on the laptops and where feasible only store sensitive data on corporate servers…

    • 612 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Apply email server and attachment antivirus/malware and email quadrating for unknown file types. Disable for ping, probing, and port scanning on all exterior IP devices. Denying of outbound traffic using source IP addresses. Apply file transfer monitoring, scanning and alarming for unknown file types. Web Surfing should be monitored by filtering out any unknown IP address with trusted cites. Apply domain-name content filtering at the internet entry/access point as well.…

    • 313 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    NT 2580 Project Part 2

    • 2096 Words
    • 9 Pages

    Issue four. You must research and formulate a plan to implement monitoring and analysis based on the premise that all employees have Internet access to browse the Web, there is no policy on the use of removable media, and several of the branch offices have encountered issues with malware recently. You must determine system implementation and access in accordance with defined IT criteria as well as how to collect information for identification of and response to security breaches or events.…

    • 2096 Words
    • 9 Pages
    Powerful Essays
  • Satisfactory Essays

    Unit 7 key terms

    • 310 Words
    • 1 Page

    Switches circuit- A circuit created by the phone company in reaction to signaling (the user tapping telephone keys or a modem sending in the same digits), with the telco tearing down the circuit when the user is finished.…

    • 310 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    and identify the devices on the network and the operating systems and services running on them.…

    • 652 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    After reviewing the new network design, we have seen several threats and came up with countermeasures to prevent these attacks. The first threat is the connection between the internet and the company’s router and connection between the wireless router and switch. Hackers, viruses, and malware can easily get in through this connection and infect the network. The countermeasure for this is a firewall or intrusion detection system. This equipment will help detect any unwanted guests the get onto the network. You can control what traffic comes in and out of your network. Next would be the wireless router being unsecured. If this router is left open and SSID board casting, any within its range can access the company’s network. A countermeasure for this is password encryption and stealth id. Hiding the id of the router will allow it to be hidden from anyone scanning for wireless routers to use. Encryption password puts a lock on the router to where only people with the key can access the router. The last threat would be the workstations and laptops. Users make the most mistakes on these machines. They download and go to places they shouldn’t which causes the risk of viruses and hackers. Countermeasures are Anti Viruses, patches, and teaching. Anti-viruses will help protect against viruses and malware that can allow hackers to enter the system and still information. It’s important to keep the definitions up to date so the AV can protect against the latest viruses. Updating OS with patches can also prevent security threats. Teaching users the dos and don’ts of security issues can help them be aware of the threats and what they should do to help prevent risks from occurring.…

    • 292 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Access Control Simulation

    • 698 Words
    • 3 Pages

    Cubicle 2-1 had a pre-approved offsite equipment request posted This should be secured to prevent an unauthorized person from stealing equipment. Both cubicle 2-1 and 2-2 had fingerprint scanners. Cubicle 2-3 had a locked file drawer and the computer was password protected as it locked after four attempts. Cubicle 2-4 did have a UPS but there was a flashdrive on the desk as well as login information on a post it note. Flashdrives should be encrypted and increased controls surrounding password/login information should be enforced. Password/login…

    • 698 Words
    • 3 Pages
    Good Essays
  • Better Essays

    The problem comes in finding and fixing these problems. Depending on how big or small the weakness is determines how detrimental the risk is. After reviewing the infrastructure of Aircraft Solutions, I was able to determine that there were a few things that would put their system in a vulnerable state and potentially put their system at risk. The two areas where they are most vulnerable are the hardware and the policy. The first vulnerable area is the hardware of the firewalls that are not being used appropriately to protect the network against breaches in the networks architecture and hierarchy. Without the firewall in place it exposes the network (LAN) to any malicious internal as well as external attacks. These attacks can lead to the compromising of any of the company’s data.…

    • 870 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    homework 1

    • 454 Words
    • 2 Pages

    This is a matching activity. You will receive the Match Risks/Threats to Solutions worksheet, which contains a numbered list of common risks and threats found in a typical IT infrastructure. You must enter the letter for the correct solution or preventative action in the blank to the right of each risk or threat.…

    • 454 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Guide to Exchange 2007 Setup

    • 3401 Words
    • 14 Pages

    Follow the steps below to correctly configure your Exchange Server 2007 SP1 email server for general use. Note that for this document we are assuming you are installing Exchange 2007 SP1 on Windows Server 2008 64-Bit.…

    • 3401 Words
    • 14 Pages
    Powerful Essays