Preview

Lab8 1 Some Common Risks

Good Essays
Open Document
Open Document
505 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Lab8 1 Some Common Risks
Lab-8
1.
Some common risks, threats, and vulnerabilities commonly found in the Remote Access Domain that must be mitigated through a layered security strategy are:
• Private data or confidential data is compromised remotely (Kim & Solomon, 2012).
• Unauthorized remote access to IT systems, applications, and data (Kim & Solomon, 2012).
• Mobile worker laptop is stolen (Kim & Solomon, 2012).
• Multiple logon retries and access control attacks (Kim & Solomon, 2012).
2.
The deny-by-default rulesets for incoming traffic should be placed on host-based firewalls when accessing the network remotely to prevent malware incidents (Wikia, n.d.).
3.
Risks, threats, and vulnerabilities introduced by implementing a Remote Access Server are:
• External hosts gain access to internal resources (Scarfone, Hoffman, & Souppaya, 2009)
• An unauthorized user eavesdrops on remote access communications and manipulate them using a compromised server (Scarfone, Hoffman, & Souppaya, 2009)
• Partially patched remote access servers (Scarfone, Hoffman, & Souppaya, 2009)
4.
Using multi-factor authentication is a recommended best practice when implementing a Remote Access Policy server user authentication service (Scarfone, Hoffman, & Souppaya, 2009).
5.
A Remediation Local Area Network (LAN) is a network with devices like a Remediation Server that quarantines non-compliant computers from an untrusted LAN to a trusted LAN. While being quarantined, these non-compliant computers get repairs for.
6.
The Remediation Server provides the approved compliant settings templates for the clients. A noncompliant device needs to meet policy compliance and remediation is performed before it is allowed into the trusted network. For remote access clients, authorized and unauthorized network traffic will use separate security domains such as Virtual Local Area Networks.
7.
Distinguish between VPN server, VPN client, VPN router, and SSL VPNS. It is a dedicated tunnel from one endpoint to

You May Also Find These Documents Helpful

  • Good Essays

    The LAN Domain will include all data closets, physical elements of the LAN, as well as logical elements to be designated by authorized personnel. Authorized personnel will be properly…

    • 471 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Nt280 Week 1 Homework

    • 359 Words
    • 2 Pages

    C. Place employee on probation, review acceptable use policy (AUP) and employee manual, and discuss status during performance reviews.…

    • 359 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    To secure the network and ensure a degree of protection from external intrusion, the first step is to ensure it is a private network and each host in the different remote locations is part of the private network; this minimizes the intrusion from public networks. Through the use of firewalls in the central computer network enforces authentication of all users in the network thus minimizing internal and external unauthorised access (Stallings, 2007).…

    • 349 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    The authentication process is a necessity for safeguarding systems against various forms of security threats, such as password-cracking tools, brute-force or wordbook attacks, abuse of system access rights, impersonation of attested users, and last but not least reply attacks just to name a few. In addition, it is imperative that authentication policies are interchangeable with the organizations in which information is being exchanged if resources are being shared between alternative organizations.…

    • 1478 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    Nt2580 Project 1

    • 492 Words
    • 2 Pages

    In the WAN domain, we need to make sure that all firewalls are set up on the network to filter all traffic. A firewall can stop all traffic coming on to our system that is not meant or not wanted on the network.…

    • 492 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    homework 1

    • 454 Words
    • 2 Pages

    This is a matching activity. You will receive the Match Risks/Threats to Solutions worksheet, which contains a numbered list of common risks and threats found in a typical IT infrastructure. You must enter the letter for the correct solution or preventative action in the blank to the right of each risk or threat.…

    • 454 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    NT2580 Project part 1

    • 606 Words
    • 3 Pages

    Safety of data and information is a real important aspect of a company. Before we can create an outline for general security solutions we must first define what is needed. I recommend that we use a multi-layered security plan. There are a total of seven domains of an IT infrastructure including user domain, workstation domain, LAN domain, LAN-to-WAN domain, WAN domain, remote access domain, and system/application domain.…

    • 606 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Looking at the network diagram provided I determined that the user, workstation, LAN, LAN-to-WAN, and system/application domains involved in the company should be redesigned to implement better access controls to provide multi-layered security. The most important access control implementation would be the user domain where the company should put emphasis on training; how to recognize social engineering attacks, how to create strong passwords, and how often they should be changed. The workstation domain should focus security via virus and malware scanning, operating system patching, and other types of application-level firewalls. To achieve a multi-layered security approach in the LAN domain I would recommend using an intrusion detection system (IDS) and an intrusion prevention system (IPS) to prevent unauthorized access. Security for the LAN-to-WAN domain should be implemented through the use of a firewall or DMZ to also prevent unauthorized access into the company’s network.…

    • 439 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    This model would support Role based access controls and allow mandatory access control to be governed by remote access. The IS Dept. is responsible for maintaining the access and access rights and prividgles and restricted as needed by user roles in the organization. All data is encrypted and transmitted via remote and encrypted and used by the vpn tunnel. VPN access will be terminated on a 3 month basis and must be renewed by revisiting based on your access role and…

    • 297 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    IS3220 Assignment 3

    • 980 Words
    • 4 Pages

    In the interest of business continuity, remote access will be utilized. User wishing access to internal network assets will only be able to access said assets with the use of a company issued laptop. We will make use of MAC address filtering to allow remote users access to the internal network via VPN. Each of the remote access laptops will have been loaded with VPN and have the MAC address added to the list on the MAC address filter. Users will be able to login to the VPN by using their local username and password. By making use of a VPN connection, users should be able to easily access the network assets. VPN connections are protected by SSL encryption which provides communication security over the internet. Each of the remote access laptops will be encrypted with McAfee safeboot encryption and all local data will remain encrypted until a valid login is entered. McAfee safeboot encryption requires additional login information to access the IDI internal network.…

    • 980 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Assignment 4 Nt2580

    • 485 Words
    • 2 Pages

    1. Secure remote access standard will be strictly controlled. Control will be enforced by a one-time password authentication and minimum 7 character length, special character and 1 numerical character with 1 month expiration.…

    • 485 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Cons putting a limitation to web surfing may cause the employee to lack independence of finding information. What if they need to look up an answer to a customers’ question and has to find it on the web?…

    • 360 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Limit unauthorized use of network resources by allowing access during businiess hours only. Do not allow remote access permitions to anyone, except those that…

    • 563 Words
    • 3 Pages
    Good Essays
  • Good Essays

    * Remote access must be secure and strictly controlled. Enforcement of control will be via password authentication or private/public keys with strong pass-phrases.…

    • 399 Words
    • 2 Pages
    Good Essays
  • Better Essays

    There are many threats a network faces when the IT department allows students to connect to the network or Internet using mobile devices. Some threats affect the campus network only, while other threats directly affect students or employees. For the campus network, threats include…

    • 1432 Words
    • 5 Pages
    Better Essays