Preview

Testing and Monitoring Security Controls

Satisfactory Essays
Open Document
Open Document
564 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Testing and Monitoring Security Controls
Unit 5 Assignment 1: Testing and Monitoring Security Controls
Testing and monitoring security controls can come in different factors. Monitoring security is by far important because you need to know what’s going on before you can announce it. Networking abuse is by far the biggest baseline anomaly. For employees who have access to the internet, the network can be used to stream media, to access social websites and to download unauthorized software or free software which has vulnerabilities a long with that.
People will always be tempted to go onto the network and to browse the web on their own. Employees can dowload music or videos and possibly games which hand affect the security contols sometimes when those who don’t have authorized access to the network, they will continuously try to attempt to connect. Its best to notify anyone who is authorized on the network to know that there is an unauthorized attempt to log in. there are created policies that are made just to inform employees of risk managing and prevention. Notify are very important to the workstation. All employees must be able to know when there is authentication failure. Viewing log files can show all the security events which allow an administrator to check into it and find he root causes.
Other suspicious indications are a large amount of requests for specific file. This takes a while for a web site to be compromised. This take a lot of trial and error as the hacker has to find exploits to determine access of a URL. The URL that is being attacked will change on each request and chances are the file portion will stay the same.
Given the following list of end-user policy violations and security breaches, select three breaches and identify strategies to control and monitor each event to mitigate risk and minimize exposure.
1. A user made unauthorized use of network resources by attacking network entities. You are potentially sabotaged by an employee or employer.
Solution can help by viewing the

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Lab 9

    • 1001 Words
    • 3 Pages

    1. What are some common risks, and vulnerabilities commonly found in the System/Application Domain that must be mitigated with proper security countermeasures?…

    • 1001 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    It 205 Week 3 Assignment

    • 667 Words
    • 2 Pages

    Here are some of the tools that as owner should be in place, one is Access control it consist of all the policies a company uses to prevent improper access to systems by unauthorized insiders and outsiders. To gain access a user must be authorized and authenticated. Another tool is a firewalls they prevent unauthorized user from accessing private networks. There are a number of firewall screening technologies, and applications, including static packet filtering, stateful inspections, Network Address Translations and application proxy filtering they are often used in combination to provide firewall protection. Others are antivirus and antispyware software, which are designed to check computer systems and drives for the presence of computer viruses and eliminates the virus…

    • 667 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    This request will be based on the Security Controls Assessor-Validator (SCA-V) pre-assessment that was done in February of the ECC. As a result of the assessment there were a lot of violations identified, but the team has worked to get them corrected. However, some will require the purchase of additional hardware. I should have the list this afternoon, and will forward it to you ASAP. The follow-up inspection is scheduled for 13 June.…

    • 74 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Log files would be the first place one would look to check for suspicious activity in the event of a crime. They can help you understand where something went wrong. Creating a timeline, of before and after the performance problem or incident. The way traffic moves through a network, especially when the computers are only used for certain things, creates baseline behavior. When something is out of place, such anomalies seem suspicious; but legitimate traffic could be used in illegitimate ways and legitimate traffic can at times seem illegitimate. By consistently monitoring the network, and observing all the possibilities, the anomalies of legitimate traffic wont seem that abnormal and one can focus on the real problems. Predictable passwords that meet minimum length requirements but remain easily guessable is a hazard that could affect a network with a weak password. If that is a problem, one should probably change the password every so often. It would be in everyone’s best interest if the password security level was increased, and that they would expire after a certain amount of time. Removable storage devices that might contain malware, filtered only when passing through the network could be a problem but by limiting the privileges of users, adapted to the duties assigned to the individual. Making it clear that no removable storage devices are to be brought into the network under no circumstance unless necessary and properly screened first. If an unencrypted laptop with sensitive information was to fall in the wrong hands, it would be likely that there would be some sort of damage. To prevent that from happening it is important to encrypt the drives and other sensitive information, have a lockout procedure where you had to put the password in again after a certain amount of time or to view critical data, and to make sure that the device could be potentially monitored.…

    • 322 Words
    • 2 Pages
    Good Essays
  • Better Essays

    The first line of defense for almost every organization is typically the system administrator. This is the person that actively interacts with the company network on a daily basis, and by extension has intimate knowledge of it. So it stands to reason that this person would hopefully be the first to notice any signs of possible compromise would it not? Sadly that is often not the case. Whether it is due to a lack of IT Training, complacency, or laziness is anyone’s guess.…

    • 1839 Words
    • 8 Pages
    Better Essays
  • Good Essays

    Lab1 questions

    • 491 Words
    • 2 Pages

    5. Why is an acceptable use policy not a failsafe means of mitigating risks and threats within the User Domain?…

    • 491 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Ping Sweeps

    • 685 Words
    • 3 Pages

    Ping sweeps and ports scans are a common ways for hackers to attempt to break a network. As a system administrator this is a concern and for the boss this should not be a worry for him. The system administrator has a lot of steps to stop attempts from hackers to get any information by using the ping sweeps and ports scans. Once, the hackers are discourage they should move on to another site.…

    • 685 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Access Control Models

    • 2490 Words
    • 10 Pages

    Network Hardening Unit 8 Assignment 1 It is very important to go through the process of hardening. Hardening is where you change the hardware and software configurations to make computers and devices as secure as possible. I picked the network layout 1-the workgroup . First with the worksta…

    • 2490 Words
    • 10 Pages
    Satisfactory Essays
  • Powerful Essays

    Sample Security Plan X

    • 2479 Words
    • 10 Pages

    The following sample security plan was put together by a fictitious company named Adventure Works. Because of the increasing focus on security in the computing world, the company has decided to review security practices and put together a plan to improve those practices. Adventure Works’ needs may differ from your company’s needs, but reading through their plan should give you a good idea of the steps involved in creating a good security plan.…

    • 2479 Words
    • 10 Pages
    Powerful Essays
  • Better Essays

    Usage auditing: Verifies that systems and software are used appropriately and consistently with organizational policies. A usage audit may entail physically inspecting systems, verifying software configurations, and conducting other activities intended to prove that resources are being used appropriately. Periodically inspecting systems to ensure that software updates and patches are current and that only approved software is installed is a good idea.…

    • 1817 Words
    • 8 Pages
    Better Essays
  • Satisfactory Essays

    Denise Clark, Joseph Huiet, Anthony Brown, Orlando Rodriguez, Niko Budworth, Cory Mooney, Armando Rocha, Denny Hoang…

    • 454 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    A controlled environment with the proper supervision from upper management, as well as support from the auditing department will yield an effective internal control measure. There are many benefits that result from doing an early analysis, such as:…

    • 583 Words
    • 3 Pages
    Good Essays
  • Good Essays

    References: Johnson, Rob. with Merkow, Mike. Security Policies and Implementation Issues. First Edition. Copyright © 2011by Jones & Bartlett Learning, LLC, an Ascend Learning company…

    • 577 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Ethics

    • 1351 Words
    • 6 Pages

    * Malicious hacker takes over computers on the Internet and causes them to flood a target site with demands for data and other small tasks…

    • 1351 Words
    • 6 Pages
    Good Essays
  • Good Essays

    Risk of Insecure System

    • 378 Words
    • 2 Pages

    There are basically three overlapping types of risk that we need to worry about on systems connected to the Internet:…

    • 378 Words
    • 2 Pages
    Good Essays