Preview

Lab8 1 Some Common Risks

Good Essays
Open Document
Open Document
505 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Lab8 1 Some Common Risks
Lab-8
1.
Some common risks, threats, and vulnerabilities commonly found in the Remote Access Domain that must be mitigated through a layered security strategy are:
• Private data or confidential data is compromised remotely (Kim & Solomon, 2012).
• Unauthorized remote access to IT systems, applications, and data (Kim & Solomon, 2012).
• Mobile worker laptop is stolen (Kim & Solomon, 2012).
• Multiple logon retries and access control attacks (Kim & Solomon, 2012).
2.
The deny-by-default rulesets for incoming traffic should be placed on host-based firewalls when accessing the network remotely to prevent malware incidents (Wikia, n.d.).
3.
Risks, threats, and vulnerabilities introduced by implementing a Remote Access Server are:
• External hosts gain access to internal resources (Scarfone, Hoffman, & Souppaya, 2009)
• An unauthorized user eavesdrops on remote access communications and manipulate them using a compromised server (Scarfone, Hoffman, & Souppaya, 2009)
• Partially patched remote access servers (Scarfone, Hoffman, & Souppaya, 2009)
4.
Using multi-factor authentication is a recommended best practice when implementing a Remote Access Policy server user authentication service (Scarfone, Hoffman, & Souppaya, 2009).
5.
A Remediation Local Area Network (LAN) is a network with devices like a Remediation Server that quarantines non-compliant computers from an untrusted LAN to a trusted LAN. While being quarantined, these non-compliant computers get repairs for.
6.
The Remediation Server provides the approved compliant settings templates for the clients. A noncompliant device needs to meet policy compliance and remediation is performed before it is allowed into the trusted network. For remote access clients, authorized and unauthorized network traffic will use separate security domains such as Virtual Local Area Networks.
7.
Distinguish between VPN server, VPN client, VPN router, and SSL VPNS. It is a dedicated tunnel from one endpoint to

You May Also Find These Documents Helpful

  • Satisfactory Essays

    -In reference to previous network plan U1A1 GPO and AD will be created and upheld for the internal network. GPO will be in place to provide username and password security policy for external network users. (System/Application Domain)…

    • 565 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Router Management Out-of-Band Management Username and Password Authentication. Traffic VPN and Tunnel Based Traffic ACL and Tunnel Traffic Established Between Trusted End Points. UDP and TCP Protocol Enforcement with Stateful Firewall Access list Source and Destination, Address and Session established with Layer 7 Firewall Protection.…

    • 155 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Finally, the system/application domain would require virtual testing of everything before any implementation, hardening of all servers, and keeping up with patches and updates regularly after testing has been completed. Some of the more efficient ways to implement better access controls in a company would start with the proper level of authorization policies including physical controls for facilities. The authorization policy would appropriate entry system access controls that specify what areas are to be locked at all times and what type of locking mechanism should be implemented. It would also include the implementation of secondary locks on specific equipment and storage cabinets…

    • 439 Words
    • 2 Pages
    Satisfactory Essays
  • Best Essays

    The LAN (Local Area Network) is used so much because it is used in small areas. Small businesses use LANs a great deal because they are small and they wouldnt need a WAN or a MAN because there business is usually ran out of one or maybe two buildings. You will usually find LANs in buildings, schools, and even in homes at times. Some buildings even have multiple LAN 's in them for certain purposes.…

    • 1489 Words
    • 5 Pages
    Best Essays
  • Satisfactory Essays

    3. Identify and document at least three vulnerabilities and the solutions related to the client configurations.…

    • 290 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    The Routing and Remote Access Service (RRAS) is part of Microsoft API and server software. This protocol will make it possible to create applications that will administer the routing and remote access service capabilities of the operating system. This will follow the server functionality and will built upon the Remote Access Service that is found in Windows NT 4.…

    • 623 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Assignment 4 Nt2580

    • 485 Words
    • 2 Pages

    1. Secure remote access standard will be strictly controlled. Control will be enforced by a one-time password authentication and minimum 7 character length, special character and 1 numerical character with 1 month expiration.…

    • 485 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    When developing a multi-layered security plan, you must look at each of the seven domains of the IT infrastructure and increase security on each of those domains. The seven domains are user domain, workstation domain, LAN domain, LAN to WAN domain, WAN domain, and remote access domain. Increasing the security on each of those seven domains will increase the overall security of the system and create a multi-layered security plan.…

    • 386 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Use strong password policies, do not store credentials in insecure manner, use authentication mechanisms, encrypt communication channels, use secure HTTP(HTTPS) only with Forms authentication cookies…

    • 1000 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Cons putting a limitation to web surfing may cause the employee to lack independence of finding information. What if they need to look up an answer to a customers’ question and has to find it on the web?…

    • 360 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt280 Week 1 Homework

    • 359 Words
    • 2 Pages

    C. Place employee on probation, review acceptable use policy (AUP) and employee manual, and discuss status during performance reviews.…

    • 359 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Lab 7

    • 928 Words
    • 3 Pages

    1. What are some common risks, threats, and vulnerabilities commonly found in the LAN-to-WAN Domain that must be mitigated through a layered security strategy?…

    • 928 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    NT2580

    • 526 Words
    • 5 Pages

    Common security countermeasures typically found in an IT infrastructure  Risk assessment approach to securing an IT infrastructure  Risk mitigation strategies to shrink the information security gap NT2580 Introduction to Information Security © ITT Educational Services, Inc. All rights reserved. Page 3 EXPLORE: CONCEPTS NT2580…

    • 526 Words
    • 5 Pages
    Satisfactory Essays
  • Satisfactory Essays

    homework 1

    • 454 Words
    • 2 Pages

    This is a matching activity. You will receive the Match Risks/Threats to Solutions worksheet, which contains a numbered list of common risks and threats found in a typical IT infrastructure. You must enter the letter for the correct solution or preventative action in the blank to the right of each risk or threat.…

    • 454 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    There are many threats a network faces when the IT department allows students to connect to the network or Internet using mobile devices. Some threats affect the campus network only, while other threats directly affect students or employees. For the campus network, threats include…

    • 1432 Words
    • 5 Pages
    Better Essays