Premium Essay

Intro to Info Security

In:

Submitted By micahclark66
Words 364
Pages 2
Multi-Layered Security Plan
User Domain
Risk, Threat, or Vulnerability: Lack of awareness, Apathy toward policies, Security policy violations, Personal CD’s and USB drives with photos, music and videos, Download photos, music and videos, Destruction of systems, applications, or data, Employee blackmail or extortion.
Mitigation: Conduct annual security awareness training, Place employee on probation, Disable internal CD drives and USB ports, Enable content filtering. Restrict user access, Track and monitor abnormal employee behavior, Enable Intrusion detection system/Intrusion prevention system (IDS/IPS).
Workstation Domain
Risk, Threat, or Vulnerability: Unauthorized access to workstation, Unauthorized access to systems, applications, and data, Desktop or Laptop computer operating system software vulnerabilities, Viruses, malicious code or malware infects a workstation or laptop.
Mitigation: Enable password protection, Define strict access control policies, standards, procedures and guidelines, Use workstation antivirus and malicious code policies,
LAN Domain
Risk, Threat, or Vulnerability: Unauthorized access to LAN, Unauthorized access to system, applications, and data, LAN server operating system/application software vulnerabilities, Rogue users on WLANs gain unauthorized access.
Mitigation: Define strict access control policies, standards, procedures and guidelines, Make sure wiring closets, data centers, and computer rooms are secure.
LAN to WAN Domain
Risk, Threat, or Vulnerability: Unauthorized network probing and port scanning, Unauthorized access, IP router, firewall, and network appliance configuration file errors or weaknesses.
Mitigation: Disable ping, probing, and port scanning on all exterior IP devices, Apply strict security monitoring controls, Define a strict zero day vulnerability window definition.
WAN Domain (Internet)
Risk, Threat,

Similar Documents

Premium Essay

Intro to Info Security Project Part 1

...User Domain Risk, Threat, or Vulnerability Lack of user awareness • Conduct security awareness training display security awareness posters, insert reminders in banner greetings, and send e-mail reminders to employees. User apathy toward policies • Conduct annual security awareness training, implement acceptable use policy, update staff manual and handbook, discuss dring performance reviews. Workstation Domain Risk, Threat, or Vulnerability Unauthorized access to workstation • Enable password protection on workstations for access. Enable auto screen lockout for inactive time. Unauthorized access to systems, applications, and data • Define strict access control policies, standards, procedures, and guidelines. Implement a second-level test to verify a user’s right to gain access. Account Policies | Password, lockout, and Kerberos settings. | Local Policies | Audit, user rights, and security options. ("Security Options" consist primarily of security-relevant registry values.) | Event Log | Settings for system, application, security and directory service logs. | Restricted Groups | Policy regarding group membership. | System Services | Startup modes and access control for system services. | Registry | Access control for registry keys. | File System | Access control for folders and files. | LAN Multilayer Security * Coverage considerations for wireless LAN (WLAN) users in a branch office * Distance considerations from the closet to the...

Words: 726 - Pages: 3

Premium Essay

Network Security

...Network Security Practices and Policies 3.1 Intro A. Regulation 1.To be a good reg, must be measurable by a metric 2. Security and privacy regs issued and quick pace to keep up with technology 3. Used to prevent misuse, mishandling, and misappropriation of sensitive info B. Private vs Gov -When private sector fails, then government is called in to regulate C. 4 areas of regulation compliance 1. Financial 2. Healthcare 3. Personal privacy 4. Homeland security 3.10 Privacy act of 1974 A. Background 1. Issued in 1974 as Public Law 93-579 2. Started by Health, Education, and Welfare dept.(HEW) because of concern with the collection of all the private information. 3. Five key principles a. There will be no secret data record-keeping system b. Individuals should have way to see what info is collected on them c. Individuals need way to ensure info collected for one purpose is not used for another. d. Must be a way for someone to correct wrong info e. Orgs must ensure info gathered is reliable 4. Preamble ▪ The privacy of an individual is directly affected by the collection, maintenance, use, and dissemination of personal information by Federal agencies. ▪ [pic]The increasing use of computers and sophisticated...

Words: 585 - Pages: 3

Free Essay

Training Schedual

...TRAINING SCHEDUAL DATABASE Eilean L. Greene Dr. Jon Drake Washington Adventist University Healthcare Systems Analysis June 22, 2014 Table of Contents Table of Contents 2 Abstract 3 Referance………………………………………………………………………………………….8 Appendix………………………………………………………………………………………….9 Abstract This essay will focus on the requirements needed to build a database for the scheduling process, the advantages and disadvantages of moving the schedule to a database .I will define referential integrity and how this database concept ensures that the relationships between tables remain consistent and whether or not the advantages outweighed the difficulty of setup. The requirements to build a database design for scheduling are tables, records, primary key relationship that will make up the database. The database is a relational one as defined by the primary key. The advantages of moving this scheduling to database is reduction in data redundancy, decreases in updating errors and increased consistency along with greater data integrity. Lat but not least I will discuss the ethical issue of change over to an automate system. I have created a graph of the database along with an access database. . TRAINING SCHEDUAL DATABASE This essay will focus on the requirements needed to build a database for the scheduling process, the advantages and disadvantages of moving the schedule to a database...

Words: 1357 - Pages: 6

Free Essay

Helllloo

...FOUNDATIONS First-Year Seminar (GEC 101) (choose 1, 2 credit hours, 1st semester on campus) GEP 101 First Year Foundations UHC 110 Freshman Honors Seminar Written Communication & Info Literacy (GEC 102) ENG 110* Writing I (#) Oral Communication (GEC 103) COM 115 Fundamentals in Public Speaking (#) GEC 104 3 3 NATURAL WORLD at least 1 course from each box, 7-9 total credit hours 2 different course codes, at least 1 with a lab Life Sciences (3-4 credit hours) BIO 100* Biological Sciences for Educators (lab) BIO 101 Biology in Your World BIO 111* Understanding Bio Sys Through Inq. (lab only) BIO 121* General Biology I (lab) BMS 100 Concepts & Issues in the Life Sciences BMS 105 Concepts & Lab in the Life Sciences (lab) BMS 110* Intro to Biomedical Sciences (lab) BMS 111* Intro to Lab in Biomedical Sci (lab only) GLG 115 Life of the Past Physical Sciences (3-5 credit hours) AST 113 Modern Astronomy AST 114 Survey of Astronomy AST 115 Basic Astronomy (lab) CHM 107 Chemistry for the Citizen CHM 108* Chemistry for the Citizen Lab CHM 116* Fundamentals of Chemistry CHM 117* Fundamentals of Chemistry Lab GLG 110 Principles of Geology (lab) GLG 171 Environmental Geology GRY 135 Principles of Weather & Climate (lab) GRY 142 Introductory Physical Geography (lab) PHY 100 Survey of Physics (lab) PHY 101* Physics by Inquiry for Educators (lab) PHY 123* Introduction to Physics I (lab) PHY 203* Foundations of Physics I (lab) 4(3-3) 3(3-0) 1(0-2) 4(3-3) 4(4-0) 4(3-2) 4(3-2) 1(0-2)...

Words: 999 - Pages: 4

Premium Essay

Hi I Am Very Simple Boy. I Like to Meet New People.

...SYSTEM-2 DISCRETE MATHEMATICS FINANCIAL MANAGEMENT CONSUMER BEHAVIOR ALGORITHMS 3-5 AGRICULTURAL ECONOMICS SYNTAX AND SEMANTICS DESIGN THEORY-I MATH METH OF ENG’G VLSI CIRCUIT DESIGN Released on July 13, 2013 Day 2: July 30, 2013 (Tuesday) TIME CAMPUS 1 ,4 & 5 WEB TECHNOLOGIES TAXATION FUNDAMENTALS OF COMPENSATION BRAND & PRODUCT MGMT. INTRODUCTION TO BUSINESS PROGRAMMING LANGUAGE 1 (CS) CAMPUS 7 SECTIONS ALL ALL ALL ALL ALL ALL ALL ALL ALL ALL ALL ALL ALL ALL ALL ALL ALL ALL ALL ALL ALL ALL ALL ALL ALL ALL ALL ALL ALL ALL ALL ALL ALL ALL ALL ALL ALL ALL ALL 9:3011:30 PROGRAMMING LANGUAGE-1 (EEE) DEVELOPMENT ECONOMICS ELEC. POWER TRANS. & DISTRIBUTION MICROPROCESSOR & I/O SYS. CS MATH INTRODUCTION TO DATABASE MANAGEMENT INFO. SYSTEM PROG. LANGUAGE-2 (CS) PROG. LANGUAGE-2 (EEE) 12-2 OPTOELECTRONIC DEVICES HEALTH ECONOMICS NEGOTIATION THEORY & PRACTICE MEDIA LAW AND ETHICS MICRO...

Words: 1161 - Pages: 5

Free Essay

Internal Data Protocol

...Mandie Brayley NT2580 – Intro to Info Sec Unit 1 Assignment 2: Impact of a Data Classification Standard When you hear Internal Use Only, the first thing that seems to pop into your head would be that any data transferred has to stay inside wherever the domains are. While there are seven IT infrastructure domains, there are only three that are actually affected by the “Internal Use Only” data standard. These domains are the user domain, workstation domain and the LAN domain. As with all infrastructures these domains have their own tasks and responsibilities. The user domain is the first layer of the IT infrastructure defense system. This domain is used to access systems, applications, data and more. You will also find the AUP or Acceptable Use Policy here. The AUP is a policy tells the user what they are and are not allowed to do with any organization-owned IT equipment. This domain is affected by the Internal Use Only standard because it is the first partition of the IT Infrastructure. After the user domain, we have the workstation domain. This domain is used to configure hardware and hardening systems. Hardening systems is the process of ensuring that controls are in place to handle any known threats. This process is done by ensuring that the infrastructure has all the latest software revisions, security patches, and systems configurations. But these aren’t the only things that go on in the domain, this is also where the antivirus files are verified. While...

Words: 453 - Pages: 2

Premium Essay

Nt 2580 Project Part 1

...NT 2580 Intro to Info Security Project part 1 December 8, 2015 Headquarters Phoenix, AZ Branch 1 Branch 2 Branch 3 Atlanta, GA Chicago, IL Cincinnati, OH User Domain * Have employees sign confidential agreement * Introduce an AUP acceptable use policy * Have HR verify an employee’s identity with background checks * Conduct security awareness training * Enable content filtering and antivirus scanning * Restrict access to only info needed to perform job * Track and monitor abnormal behavior of employees Workstation Domain * Implement workstation log on ids and password * HR must define proper access controls for workers based on jobs * IT security must then assign access rights to systems, apps, and data * IT director must ensure workstation conforms to policy * Implement second level test to verify a user’s right to gain access * Start periodic workstation domain vulnerability tests to find gaps * Define workstation application software vulnerability window policy * Use content filtering and antivirus scanning at internet entry and exit * Mandate annual security awareness training LAN Domain * Setup of user LAN accounts with logon ID and password access controls * Make sure wiring closets, data centers , and computer rooms are secure * Define strict access control policies * Implement second level identity check * Define a strict software vulnerability window policy ...

Words: 1912 - Pages: 8

Free Essay

Computer Ethics

...Computer Ethics Angel L Rivera CIS106020VA016-1146-001 (Intro to Info Technology) Prof MERRITT, JENNIFER 8.7.2014 1-Describe two (2) potential computer ethics issues associated with holding computers hostage. A- Computer Crime: Attacks on Software through Back Doors or Trojan Horses- The intruder creates a malicious code just like they would to create other types of malware. The code is specifically designed to take control of your computer and then hijack all of your files. The files are then placed in an encrypted format so you no longer have access to them. B- Computer Crime: Attacks on People - Sabotage/Destruction of Data
-If you fail to pay, the intruder is capable of creating additional malicious code that will destroy the content of your PC a little bit at a time until you pay up. Another type of ransomware presents itself in the form of a Trojan, which scans all of your PC's directories and drives, and then automatically encrypts all of your files so you cannot access them. The Trojan places the finishing touch on the intrusion by leaving a ransom note. 2-Propose two (2) methods that computer users could use to prevent this type of attack. A- Your best defense is to not click on e-mail attachments from unknown sources and avoid clicking anything in a pop up window that you receive while browsing the Internet. B- Make sure your anti-malware software has the latest and greatest definition files so that it is prepared for the current batch...

Words: 512 - Pages: 3

Free Essay

Book

...StudName | StudAddr | PhNum | CourseCode | CourseName | UnitID | UnitName | StaffID | StaffName | StaffOffice | Grade | 101 | Jenny Teo | 123a Norwich Hse | 9911345 | 20241 | BBus(Acc) | Acc24 | Finance 2a | S045 | Paul Smith | D401 | D | 101 | Jenny Teo | 123a Norwich Hse | 9911345 | 20241 | BBus(Acc) | Law01 | Intro. Law | S022 | Elaine Ng | F213 | C | 101 | Jenny Teo | 123a Norwich Hse | 9911345 | 20241 | BBus(Acc) | Mgt21 | Org. Behaviour | S099 | Ann McCall | D211 | P | 112 | Warren Wills | 64 South St. Clayton | 9894387 | 30001 | BCom | Ais20 | Acc Info Systems | S120 | Peter Duffy | D411 | HD | 121 | Neil Smith | 123a Norwich Hse | 9911345 | 30001 | BCom | Acc24 | Finance 2 | S045 | Paul Smith | D401 | D | 121 | Neil Smith | 123a Norwich Hse | 9911345 | 30001 | BCom | Mkt10 | Intro Marketing | S111 | Dan Coleman | F210 | P | 130 | Joe Chan | 10 Wells St Frankston | 9901238 | 20242 | BBus(Acc) | Acc11 | Intro Accounting | S030 | Elli Blake | F109 | P | 130 | Joe Chan | 10 Wells St Frankston | 9901238 | 20242 | BBus(Acc) | Acc24 | Finance 2a | S046 | Paul Smith | D401 | D | 130 | Joe Chan | 10 Wells St Frankston | 9901239 | 20242 | BCom(Acc) | Law01 | Intro. Law | S022 | Elaine Ng | F213 | C | 130 | Joe Chan | 10 Wells St Frankston | 9901238 | 20242 | BBus(Acc) | Mkt10 | Marketing A | S111 | Dan Coleman | F210 | P | The following abbreviations have been used in this table: StudNum – Student identification number StudName – Student name StudAddr – Student...

Words: 1236 - Pages: 5

Premium Essay

Changing Our Lives

...Assignment 1: Ethical Issues in Information Systems Strayer University Professor April Hudson CIS109-Intro Mgt Info Systems   Privacy is one of the major ethical issues in today’s digital society. The collection of data by various electronic means, has pretty much ensured the age of total privacy is coming to an end. The ethical use of private information walks a thin line with the way information is given and received. Private information can be handle very delicately by a doctor’s office, but with the wrong click of the mouse. You can basically hand over your life to someone and have your life stolen. I personally chose social media as a way to stay in contact with most of my family and friends. Not until 2007 did I realize how social media worked and how privacy could become an issue. Posting the wrong picture or allowing someone to post a not so pleasing one of you could cause and ethical issue in the work place years later. Trying to get a job these days required you handing over your Facebook password and allowing people to form an opinion of you from what you do or say away from the workplace. The ethical issue behind this demand of you private life only start here. That’s why I learned to interact with social media very carefully. Watching what I post, and being aware of what other people post of myself. Protecting you privacy can be pretty easy. Being aware of what you say around a group of people is very important. For example, you’re at work and...

Words: 726 - Pages: 3

Premium Essay

Assignment 1 Ethical Issues in Information

...Assignment 1: Ethical Issues in Information Systems Antheus Bowden CIS109 – Intro Mgt. Info Systems Professor Arend Clayborn November 21, 2015 Ethics issues in information systems is the subject of this research paper, and if I was to choose one particular issue that interested me the most, it would be Privacy. It personally affected me in the workplace, so this paper will illustrate what I know firsthand. I’ll identify some human and technological protective measures I would use as security safeguards and enforcement actions in order to address the Privacy issue, list some problems related to management information systems that may arise from this issue, and propose at least one solution to address the problem in question. Privacy is the right of individuals to retain certain information about them without disclosure and to have any information collected about them with their consent protected against unauthorized access. In the workplace unfortunately, what we consider private could potentially be the reason for our employment or even our termination. Employers have monitoring systems that can measure performance and determine time spent at desk, and organizations, institutions, and firms can gather personal information and enter it into databases for their personal gain. One protective measure to safeguard my privacy would be to use a “private browsing mode”. That limits the web history kept on the computer, which will prevent others from accessing history...

Words: 522 - Pages: 3

Premium Essay

Swot Analysis Paper

...Strengths: - Chris executes on the strong intro. - He digs in to ask if the caller has the letter of explanation. Opportunities: - Verification. Chris pulls up the loan using a telephone #. He then goes on to verify the property address. Kelly, the wife calling in, is not listed on the loan as a client nor as an okay to speak with. There is also a discrepancy with the property address given--she states the city is Miami and AMP shows Cutler Bay. We have not gotten a successful verification on the loan, nor do we have permission to speak with Kelly. It is important that we protect our client's security by only speaking with them regarding loan specific info, unless we have permission, and verifying 3 pieces of ID. - Foreshadow timeframe of follow up. Chris begins to foreshadow to the caller that their is a possibility of reaching the mb's voicemail. However, he does not set the expectation that if this happens leaving a voicemail ensures a call back within 24 hours. It's important to set these expectations with our clients and to set our team members up for success....

Words: 559 - Pages: 3

Premium Essay

Fundamentals of Information Systems

...date of birth is 5/25/1965. 4. What date and time did patient #1298 visit the doctor’s office? What is the patient’s name and date of birth? Lucy Ann Johnson was born on 6/12/1975. She was seen by a doctor on 06/04/2011 5. What patient lives in 1704 N. Atlantic Ave Ontario, AZ 85320? What is its encounter number? John Peters lives on 1704 N. Atlantic Ave in Ontario, AZ. His encounter number is 111218. Patient Info Table | Pat# | Last_Name | First_Name | Middle_Name | Birthdate | 10259 | Pallares | Sofia | Yakaria | 9/18/1985 | 30528 | Peters | John | | 5/25/1965 | 1298 | Johnson | Lucy | Ann | 6/12/1975 | Patient Address Table | Pat# | Address | City | State | Zip | 10259 | 705 E. Woodlawn St. | Peoria | CA | 91762 | 30528 | 1704 N. Atlantic Ave | Ontario | AZ | 85320 | 1298 | 5150 W. Eugie St. | Glendale | NY | 95627 | Patient Visits Table | Pat# | Encounter_# | Date | Time | Provider_# | 10259 | 100876 | 20111221 | 10:00 | 2 | 30528 | 111218 | 20101105 | 11:30 | 3 | 1298 | 120548 | 20110604 | 17:15 | 1 | Provider Info Table |...

Words: 901 - Pages: 4

Free Essay

Arabizi

...Sections Found Accounting Select CRN Subj Crse Sec Cmp Cred NR 21138 ACC 201 01 M 3.000 Title Fund of Financial Accounting Days Time TRU Instructor Date Location Attribute (MM/DD) 02/03-06/01 SBM 009 Design Managmnt Major_Elective and Design Managmnt Minor_Elective and Economics Major_BAE_Elective and Eng'g Managmnt_Minor_Elective and MTH Major_Elective Design Managmnt Major_Elective and Design Managmnt Minor_Elective and Economics Major_BAE_Elective and Eng'g Managmnt_Minor_Elective and MTH Major_Elective Design Managmnt Major_Elective and Design Managmnt Minor_Elective and Economics Major_BAE_Elective and Eng'g Managmnt_Minor_Elective and MTH Major_Elective Design Managmnt Major_Elective and Design Managmnt Minor_Elective and Economics Major_BAE_Elective and Eng'g Managmnt_Minor_Elective and MTH Major_Elective Design Managmnt Major_Elective and Design Managmnt Minor_Elective and Economics Major_BAE_Elective and Eng'g Managmnt_Minor_Elective and MTH Major_Elective Design Managmnt Major_Elective and Design Managmnt Minor_Elective and Economics Major_BAE_Elective and Eng'g Managmnt_Minor_Elective and MTH Major_Elective Design Managmnt Major_Elective and Design Managmnt Minor_Elective and Economics Major_BAE_Elective and Eng'g Managmnt_Minor_Elective and MTH Major_Elective 09:00 Marian I. Mason am-09:50 (P) am NR 21139 ACC 201 02 M 3.000 Fund of Financial Accounting TRU Ronald D. 12:00 pm-12:50 Williams (P) pm 02/03-06/01 SBM 012 ...

Words: 48244 - Pages: 193

Premium Essay

Finance

...Requirements for Fall 2011, Spring 2012, Summer 2012 Undergraduate Program Office C140 PBB (319) 335-1037 http://tippie.uiowa.edu/undergraduate/ Finance 2011-12 This form is a planning tool only. To confirm specific graduation requirements, consult your degree audit on ISIS. I. General Education* (22-32 sh) Rhetoric Interpretation of Literature (req: completion of rhetoric) World Languages** Historical Perspectives International and Global Issues Values, Society, and Diversity Natural Sciences (lab not required) Social Sciences (excluding 6E:1, 6E:2) sh grade 4 3 0-10 3 3 3 3 3 Subtotal (I) ________ IV. Finance Major Requirements (20 sh) Required Major Courses* 6F:110 Financial Information Tech (coreq: 6F:100) (grade: S/F) 6F:111 Investment Management (prereq: 6F:100, coreq: 6F:110) 6F:117 Corporate Finance (prereq: 6F:100, coreq: 6F:110) 6A:120 Financial Acct and Reporting** (prereq: 6A:2) Choose three additional electives from the following: 6F:102 Principles of Risk Mgt & Insurance (coereq: 6F:100) 6F:103 Property and Liability Insurance (prereq: 6F:102); or 6F:104 Corp Fin Risk Mgt (prereq: 6F:102, coreq 6F:110); or 6F:105 Life and Health Insurance (prereq: 6F:102); or 6F:106 Employee Benefit Plans (prereq: 6F:102) 6F:108 Topics in Finance I (SP 09 or later, prereq: 6F:100) 6F:109 Topics in Finance II (prereq: 6F:100) 6F:112 Applied Equity Valuation (prereq: 6F:100) (req: 2.80 UI GPA). See Finance Department for special permission. sh grade 2 3 3 3 3 3 ...

Words: 1234 - Pages: 5