Free Essay

Wireless Vulnerabilities

In:

Submitted By battlet11
Words 2588
Pages 11
Wireless Vulnerabilities
DUE DATE: 01/10/2016
ISSC 680
BY: TAMMY BATTLE
PROFESSOR: Dr. Louay Karadsheh

Introduction What is vulnerability? Vulnerabilities are shortcomings in the physical design, association, strategies, work force, administration, organization, equipment, or programming that might be misused to make hurt framework. The objective of the preparatory helplessness evaluation is to add to a rundown of framework vulnerabilities (defects or shortcomings) that could be misused by a potential danger. For new frameworks, the quest for vulnerabilities ought to concentrate on security arrangements, arranged methodology, framework necessities definitions, and security item examination. For operational frameworks, break down specialized and procedural security highlights and controls used to ensure the framework. Weakness investigation includes the accompanying five security control territories: (FAA) * Technical – the computer hardware and software, modes of communication, and the system architecture. * Operational - methods that individuals perform as for as information system * Administrative - feeble countermeasures in the authoritative methodology that influence the information systems. * Physical - frail countermeasures in the physical design of, and access to, offices and fenced in areas where computerized data frameworks are house. * Personnel - feeble countermeasures in approach, procedure, and methods utilized for security screening of staff having entry to the system. I would like to focus my paper on Wireless Vulnerabilities, because assailants have discovered new parkways to exploit shortcomings in remote systems that, as a rule, have yet to be tended to by associations. There are a few known vulnerabilities that happen for the most part as a result of the very way of the LAN, which utilizes radio frequencies (RFs) to allow the transmission of information over the wireless transmissions. One noteworthy reason that various vulnerabilities happen, in both SOHOs and Enterprises, is on account of clueless client’s setup remote LANs without the reasonability important to secure these systems from noxious or even inadvertent occasions. (Lane, 2005) There are several known Wi-Fi vulnerabilities that some may know or may not know at which I will discuss a few such as: * No set physical boundaries - Remote access focuses can lose signals on account of divider, entryways, floors, protection and other building materials. The signs might likewise go into another client's airspace and join with their remote neighborhood. This is alluded to as incidental affiliations and can happen in thickly populated zones where a few individuals or organizations use remote innovation. * Default WiFi routers - Remote switches are delivered in an un-secured state. The aftereffects of this are an assailant can without much of a stretch interface with and arrange the switch to address his or her own issues. The dangers incorporate changing the DNS server settings to a static IP that is possessed by the assailant; or, transferring a hacked firmware rendition to the switch that could put the aggressor in full control of the information. Sniffing programs, remote filtering rambles, assault scripts, and more can be effortlessly introduced on the switch that can be undetected. * Untrained users setting up unauthorized workstations and network - This gathering constitutes clients who either are ignorant and along these lines uninformed of efforts to establish safety that should be taken while conveying remote, or whose longing to have remote is strong to the point that it totally dominates the principles set by the association to guarantee that frameworks are secure. These activities can be exorbitant to an association, in this manner it turns into the endeavor's obligation to change mentalities through training, and give approaches that layout results to violators. * Rogue access points - These might be illegal access indicates got the venture by representatives, or poor access point setup by the untrained worker depicted previously. A representative may likewise erroneously utilize SOHO access focuses that are not intended to be utilized as a part of a venture on account of its feeble security alternatives. Different mavericks might incorporate outside vindictive clients, for example, programmers taking part in war driving trying to get to the remote LAN from adjacent areas. * Lack of network monitoring – Intrusion detection apparatuses can be utilized effectively to ceaselessly screen for maverick access focuses. Not conveying a few methods for recognition with alerts and occasion information recorders for all intents and purposes leaves the entryway totally open to programmers or other undesirable clients. * Insufficient network performance - This happens when a system network is not intended for limit. With the headers, parcels, interframe dividing and different exercises that happen, throughput turns out to be altogether corrupted to bring about the remote LAN to work at about a large portion of its normal information rate. * MAC address filtering - A media access control (MAC) location is an one of a kind number appointed to a PC. In remote LANs this number is utilized to permit an entrance point to associate with a specific system. Complete dependence on this separating can bring about a security rupture as a client might change the MAC address, which changes its 'character', along these lines bringing about data fraud. This is otherwise called MAC Spoofing. * Man-in-the-middle attacks - Outer rebels can dispatch man-in-the-middle assaults that pull in authentic uniting access point movement at approval time, constraining clients to interface with the rogue. The programmer assembles all the verification data of the true blue PC as it join with the entrance point, and then uses this data to send a solicitation. The entrance point sends the virtual private system (VPN) test to the honest to goodness framework, which gives back a substantial reaction. The programmer utilizing this data professes to be the entrance point and the solicitation, challenge, reaction exchanges proceed with the programmer now giving off an impression of being true blue. * Denial of service Attacks - Outside mavericks can bring about Denial of Service (DoS) assaults where the system is overflowed with information packs driving clients to disengage persistently in this manner upsetting undertaking operations. These interruptions can be brought about by clamor from microwaves, cordless telephones, or different apparatuses that work on the 2.4 GHz radio recurrence on which 802.11b remote LANs likewise work. Disturbances can likewise be created by programmers utilizing access focuses to send separate summons. People may not know but the vulnerabilities I mention above also apply to cell phone and security devices.
Body
While during my research I came across an article that discusses the classes of vulnerabilities and attacks. A superior comprehension of vulnerabilities and assaults can be accomplished by gathering them in view of normal properties and similitudes. Numerous gatherings and "sorts" are regularly talked about in PC security messages and secure programming materials. These prominent classifications more often than not catch a deformity or a feeble innovation that empowers assaults or display an engaging, brief and helpful perspective for talking about vulnerabilities. (Meunier) This article covers several classifications, but I think that Classifications by Software Development LifeCycle (SDLC) Phase and Comprehensive, Lightweight Application Security Process (CLASP) is more reverent. The Software Development LifeCycle (SDLC) is scientific categorizations of this kind endeavor to order vulnerabilities as indicated by when they were presented in the product lifecycle. Traditionally, 6 stages are perceived: plausibility study, prerequisites definition, plan, usage, coordination and testing, and operations and support. At a fundamental level, this arrangement assembles the above stages into 3 bunches: outline (initial 3 stages), usage (stages 4 and 5), and operation and support. It was recommended that the timing of audits could be chosen in view of the stage in which a powerlessness sort could be presented. (Schuh, 2006) The configuration and execution qualification is especially speaking to PC researchers who need to contend the rightness of a calculation, convention or model in principle, independently from a usage that might be liable to unfavorable restrictions or botches bringing about vulnerabilities. For instance, helplessness might be because of an awful calculation being picked amid outline stages. Another might be because of a terrible execution of an effectively picked calculation, and in this manner the helplessness was presented sooner or later amid the usage periods of the system. The Comprehensive, Lightweight Application Security Process (CLASP Classification) is an arrangement of exercises intending to enhance security. (Secure Software) It utilizes an order concentrated on counting blunders, yet all the while incorporates conditions coming about because of slip-ups, and in addition occasions. It has the accompanying classifications at the top level which are: * Range and Type Errors: This consists of the “write-what-where conditions along with overflows of buffer and difficulties formatting the string. * Environmental Problems: This happens with failure of a generator * Synchronization and Timing Errors: For reasons unknown this incorporates factual assaults. It likewise incorporates "Catch replay", the helplessness to which is typically a convention blemish * Protocol Errors: This happens when the cryptographic are broken or at risk * General Logic Errors: This is a catch-all that incorporates things as differing as utilizing a "non-cryptographic" irregular number generator, or excessively couple of parameters being passed, making it impossible to a capacity (e.g., group string issues in "C"). When you have a frail, ineffectively arranged remote access focuses can trade off privacy by permitting unapproved access to the system. But there are countermeasures that you can apply to your wireless network or device to elevate those issues. Below I will discuss each area in detail so you are safe in every aspect. (Graham, 2006) * Eliminate Rogue Access Points: The best system for managing the risk of rogue access focuses is to utilize 802.1x on the wired system to validate all gadgets that are connected to the system. Utilizing 802.1x will keep any unapproved gadgets from uniting with the system. * Secure Configuration of Authorized Access Points: Associations will need to guarantee that all approved remote access focuses are safely arranged. It is particularly critical to change all default settings in light of the fact that they are well known and can be abused by aggressors. * Use 802.1x to Authenticate all Devices: Solid verification of all gadgets endeavoring to interface with the system can anticipate maverick access focuses and other unapproved gadgets from getting to be frail secondary passages. The 802.1x convention talked about before gives a way to emphatically validating gadgets preceding allotting those IP addresses. * Securing Wireless Client Devices: Two noteworthy dangers to remote customer gadgets are (1) misfortune or burglary, and (2) bargain. Misfortune or robbery of tablets and PDAs is a significant issue. Portable PCs and PDAs frequently store private and exclusive data. Therefore, misfortune or robbery of the gadgets might bring about the association to be infringing upon security regulations including the revelation of individual recognizing data it hosts gathered from third gatherings. Another danger to remote customer gadgets is that they can be bargained so that an assailant can get to delicate data put away on the gadget or use it to get unapproved access to other framework assets. Securing Wireless Networks (Cisco, Revision 2.1, July 19) * Use of Encryption: The best approach to secure your remote system from gatecrashers is to encode, or scramble, correspondences over the system. Most remote switches, access focuses, and base stations have an inherent encryption instrument. In the event that your remote switch doesn't have an encryption highlight, consider getting one that does. Makers frequently convey remote switches with the encryption highlight killed. You should turn it on. * Use anti-virus and anti-spyware software, and a firewall: PCs on a remote system require the same securities as any PC joined with the Internet. Introduce hostile to infection and against spyware programming, and stay up with the latest. On the off chance that your firewall was sent in the "off" mode, turn it on. (McDougall, 2004) * Turn off identifier broadcasting: Most remote switches have a system called identifier TV. It conveys a sign to any gadget in the region declaring its vicinity. You don't have to show this data if the individual utilizing the system definitely knows it arrives. Programmers can utilize identifier television to home in on helpless remote systems. Impair the identifier television instrument if your remote switch permits it. * Change the identifier on your router from the default: The identifier for your switch is prone to be a standard, default ID doled out by the maker to all equipment of that model. Regardless of the fact that your switch is not TV its identifier to the world, programmers know the default IDs and can utilize them to attempt to get to your system. Change your identifier to something just you know, and recollect to arrange the same one of a kind ID into your remote switch and your PC so they can impart. Utilize a watchword that is no less than 10 characters long: The more drawn out your secret key, the harder it is for programmers to break. * Allow only specific computers to access your wireless network: Each PC that can speak with a system is doled out its own particular one of a kind Media Access Control (MAC) address. Remote switches more often than not have a system to permit just gadgets with specific MAC addresses access to the system. A few programmers have imitated MAC addresses, so don't depend on this stride alone. * TURN OFF YOUR WIRELESS NETWORK WHEN NOT IN USE * Don’t assume that public “hot spots” are secure * Training and Educating Users: Notice that Figure 1 likewise incorporates clients as the fourth fundamental segment of remote systems administration. Similar to the case with wired security, clients are the key segment to remote systems administration security. Without a doubt, the significance of preparing and teaching clients about secure remote conduct can't be exaggerated. To be powerful, client preparing and instruction should be rehashed occasionally. * Network Auditing: Remote system reviewing is a vital piece of WLAN security arrangement. The system should be frequently evaluated for rouge equipment. In this strategy the system is checked and mapped for all entrance focuses and WLAN hubs. At that point this is contrasted and past system map. Generally accessible system mapping instruments like nets tumbler and wavelan-device can be utilized. Particular devices, for example, Air snort can be utilized for WEP splitting and examining the system for powerless keys, key reuse and WEP security settings. These techniques incorporate the same tests as those completed by programmers for breaking into the system.
Conclusion
Remote systems administration gives various chances to expand efficiency and cut expenses. It additionally changes an association's general PC security hazard profile. In spite of the fact that it is difficult to thoroughly dispose of all dangers connected with remote organizing, it is conceivable to accomplish a sensible level of general security by embracing an efficient way to deal with surveying and overseeing hazard. This paper examined the dangers and vulnerabilities connected with each of the three fundamental innovation parts of remote systems (customers, access focuses, and the transmission medium) and portrayed different generally accessible countermeasures that could be utilized to alleviate those dangers. It likewise focused on the significance of preparing and teaching clients in safe remote organizing strategies.

Bibliography
Cisco. (Revision 2.1, July 19). Dictionary Attack on Cisco LEAP Vulnerability.
FAA. (n.d.). Develop Preliminary Vulnerability and Risk Assessment.
Graham, S. E. (2006). Wireless Security.
Lane, H. D. (2005). Security Vulnerabilities and Wireless LAN Technology. SANS Institue InfoSec Reading Room, 18.
McDougall, P. (2004). Laptop Theft Puts GMAC Customers' Data at Risk.
Meunier, P. (n.d.). Classes of Vulnerabilities and Attacks. Wiley Handbook of Science and Technology for Homeland Security, 20.
Schuh, M. M. (2006). Identifying and Preventing Software Vulnerabilities. The Art of Software Security.
Secure Software. (n.d.). Comprehensive, Lightweight Application Security Process.

Similar Documents

Premium Essay

Mr Security

...VULNERABILITY ASSESSMENT WHITEPAPER Automating Vulnerability Assessment This paper describes how enterprises can more effectively assess and manage network vulnerabilities and reduce costs related to meeting regulatory requirements. Automated Vulnerability Assessment / Vulnerability Management (VA/VM) solutions are supplementing and in some cases replacing manual penetration testing with an overall improvement in network security without increasing costs. New advances have eliminated the high management overhead and false positive rate issues that plagued open source and early market VA/VM entries. This whitepaper discusses: Speed of change in networks, equipment and applications plus the speed of exploit deployment is revealing weakness in corporate policies specifying relatively infrequent manual penetration testing. Perimeter defences (anti-virus, firewall and IPS/IDS) are vital, but can be bypassed by determined effort to reach and exploit known vulnerabilities that reside just inside the fence. The introduction of an automated network scanning mechanism and consolidated reporting to identify and track mitigation of known vulnerabilities is establishing a higher overall security level often using already existing budget and manpower. Table of Contents Introduction................................................................................................................................................... 3 The Challenges of Network Security Assessments .......

Words: 3435 - Pages: 14

Free Essay

Executive Proposal

...Research to invest personal for the sole purpose of constant testing of network security and vulnerability; therefore ensure AR’s safety of intellectual property. Table of Contents Executive Summary……………………………………………………………………….2 Introduction………………………………………………………………………………..2 Recommendations…………………………………………………………………………3 Budget……………………………………………………………………………………...4 References………………………………………………………………………………….4 Executive Summary Advanced Research (AR) is on its way to becoming a major player in the medical research and development industry. However, suspicion that the corporate network infiltrated from unauthorized sources more than once, indicated the lack of solid security measures. The false allegations of unethical research and development practices are proof of such accesses. Despite the security troubles and false allegations, AR has experienced a 40% increase in business and as result of the increase AR has hires more stuff. The increase traffic is another indication that AR needs a sure and effective method to securing employee’s credential and devices. AR’s innovative research and development information is paramount to its continued success as a company. AR must enhance every security measure to meet the increase in business and procurement of new tools, personal and advance software for the sole purpose of testing the vulnerabilities in our...

Words: 1213 - Pages: 5

Premium Essay

Ddos

...Cyber-Core Steven Paul Schwartzle American Military University ISSC363 Professor Carol Tannoury The risk methodology that will help Cyber-Core evaluate their security structure is a daunting task, however with the right tools can be very rewarding. Knowing the over-all methodology can help the clients understand the process and the steps that help do the assessment. Qualified and experienced consultant who will work on site with you and your team to examine each of the ten risk areas (described below) in sufficient detail to identify the strengths and weaknesses of your current security posture. All this information consolidated into a tailored, immediately usable action plan that will help you close the gap between recognized good practice and what you are actually doing. The assessment can also find bottlenecks within the network that slow data and cause unnecessary downtime. Reports are produce so that concerns or problems will easily identified. Our organization finalizes the assessment and makes recommendations for improvements on the network. Our assessment included five major attributes, which are infrastructure, performance, availability, management, and security. When the final assessment is finished, the collected data reviewed for problems that negatively affect the network. We test the network at multiple levels for enterprise deigns errors, application problems, and equipment and circuit errors. We do not take our...

Words: 612 - Pages: 3

Premium Essay

Nt1310 Unit 3 Assignment 1 Network Security

...At the accounting firm, I have discovered several vulnerabilities in regards to the organizations network security. Starting with the current router, the NetGear WGR614 is an 802.11b wireless networking device originally released in 2002, it only has wired equivalent privacy (WEP) security, and has an approximate 1650 Ft. range. While the use of this router may deter the most basic intrusion attempts from individuals searching for quick access to a network. It was originally produced over 14 years ago and its age leaves it with out of date technology. The NetGear’s WEP security provides attackers who have the proper tools quick access to the network, because WEP security reuses a portion of the encryption key or initialization vector (IV) due to the limitation on the IV character size. The small IV size allows individuals with...

Words: 558 - Pages: 3

Premium Essay

Nt2580 Unit 1 Lab 1 Report

...Lab #1 – Report file Identifying Threats and Vulnerabilities in an IT Infrastructure Course Name and Number: Risk Management IS355 Student Name: Sherry Best Instructor Name: Nicole Goodyear Lab Due Date: 1/16/2018 In your Lab Report file, describe how risk can impact each of the seven domains of a typical IT infrastructure: User, Workstation, Local Area Network (LAN), Local Area Network to Wide Area Network (LAN-to-WAN), Wide Area Network (WAN), Remote Access, and System/Application domains. Risk is the likelihood that a loss will occur. A loss results in a compromise to business functions or assets. • User Domain can come in various forms; people are the weak link here such as a user writing a password on a sticky note and sticking under the keyboard or on the monitor. Unknown to the user a malicious individual can log unto the network or domain using that person's credential to steal or launch a DoS or a DDoS attack. This can overwhelm the entire network that can lead to loss of revenue for the organization....

Words: 695 - Pages: 3

Premium Essay

Multi-Layered Security Plan

...Earlier today, I was instructed to create a general purpose outline for our company’s multi-layered security plan. There are seven (7) domains in a typical IT infrastructure: User Domain, Workstation Domain, LAN Domain, LAN-to-WAN Domain, WAN Domain, Remote Access Domain, and System/Application Domain. Each domain has their own unique risks, threats, and vulnerabilities that need to be mitigated in order to ensure our company’s security. In the User Domain the first thing that should be done is create an acceptable use policy (AUP). An AUP defines what users are allowed to do with organization-owned IT assets. Violation of the terms defined in the AUP can be grounds for dismissal. We will require staff and other 3rd parties to sign a confidentiality agreement to keep private data confidential. In addition to signing a confidentiality agreement, some positions may require criminal background checks to help ensure security. Here at Richman Investments we need to conduct security awareness training, insert reminders in banner greetings, and send email reminders to employees with security related tips. Disabling internal CD drives and USB ports will help keep employees from accessing personal photos, music, and videos at work. Also enabling automatic virus scans for email attachments and all new files that reach the workstation. The Workstation Domain is where most users connect to the IT infrastructure. A Workstation can include a computer, smartphone or any other device that...

Words: 807 - Pages: 4

Premium Essay

Iss Unit 2 Homework

...Eric Mcknight 7/6/2012 Unit 2: Assignment 1: Calculate the window of vulnerability. To calculate the window of vulnerability (WOV) we will first need to know the amount of time It will take to get a working solution. In this case, we need a patch to solve the issue. We already know that it will take Microsoft 3 days to get a patch out to us. So, we can start with three days. After that, we need time to test the patch, and publish it out to the active directory update servers. This will usually take a few days according to the book. After it is all tested on the equipment, we need to push out the update to all of the client computers and servers. This will usually take a day or so. Also, depending on if the IT staff works on the weekends to solve the problem that will add another two days to fix the problem. So, to add it up, It takes three days to get the patch, Up to five days to test the patch, and another day or two to publish the patch out to all of the client computers. All in total, this will take around a week to solve this issue. My personal opinion is any IT personal that takes a WEEK to solve a major security breach should be fire. Personally, I would put immediate measures in place to solve the issue such as blocking the mac address, immediately writing scripts and programs to detect intrusions in the hole, and block out the attacker. Taking more than a day or two for testing is major overkill for fixing a major hole. But, that is my...

Words: 287 - Pages: 2

Premium Essay

Data Prevention Breach

...6 StepS to prevent a Data Breach For companies that have critical information assets such as customer data, intellectual property, trade secrets, and proprietary corporate data, the risk of a data breach is now higher than ever before. To monitor and protect information from hackers, malicious and well-meaning insiders, organizations should select solutions based on an operational model for security that is risk-based and content-aware. Here are six steps that any organization can take, using proven solutions to significantly reduce the risk of a data breach. 1 2 3 4 5 6 Stop incurSion By targeteD attackS The top four means of hacker incursion into a company’s network are through exploiting system vulnerabilities, default password violations, SQL injections, and targeted malware attacks. To prevent incursions, it is necessary to shut down each of these avenues into the organization’s information assets. Core systems protection, IT compliance controls assessment automation, and endpoint management, in addition to endpoint, Web, and messaging security solutions, should be combined to stop targeted attacks. iDentify threatS By correlating real-time alertS with gloBal intelligence To help identify and respond to the threat of a targeted attack, security information and event management systems can flag suspicious network activity for investigation. The value of such real-time alerts is much greater when the information they provide can be correlated in...

Words: 642 - Pages: 3

Premium Essay

How to Secure Your Systems

...How to Secure Your Systems Networking Security Fundamentals CIS 333 July 28, 2012 How to Secure Your Systems When we think about technology we think of all the capabilities it gives us and also the headaches it brings. In today's technological world there are many vulnerabilities to the computer networks that we have. If there is a malicious attacker exposes these vulnerabilities can affect the company in many ways. We know that your business could be interrupted causing you thousands of dollars in damage. Not only could you lose business by your network going down, but you can also lose consumer confidence, and ensure the possible penalties imposed on you by the government for not properly securing your customers imperative information. This is why we will be looking at different measures that we can take to be proactive and prevent this from happening. There are several methods or should we say concepts available to the network administrators to help them in securing the networks or should we say the concept of defense-in depth, which is a concept that uses multiple defense strategies. This is a concept that all network administrators and security personnel should practice. Using this method will add several layers of security to your network. Two of those concepts or solutions are DMZ’s (Demilitarized Zones) and IDS’s (Intrusion Detection Systems). DMZ is a physical or logical sub-network that contains and exposes an organization’s external services to a larger untrusted...

Words: 1667 - Pages: 7

Premium Essay

Windows of Vulnerablity

...of the window of vulnerability (WOV), the LAN administrator needs to get the patch from Microsoft. Upon contact Microsoft has determined that it will take up to no less than three business days for the patch that we requested to be made available to us. Once we receive the patch we would need approximately several hours to download and then test out the patch to be certain that the patch will work and that this is the correct action to take to fix the Window of Vulnerability and seal the security breach on the Server Message Block server. Upon completion of testing the IT staff would need to hold a meeting to assess the quickest and most correct course of action to take after the patch has been installed to determine how to apply the patch apply it to the server and also to client computers depending on the process the IT staff decides to take it can take anywhere from one to three business days for the completion date to be met. If the IT staff were to work around the clock for overtime in shifts and the security breach was reported on a Friday with three days for the patch to be made and a week to troubleshoot and test the patch. The Window of vulnerability would be close to two weeks of time where their system can breached again and my recommendation if I were the administrator to remedy this gap of time I would attempt to have around the clock staff working on this in order to prevent further breaches of security until the (WoV) Window of Vulnerability is closed off and...

Words: 393 - Pages: 2

Premium Essay

Impact of Data Classification Standard

...the standard and are affected by "Internal Use Only" are the User, Workstation and LAN domain. The user domain is made up of the people who can access the information with an AUP. This domain is considered one of the weakest and most affected for several reasons, but mostly the lack of user awareness. The second is the workstation domain. This domailn is made up of the devices that employees use to connect to the IT infrastructure. This domain requires a strong security and controls because this is where users first access the system. If you can have unauthorized user access situation; make sure you have a strong password and screen lockout policy in place. If you have any software vulnerabilities or software patch updates that are needed; make sure you have the workstation OS vulnerability window policy in place so to it can be consistently monitored and updated. And the third domain is the Local Area Network domain. The LAN Domain is a collection of computers connected to one another or to a common medium. All LAN domains include data closets, physical elements of the LAN, as well as logical elements as designated by authorized personnel and requires a strong security and access controls. This domain can access company-wide systems, applications, and data from anywhere within the LAN. The LAN support group is in charge maintaining and securing this domain. The biggest threat to the LAN domain is Un-authorized access to anything (the LAN, the systems, & the data) on...

Words: 286 - Pages: 2

Premium Essay

Computer Forensics and Cyber Crime

...survey or audit can also be referred to as a vulnerability analysis. A security survey is an exhaustive physical examination whereby all operational systems and procedures are inspected thoroughly (Fischer & Green, 2004). A security survey involves a critical on-site examination and analysis of a facility, plant, institution, business or home to determine its current security status, its current practices deficiencies or excesses, determine level of protection needed, and ways of improving overall security levels are recommended. A security survey can either be done by in-house personnel or by external security consultants. However, outside security experts are preferred their approach to the job would be more objective and would not take some parts of the job for granted therefore resulting to a more complete appraisal of current conditions. A security survey/audit should be carried out regularly so as keep improving to and up to date especially with the growing rate of technology. Overall objectives of a security survey are: determination of current states of security, location various weaknesses in the security defenses, determination of level of protection required and finally give recommendations for the establishment of a total security program (Fischer & Green, 2004). Some weaknesses identified in the process of a security survey may be: vulnerability to injury, death or destruction by natural causes, vulnerability of corporate assets to outside and within criminal...

Words: 686 - Pages: 3

Free Essay

Vlt2Task1

...gateway to allow the attacker access to the compromised server, without intervention or further initiation from the unsuspecting user. This may have been one possible highway that was used by the attackers to gain access to and delete data from the customer website. Open Ports & Services – By default, many server type operating systems leave a large quantity of ports open. This allows greater configurability and compatibility for software and server based services. However, leaving these default ports and a multitude of default services in operation, increase the attack surface and overall vulnerability of the server. These vulnerable ports allow for attacks such as ‘Denial of Service’, and this may have been factor in the latency and slowdown experienced by employees and customers alike. Missed Patches – Every day new attack vectors are discovered, and operating system and software vulnerabilities are identified. Many server type operating systems come with a robust security suite, however these security measures fail to identify new threats if patches are not being kept up to date and installed on a regular interval. By missing updates, hackers utilize the new attacks against the server. Backdoor Access – Often installed alongside a rootkit or Trojan, backdoor’s leave a permanent route of ingress unknown to the end-user. This access allows the hacker to gain access to the system and remote...

Words: 2778 - Pages: 12

Premium Essay

Sdhhsdh

...Securing Windows applications requires hardening each application to protect it from potential vulnerabilities. Your job is to select the best control to address each of the anticipated vulnerability. You have been given the task of reviewing security policy and recommending the best security controls to respond to vulnerabilities the security team has identified for the new enterprise resource planning (ERP) software. You can select from a short list of security controls to detect or prevent each stated threat. For each vulnerability, select the best control to ensure Ken 7 Windows Limited fulfills the stated requirements to secure its application software. Select from these security controls: a. Place a firewall between the Internet and your Web server. b. Place a firewall between your Web server and your internal network. c. Remove the mail server service. d. Require encrypted connections for all remote ERP clients. e. Apply the latest security patches. f. Use a packet sniffer to view the contents of network packets. g. Require all personnel attend a lunch and learn session on updated security policies. Identified ERP software vulnerabilities: a | 1. The ERP software vendor reports that some customers have experienced denial-of-service (DoS) attacks from computers sending large volumes of packets to mail servers on the Web server computers. | | 2. | g | 3. Users that leave their workstations logged in during long durations...

Words: 297 - Pages: 2

Free Essay

Unit 1 Assignment 1 Is3110

...For YieldMore Executives, We here in your IT department have recently audited our infrastructure for our company’s network. Upon the review we did find several threats and vulnerabilities. First off is the fact we do not have a backup system in place for any natural disaster to our headquarters. This is an exploit found in the systems and application domain that can cripple our whole company. A second system found in one of the production center could be able to be installed in case of said disaster to our corporate headquarters. Our second issue is the possibility of our sales force using their own computers to remote access into our network. There could be malware installed in their hardware at home and can be sent to our network to infiltrate our system. Good practice to this is to supply company laptop to sales and have restrictions to known websites with malware downloads to help avoid infections and malware to our system. This area is on the remote access domain and needs to be looked at on a constant basis. The third issue would be in the user domain. Any terminated or disgruntled employee can load issues to our system and need to be expelled from our system as soon as they are gone from the company. A fourth issue would be password safety. We must assume that passwords are not secure since most of our labor is found outside of our three building units. A policy to have the user change his or her password on a frequent basis will in fact...

Words: 361 - Pages: 2