Free Essay

Nt2580 Unit 5 Assignment 1

In: Computers and Technology

Submitted By saintjay
Words 258
Pages 2
It255 Unit5 Assignment
TO:
FROM:
DATE:
SUBJECT:Unit 5 Assignment 1: Testing and Monitoring Security Controls
REFERENCE: Testing and Monitoring Security Controls (IT255.U5.TS1)
How Grade: One hundred points total. See each section for specific points.

Assignment Requirements

Part 1:Identify at least two types of security events and baseline anomalies that might indicate suspicious activity. Explain why they might indicate suspicious activity.(Forty points. Twenty points for each event.)

# | Security Event & Baseline Anomaly That Might Indicate Suspicious Activity | Reason Why It May Indicate Suspicious Activity | 1. | Authentication Failures | Unauthorized access attempts | 2. | Network Abuses | Employees are downloading unauthorized material. | 3. | | | 4. | | | 5. | | | 6. | | |

Part 2: Given a list of end-user policy violations and security breaches, select three breaches and consider best options for monitoring and controlling each incident. Identify the methods to mitigate risk and minimize exposure to threats and vulnerabilities. (Sixty points. Twenty points for each breach.)

# | Policy Violations & Security Breaches | Best Option to Monitor Incident | Security Method (i.e., Control) to Mitigate Risk | 1. | A user made unauthorized use of network resources by attacking network entities. | Monitor the logs | Fire the user | 2. | Open network drive shares allow storage privileges to outside users. | | | 3. | Sensitive laptop data is unencrypted and susceptible to physical theft. | Monitor for port scanning and malware | Encrypt the data | 4. | Remote users do not have recent patches or current updates. | | | 5. | Legitimate traffic bearing a malicious payload exploits network services. | | | 6. | An invalid protocol header disrupts a critical network service. | | | 7. | Removable storage drives introduce malware filtered only...

Similar Documents

Free Essay

Nt2580 Assignment 1

...NT2580 Network|| NetRange|76.74.255.0 - 76.74.255.127| CIDR|76.74.255.0/25| Name|PEER1--AUTOMATTIC-SERVERBEACH-ACCOUNT--01| Handle|NET-76-74-255-0-1| Parent|PEER1-SERVERBEACH-08A (NET-76-74-248-0-1[->0]) | Net Type|Reassigned| Origin AS|| Organization|Automattic, Inc (AUTOM-93[->1]) | Registration Date|2012-03-26| Last Updated|2012-03-26| Comments|| RESTful Link|http://whois.arin.net/rest/net/NET-76-74-255-0-1| See Also|Related organization's POC records.[->2]| See Also|Related delegations.[->3]| Organization|| Name|Automattic, Inc| Handle|AUTOM-93| Street|60 29th Street #343| City|San Francisco| State/Province|CA| Postal Code|94110| Country|US| Registration Date|2011-10-05| Last Updated|2011-10-05| Comments|| RESTful Link|http://whois.arin.net/rest/org/AUTOM-93| Function|Point of Contact|| NOC|NOC12276-ARIN (NOC12276-ARIN[->4])|| Abuse|NOC12276-ARIN (NOC12276-ARIN[->5])|| Tech|NOC12276-ARIN (NOC12276-ARIN[->6])|| Admin|NOC12276-ARIN (NOC12276-ARIN[->7])|| Point of Contact|| Name|NOC| Handle|NOC12276-ARIN| Company|Automattic| Street|60 29th Street #343| City|San Francisco| State/Province|CA| Postal Code|94110| Country|US| Registration Date|2011-10-04| Last Updated|2012-10-02| Comments|| Phone|+1-877-273-8550 (Office)| Email|ipadmin@automattic.com| RESTful Link|http://whois.arin.net/rest/poc/NOC12276-ARIN| bossip.com registry whois|Updated 1 second ago - Refresh[->8]| Domain Name: BOSSIP.COM Registrar: GODADDY.COM...

Words: 741 - Pages: 3

Premium Essay

Unit 5 Nt2580

...Unit 5 Assignment: Acceptable Use Policy (AUP) Definition The Richman”s Investment Group updated (AUP) Acceptable Use Policy for January 2014 for both acceptable and unacceptable use of the Internet use operated or owned by Richman’s Investment. Any violations in this agreement policy may result in disciplinary and/or legal action. Penalties can range from immediate termination of employment to imprisonment with fines. Internet Usage • Any and all employees of Richman’s Investment are encouraged to use the internet where such use is needed and is in stride to goals and objectives of the business of Richman’s Investments. • The equipment and services belong to Richman’s Investments and there reserve the right to monitor any or all internet traffic including emails and any data sent or received. • Using Richman’s Investment hardware, software and or internet to hack into unauthorized websites is strictly prohibited. • The use of any and all bit torrent software or sites is not allowed on any network, owned or operated by Richman’s Investment do to its high risk of abuse and or misuse. • No viewing or distributing of inappropriate material on the internet owned or operated by Richman’s Investments and will result in termination of employment. • Any and all downloads done off of the internet must be scanned before opening or accessing (NO ACCECPTIONS). • Using Richman’s Investments hardware, software and or internet to form and sort of fraud, and/or software, film or......

Words: 323 - Pages: 2

Free Essay

Nt2580 Unit 1 Assignment Impact of Data Classicification

...Unit Assignment 2: Impact of a Data Classification The Internal Use Only data classification standard of Richman Investments has many different infrastructures domains that are affected via internal use only data classification. More than all others, the three infrastructures that are affected the most are the User Domain, Workstation Domain and the LAN Domain. The reason why the User Domain infrastructure is one of the most affected infrastructures is because the User Domain infrastructure is the infrastructure that allows users to access the network. This is a problem because many users do not fully understand everything, all the time and thus is bound to make a mistake sooner or later. With so many users on our network, this is probably the most vulnerable domain infrastructures in our network. The Workstation Domain is also another domain infrastructure that has great reason to be affect by internal use only data because this is where the user connects to the our network. The reason that this can cause security threats and other problems is because this domain can be connected via a personal laptop or even a cell phone or other mobile device. The final infrastructure domain that is greatly affected is the LAN domain. The reason that this domain infrastructure is affected by internal use only data is because this domain is the open domain available companywide, to anybody in the building or even near the building via a wireless device. If we watch these specific......

Words: 280 - Pages: 2

Premium Essay

Unit 5 Assignment 1

...Shamone Gayles Unit 5 exercise 1: Guided Reading Chapter 10 1. What is the typical organization on an argument essay? Introduction /summary of opposing positions including strengths/ limitations of opposing positions/Your understanding of the issue, describing both strengths and limitations of your position/Reasons your understanding is better than the opposing views’ understanding/ Conclusion 2. What are points of contention, and how do you identify them? My position verses opposing positions, by coming up with the best arguments against your position yourself so you are prepared to counter them. 3. Why is it important to know the stance of your opposition? By knowing your opposition, you can identify the weaknesses in your stance and how to remedy them. 4. What is the difference between argument and research paper? In an argument you pick a topic that is controversial and debatable, whereas in a research paper, you do your research and only report what you find, while not trying to sway in either direction. Chapter 24 1. What is a good way to start the research process? Define your research question and sharpen it/ develop a working thesis that offers your best guess about how you will answer the research question/ devise a research plan to systematically collect the information needed to answer your research question and determine whether you’re working thesis is verifiable. 2. Why is it important to have a sharp research......

Words: 724 - Pages: 3

Free Essay

Nt1110 Unit 5 Assignment 1

...A port expander is a hardware device that will allow users to utilize multiple devices on a single port at the same time. It is the same principle as using a power strip for the power in a home or a splitter for the cable. For example, if you only have 1 Universal Serial Bus (USB) port, yet you have a USB mouse and keyboard, then you can use a USB port expander to allow one port slot to become multiple ports and plug in the mouse and keyboard. Allowing multiple devices to be able to connect to a single port is a major advantage to port expanders. However, one of the biggest drawbacks is that the speed of that port is now divided throughout all the expansion ports, an example being a 3Gbps port expanded to accommodate 4 ports will now have to split that 3Gbps between all 4 ports and not 3Gbps per expansion slot. There are two types of port expanders: internal and external. An internal port expander will usually connect to the motherboard and have an expansion plate with multiple ports along the box of the computer. An external port expander will plug into an existing port (such as a USB) and will then have multiple connections off of the port expander. Port expanders are also very generic and will allow expansion on just about any computer. There are many ports available that come with port expansion hardware. Some examples are, but are not limited to, USB Port Expander Hardware, Microphone Port Expander Hardware, FireWire Port Expander Hardware, Serial Port......

Words: 335 - Pages: 2

Free Essay

Unit 5 Assignment 1

...pasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmrtyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnm Unit 5 Assignment 1:Future Statement Brain Mapping 8/1/2013 Troy Jones (16609262) GS 1140 | I find the future of Brain Mapping Technology very exciting! Think of it, science has already begun to do this. Can you imagine if we could look at the brain and find exactly where our actions come from? Thoughts, behaviors, actions, and brain trauma/disease just to name a few could be improved upon or better yet cured! This would have a huge impact on our society. Brain diseases like (ALS) Lou Gehrig’s disease for example could be impacted greatly. I personally lost my oldest brother to ALS last year. He was only 54 and died nine months after the diagnosis. It’s a brutal disease. I would like to in vision a future for people without ALS or Autism. Curing......

Words: 274 - Pages: 2

Premium Essay

Nt2580 Unit 4 Assignment 2

...Dallas Page July 17, 2015 Unit 4 Assignment 2 NT2580 Acceptable Use Policy Definition 1. Overview To protect the integrity, confidentiality and accessibility along with the safety of our clientele and employees it is necessary that a precise set of standards must be defined for anyone who utilizes the electronic devices to access information via the internet. Richman Investments is committed to protecting employees, partners and the company from illegal or destructive actions whether knowingly or unknowingly. Internet or Intranet related systems, including but not limited to the World Wide Web, storage media, operating systems, network accounts and electronic mail are intended to be used for business pertaining to Richman Investments. It is the responsibility of each electronic device user to know the guidelines of the Acceptable Use Policy and to adhere to the Acceptable Use Policy of Richman Investments. 2. Purpose To outline and give a clear precise definition of what is and what isn’t acceptable when using the property of Richman Investments. Property including but not limited to computers, internet service, email service, storage media, operating systems or network accounts. Inappropriate use of either of the aforementioned exposes Richman Investments to legal liability and/or risks of damage to company hardware and/or software. 3. Scope The Acceptable Use Policy applies to all employees, contractors, clients, visitors and partners to...

Words: 689 - Pages: 3

Premium Essay

Nt2580 Unit 1

...NT2580-M1 Introduction to Information Security Unit 1: Information Systems Security Fundamentals 2015-Summer, 6/20/2015, Saturday (9:00am – 1:30pm) Student Name ___________________________________ Lesson Plan Theory (in class, Lab #2)……………………………..…………………..……...2 Reading  Kim and Solomon, Chapter 1: Information Systems Security. Objectives……………..………………….……………………………….2 Student Assignments for this Unit Unit 1 Lab Perform Reconnaissance & Probing Using ZenMap GUI (Nmap) Lab #1: Performing Network Reconnaissance using Common Tools Overview and access vLab..............................................................................................3 Part 1: Exploring the Tools used in the Virtual Lab Environment……………16 Unit 1 Assignment Match Risks/Threats to Solutions Part 2: Connecting to a Linux Machine …………………. .........................44 Unit 1 Assignment Impact of a Data Classification Standard Part 3: Using Zenmap to Perform Basic Reconnaissance ……………………59 Appendix A. SYLLABUS………………………………………………..……..………….69 B. Forgot your password?………………………………………………..……..73 Instructor: Yingsang “Louis” HO Tel: 425-241-8080 (cell), (206) 244-3300 (school) Email: yho@itt-tech.edu NT2580_2015_Summer_M1_UNIT1.doc Page 1 of 76 Unit 1: Information Systems Security Fundamentals Learning Objective  Explain the concepts of information systems security (ISS) as applied to an IT infrastructure. Key Concepts  Confidentiality, integrity, and......

Words: 3379 - Pages: 14

Premium Essay

Pm3110 Unit 5 Assignment 1

...Intro to Project Management Hector Diaz PM3110 7/23/15 Instructor: Muhammad Bashir Unit 5 Assignment 1; Simulation/Case Study: The Dulhasti Power Plant After reviewing case study 8.1 in unit 5 of the textbook Project Management: Achieving Competitive Advantage (2nd Edition), I was tasked to elaborate on the challenges of delivering an accurate cost estimation when working on harsh geographical conditions. It was observed in the case study that the geographical location chosen for the construction of the Dulhasti Power Plant in the provinces of Jammu and Kashmir, had become too much of a concern for investors and project coordinators, mainly due to a disputed border conflict between India and Pakistan. Not only did the budget increased exponentially over a 20-plus year period (due to the fact that this project was conceived in 1983), but concerns about the local terrorist and nationalist groups in and around the border began to raise numerous questions regarding safety and of course, budgeting (in the sense of hiring extra security to patrol the area). When the Indian government used a fixed-price contract to favor the lowest bids when initially beginning the project, it was believed to be the best method of approach at the...

Words: 438 - Pages: 2

Free Essay

Nt2580 Unit 1 Assignment 2

...------------------------------------------------- Nt2580 - Unit 1 Assignment 2: Impact of a Data Classification Standard Richman Investments Internal Use Only Data Classification Standard Domain Effects Richman Investments has implemented an “Internal Use Only” data classification standard. This report will describe the effects of the Internal use Only Standard on our respective system domains. “Internal Use Only” sets up a restricted access security policy to our network. Any access, including from a website would require company mandated credentials to log on and enter the system. This type of policy is enforced because companies do not want to allow “free access” to their network for potential threats to their system or their security. This policy will impact three of the seven domains. These include: * User Domain * Define: This Domain defines what users have access to the information system.   * Policy Impact: The IT Team will use the User domain to define who has access to the company’s information systems. The domain will impose an acceptable use policy (AUP) that will define the permissions of what actions a user may make while inside the system. These permissions may also be defined by the data they are accessing at the time. All third party users (vendors, contractors, outside users, etc.) must also agree to the AUP. Any violation will be reported to management and/or the authorities, depending on the violation. * Workstation......

Words: 508 - Pages: 3

Premium Essay

Unit 5 Nt2580

...Tyler Hopkins 10/14/15 Unit 5 testing and monitoring security controls The Two popular types of security events that might indicate suspicious activity are Authentication Failures, and Unauthorized Access Attempts. Most times you will get this when you have failure due to device denying connection or incorrect password being entered in. Some system administrators set up alerts to let them know when there is an unauthorized access attempt, so that they may investigate the reason. These alerts can help stop hackers from gaining access to a secure or confidential system. Many secure systems may also lock an account that has had too many failed login attempts. When it comes to baseline anomalies that might indicate suspicious activity Network Abuse and Employees are downloading unauthorized material. That is why there are many policies out there to monitor the network abuse and employee abuse of unauthorized material. -Predictable passwords meet minimum length requirements but remain easily guessable. The solution to this problem is simple. You set a guideline for passwords for your employees to make it contain a set number of characters and numbers. And the passwords have to be changed every 30 days. -Sensitive laptop data is unencrypted and susceptible to physical theft. The solution to this problem is to encrypt all files and drives and sensitive info to make sure if it falls into the wrong hands they will not be able to destroy it. -A user made unauthorized use of......

Words: 264 - Pages: 2

Free Essay

Unit 5 Assignment 1 Video

...Unit 5 Assignment 1: Video Summary NT1110 There are two major manufactures we use in today’s market which are Intel and AMD. There are some minor competitions but don’t stay on the market for long. The system bus for the CPU is also known as the Front-side bus as it inserts the CPU and has a 64 bit data pass. In the CPU theirs a controller that controls communication between the motherboard and other components with the CPU. The ALU is responsible for performing complex calculations. Communications between the controllers and the ALU’s uses a 32 bit wide internal data bus. A processor is usually measured in GHz. A system Bus is usually measured in MHz and has limiting factors of speed. The multiplier is the ratio between processor and the System bus. The system bus speed x multiplier equals the processor speed. CPU manufactures have come up with different ways to make the CPU work faster. Two multi-processing requires multiple processors (In other words your system must be designed to support more than one CPU on a single motherboard). Dual Core Processors have been recently developed, that means incorporating multiple processors with multiple ALU’s inside a CPU. These ALU’s process their information individually. There’s two cache memory’s which are SRAM and DRAM. SRAM is also called Static RAM, it is faster and more expensive then DRAM, it holds memory without being refreshed and DRAM must be refreshed. There are three types of RAM which are L1 cache, L2 cache, and L3......

Words: 644 - Pages: 3

Free Essay

Et 2560 Unit 5 Assignment 1

...Matthew Lopez ET2560 Intro to C Unit 5 assignment 1 Pg. 238 1. Choose an appropriate kind of loop from Table 5.1 for solving each of the following problems. a. Calculate the sum of the test scores of a class of 35 students. ( Hint: Initialize sum to zero before entering loop.) Endfile- controlled loop b. Print weekly paychecks for a list of employees. The following data are to be entered interactively for each employee: ID, hours worked, and hourly pay rate. An ID of zero marks the end of the data. Sentinel- controlled loop c. Process a data file of Celsius temperatures. Count how many are above 100° C. Input validation loop Pg. 241 – 242 1. Predict the output of this program fragment: i = 0; while ( i <= 5) { printf("% 3d % 3d\ n", i, 10 - i); i = i + 1; } It will show the numbers that appear before 5 2. What is displayed by this program fragment for an input of 8? scanf("% d", & n); ev = 0; while ( ev < n) { printf("% 3d", ev); ev = ev + 2; } printf("\ n") Show the numbers from 0 to 8 increasing by 2 each time Pg. 246 – 247 1. What output values are displayed by the following while loop for a data value of 5? Of 6? Of 7? printf(" Enter an integer> "); scanf("% d", & x); product = x; count = 0; while ( count < 4) { printf("% d\ n", product); product *= x; count += 1; } No values are output 3. The following segment needs some revision. Insert braces where they are needed and correct the...

Words: 752 - Pages: 4

Premium Essay

Nt2580 Unit 3 Assignment & Lab

...NT2580 Unit 3 Assignment & Lab Unit 3. Assignment 1 - Remote Access Control Policy Definition There are three key parts I will have to take into account while designing a Remote Access Control Policy for Richman Investments. These three parts (Identification, Authentication and Authorization) will not be all for the Remote Access Control Policy, I will need to include the appropriate access controls for systems, applications and data access. I will also need to include my justification for using the selected access controls for systems, applications and data access. The first part I need to implement for this Remote Access Control Policy is Identification, which is defined in this sense as: physical keys or cards, smart cards, and other physical devices that might be used to gain access to something. What needs to be done for the Remote Access Control Policy is a group member policy needs to be setup which uniquely identifies each user. Users should be identified by rank with higher ranking users requiring more authentication. Each individual user should be assigned to a group based on rank with special permissions. Using this system for Identification will make our company more secure in day to day operations. The second part I need to implement for this remote access control policy is Authentication, which is defined as: what you know or passwords, numeric keys, PIN numbers, secret questions and answers. For remote access, there must......

Words: 477 - Pages: 2

Free Essay

Nt2580 Unit 1 Assignment 2

...William Burns-Garcia NT 2580 Unit 1 Assignment 2 Re: Impact of a Data Classification Standard Per your request, I have included information regarding the data classification standards designed for Richman investments. This report will include information that pertains to the IT infrastructure domains and how they are affected. Though there are several, I want to concentrate on three of the most vulnerable. 1. User Domain: Of all domains, this can be the most vulnerable as it usually affects any user on the network. Most companies should have an Acceptable Use Policy (AUP) with standards that can be monitored at any time. Not only does this policy affect internal users, it should also be enforced by any outside vendors such as, off-site IT support. There should be on-going information sessions to remind users of AUP. 2. Workstation Domain: Every person with access to the network of Richman Investments must have authorized personal credentials to use a workstation assigned to them. A few exceptions can be Major IT administration and authorized upper management. A change password should be implemented no less than 45-60 days on Richman’s network. Administrative passwords should also be changed no less than 30-45 days, Since Administrative access has the most immediate vulnerability. 3. LAN Domain: The Local Area Network (LAN), which includes most things in the computer closet that helps all devices connect to the network. This domain can be vulnerable because...

Words: 364 - Pages: 2