Premium Essay

Unit 5 Assignment 1 Testing and Monitoring Security Controls

In: Computers and Technology

Submitted By scarfacejj75
Words 524
Pages 3
NT2580
Unit 5 Assignment 1
Testing and Monitoring Security Controls
Jose J Delgado

Testing and Monitoring Security Controls
A few different types of security events and baseline anomalies that might indicate suspicious activity. Different traffic patterns or influx in bandwidth usage can be considered suspicious activity. Also, services changing port usage, in turn creating variations in normal patterns. All sudden increase in overall traffic. This may just mean that your web site has been mentioned on a popular news site, or it may mean that someone is up to no good. A sudden jump in the number of bad or malformed packets. Some routers collect packet-level statistics; you can also use a software network scanner to track them.
Some routers collect packet-level statistics; you can also use a software network scanner to track them. Also large numbers of packets caught by your router or firewall's egress filters. Egress filters prevent spoofed packets from leaving your network, so if your filter is catching them you need to identify their source, because it is a clear sign that devices on your network have been compromised. Unscheduled reboots of server machines may sometimes signify that they are compromised as well. You should already be watching the event logs of your servers for failed logons and other security-related events.
Log Files encompass complete records of all security events (logon events, resource access, attempted violations of policy, and changes in system configuration or policies) and critical system events (service/daemon start/stop, errors generated, system warnings) that can allow an administrator to quickly discover the root cause of any issues.
When remote users do not have recent patches or updates, the system administrator should set up group policies such as, forcing updates to install right away. Rather than having, the

Similar Documents

Premium Essay

It255

...Technical Institute IT255 Introduction to Information Systems Security Onsite Course SYLLABUS Credit hours: 4 Contact/Instructional hours: 50 (30 Theory Hours, 20 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisites: IT220 Network Standards and Protocols, IT221 Microsoft Network Operating System I, IT250 Linux Operating System Course Description: This course provides an overview of security challenges and strategies of counter measures in the information systems environment. Topics include definition of terms, concepts, elements, and goals incorporating industry standards and practices with a focus on availability, vulnerability, integrity and confidentiality aspects of information systems. Introduction to Information Systems Security Syllabus Where Does This Course Belong? This course is required for the Bachelor of Science in Information Systems Security program. This program covers the following core areas:    Foundational Courses Technical Courses BSISS Project The following diagram demonstrates how this course fits in the program: IS427 Information Systems Security Capstone Project 400 Level IS404 Access Control, Authentication & KPI IS411 Security Policies & Implementation Issues IS415 System Forensics Investigation & Response IS416 Securing Windows Platforms & Applications IS418 Securing Linux Platforms & Applications IS421 Legal & Security Issues IS423 Securing Windows Platforms & Applications 300...

Words: 4114 - Pages: 17

Premium Essay

Seeking Help

...Systems Security [Onsite] Course Description: This course provides an overview of security challenges and strategies of counter measures in the information systems environment. Topics include definition of terms, concepts, elements, and goals incorporating industry standards and practices with a focus on availability, vulnerability, integrity and confidentiality aspects of information systems. Prerequisite(s) and/or Corequisite(s): Prerequisites: IT220 Network Standards and Protocols, IT221 Microsoft Network Operating System I, IT250 Linux Operating System Credit hours: 4 Contact hours: 50 (30 Theory Hours, 20 Lab Hours) Introduction to Information Systems Security Syllabus Where Does This Course Belong? This course is required for the Bachelor of Science in Information Systems Security program. This program covers the following core areas:    Foundational Courses Technical Courses BSISS Project The following diagram demonstrates how this course fits in the program: IS427 Information Systems Security 400 Level Capstone Project IS418 IS404 Access Control, Authentication & KPI IS421 Legal & Security Issues IS423 Securing Windows Platforms & Applications IS411 Security Policies & Implementation Issues IS415 System Forensics Investigation & Response IS416 Securing Windows Platforms & Applications Securing Linux Platforms & Applications 300 Level IS305 Managing Risk in Information Systems IS308 Security Strategies...

Words: 4296 - Pages: 18

Premium Essay

Dfhdfh

... |[pic]www.csudh.edu | | |[pic] | |[pic] |College of Natural and Behavioral Sciences | | |Department of Computer Science | | |http://csc.csudh.edu | |Course Title: |Communication Systems Security | |Course Number: |CTC 362 | |Instructor Name: | Mehrdad S. sharbaf, ph.d. msharbaf@csudh.edu, Office: tba, phone: tba, office Hours: tba | |Date: |Spring Semester, 2016 | |Course Length: |_15_ Weeks | |Web Companion |N/A ...

Words: 1433 - Pages: 6

Premium Essay

Informative

...IS4550 Security Policies and Implementation INSTRUCTOR GUIDE Course Revision Table Change Date | Updated Section | Change Description | Change Rationale | Implementation Quarter | 12/20/2011 | All | New curriculum | | June 2012 | | | | | | | | | | | | | | | | | | | | | | | | | | ------------------------------------------------- ------------------------------------------------- Credit hours: 4.5 Contact/Instructional hours: 60 (30 Theory, 30 Lab) Prerequisite: IS3110 Risk Management in Information Technology Security or equivalent Corequisite: None Table of Contents Course Overview 5 Course Summary 5 Critical Considerations 5 Instructional Resources 6 Required Resources 6 Additional Resources 6 Course Management 8 Technical Requirements 8 Test Administration and Processing 8 Replacement of Learning Assignments 9 Communication and Student Support 9 Academic Integrity 10 Grading 11 Course Delivery 13 Instructional Approach 13 Methodology 13 Facilitation Strategies 14 Unit Plans 15 Unit 1: Information Security Policy Management 15 Unit 2: Risk Mitigation and Business Support Processes 25 Unit 3: Policies, Standards, Procedures, and Guidelines 33 Unit 4: Information Systems Security Policy Framework 42 Unit 5: User Policies 50 Unit 6: IT Infrastructure Security Policies 58 Unit 7: Risk Management 66 Unit 8: Incident Response Team Policies 74 Unit 9: Implementing...

Words: 18421 - Pages: 74

Premium Essay

Intro to Information Security Notes

...need is access to the LAN and/or subnet Technet.microsoft.com/en-us/security/advisory Mitigate vulnerabilities Threats are things you have to respond to effectively. Threats are controllable Risks are manageable Vulnerabilities can be mitigated All affect the CIA triad Not all threats are intentional Confidentiality, integrity, accessibility = CIA Starting on pg 161 DAC- only as secure as the individuals understanding. Access determined by owner. MAC- access determined by data classification itself. data itself has a classification. Need to be cleared to the level of the data security. Also has a “need to know” aspect to it. Non DAC- third party determines the permissions. Role based- pg 166. Access determined on the job of the user. Rule based- variation of DAC. Rules are created and access is based on the rules created. Week of 4/17/13 Starts on pg 146 Project- search SSCP CBK on the library under 24/7 Each of the 7 domains, vulnerabilities in each, security used in each to control, For lab 5--- Make 4 types of connections. 2 secure 2 not secure. telnet, securenet, ssh, and ftp. Will need 3 machines. Student, Target, ubuntu 1 Wireshark setting to capture a file in promiscuous mode on student. Do an FTP to target windows. Command prompt from student to ubuntu. Try to log in. Do questions. Question 9, focus on SSH and what traffic you are getting. Assignments— Week of 5/1/13 Acronyms- Pg263 BCP- Business Continuity Plan DRP- Disaster...

Words: 907 - Pages: 4

Premium Essay

Accounting

...CHAPTER 1 AUDITING AND THE PUBLIC ACCOUNTING PROFESSION – INTEGRITY OF FINANCIAL REPORTING |LEARNING CHECK | 1. SEVERAL COMMON ATTRIBUTES OF ACTIVITIES DEFINED AS AUDITING ARE (A) SYSTEMATIC PROCESS, (B) OBJECTIVELY OBTAINING AND EVALUATING EVIDENCE, (C) ASSERTIONS ABOUT ECONOMIC ACTIONS AND EVENTS, (D) DEGREE OF CORRESPONDENCE, (E) ESTABLISHED CRITERIA, (F) COMMUNICATING THE RESULTS, AND (G) INTERESTED USERS. 2. A financial statement audit involves obtaining and evaluating evidence about an entity's financial statements for the purpose of expressing an opinion on whether the statements are presented fairly in conformity with established criteria--usually GAAP. Thus, the nature of the auditor's report is an opinion on the fairness of the financial statement presentation. A compliance audit involves obtaining and evaluating evidence to determine whether certain financial or operating activities of an entity conform to specified conditions, rules, or regulations. A report on a compliance audit takes the form of a summary of findings or assurance regarding degree of compliance. An operational audit involves obtaining and evaluating evidence about the efficiency and effectiveness of an entity's operating activities in relation to specified objectives. Reports on such audits include an assessment of efficiency and effectiveness and recommendations for improvements. 3. Independent auditors are individual practitioners or members of public...

Words: 4500 - Pages: 18

Premium Essay

Mobile App

...IT425-1404B-02 Systems Analysis, Design and Integration Mobile Apparel Ordering Application 22DEC14 Table of Contents Week 1: System or Application Overview 3 Week 1: Requirements Specification 4-5 Week 2: System or Application Design 6-10 Week 3: Testing and Quality Assurance Plan 11-13 Week 4: Development Strategy 14-17 Week 5: Integration and Deployment Plan 18-20 References 21 System or Application Overview Introduction This Instruction contains the deliverables for the mobile Apparel Ordering application. The purpose is to provide 100 percent end user and customer satisfaction by giving customers the freedom to open an app on their personal device anytime anywhere and place an order. Description This is an online line system that will be able to process 200 orders every 20 minutes. This application will have access to the customer database for reliable customer information available to any customer service representative 24/7. This application should be made available for all Android and Apple devices. This application inside planning and development will feature the following...

Words: 3332 - Pages: 14

Premium Essay

Security N Tsting

...Unit 5 Assignment 1: testing & monitoring security controls. Identify types of security events and baseline anomalies that might indicate suspicious activity. I. Unscheduled reboots on machines and servers that aren’t updates. II. non-business related websites. III. jump in packets. IV. passwords entered wrong to many times. Policy violations and security breaches: I. Watching the event logs of your servers for failed logons and other security-related events. Logs can tell an Admin a lot about the root of the issue and makes it easier to fix or manage from happening again. II. Best way to get rid of the traffic to certain web sites is to make a block list or outsource a company to make a block list for you. III. Use a software network scanner to monitor or track them. IV. User passwords are probably one of the most vulnerable ways to have a security breach. A proper password should consist of 8 characters or more, capital, number, system, and never a word, or date. Next best thing is ACS. Given the following list of end-user policy violations and security breaches, select three breaches and identify strategies to control and monitor each event to mitigate the risk and minimize exposer: 1.A user made unauthorized use of network resources by attacking network entities. Fire the employee or put employee on probation with limited access. 2.Open network drive shares allow storage privileges to outside users. 3.Sensitive laptop data is unencrypted and susceptible...

Words: 328 - Pages: 2

Free Essay

Quality Palnning and Analysis

...tusharUTS: ENGINEERING Assignment Cover Sheet STANDARD Mode SUBJECT NAME: Quality Planning and Analysis SUBJECT NUMBER: 49309 ASSIGNMENT NUMBER: 1 STUDENT LAST NAME: PATEL STUDENT FIRST NAME: SANJAYKUMAR NATVERBHAI STUDENT ID: 10911497 Declaration of Originality: The work contained in this assignment, other than that specifically attributed to another source, is that of the author(s) and has not been submitted in any other subject or published elsewhere before. It is recognised that, should this declaration be found to be false, disciplinary action could be taken and penalties imposed in accordance with University policy and rules. Signature: Sanjaykumar Natverbhai Patel Table of Contents: * Introduction……………………………………………………………………………………………….2 1.1 Introduction about product and its key feature and characteristics……….3 2 Customer satisfaction………………………………………………………………………………..4 2.1 Identify Stockholders and their expectations………………………………………..5 2.2 Method of capturing customers’ needs…………………………………………………6 2.3 Kano analysis on capturing customer needs………………………………………….7 3 Design Requirements…………………………………………………………………………………8 4.1 Quality Function Deployment of identified customer needs…………………9 3.2 Failure Mode and Effect Analysis of top five customer needs………………10 4 Supplier selection and Evaluation……………………………………………………………..11 5.2 Identify components , parts ………………………………………………………………...

Words: 6043 - Pages: 25

Premium Essay

Management

...Framework for Enterprise Risk Management © 2013 Johnson & Johnson Contents Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 J&J Strategic Framework . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 What is Risk?. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 J&J Approach to Enterprise Risk Management. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 Governance & Oversight. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 . . 2 3 Introduction In order to deliver value to our consumers, patients, caregivers, employees, communities and shareholders, we at Johnson & Johnson (J&J) must understand and manage the risks faced across our entire organization. Risks are inherent in our business activities and can relate to strategic threats, operational issues, compliance with laws, and reporting obligations. This document...

Words: 3109 - Pages: 13

Premium Essay

Ebusiness

...CSE308_Miki Juice Specification Page 2 of 9 Contents 1. Introduction ..................................................................................................................................... 3 2. Project Objective .............................................................................................................................. 3 3. Success Criteria ................................................................................................................................ 3 4. Site Map ........................................................................................................................................... 4 5. Functional Requirements ................................................................................................................. 5 6. Technical Requirements ................................................................................................................... 6 7. Privacy Policy.................................................................................................................................... 6 7.1 Protection ........................................................................................................................................................... 6 7.2 Authorization and Authentication ............................................................................................................ 7 8. Content Plan..........................................

Words: 1872 - Pages: 8

Premium Essay

Bop Report

...SELECT APPLICATION CONTROLS REVIEW OF THE FEDERAL BUREAU OF PRISONS’S SENTRY DATABASE SYSTEM U.S. Department of Justice Office of the Inspector General Audit Division Audit Report 03-25 July 2003 SELECT APPLICATION CONTROLS REVIEW OF THE FEDERAL BUREAU OF PRISONS’S SENTRY DATABASE SYSTEM EXECUTIVE SUMMARY SENTRY is the Federal Bureau of Prisons’s (BOP) primary mission support database. The system collects, maintains, and tracks critical inmate information, including inmate location, medical history, behavior history, and release data. SENTRY processes over 1 million transactions each day and tracks more than 165,000 inmates. Roughly 85 percent of these inmates are housed within the BOP facilities, with the remaining inmates confined in other government facilities (state or local) or privately operated facilities through contracts with the BOP. As of March 2003, over 24,000 personal computers at approximately 200 facilities could access SENTRY. The purpose of this audit was to assess the application controls for the BOP’s SENTRY database to determine whether inmate data entered in SENTRY is valid, properly authorized, and completely and accurately processed.1 Our criteria for conducting the review was the Federal Information System Controls Audit Manual (FISCAM).2 We reviewed the accuracy and timeliness of SENTRY’s input, processing, and output controls and judgmentally selected 3 of the BOP’s 29 Community Corrections Offices (CCO) to conduct onsite reviews of their operational...

Words: 14625 - Pages: 59

Free Essay

Can Brazil Become a Global Competitor in the Information Technology Outsourcing Business

...GUI Based Real Time Monitoring and Controlling Approach on Networking A Technical Project report Submitted in the partial fulfillment of the requirement For the award of the degree of BACHELOR OF TECHNOLOGY IN COMPUTER SCIENCE AND ENGINEERING Submitted By K.BHARGAVI CH.KOMALI (Regd. no: 11981A0528) (Regd. no: 11981A0537) K.L.V.S.SANKAR ANDE BINDU YATHISHA (Regd. no: 11981A0541) (Regd. no: 11981A0543) Under the esteemed guidance of Mr. B. SATHISH KUMAR Assistant Professor DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING [pic] RAGHU ENGINEERING COLLEGE (Affiliated to JNTU-KAKINADA) Dakamari, Bheemunipatnam Mandal,Visakhapatnam-531162 2014-2015 DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING RAGHU ENGINEERING COLLEGE (AFFILIATED TO JNTUK) BHEEMUNIPATNAM MANDAL VISAKHAPATNAM [pic] CERTIFICATE This is to certify that this Project Report Entitled “ GUI Based Real Time Monitoring and Controlling Approach on Networking” is the bonafide work carried out by K.Bhargavi(11981A0528),CH.Komli(11981A0537),K.L.V.S.Sankar(11981A0541),Ande Bindu Yathisha(11981A0543)of final year B.Tech, Computer Science Engineering, submitted in the partial fulfillment of the requirements for award of Degree of Bachelor of Technology during the...

Words: 12675 - Pages: 51

Premium Essay

Is3350 Unit 2 Assignment 1

...Executive Summary on Veteran’s Affairs (VA) and Loss of Private Information IS3350 Unit 2 Assignment 1: Executive Summary on Veteran’s Affairs (VA) and Loss of Private Information Background On 3 May 2006, a Department of Veterans Affairs (VA) laptop was stolen from a VA data analyst’s home in Montgomery County, Maryland. In addition to the laptop, a personal external hard drive was stolen. The external hard drive contained the personal data (names, social security numbers, dates of birth, disability ratings) for 26.5 million veterans and their spouses. It should be noted that the massive data theft was only one of many that had been discovered over the course of 1.5 years. Upon discovery of the theft, the VA employee immediately notified the local police and his supervisors. His supervisors did not notify the Veterans Affairs Secretary until 16 May 2006. On 17 May 2006, the Veterans Affairs Secretary notified the FBI, who began to work with the Montgomery County police to investigate the theft. Results and Conclusions Issue 1: The VA employee had authorization to access and use the VA databases for performance of official duties. He was not, however, authorized to take it home as he had no official need to have the data at home. The private data was not properly safeguarded. He failed to password protect (at the very minimum) and encrypt it (Opfer, 2006). For this, he receives the highest honors in the idiot category. Issue 2: The response of managers...

Words: 796 - Pages: 4

Premium Essay

How to Create a Project Specification

... Project Budget Contents 1 Project Business Direction 2 1.1 Project Goals 2 1.2 Purpose 2 1.3 Business Opportunity 3 1.4 Project Background 3 2 Project Scope Description 3 2.1 Project Outcome 3 2.2 Quality Objectives for the Project Outcome 3 2.3 Organizational Requirements on the Project Performance 4 2.4 Project Performance Quality Objectives 4 2.5 Included, Excluded 4 3 Project Plans 4 3.1 Time Schedule 4 3.2 Project Milestone Definitions 5 3.3 Delivery Plans 5 4 Project Budget 5 5 Project Organization and Stakeholders 5 5.1 Project Organization, Roles, Responsibility and Authority 5 5.1.1 Project Steering Function 5 5.1.2 Project Management Function 5 5.1.3 Project Executing Function 6 5.2 Project Organization Overview 6 5.3 Customer and Customer Commitments 6 5.4 Suppliers (Services, Competence or Products) 7 5.5 Connections to Other Projects or Assignments 7 5.6 Reporting and Communication Principles 7 ...

Words: 2362 - Pages: 10