Nt2580 Unit 1 Assignment Match Risk/Threats to Sulutions

In: Computers and Technology

Submitted By Rhino602
Words 409
Pages 2
Write the letter of the correct solution or preventative action in the blank to the right of each risk or threat.

Risks or threats:
1. Violation of a security policy by a user _____C___
2. Disgruntled employee sabotage ____I____
3. Download of non-business videos using the
Internet to an employer-owned computer ____A____
4. Malware infection of a user’s laptop ___L_____
5. Unauthorized physical access to the LAN ___N_____
6. LAN server operating system vulnerabilities ___F_____
7. Download of unknown file types from unknown sources by local users ____B____
8. Errors and weaknesses of network router, firewall, and network appliance configuration file ___H_____
9. WAN eavesdropping ___M_____
10. WAN Denial of Service (DoS) or Distributed Denial of
Service (DDoS) attacks ____D____
11. Confidential data compromised remotely ____K____
12. Mobile worker token stolen ___G_____
13. Corrupt or lost data ___E_____
14. Downtime of customer database ____J____

Solutions or preventative actions:
A. Enable content filtering and antivirus scanning at the entry and exit points of the Internet. Enable workstation auto-scans and auto-quarantine for unknown file types.
B. Apply file transfer monitoring, scanning, and alarming for unknown file types and sources.
C. Place employee on probation, review acceptable use policy (AUP) and employee manual, and discuss status during performance reviews.
D. Apply filters on exterior Internet Protocol (IP) stateful firewalls and IP router WAN interfaces.
E. Implement daily data backups and off-site data storage for monthly data archiving. Define data recovery procedures based on defined Recovery Time Objectives (RTOs).
F. Define vulnerability window policies, standards, procedures, and guidelines. Conduct LAN domain vulnerability assessments.
G. Apply…...

Similar Documents

Nt2580 Unit 5 Assignment 1

...It255 Unit5 Assignment TO: FROM: DATE: SUBJECT:Unit 5 Assignment 1: Testing and Monitoring Security Controls REFERENCE: Testing and Monitoring Security Controls (IT255.U5.TS1) How Grade: One hundred points total. See each section for specific points. Assignment Requirements Part 1:Identify at least two types of security events and baseline anomalies that might indicate suspicious activity. Explain why they might indicate suspicious activity.(Forty points. Twenty points for each event.) # | Security Event & Baseline Anomaly That Might Indicate Suspicious Activity | Reason Why It May Indicate Suspicious Activity | 1. | Authentication Failures | Unauthorized access attempts | 2. | Network Abuses | Employees are downloading unauthorized material. | 3. | | | 4. | | | 5. | | | 6. | | | Part 2: Given a list of end-user policy violations and security breaches, select three breaches and consider best options for monitoring and controlling each incident. Identify the methods to mitigate risk and minimize exposure to threats and vulnerabilities. (Sixty points. Twenty points for each breach.) # | Policy Violations & Security Breaches | Best Option to Monitor Incident | Security Method (i.e., Control) to Mitigate Risk | 1. | A user made unauthorized use of network resources by attacking network entities. | Monitor the logs | Fire the user | 2. | Open network drive shares allow storage privileges to outside users. |...

Words: 258 - Pages: 2

Match Risks/Threats to Solutions

...Match Risks / Threats to Solutions 1. Violation of a security policy by a user. C. Place employee on probation, review acceptable use policy (AUP) and employee manual, and discuss status during performance reviews. 2. Disgruntled employee sabotage. I. Track and monitor abnormal employee behavior, erratic job performance, and use of IT infrastructure during off-hours. Begin IT access control lockout procedures based on AUP monitoring and compliance. 3. Download of non-business videos using the internet to an employer-owned computer. A. Enable content filtering and antivirus scanning at the entry and exit points of the internet. Enable workstation auto-scans and auto-quarantine for unknown file types. 4. Malware infection of a user’s laptop. L. Use workstation antivirus and malicious code policies, standards, procedures, and guidelines. Enable an automated antivirus protection solution that scans and updates individual workstations with proper protection. 5. Unauthorized physical access to the LAN. N. Make sure wiring closets, data centers, and computer rooms are secure. Provide no access without proper credentials. 6. LAN server operating system vulnerabilities. F. Define vulnerability window policies, standards, procedures, and guidelines. Conduct LAN domain vulnerability assessments. 7. Download of unknown file types from unknown sources by local users. B. Apply file transfer monitoring, scanning, and alarming for unknown...

Words: 270 - Pages: 2

Nt2580: Unit 1 Match Risks/Threats to Solutions

...Instructions: You are presented with a list of some risks and threats associated with the seven domains of a typical IT infrastructure. Below the list, the solutions or preventive actions to manage those risks and threats are listed. Write the letter of the correct solution or preventative action in the blank to the right of each risk or threat. Risks or threats: 1. Violation of a security policy by a user ___C_____ 2. Disgruntled employee sabotage ____I____ 3. Download of non-business videos using the Internet to an employer-owned computer ____A____ 4. Malware infection of a user’s laptop ____L___ 5. Unauthorized physical access to the LAN ____N__ 6. LAN server operating system vulnerabilities ____F_ 7. Download of unknown file types from unknown sources by local users ____B___ 8. Errors and weaknesses of network router, firewall, and network appliance configuration file ____H___ 9. WAN eavesdropping ____M___ 10. WAN Denial of Service (DoS) or Distributed Denial of Service (DDoS) attacks ____D___ 11. Confidential data compromised remotely ____K____ 12. Mobile worker token stolen ____G___ 13. Corrupt or lost data ____E___ 14. Downtime of customer database ____J__ Solutions or preventative actions: A. Enable content filtering and antivirus scanning at the entry and exit points of the Internet. Enable workstation auto-scans and auto-quarantine for unknown file types. B. Apply file......

Words: 447 - Pages: 2

Match Risk/Threats to Solutions

...Nt2580 - Unit 1 Assignment 2: Impact of a Data Classification Standard Three IT Infrastructure Domains affected by the “Internal Use Only” data classification standard are User Domain, Workstation Domain and LAN Domain Here at Richmond Investments. * User Domain This Domain is where only one user will have access to it. Generally this is an internal use only. By default, the IT department tries to maintain a certain level of Security for this so no one can access from the outside. Only the IT Department can grant access privileges for a Remote Access Point. The (User Domain) where only the company is responsible for the security of the environment will enforce an acceptable use policy (AUP) to define what each user can and cannot do with any company data they have access to. * Workstation Domain Workstation Domain, all the users have access. Before a user can log in he/she will need to be verified in order to gain access. At Richman Investments, we provide very secure access for the employee workstations with a username, password and in some instances Biometrics. A security protocol requires the password to be changed every 90 days and must contain at least one capital letter and one number. All computers maintain regular updates and continuous antivirus protection for monitoring. Additionally, no personal devices are allowed on the network. ...

Words: 377 - Pages: 2

Nt2580 Unit 1 Assignment 2

...------------------------------------------------- Nt2580 - Unit 1 Assignment 2: Impact of a Data Classification Standard Richman Investments Internal Use Only Data Classification Standard Domain Effects Richman Investments has implemented an “Internal Use Only” data classification standard. This report will describe the effects of the Internal use Only Standard on our respective system domains. “Internal Use Only” sets up a restricted access security policy to our network. Any access, including from a website would require company mandated credentials to log on and enter the system. This type of policy is enforced because companies do not want to allow “free access” to their network for potential threats to their system or their security. This policy will impact three of the seven domains. These include: * User Domain * Define: This Domain defines what users have access to the information system.   * Policy Impact: The IT Team will use the User domain to define who has access to the company’s information systems. The domain will impose an acceptable use policy (AUP) that will define the permissions of what actions a user may make while inside the system. These permissions may also be defined by the data they are accessing at the time. All third party users (vendors, contractors, outside users, etc.) must also agree to the AUP. Any violation will be reported to management and/or the authorities, depending on the violation. * Workstation......

Words: 508 - Pages: 3

Nt2580 Unit 1 Assignment 1

...NT2580 Information Security Sonja Moskal Unit 1 Assignment 1 Worksheet: Match Risk/Threats to Solutions F. Mohamed 1. Violation of a security policy by a user C. Place employee on probation, review acceptable use policy (AUP) and employee manual, and discuss status during performance review. 2. Disgruntled employee sabotage. I. Track and monitor abnormal employee behavior, erratic job performance, and use of IT infrastructure during off-hours. Begin IT access control lockout procedures based on AUP monitoring and compliance. 3. Download of non-business videos using the Internet to an employer owned computer. A. Enable content filtering and antivirus scanning at the entry and exit points of the internet. Enable workstation auto-scans and auto-quarantine for unknown files. 4. Malware infections of a user’s computer. L. Use workstation antivirus and malicious code policies, standards, procedures, and guidelines. Enable an automated antivirus protection solution that scans and updates individual workstations with proper protection. 5. Unauthorized physical access to the LAN. N. Make sure wiring closets, data centers, and computer rooms are secure. Provide no access without proper credentials. 6. LAN server operating system vulnerabilities. F. Define vulnerability window policies, procedures, and guidelines. Conduct LAN domain vulnerability assessment. 7. Download of unknown file types from unknown sources by local users. B.......

Words: 380 - Pages: 2

Nt2580 Unit 1 Assignment 1

...1. Violation of a security policy by a user C. Place employee on probation, review acceptable use policy (AUP) and employee manual, and discuss status during performance review. 2. Disgruntled employee sabotage. I. Track and monitor abnormal employee behavior, erratic job performance, and use of IT infrastructure during off-hours. Begin IT access control lockout procedures based on AUP monitoring and compliance. 3. Download of non-business videos using the Internet to an employer owned computer. A. Enable content filtering and antivirus scanning at the entry and exit points of the internet. Enable workstation auto-scans and auto-quarantine for unknown files. 4. Malware infections of a user’s computer. L. Use workstation antivirus and malicious code policies, standards, procedures, and guidelines. Enable an automated antivirus protection solution that scans and updates individual workstations with proper protection. 5. Unauthorized physical access to the LAN. N. Make sure wiring closets, data centers, and computer rooms are secure. Provide no access without proper credentials. 6. LAN server operating system vulnerabilities. F. Define vulnerability window policies, procedures, and guidelines. Conduct LAN domain vulnerability assessment. 7. Download of unknown file types from unknown sources by local users. B. Apply filter transfer monitoring, scanning, and alarming for unknown file types and sources. 8. Errors and weaknesses of network router, firewall,......

Words: 363 - Pages: 2

Nt2580 Unit 1 Assignment 1

...1. Violation of a security policy by a user C. Place employee on probation, review acceptable use policy (AUP) and employee manual, and discuss status during performance review. 2. Disgruntled employee sabotage. I. Track and monitor abnormal employee behavior, erratic job performance, and use of IT infrastructure during off-hours. Begin IT access control lockout procedures based on AUP monitoring and compliance. 3. Download of non-business videos using the Internet to an employer owned computer. A. Enable content filtering and antivirus scanning at the entry and exit points of the internet. Enable workstation auto-scans and auto-quarantine for unknown files. 4. Malware infections of a user’s computer. L. Use workstation antivirus and malicious code policies, standards, procedures, and guidelines. Enable an automated antivirus protection solution that scans and updates individual workstations with proper protection. 5. Unauthorized physical access to the LAN. N. Make sure wiring closets, data centers, and computer rooms are secure. Provide no access without proper credentials. 6. LAN server operating system vulnerabilities. F. Define vulnerability window policies, procedures, and guidelines. Conduct LAN domain vulnerability assessment. 7. Download of unknown file types from unknown sources by local users. B. Apply filter transfer monitoring, scanning, and alarming for unknown file types and sources. 8. Errors and weaknesses of network router, firewall,......

Words: 363 - Pages: 2

Nt2580 Unit 1 Assignment 1

...violation causes an immediate suspension of privileges and the person(s) in violation will be subject to company management’s decisions and or the proper authorities will be called. LAN Domain: A LAN Domain is a collection of computers that are interconnected to one another. Data closets and physical elements of the LAN, and logical elements are to be designated by authorized personnel. This requires strong security & access controls. The LAN Domain can access company wide systems, allowing access to applications and data from anywhere on the LAN. There is a team of people responsible for the upkeep of the LAN Domain, this is called the LAN support group and they are in charge of maintaining and securing the domain. One of the biggest threats we commonly face on the LAN domain are unauthorized users trying to access anything on the network. One last thing we recommend is to require stricter security protocols for the domain. An example could be something like this; disabling all external access ports for the work stations will deny anyone external access from the LAN....

Words: 402 - Pages: 2

Assignment #2 Match Risks/Threats to Solutions

...Nt2580 - Unit 1 Assignment 2: Impact of a Data Classification Standard Three IT Infrastructure Domains affected by the “Internal Use Only” data classification standard are User Domain, Workstation Domain and LAN Domain Here at Richmond Investments. * User Domain This Domain is where only one user will have access to it. Generally this is an internal use only. By default, the IT department tries to maintain a certain level of Security for this so no one can access from the outside. Only the IT Department can grant access privileges for a Remote Access Point. The (User Domain) where only the company is responsible for the security of the environment will enforce an acceptable use policy (AUP) to define what each user can and cannot do with any company data they have access to. * Workstation Domain Workstation Domain, all the users have access. Before a user can log in he/she will need to be verified in order to gain access. At Richman Investments, we provide very secure access for the employee workstations with a username, password and in some instances Biometrics. A security protocol requires the password to be changed every 90 days and must contain at least one capital letter and one number. All computers maintain regular updates and continuous antivirus protection for monitoring. Additionally, no personal devices are......

Words: 304 - Pages: 2

Nt2580 Unit 4 Assignment 1

...Nt2580 Unit 4 Unit 4 assignment 1 1.0 Purpose The purpose of this policy is to define standards for connecting to Richman investments's network from any host. These standards are designed to minimize the potential exposure to Richman investments from damages which may result from unauthorized use of Richman investments resources. Damages include the loss of sensitive or company confidential data, intellectual property, damage to public image, damage to critical Richman investments internal systems, etc. 2.0 Scope This policy applies to all Richman investments employees, contractors, vendors and agents with a Richman investments-owned or personally-owned computer or workstation used to connect to the Richman investments network. This policy applies to remote access connections used to do work on behalf of Richman investments, including reading or sending email and viewing intranet web resources. Remote access implementations that are covered by this policy include, but are not limited to, dial-in modems, frame relay, ISDN, DSL, VPN, SSH, and cable modems, etc. 3.0 Policy 3.1 General 1. It is the responsibility of Richman investments employees, contractors, vendors and agents with remote access privileges to Richman investments's corporate network to ensure that their remote access connection is given the same consideration as the user's on-site connection to Richman investments. 2. General access to the Internet for recreational use by immediate household......

Words: 300 - Pages: 2

Nt2580 Unit 1 Assignment 2

...Unit 1 Assignment 2 Impact of a Data Classification Standard Internal use only is information that may or may not be confidential. But is shared within a organization and kept away from the public. With that being said it is imperative that we seek the following to be incorporated within the standards in each domain. User Domain refers to the people who have access to the organizations equipment User domains is the worst domain for security and personal information can be obtained on this domain under internal use only. The reasoning for this is the multitudes of social networking and the fallacy’s of the employee’s not even meaning to release information that could be detrimental. Employees are responsible for their own equipment. The best way to avoid this is to set up an Acceptable use Policy (AUP) that informs employees what they can and cannot do with company information, equipment, and resources. We must hold employees accountable who are abusing company’s AUP. Workstation Domain (WSD) refers to the computers or electronic devices in which a user uses to access the system. The WSD is where users first access the systems, applications, and data. This layer requires a login and password authentication before access is allowed to view information. The threats to this domain which vary from unauthorized access to downloading personal files, the best way to fix this is to “Harden” the system by setting up firewalls, anti-virus, malware programs and restricted access......

Words: 537 - Pages: 3

Nt2580 Unit 1 Assignment 2

...Unit 1 Assignment 2 Impact of a Data Classification Standard Internal use only is information that may or may not be confidential. But is shared within a organization and kept away from the public. With that being said it is imperative that we seek the following to be incorporated within the standards in each domain. User Domain refers to the people who have access to the organizations equipment User domains is the worst domain for security and personal information can be obtained on this domain under internal use only. The reasoning for this is the multitudes of social networking and the fallacy’s of the employee’s not even meaning to release information that could be detrimental. Employees are responsible for their own equipment. The best way to avoid this is to set up an Acceptable use Policy (AUP) that informs employees what they can and cannot do with company information, equipment, and resources. We must hold employees accountable who are abusing company’s AUP. Workstation Domain (WSD) refers to the computers or electronic devices in which a user uses to access the system. The WSD is where users first access the systems, applications, and data. This layer requires a login and password authentication before access is allowed to view information. The threats to this domain which vary from unauthorized access to downloading personal files, the best way to fix this is to “Harden” the system by setting up firewalls, anti-virus, malware programs and restricted access......

Words: 537 - Pages: 3

Nt2580 Unit 1 Assignment 2

...William Burns-Garcia NT 2580 Unit 1 Assignment 2 Re: Impact of a Data Classification Standard Per your request, I have included information regarding the data classification standards designed for Richman investments. This report will include information that pertains to the IT infrastructure domains and how they are affected. Though there are several, I want to concentrate on three of the most vulnerable. 1. User Domain: Of all domains, this can be the most vulnerable as it usually affects any user on the network. Most companies should have an Acceptable Use Policy (AUP) with standards that can be monitored at any time. Not only does this policy affect internal users, it should also be enforced by any outside vendors such as, off-site IT support. There should be on-going information sessions to remind users of AUP. 2. Workstation Domain: Every person with access to the network of Richman Investments must have authorized personal credentials to use a workstation assigned to them. A few exceptions can be Major IT administration and authorized upper management. A change password should be implemented no less than 45-60 days on Richman’s network. Administrative passwords should also be changed no less than 30-45 days, Since Administrative access has the most immediate vulnerability. 3. LAN Domain: The Local Area Network (LAN), which includes most things in the computer closet that helps all devices connect to the network. This domain can be vulnerable because...

Words: 364 - Pages: 2

Match Risks/Threats to Solutions

...IT-255 – ISS Unit 1 – Assignment 1 Match Risks/Threats to Solutions Match Risks / Threats to Solutions 1. Violation of a security policy by a user. C. Place employee on probation, review acceptable use policy (AUP) and employee manual, and discuss status during performance reviews. 2. Disgruntled employee sabotage. I. Track and monitor abnormal employee behavior, erratic job performance, and use of IT infrastructure during off-hours. Begin IT access control lockout procedures based on AUP monitoring and compliance. 3. Download of non-business videos using the internet to an employer-owned computer. A. Enable content filtering and antivirus scanning at the entry and exit points of the internet. Enable workstation auto-scans and auto-quarantine for unknown file types. 4. Malware infection of a user’s laptop. L. Use workstation antivirus and malicious code policies, standards, procedures, and guidelines. Enable an automated antivirus protection solution that scans and updates individual workstations with proper protection. 5. Unauthorized physical access to the LAN. N. Make sure wiring closets, data centers, and computer rooms are secure. Provide no access without proper credentials. 6. LAN server operating system vulnerabilities. F. Define vulnerability window policies, standards, procedures, and guidelines. Conduct LAN domain vulnerability assessments. 7. Download of unknown file types from unknown sources by local users. ...

Words: 385 - Pages: 2