Preview

IS3110 U5D1

Good Essays
Open Document
Open Document
712 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
IS3110 U5D1
Risk Assessment and Risk Mitigation Control
By
Thomas Fletcher
IS3110

There are several different types of controls that you can take advantage of for securing your servers. Below are official guidelines from the (National Institute for Standards and Technology), or NIST.

Securing the Server Operating System
This is extremely important. If an OS has a know vulnerability and is not patched, it could lead to many problems. Once an OS is installed, applying needed patches or upgrades to correct for known vulnerabilities is essential. Any known vulnerabilities an OS has should be corrected before using it to host a server or otherwise exposing it to malicious users. Below are some ways to harden the server OS.

Remove unnecessary services, applications, and network protocols to reduce exploits on applications you commonly are not using.
Configure OS user authentication to minimize unwanted intrusion.
Configure resource controls appropriately to ensure that information is going to whom it should go to.

Securely Installing Server Software
This is a lot like hardening the OS in respect that you are making sure that software stays up to date to ensure that known exploits are being addresses. Any unnecessary applications, services, or scripts that are installed should be removed immediately once the installation process is complete. Below are some things that you can do to harden software.

Install the server software either on a dedicated host or on a dedicated guest OS if virtualization is being employed.
Apply any patches or upgrades to correct for known vulnerabilities in the server software.
Create a dedicated physical disk or logical partition (separate from OS and server application) for server data, if applicable.
Remove or disable all services installed by the server application but not required (e.g., gopher, FTP, HTTP, remote administration)

Install and Configure Additional Security Controls
This could be anything that you would like to

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Lab 9

    • 1001 Words
    • 3 Pages

    1. What are some common risks, and vulnerabilities commonly found in the System/Application Domain that must be mitigated with proper security countermeasures?…

    • 1001 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    | * OS Level * Patch history Configuration hardening Desktop access, Application access * File Access * File Storage * VPN Authentication Browsing * Emails * Backups…

    • 409 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Privileged Users will be presented the ROB for Users with Privileged Access to Information Systems. Non-Privileged Users are required to select the appropriate ROB at first login per database prior to receiving access to the application. If a user elects to decline the ROB, access to…

    • 1211 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    It-260 Worksheet

    • 512 Words
    • 3 Pages

    Install the File Services role by using the Server Manager console. This enables you to deploy this computer as a file server and implement the various storage-related technologies supplied with Windows Server 2008.…

    • 512 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    ISSC 363 Week 2 Quiz

    • 320 Words
    • 2 Pages

    After implementing several security controls, what should be done to ensure the controls are performing as expected?…

    • 320 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Scenario Three

    • 791 Words
    • 4 Pages

    Proper operating system patching would have to be done as well to reduce the risk of software vulnerabilities. Patching could be done from an internal update server like Microsoft’s WSUS server so that a connected system would contact the internal server at a scheduled time and pull down the appropriate updates it needs for the software that is installed. There are also many third party tools, like GFI’s LanGuard, that can be used to scan systems for vulnerabilities and patches and install them on demand without having to wait for a scheduled time to download (GFI, 2012).…

    • 791 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    The basic strategies of attack surface reduction are to reduce the amount of code running, reduce entry points available to untrusted users, and eliminate services requested by relatively few users. One approach to improving information security is to reduce the attack surface of a system or software. By turning off unnecessary functionality, there are fewer security risks. By having less code available to unauthorized actors, there will tend to be fewer failures. Although attack surface reduction helps prevent security failures, it does not mitigate the amount of damage an attacker could inflict once a vulnerability is found.[3]…

    • 348 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    iss project0

    • 376 Words
    • 1 Page

    2. Other than installing virus and worm control software, what can SLS do to prepare for the next…

    • 376 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    The measures could be to use firewalls; a firewall is either a software application or a hardware device. It acts as a shield between your computer/s and the rest of the Internet. The purpose of this is to control and keep safe of all the incoming and outgoing network traffic by carefully checking the data packets and…

    • 522 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Pci Quick Guide

    • 7658 Words
    • 31 Pages

    The intent of this document is to provide supplemental information, which does not replace or…

    • 7658 Words
    • 31 Pages
    Powerful Essays
  • Satisfactory Essays

    3. Where possible use secure methods for remote access. I.E. Use SSH in place of Telnet, secure web servers, SCP in place of FTP.…

    • 254 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Hardening servers, desktops, laptops and mobile devices through their configuration by turning off unused services. Constraining remote access and other convenience features; setting administrator and user identities; defining execution policy for required applications.…

    • 746 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Malware

    • 483 Words
    • 2 Pages

    For maximum security, create an "air gap" between sensitive data and the Internet. To protect confidentiality and integrity, do not connect computers that store sensitive information to the Internet or other public networks. Any computer connected to the Internet is exposed and possibly vulnerable to a huge number of attacks.…

    • 483 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Fix Open Vulnerabilities –These vulnerabilities are in operating systems, applications, web browsers, and virtualized platforms. If you can stay on top of the vulnerabilities that are critical to your organization then you can mitigate a lot of the risk of outside attackers targeting insiders.…

    • 962 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    With the choices of vendors available (Red Hat, Novell, or Canonical/Unbuntu), there are only two that do a great job regarding the customization for enterprise-ready systems; Red Hat and Unbutu. With these distribution-specific kernels, security issues that are related to them vary. With that now mentioned, you may not want to do a recent security update as soon as it comes available, as it may not be needed in your network environment. The main thing that cannot be stress enough (with both vendor –specific distributions & stock kernels) is that updates need to be thoroughly tested within a “test” environment. Prior to testing, a plan needs to be written up and discussed so that all possible threats are exposed to the system, so that these can be confirmed as mitigated. The key is to test, test, & test the updates prior to rolling them out to a production environment.…

    • 266 Words
    • 1 Page
    Satisfactory Essays