Preview

Lab 4

Good Essays
Open Document
Open Document
581 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Lab 4
4. Paragraphs 1-4 In User Domain the people are often the weakest link in IT security. In Workstation Domain is vulnerable if not kept up to date. In LAN-to-WAN Domain IP addresses are accessible from anywhere in the world, and attackers are constantly probing public IP addresses. They look for vulnerabilities and when one is found, they pounce. In Remote Access Domain is vulnerable to authentication because when the user provides credentials to prove identity, if found the attacker can later use them to impersonate the user. Also when data is passes between the user and the server. In WAN Domain is the same vulnerabilities as LAN-to-WAN Domain. In System/Application should remove unneeded services and protocols, change default passwords, and regularly patch and update the server systems.
Impact Analysis: The next major step in measuring level of risk was to determine the adverse impact resulting from successful exploitation of vulnerability. The adverse impact of a security event can be described in terms of loss or degradation of any, or a combination of any, of the following three security goals:
Loss of Confidentiality – Impact of unauthorized disclosure of sensitive information (e.g., Privacy Act).
Loss of Integrity – Impact if system or data integrity is lost by unauthorized changes to the data or system.
Loss of Availability – Impact to system functionality and operational effectiveness. The user domain can be assessed by training them properly and the impact can damage the integrity of the company. Workstation domain can be assessed by keeping up with the systems and updating the when needed. LAN to WAN domain can be assessed by keeping good firewall restrictions and implementing them the impact could escalate to network downtime. Remote access domain can be assessed by requiring two credentials from the three something you are, something you have and something you know. This can impact the data stored on the network as well as the network itself.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    lab 4

    • 451 Words
    • 2 Pages

    Compare the portions that address Internet and e-mail access of at least three different companies.…

    • 451 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    lab 4

    • 527 Words
    • 3 Pages

    The shielding also makes the cable heavier and stiffer. Thus, it is more difficult to handle.…

    • 527 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Lab 3

    • 257 Words
    • 1 Page

    7. What is the IP address of the DHCP server from which W2K8yy has obtained its IP address?…

    • 257 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    lab 4

    • 503 Words
    • 2 Pages

    Of these three fundamental controls, which two are used by the Domain User Admin to create users and assign rights to resources?…

    • 503 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Lab 4

    • 575 Words
    • 3 Pages

    1.List four cell structures that were common to both plant and animal cells. (4 points)…

    • 575 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Lab 7

    • 928 Words
    • 3 Pages

    1. What are some common risks, threats, and vulnerabilities commonly found in the LAN-to-WAN Domain that must be mitigated through a layered security strategy?…

    • 928 Words
    • 3 Pages
    Good Essays
  • Good Essays

    LAB 3

    • 368 Words
    • 2 Pages

    1. What are the three fundamental elements of an effective access control solution for information systems?…

    • 368 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Lab 2

    • 742 Words
    • 3 Pages

    To form a hypothesis for the pitching velocity of a ball. Use a spreadsheet and math to calculate the actual velocity and determine the accuracy of the hypothesis. I will also roll a large ball to measure its velocity and graph its horizontal motion.…

    • 742 Words
    • 3 Pages
    Powerful Essays
  • Good Essays

    Jmz Memorandum

    • 823 Words
    • 4 Pages

    Impacts are the [adverse] consequences on the individual, organization or community resulting from information security incidents:…

    • 823 Words
    • 4 Pages
    Good Essays
  • Good Essays

    It Infrastructure

    • 342 Words
    • 2 Pages

    The local area network (LAN) Domain is a collection of computers connected to one another, or to a common medium. All LAN domains include data closets, physical elements of the LAN, as well as logical elements to be designated by authorized personnel. It needs strong security and access controls. Its can access company-wide systems, applications, and data from the LAN…

    • 342 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Business value of security and control: Organizations can be held liable for needless risk and harm created if the organization fails to take appropriate protective action to prevent loss of confidential information, data, corruption, or breach of privacy…

    • 1209 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    Lab 4

    • 1087 Words
    • 3 Pages

    1. What is a PHP Remote File Include (RFI) attack, and why are these prevalent in today’s Internet world?…

    • 1087 Words
    • 3 Pages
    Powerful Essays
  • Good Essays

    Hardware and software are key pieces of any organization’s infrastructure. Components in each domain of the seven domains of the IT infrastructure may connect to a network or to the internet, and can be vulnerable to malicious attacks. Malicious attacks on hardware and software can also lead to more widespread problems. These problems can include loss of critical data or theft of financial information or intellectual property. Unprotected IT and network infrastructure assets can offer attackers and cybercriminals the widest opening to access sensitive resources. The ease of access makes assets that are connected to the internet the most common first point of attack. That means those assets should be you first line of defense. Technical failure and human error are the most common causes of unintentional downtime. Malicious attacks can occur and cause downtime in all seven domains of an IT infrastructure, but you are more likely to see them in the User, Workstation, LAN, and WAN domains. Opportunity cost is the amount of money a company losses due to downtime. The downtime can be either intentional or unintentional. Some organizations refer to opportunity cost as true downtime cost. It usually measures the loss of productivity experienced by an organization due to downtime. One of the most important things that information security professionals try to protect is their organization’s reputation and brand image. Companies that suffer from security breaches and malicious attacks that expose any assets are likely to face serious negative consequences in the public eye. In the popular usage and in the media, the term hacker often describes someone who breaks into a computer system without authorization. In most cases that means the hacker tries to take control of a remote computer through a network, or software cracking. The media and the general public also use the word hacker to describe anyone accused of using technology for terrorism, vandalism, credit card fraud,…

    • 1126 Words
    • 5 Pages
    Good Essays
  • Better Essays

    Computer systems are vulnerable to many threats that can inflict various types of damage resulting in significant losses. This damage can range from errors harming database integrity to fires destroying entire computer centers. Losses can stem, for example, from the actions of supposedly trusted employees defrauding a system, from outside hackers, or from careless data entry clerks. Precision in estimating computer security-related losses is not possible because many losses are never discovered, and others are "swept under the carpet" to avoid unfavorable publicity. The effects of various threats varies considerably: some affect the confidentiality or integrity of data while others affect the availability of a system.…

    • 1117 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Analyze the current state of the IT network. What are the vulnerable points and what are the strong points. Where, when and how these risk can and will occur.…

    • 673 Words
    • 5 Pages
    Good Essays