Preview

Nt1310 Unit 3 Data Management Information System

Good Essays
Open Document
Open Document
1000 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Nt1310 Unit 3 Data Management Information System
Using weak passwords, Unencrypted data storage, passing clear text credentials over the network, using weak authentication mechanisms, allowing prolonged session lifetime Access to credentials through data theft, access to authenticated user session, attacker can do network eavesdropping, brute force attacks, dictionary attacks, cookie replay attacks Use strong password policies, do not store credentials in insecure manner, use authentication mechanisms, encrypt communication channels, use secure HTTP(HTTPS) only with Forms authentication cookies Storing secrets in clear text in files, registry, or configuration, Passing sensitive data in clear text over networks, Storing secrets when you do not need to Attacker Network eavesdropping, configuration file sniffing, attacker can read sensitive data out of memory or from local files Confidentiality Do not store secrets in software, Encrypt sensitive data over the network, Secure the channel, Encrypt sensitive data in configuration files Outdated security patch, using vulnerable old version of software, downloading from or browsing un-trusted web-sites, antivirus without latest updates, disabled firewall Hacker Stealing or hacking of personal devices, malware or virus, eavesdropping, sniffing through endpoints, web Session Hijacking Device management …show more content…
Use least-privileged accounts, consider the granularity of access, enforcing separation of privileges, secure the system resources against system identities DB system having multiple administrators Using insecure custom administration interfaces, insecure configuration of files on the server, storing sensitive information in the clear text form, using overprivileged process accounts and service accounts Hacker Unauthorized access to configuration stores, Retrieval of clear text configuration secrets Encrypt sensitive sections of configuration files, secure settings for various operations of web services using configuration files, usage of access control lists

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Lab 9

    • 1001 Words
    • 3 Pages

    Unauthorized access to data centers, computer rooms and wiring closets, servers must be shut down occasionally for maintenance causing network downtime, data can be easily lost or corrupt and recovering critical business functions may take too long to be useful.…

    • 1001 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Lab 7 & 8

    • 1094 Words
    • 5 Pages

    Authorized secure remote access, Traffic inspection and Coordinated Threat Control, Centralized security management and enterprise-wide visibility and control.…

    • 1094 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    In the WAN domain, enforce encryption, and VPN tunneling for remote connections. Configure routers, and network firewalls to block Ping requests to reduce chance of Denial of Service attacks. Deployment of…

    • 386 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    * Remote access must be secure and strictly controlled. Enforcement of control will be via password authentication or private/public keys with strong pass-phrases.…

    • 399 Words
    • 2 Pages
    Good Essays
  • Better Essays

    VUT2 Task 1 Memo CheckList

    • 1884 Words
    • 7 Pages

    remote access and data trolling capabilities alone will cause the attacker to access any and all desired…

    • 1884 Words
    • 7 Pages
    Better Essays
  • Good Essays

    Computers – for example when using a public computer it’s important to log out while the computer is unattended it’s very simple…

    • 914 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    week 3 lab

    • 350 Words
    • 2 Pages

    3. Store passwords using reversible encryption is required for certain remote access protocols. It is also required to VPN in most cases.…

    • 350 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    First and for most this process I found out seems like a whole lot of hassle so I don’t understand why people would do this and just get caught in the end. But I will be listing 5 general phases of a computer attack that one would have to go through to be successful in other words jumping through hoops that are on fire.…

    • 377 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Week 5 Quiz

    • 531 Words
    • 3 Pages

    Limit what services are running on the server to only what is absolutely needed, use unique id/strong password in combination with principle of least privilege to help prevent unauthorized access, use up-to-date anti-malware software, use firewalls to prevent unauthorized access, use intrusion detection software to monitor for unauthorized access…

    • 531 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    up north fishing

    • 544 Words
    • 3 Pages

    Keep up to date software and use methods when coding to prevent attacks. Test the server for vulnerabilities weekly. Configure the web services using best practices.…

    • 544 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    1. File and share permissions that give up everything to everyone -- This is easily the biggest vulnerability I'm seeing with Windows systems regardless of the type of system or Windows version. Users who create shares to make their local files available across the network are typically the culprits. Sometimes it's careless admins; other times they're honest mistakes. Unfortunately, all too often the "Everyone group" is given full access to every file on the system. Then, all it takes is for an insider to search for sensitive keywords stored in .pdf, .xls, .doc and other file formats using a text search tool such as Effective File Search or FileLocator Pro. Odds are -- nearly 100% of the time -- the attacker will come across sensitive information (SSNs, credit card numbers, you name it) that they shouldn't have access to. Best case scenario, this is an identity theft in the making. Worst case, this becomes a serious breach that…

    • 2361 Words
    • 7 Pages
    Powerful Essays
  • Powerful Essays

    Cyber Espionage

    • 3589 Words
    • 15 Pages

    Cyber spying, or cyber espionage, is the act or practice of obtaining secrets without the permission of the holder of the information (personal, sensitive, proprietary or of classified nature), from individuals, competitors, rivals, groups, governments and enemies for personal, economic, political or military advantage using methods on the Internet, networks or individual computers through the use of cracking techniques and malicious software including Trojan horses and spyware. It may wholly be perpetrated online from computer desks of professionals on bases in far away countries or may involve infiltration at home by computer trained conventional spies and moles or in other cases may be the criminal handiwork of amateur malicious hackers and software programmers.…

    • 3589 Words
    • 15 Pages
    Powerful Essays
  • Powerful Essays

    Computer Security

    • 768 Words
    • 4 Pages

    Counter attacks: Documents should have a password, a firewall should be used to bar hackers, user account should have a password or a screen lock and data should be…

    • 768 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    o Altering of software settings and/or intentional introduction of malicious software in order to circumvent network security.…

    • 855 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    IT personnel, students, and staff are also considered security risks and therefor the proper level of user security awareness training, workshops, and seminars should be provided to users on the network. Other security measures such as an acceptable usage policy and password policies should be properly implemented to ensure users are responsible for and understand their actions on the network. In addition, it would be best practice to implement the…

    • 341 Words
    • 2 Pages
    Satisfactory Essays