Preview

NT2580

Satisfactory Essays
Open Document
Open Document
526 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
NT2580
NT2580 Introduction to
Information Security
Unit 2
Application of Security Countermeasures to Mitigate Malicious Attacks
© ITT Educational Services, Inc. All rights reserved.

Learning Objective
Describe how malicious attacks, threats, and vulnerabilities impact an IT infrastructure.

NT2580 Introduction to Information Security

© ITT Educational Services, Inc. All rights reserved.

Page 2

Key Concepts
 Attacks, threats, and vulnerabilities in a typical IT infrastructure
 Common security countermeasures typically found in an IT infrastructure
Risk assessment approach to securing an
IT infrastructure
 Risk mitigation strategies to shrink the information security gap

NT2580 Introduction to Information Security

© ITT Educational Services, Inc. All rights reserved.

Page 3

EXPLORE: CONCEPTS

NT2580 Introduction to Information Security

© ITT Educational Services, Inc. All rights reserved.

Page 4

Definitions
 Risk: Probability that an intentional or unintentional act will harm resources
 Threat: Any accidental or intentional event that negatively impacts company resources
 Vulnerability: Inherent weakness that may enable threats to harm system or networks
Risks, threats, and vulnerabilities affect confidentiality, integrity, and availability (CIA).
NT2580 Introduction to Information Security

© ITT Educational Services, Inc. All rights reserved.

Page 5

Types of Threats
 Malicious software
 Device failure
 Application failure
 Natural disaster
 Intrusive cracker

NT2580 Introduction to Information Security

© ITT Educational Services, Inc. All rights reserved.

Page 6

Types of Vulnerabilities
 Insecure servers or services
 Exploitable applications and protocols
 Unprotected system or network resources
 Traffic interception and eavesdropping
 Lack of preventive and protective measures against malware or automated attacks NT2580 Introduction to Information Security

© ITT Educational Services, Inc. All rights reserved.

Page 7

Identify

You May Also Find These Documents Helpful

  • Satisfactory Essays

    NT1210 Lab 1

    • 319 Words
    • 4 Pages

    1. It is important to know how many system words will fit in a primary storage device on a computer so you know how big of a storage unit you have. The more system words that will fit in a primary storage device, the more memory you have on your computer.…

    • 319 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT2670 Lab 5

    • 88 Words
    • 1 Page

    2. No you need to configure the URL and path for the media you want to show.…

    • 88 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    NT1230 Lab 4

    • 56 Words
    • 1 Page

    1. What tasks can you perform in the J.Adams Properties dialog box that you could not perform in the User Accounts control panel?…

    • 56 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    NT2460

    • 271 Words
    • 2 Pages

    Answer: The /W switch specifies the warning level of the MIDL compiler. The warning level indicates the severity of the warning. /W Specifies the warning level, an integer in the range 0 through 4. There is no space between the /W switch and the digit indicating the warning-level value. Warning levels range from 1 to 4, with a value of zero meaning to display no warning information. The highest-severity warning is level 1. The following table describes the warnings for each warning level…

    • 271 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    PT2520

    • 1263 Words
    • 7 Pages

    The course project is based on the Westlake Research Hospital scenario that you have been studying throughout the course and uses the Westlake database you used for the Group A labs. To complete the project, you will need to use your copy of the SQL2008ExpVM virtual machine, as it existed at the end of the last unit (Unit 9). Your instructor will provide you with a script file named ProjectLoadData.sql, which you will use to populate the database. You will receive instructions on how to use this file in Step 10 of the Technical Steps section of this lab.…

    • 1263 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    NT2670 Lab1 2

    • 1472 Words
    • 7 Pages

    The classroom network consists of Windows Server 2008 student servers and the ServerDC connected to a local area network. ServerDC, the domain controller for the contoso##.com domain, is running Windows Server 2008. Throughout the labs in this manual, you will install, configure, maintain, and troubleshoot application roles, features, and services on the same student server.…

    • 1472 Words
    • 7 Pages
    Good Essays
  • Satisfactory Essays

    Nt1330

    • 268 Words
    • 2 Pages

    I would say that the amount of users we have is about 200. And we will have plenty of room to expand in case we ever need to expand up to another 300 Users if we need to. And we will only have 5 departments (IT, H.R, Distribution, Maintenance, and Staff). As far as what departments permissions go we will have to sit with all department heads and come up with a valuable plan to benefit everyone. And since we are in a trucking distribution company named Spike’s Distro. We will only have one site for our infrastructure. The reason being is because we only have one building that everyone works out of. Our budget for creating this new infrastructure is going to be $35,000 to buy all the servers and switches needed including the computers to hold the active directory and domain servers. And we should buy physical servers as they are more efficient than virtual servers are. We should only create one domain per department. The only time we will need to create more is if we expand to more than one…

    • 268 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    In this assignment we are asked to identify the major threats and security concepts from a whitepaper located on the internet: http://eval.symantec.com/mktginfo/enterprise/white_papers/b-whitepaper_internet_security_threat_report_xv_04-2010.en-us.pdf. This report stated that: “There are a number of recent and growing trends in the threat activity landscape that were observed by Symantec in 2009.” These threats are identified as:…

    • 275 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Itt 255 IT255 Instructor Lab Manual LABORATORY Instructor Lab Manual IT255 Fundamentals of Information Systems Security Copyright © 2012 Jones & Bartlett Learning, LLC www.jblearning.com All Rights Reserved. Current Version Date: 12/06/2010 -1- IT255 Instructor Lab Manual LABORATORY ISS Curriculum Overview............................................................................................................................. 5 Ethics and Code of Conduct.......................................................................................................................... 6 ISS Mock IT Infrastructure ...........................................................................................................................…

    • 33056 Words
    • 133 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT1210 Lab 5

    • 1862 Words
    • 7 Pages

    The IEEE standards cover more than just Ethernet. The 802.3 standard actually builds upon the 802.1 network architecture standard from IEEE. Briefly define the 802.1 standard and what it provides. Use your textbook and the Internet to research your answer.…

    • 1862 Words
    • 7 Pages
    Satisfactory Essays
  • Satisfactory Essays

    IS4799

    • 675 Words
    • 8 Pages

     Importance • Significant amount of supplemental information IS4799 Information Systems and Cybersecurity Capstone Project © ITT Educational Services, Inc. All rights reserved. Page 4 Key Concepts  Clarification • Additional information to clarify RFP contents…

    • 675 Words
    • 8 Pages
    Satisfactory Essays
  • Good Essays

    It250

    • 272 Words
    • 2 Pages

    Which of the following symbols instructs the shell to redirect the output of a command to the specified file instead of the screen and overwrite the file?…

    • 272 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    1. Discuss common forms of attack on Microsoft systems using the text Internet, and/or your job as reference for full credit.…

    • 488 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Dougherty, C., Householder, A., & Houle, K. (2002). Computer attack trends challenge Internet security. Computer, 35(4), 0005-7.…

    • 1278 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Nt1310

    • 932 Words
    • 4 Pages

    1. Horizontal Cable : A type of inside cable designed for horizontal use in non-plenum areas. While horizontal cable must be fire retardant, the National Electrical Code (NEC) specifications are not as demanding as those governing the use of plenum cable or riser cable. See also NEC, plenum, plenum cable, and riser cable.…

    • 932 Words
    • 4 Pages
    Good Essays