Preview

Testing and Monitoring Security Controls

Good Essays
Open Document
Open Document
588 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Testing and Monitoring Security Controls
Nt2580
04/23/2013
Unit 5 Assignment 1
Testing and Monitoring Security Controls

Testing and Monitoring Security Controls Different traffic patterns can be a red flag when it comes to identifying different types of suspicious activities. There are multiple ways traffic can change to point out the activities: First is an unexpected increase in overall traffic. This may just mean that your web site has been talk about on a popular news site, or it may mean that someone is up to no good. Another would be a sudden jump in the number of bad or malformed packets. Some routers collect packet-level statistics; you can also use a software network scanner like Observer or Network Monitor to track them. Also large numbers of packets caught by your router or firewall's egress filters. Remember that egress filters prevent spoofed packets from leaving your network, so if your filter is catching them you need to identify their source, because that's a clear sign that machines on your network have been compromised. Unscheduled reboots of server machines may sometimes signify that they are compromised as well. You should already be watching the event logs of your servers for failed logons and other security-related events. Log Files encompass complete records of all security events (logon events, resource access, attempted violations of policy, and changes in system configuration or policies) and critical system events (service/daemon start/stop, errors generated, system warnings) that can allow an administrator to quickly discover the root cause of any issues. When remote users do not have recent patches or updates, the system administrator should set up group policies such as, forcing updates to install right away. Rather than having the users restart the systems themselves, squandering the companies and users time, but at the same time safe guarding what goes in and out of the network. Removable storage drives introduce malware filtered only when crossing

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Lab 9

    • 1001 Words
    • 3 Pages

    Unauthorized access to data centers, computer rooms and wiring closets, servers must be shut down occasionally for maintenance causing network downtime, data can be easily lost or corrupt and recovering critical business functions may take too long to be useful.…

    • 1001 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT1230 Lab 10

    • 1546 Words
    • 8 Pages

    In this exercise, you began the process of troubleshooting a server and isolating the most important events in the Windows Server 2008 logs.…

    • 1546 Words
    • 8 Pages
    Satisfactory Essays
  • Good Essays

    ISSC342 Assignment5

    • 338 Words
    • 1 Page

    During the first two phases of the five step process of a cyber-attack a hacker conducts reconnaissance of the target network and scans for any vulnerabilities that could be exploited. (EC-Council, 2009) These vulnerabilities are known as a system’s attack surface. One of the core job functions of Network administrators is reducing this attack surface through a process called system hardening. There a number of techniques that can be used to harden Microsoft clients and servers such as scanning the system with nmap to find any vulnerabilities that comes from having open ports. After the initial scan the administrator should close open ports and uninstall unnecessary services. (Solomon, 2014) Administrators should also run follow up scans with nmap to make sure that there are no ports or services that they may have missed during their first run. Nmap is not the only program that can identify vulnerabilities within a server, the SCW utility should also be used when you are installing new server hardware to check for any unwanted services that may be set to run on the server as a default setting. (Solomon, 2014)…

    • 338 Words
    • 1 Page
    Good Essays
  • Better Essays

    An essential part of network security is knowing what the characteristics of an attack are, so they can be countered or prevented. When the university suffered an overwhelming internal DDoS attack, it required administrators to reevaluate its security guidelines based on what was known about the attack.…

    • 1279 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    NT260 unit 1 assignment 1

    • 624 Words
    • 3 Pages

    Brute Force - The intruder attempts to gain access to a server by guessing a user password (usually the root administrator) through the SSH server, Mail server, or other service running on your system. Brute force detection software will alert you when multiple failed attempts to gain access are in progress and disable access from the offending IP address.…

    • 624 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Use the Web to research and evaluate security products from two competing vendors, such a...…

    • 428 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Stealing or hacking of personal devices, malware or virus, eavesdropping, sniffing through endpoints, web Session Hijacking…

    • 1000 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    ISSC362 Lab 4 Assessment

    • 412 Words
    • 2 Pages

    2. During the reconnaissance step of the attack, describe what task Zenmap GUI performs to do passive OS fingerprinting.…

    • 412 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Nt1310 Unit 3 Essay

    • 1872 Words
    • 8 Pages

    What are the major security threats on my network and computers connected to the network?…

    • 1872 Words
    • 8 Pages
    Better Essays
  • Powerful Essays

    3. Identify and document at least three vulnerabilities and the solutions related to the client configurations.…

    • 537 Words
    • 2 Pages
    Powerful Essays
  • Powerful Essays

    For example, humans can inadvertently shut down a Web server or corporate gateway router by starting a computationally intensive application. An OLAP application that uses the operational DBMS can consume so many DBMS resources that order-entry transactions cannot get through. Denial-of-service attacks can be launched maliciously. A malicious hacker can flood a Web server, for example, with millions of bogus service requests that so occupy the server that it cannot service legitimate requests. Computer worms can infiltrate a network with so much artificial traffic that legitimate traffic cannot get through. Finally, natural disasters may cause systems to fail, resulting in denial of service.…

    • 4641 Words
    • 19 Pages
    Powerful Essays
  • Satisfactory Essays

    mrs Alice

    • 575 Words
    • 3 Pages

    It is important to record information so that any patterns of incidents are notify and actions are taken to prevent them from happening again.…

    • 575 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    discussion

    • 278 Words
    • 2 Pages

    Reconnaissance- public internet, email, social networking; Discovery- port scanning, icmp, snmp; Fingerprinting- looking for system versions; Targeting- either a scattershot, or the most vulnerable part of the system; Intrusion- remote access; Privilege escalation- running utilities to gain admin rights; Snooping and eavesdropping- tapping into conversations between computers; Remote Access- installation of rootkits to conceal presence; Zombies- host becomes passive.…

    • 278 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    In this lab, you used group policy objects to create a minimum password length password policy and link it…

    • 365 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Computer Worms

    • 594 Words
    • 3 Pages

    Worms are one of the most ill-defined concepts in Network Security and are among the most common types of malware. They spread over computer networks by finding operating system vulnerabilities. Worms typically cause harm to their host networks by consuming bandwidth and shorting out web servers. Generally, the intent of the worm is to be malicious. There are some worms however, which do not have malicious intent. They are referred to as anti-worms.…

    • 594 Words
    • 3 Pages
    Good Essays