Preview

The security implications of having a variety of client platforms

Satisfactory Essays
Open Document
Open Document
348 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
The security implications of having a variety of client platforms
The security implications of having a variety of client platforms are:
1. Violation of a security policy by a user
2. Disgruntled employee sabotage
3. Download of non-business video using the Internet to an employer-owned computer
4. Malware infection of a user’s laptop
5. Unauthorized physical access to the LAN
6. LAN server operating system vulnerabilities
7. WAN Denial of Service (DoS) or Distributed Denial of Service (DDoS) attacks
8. WAN eavesdropping
9. Errors and weaknesses of network router, firewall, and network appliance configuration file

The basic strategies of attack surface reduction are to reduce the amount of code running, reduce entry points available to untrusted users, and eliminate services requested by relatively few users. One approach to improving information security is to reduce the attack surface of a system or software. By turning off unnecessary functionality, there are fewer security risks. By having less code available to unauthorized actors, there will tend to be fewer failures. Although attack surface reduction helps prevent security failures, it does not mitigate the amount of damage an attacker could inflict once a vulnerability is found.[3] he security implications of having a variety of client platforms are:
1. Violation of a security policy by a user
2. Disgruntled employee sabotage
3. Download of non-business video using the Internet to an employer-owned computer
4. Malware infection of a user’s laptop
5. Unauthorized physical access to the LAN
6. LAN server operating system vulnerabilities
7. WAN Denial of Service (DoS) or Distributed Denial of Service (DDoS) attacks
8. WAN eavesdropping
9. Errors and weaknesses of network router, firewall, and network appliance configuration file

The basic strategies of attack surface reduction are to reduce the amount of code running, reduce entry points available to untrusted users, and eliminate services requested by relatively few users. One approach to

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Improved Security: strictly enforced standards and the reduction of networks and data centers, thereby reducing the number of vulnerable seams…

    • 639 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    For the systems/application domain, we must strengthen our servers. This will be done by shutting off access to unused ports and services. This will provide less ways onto our system. Our servers must have the latest patches and…

    • 337 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    IS3110 U5L1

    • 912 Words
    • 4 Pages

    One of the most important first steps to risk management and implementing a security strategy is to identify all resources and hosts within the IT infrastructure. Once you identify the workstations and servers, you now must then find the threats and vulnerabilities found on these workstations and servers. Servers that support mission critical applications require security operations and management procedures to ensure C-I-A throughout. Servers that house customer privacy data or intellectual property require additional security controls to ensure the C-I-A of that data. This lab requires the students to identify threats and vulnerabilities found within the Workstation, LAN, and Systems/Applications Domains.…

    • 912 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    When designing a layered security solution for an IT infrastructure. The more layers or compartments that block or protect private data and intellectual property, the more difficult it is to find and steal.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Good Essays

    You Decide- Sec572 Week 2

    • 577 Words
    • 3 Pages

    To develop network security strategies that will ensure that the organization's network is protected from both internal and external security risks. A summary of the steps I can take to mitigate the risk in the following areas: Denial-of-Service attacks (DoS), Distributed Denial-of-Service attacks (DDoS), Masquerading and IP Spoofing, Smurf attacks, Land.c attacks, Man-in-the-Middle attacks.…

    • 577 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Nt2580 Project 1

    • 492 Words
    • 2 Pages

    For the systems/application domain, we must lessen chances for attacks on our servers. This shall be done by figuring out which ports and services are not being used and shutting them off. This gives hackers less ways onto our system. Also needed is to make sure all servers have the latest patches and updates. These updates provide the latest security patches with less likelihood of vulnerabilities.…

    • 492 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    It255 Project Part 1

    • 634 Words
    • 3 Pages

    References: David Kim., and Michael G. Solomon. Fundamentals of Information Systems Security , 2012: Sudbury, MA 2012…

    • 634 Words
    • 3 Pages
    Better Essays
  • Good Essays

    BSA 375 Week 3 Individual

    • 793 Words
    • 3 Pages

    The level of security and its effectiveness in an application is a concern for all software development projects. Operations and Information Technology will hold key responsibility in implementation and maintenance of the software security measures. These measures will include but not be limited to firewalls, intrusion detection systems, credential verification, and standard backup operations (Valacich, 2012). This responsibility isn’t limited to just these measures or to this scope of responsibility. All hands that take part in development will have some responsibility in assuring appropriate security measures are developed, implemented, and maintained.…

    • 793 Words
    • 3 Pages
    Good Essays
  • Good Essays

    IS3110 U5D1

    • 712 Words
    • 3 Pages

    Remove unnecessary services, applications, and network protocols to reduce exploits on applications you commonly are not using.…

    • 712 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Nt280 Week 1 Homework

    • 359 Words
    • 2 Pages

    C. Place employee on probation, review acceptable use policy (AUP) and employee manual, and discuss status during performance reviews.…

    • 359 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    What vulnerabilities exist for this workgroup LAN based on the advisories? List five of them.…

    • 286 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 1 Assignment 2

    • 313 Words
    • 2 Pages

    Discovery helps to analyze and understand how breaches occur. If this company can reduce system vulnerabilities can reduce the risk and impact of threats, to the system significantly.…

    • 313 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT2580

    • 526 Words
    • 5 Pages

    All rights reserved. Page 6 Types of Vulnerabilities  Insecure servers or services  Exploitable applications and protocols  Unprotected system or network resources  Traffic interception and eavesdropping  Lack of preventive and protective measures against malware or automated attacks NT2580 Introduction to Information Security…

    • 526 Words
    • 5 Pages
    Satisfactory Essays
  • Good Essays

    [242.1] Select and use appropriate methods to minimise security risk to IT systems and data…

    • 793 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Web Application Attacks Prevention advantage is used to benefit a protective or preventative standard used for determining the dimensions, area, with response capabilities such as an application layer firewall over a solution that identifies vulnerabilities in an application that are mean-full.…

    • 1988 Words
    • 8 Pages
    Better Essays