Unit 2 – Assignment 1: Selecting Security Countermeasures Marcial Norori IS3220 Mr. Sebastian Burci ITT Technical Institute – Hialeah, FL. 1/5/2015 A secure Web server provides a protected foundation for hosting Web applications. A Web server configuration plays a critical role in the Web application's security. Badly configured directories can lead to unauthorized access. A forgotten detail can provide a convenient back door, while an overlooked port can be an attacker's front door.
• Imagine you are a CISO of a publically traded company and concerned about security when sending any message traffic over the Internet to your remote sites. Determine the security measures you would consider implementing to mitigate security risks when sending message traffic over the Internet. Explain your reasoning. Teardrop – a mangled packet sent in fragments via overlapping or overloading payloads which could cause the systems as it has in the past with older OS versions. Sequence number – hijacked or interrupted TCP/IP sessions via injected packets that disguises its origination from one of the two computers in a session.
Spyware is almost exactly as it sounds, a spying program. This type of malware will record the users input and transmit it back to the hacker to access at his leisure. This type of spyware is called a key logger and can capture interesting information such as user names, passwords, credit card numbers and email addresses. The more advanced versions of spyware can siphon off network data that will allow the hacker access to files, encryption keys, and other sensitive information. The final malware I will cover is the zombie.
Is this the same thing as a Public Key Infrastructure (KI) server? The Public Key Infrastructure creates encryption keys and manages certificate requests while the storage location is called the certificate store. 7. What do you need if you want to decrypt encrypted messages and files from a trusted sender? You need the sender’s private key to decrypt the message.
Increase fault tolerance by splitting DHCP scopes. 2. Balance the load on your DHCP server by using the 80/20 rule for scopes 3. Allow remote administration of DHCP servers by comfiguring windows Firewall ports. | Question 4 | What is the name of the computer you are working from?
IS3445 – Security Strategies in Web Applications and Social Networking Unit 1 Lab 1 Assessment Doug Stott Mr.Gibbins 10/1/14 1. From the results of lab #1 – Business Application impact analysis worksheet, what do you consider to be the greatest type of risk and why? The greatest risk is hackers having access to data because it can lead to identity theft. 2. Why is it critical to perform periodic web application vulnerability assessments and penetration tests?
To begin with, the definition of a port scan is, “The examination of TCP and UDP ports to determine which are open and what services are running. (Conklin 659) “The method used by intruders to discover the services running on the target machine. The intruder can then plan an attack on any vulnerable service that he or she finds for example, if the intruder finds that port 143 is open here she may proceed to find out what version of IMAP is running on the target machine if the version is vulnerable she may be able to gain superuser access to the machine using exploit (a program that exploits a security hole).” (Teo, 2000) To put the definition of the port scan into simpler terms it is a way for intruders to scan the network of the company for a way into the company records and programs. A port scan can tell an intruder what port is open, where it leads to, and what programs, files, passwords are on the machine that they have found access. Ping sweeps are used to identify the path a host ID uses in a given subnet.
3. If the company is looking into using laptops and Internet access in the field, then it must consider encryptions. According to Pfleeger & Pfleeger, “encryption is powerful for providing privacy, authenticity, integrity, and limited access to data” (p. 444). I would suggest “end-to-end encryption” this is known to provide encryption from one end of transmission to the other” (p. 446). This way, information transmitted from the field would be in encrypted throughout the network.
Permissions are based on what the user or group is allowed to do with the data that they have accessed. This includes the ability to alter, add, or delete data. Usernames, passwords, and encryption keys will be used to limit access to the network and to help the IT team keep track of who has used the network and when. This will help reduce the risk of unauthorized access. Gaining access to the network will be done using IPv4 and Mobile IPv4 (MIPv4) protocols.
Other types of risks that BUGusa, Inc. can potentially face without property protection and poor management are: loss in customer trust, penalties for law violations, compliance risk, availability risk, access risk, and more. (Priviti, 2008) B. Discuss in detail what types(s), if any, of civil liability Steve and/or WIRETIME may face if caught. a. BUGusa is facing the issues of their work being stolen and internet hacking. Not to mention WIRETIME is unethical in their actions.