Unit 2 – Assignment 1: Selecting Security Countermeasures Marcial Norori IS3220 Mr. Sebastian Burci ITT Technical Institute – Hialeah, FL. 1/5/2015 A secure Web server provides a protected foundation for hosting Web applications. A Web server configuration plays a critical role in the Web application's security. Badly configured directories can lead to unauthorized access. A forgotten detail can provide a convenient back door, while an overlooked port can be an attacker's front door.
Table for Individual Question FeedbackPoints Earned:1.0/1.0Correct Answer(s):C 3. __________ is the process of confirming a user’s identity, usually by requiring the user to supply some sort of token, such as a password or certificate. Table for Individual Question FeedbackPoints Earned:0.0/1.0Correct Answer(s):Authentication 4. SMTP server is essentially the Windows counterpart to the __________ program used by most UNIX Web servers. Table for Individual Question FeedbackPoints Earned:0.0/1.0Correct Answer(s):sendmail; Sendmail 5.
lab 3 Configuring and Managing the DHCP Server Role Question 1 | What is the name of the computer you are working from? SEA-SVR1 | Question 2 | What is the default lease duration of a Wired subnet type? 6 Days | Question 3 | What are three recommendations listed in Server Manager for managing the DHCP Server role? 1. Increase fault tolerance by splitting DHCP scopes.
Sec 574 Week 1 Quiz 1. (TCO A) Which of the following administrator functions is enabled by a database management system? (Points : 3) | Automatically back up data in case of a failure Back up data in case of theft Back up data in case of an intrusion Back up data for auditing purposes | 2. (TCO A) What system or application is capable of performing what-if analysis? (Points : 3) | TES ES TPS DSS | 3.
For example, instead of directly calling a system I/O routine, a thread calls an application-level I/O jacket routine. Within this jacket routine is code that checks to determine if the I/O device is busy. If it is, the thread enters the Blocked state and passes control (through the threads library) to another thread. When this thread later is given control again, the jacket routine checks the I/O device
IS3445 – Security Strategies in Web Applications and Social Networking Unit 1 Lab 1 Assessment Doug Stott Mr.Gibbins 10/1/14 1. From the results of lab #1 – Business Application impact analysis worksheet, what do you consider to be the greatest type of risk and why? The greatest risk is hackers having access to data because it can lead to identity theft. 2. Why is it critical to perform periodic web application vulnerability assessments and penetration tests?
Based on the case study, risk factors that affected outsourcing process included ethical concern, quality and patent protection. Late delivery would affect its market and general market positions. This would have negative impact on Metrovox’s reputation such that the company feared it would trigger both consumer protests and boycotts. The solution relied on the company’s code of conduct. The introduction of video capability in Bugabyte was highly susceptible copyright.
No matter how big or small your company (ours being big), having an IDS policy in place will assist in the preventing and notify personnel of security breaches. An IDS stands for Intrusion Detection System and it is a collaboration of hardware, software and personnel as the first line of defense when an intrusion occurs. An easy way to understand this is in four steps; Prevention, Intrusion Monitoring, Intrusion Detection and Response. The first step of an IDS policy is prevention. Since prevention is where most companies pour their dollars into, there is a whole system devoted to prevention.
Case Study #1: Port Scans and Ping Sweeps Your boss has just heard about some nefarious computer activities called ping sweeps and port scans. He wants to know more about them and what their impact might be on the company. Write a brief description of what they are, and include your assessment of whether the activities are something to worry about or not. The impact that can be inflicted upon a company by the use of port scans and ping sweeps can be quite dangerous and cause major issues to the vulnerability of information; if these are used nefariously to gain unauthorized access to company records. To begin with, the definition of a port scan is, “The examination of TCP and UDP ports to determine which are open and what services are running.
Lab 4 global catalog and flexible single master operations (FSMO) roles This lab contains the following projects and activities: Project 4.1Project 4.2Project 4.3 | The Global Catalog and Windows Server 2003 Domain Functional LevelEnabling Universal Group Membership CachingWorking with Flexible Single Master Operations Roles | Lab Review Questions | | Lab Challenge 4.1 | Using the DNS Console to Verify Global Catalog Records on the DNS Server | Lab Challenge 4.2 | Verifying FSMO Role Holders with DCDIAG | Lab Challenge 4.3 | Determining Whether an Attribute Is Replicated in the Global Catalog | Before You Begin Lab 4 assumes that setup has been completed as specified in the setup document and that your computer has connectivity