Part 3: Application/End-User Security Recommendations
Introduction
A robust network security strategy is one that actively involves the entire stakeholders of the system. The network administrator has the responsibility of ensuring that best practices in information security management are implemented throughout the entirety of the system they oversee. Threats to a system exist both within and outside an organization. This necessitates the need for a comprehensive security strategy that can cover all those potential threats. Information security threats are of a dynamic nature and the network administrator should take this consideration to ensure that they are always on top of any emerging threats. System vulnerabilities should be sought and effectively sealed and this should be a regular task.
End User Security Recommendations
Best practice in network security will require that the users and the firm abide by the following:
• Training and awareness – all employees of the company should have a firm grasp of matters pertaining network security. This will come through the training that should be offered by the company. The training should involve how to spot and identify threats, how to combat them, and how to handle them should they occur. As new threats emerge, the firm will need to create a continuous awareness program to inform its employees on them.
• Effective monitoring program – even after training has been done, this is not reason enough to believe employees will adhere to the lessons learnt. As such, the IT personnel should be empowered to conduct random checks on the security behavior of the firm’s employees. This will help in identifying potential weak spots.
• Unique user credentials – each and every employee that has been granted use of computer resources should do so with their own unique username and a password that should not be shared with any other user. The password should be complex enough that no one could possibly guess. The user should avoid using passwords from familiar objects or people. A strong password should have a mix of alphanumeric and special characters. For every activity a user does on any computer, they will be required to use their own unique credentials. This should leave an audit that can be followed should there be an incident.
• Automatic logoff – it is possible that a user might leave a computer without logging out from their session. This opens the possibility that another user might access resources using the logged in credentials. This could be devastating should the unauthorized have malicious intent and the logged on credentials have advanced permissions. Automatic logoff should be set to happen after a given period of time. This should especially happen after the end of prescribed business hours.
• Regular event log audits – event logs are very important when it comes to monitoring the performance of a given system. They can also be used to spot any anomalies within the system. Event log.
In computer security, a vulnerability is a weakness which allows an .pdfanandanand521251
In computer security, a vulnerability is a weakness which allows an attacker to reduce a system\'s
information assurance. Vulnerability is the intersection of three elements: a system susceptibility
or flaw, attacker access to the flaw, and attacker capability to exploit the flaw.[1] To exploit a
vulnerability, an attacker must have at least one applicable tool or technique that can connect to a
system weakness. In this frame, vulnerability is also known as the attack surface.
Vulnerabilities are flaws in computer software that create weaknesses in your computer or
network’s overall security. Vulnerabilities can also be created by improper computer or security
configurations. Threats exploit the weaknesses of vulnerabilities, resulting in potential damage to
the computer or its data.
The impact of a security breach can be very high. The fact that IT managers, or upper
management, can (easily) know that IT systems and applications have vulnerabilities and do not
perform any action to manage the IT risk is seen as a misconduct in most legislations.
Intrusion detection system is an example of a class of systems used to detect attacks. Some sets
of criteria to be satisfied by a computer, its operating system and applications in order to meet a
good security level have been developed: ITSEC and Common criteria are two examples.
Vulnerability falls under security like computer security, network security,etc.
How to mitigate the risk
§ Install Anti-Virus Software.
Ensure that reputable anti-virus software is installed on all computers. This should include all
servers, PCs and laptops. If employees use computers at home for business use or to remotely
access the network, these PCs should also have anti-virus software installed.
§ Ensure that the anti-virus software is up to date.
Everyday new computer viruses are being released and it is essential that businesses are
protected from these viruses by keeping the anti-virus software up to date. If possible, companies
should look at policies whereby computers that do not have the most up to date anti-virus
software installed are not allowed to connect to the network.
§ Employ a firewall to protect networks.
As computer viruses can spread by means other than email, it is important that unwanted traffic
is blocked from entering the network by using a firewall. For users that use computers for
business away from the protection of the company’s network, such as home PCs or laptops, a
personal firewall should be installed to ensure the computer is protected.
§ Filter all email traffic.
All incoming and outgoing email should be filtered for computer viruses. This filter should
ideally be at the perimeter of the network to prevent computer viruses. Emails with certain file
attachments commonly used by computer viruses to spread themselves, such as .EXE, .COM and
.SCR files, should also be prevented from entering the network.
§ Educate all users to be careful of suspicious e-mails.
Ensure that all users know to .
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
Part 1 List the basic steps in securing an operating system. Assume.pdffashiionbeutycare
Part 1: List the basic steps in securing an operating system. Assume that the O.S. is being
installed for the first time on new hardware.
Part 2: Name and briefly describe two ways that college students could be recruited into illegal
espionage.
Part 3: Explain the function of the trusted boot function of the trusted platform module (TPM.)
Tell how that is related to the current controversy between Apple and the FBI concerning
encryption. What could the FBI do in the absence of a trusted boot function?
Part 4: Define single loss exposure and annualized risk of occurrence. Explain in your own
words what these have to do with computer security.
Part 5: Explain why it is important to monitor outbound traffic as well as inbound traffic in a
corporate network. Give an example
Solution
Part1:-
There are three things that can enhance operating system security across an enterprise network:
First, provisioning of the servers on the network should be done once in one place, involving the
roughly tens of separate configurations most organizations require. This image, or set of images,
can then be downloaded across the network, with the help of software that automates this process
and eliminates the pain of doing it manually for each server. Moreover, even if you had an
instruction sheet for these key configurations, you wouldn\'t want local administrators to access
these key configurations for each server, which is very dangerous. The best way to do it is once
and for all.
Once the network has been provisioned, administrators need to be able to verify policy
compliance, which defines user access rights and ensures that all configurations are correct. An
agent running on the network or remotely can monitor each server continuously, and such
monitoring wouldn\'t interfere with normal operations.
Second, account management needs to be centralized to control access to the network and to
ensure that users have appropriate access to enterprise resources. Policies, rules and intelligence
should be located in one place—not on each box—and should be pushed out from there to
provision user systems with correct IDs and permissions. An ID life cycle manager can be used
to automate this process and reduce the pain of doing this manually.
Third, the operating system should be configured so that it can be used to monitor activity on the
network easily and efficiently—revealing who is and isn\'t making connections, as well as
pointing out potential security events coming out of the operating system. Administrators can use
a central dashboard that monitors these events in real time and alerts them to serious problems
based on preset correlations and filtering. Just as important, this monitoring system should be set
up so that administrators aren\'t overwhelmed by routine events that don\'t jeopardize network
security.
Part2:-
Two ways that college students could be recruited into illegal espionage:
First, the students may be trend before they sending out to the foreign .
Project Quality-SIPOCSelect a process of your choice and creat.docxwkyra78
Project Quality-SIPOC
Select a process of your choice and create a SIPOC for this process. Explain the utility of a SIPOC in the context of project management.
(
Application security in large enterprises (part 2)
Student Name:
) (
Instructor Name
)
Detailed Description:
Large enterprises of a thousand persons or more often have distinctly distinct data security architectures than lesser businesses. Typically they treat their data security as if they were still little companies.
This paper endeavors to demonstrate that not only do large businesses have an entire ecology of focused programs, specific to large businesses and their needs, but that this software has distinct security implications than buyer or small enterprise software. identifying these dissimilarities, and analyzing the way this can be taken advantage of by an attacker, is the key to both striking and keeping safe a large enterprise.
The Web applications are the important part of your business every day, they help you handle your intellectual property, increase your sales, and keep the trust of your customers. But there's the problem that applications re fast becoming the preferred attack vector of hackers. For this you really need something that makes your application secure.
And, with the persistent condition of today's attacks, applications can easily be get infected when security is not considered and scoped into each phase of the software development life cycle, from design to development to testing and ongoing maintenance of the application. When you take a holistic approach to your application security, you actually enhance your ability to produce and manage stable, secure applications. Applications need training and testing from the leading team of ethical hackers, for this there should be an authentic plan to recover these issues that can help an organization to plan, test, build and run applications smartly and safely.
Large enterprises of a thousand people or even more have distinctly different information security architectures than many other smaller companies. Actually, they treat their information security as if they were still small companies.
We are going to discuss some attempts to demonstrate that not only do large companies have an entire ecology of specialized software, specific to large companies and their needs, but that this software has different security implications than consumer or small business software for the applications. Recognizing these differences, and examining the way this can be taken advantage of by an attacker, is the key to both attacking and defending a large enterprise. It’s really important to cover up the security procedures in the large enterprise.
Key Features:
· Web application security checking from development through output
· Security check web APIs and world wide web services that support your enterprise
· Effortlessly organize, view and share security-test outcomes and histories
· Endow broader lifecycle adoption th ...
Student NameCYB110Playbook Runbook Parts 1-3S.docxdeanmtaylor1545
Student Name
CYB/110
Playbook / Runbook Parts 1-3
Student Name
University of Phoenix Online
CYB/110
Question 3
The scenario that happened involved the Win32/Virut malware that was notorious and wreaked havoc on one machine in the company (Microsoft). The malware was detected and stopped before it spread to any other computer on the network. It operates by modifying the software executables on the computers and spreads by targeting every software executable that opens and writes its code that introduces a backdoor that allows hackers to access the system from remote servers. The malware is introduced when an infected executable is run on the machine and once it has been installed along with the innocent-looking software, it copies itself to every other executable as soon as it is opened, meaning that it does not spread if no executable file is run. This, in turn, means that any software that is yet to be run is safe.
Upon realizing the corruption, which was done when an online scan using ESET antivirus was conducted, every executable was closed down (ESET). This allowed for antivirus to effectively isolate any executable affected and list it. Indeed, the executables were listed and it turned out that 7 executables had been affected already, these were immediately quarantined. Some of the software affected were office word and operating system executables. To effectively deal with the threat, I restored the quarantined files so that I could cleanly uninstall the software. After the uninstallation, the online scan was run again, since it was not vulnerable to infection through the executable corruption. This time around, every identified threat was removed and an operating system disc used to repair the corrupted operating system files. Finally, the ESET antivirus was installed so that such threats can be prevented before happening to reduce the extent of the damage. The affected software was then reinstalled and the system scanned with the offline antivirus and scheduled to automatically scan every day (Koret and Bachaalany).
Employees must be guided not to share the following information online:
· Usernames
· Office address
· Their medical history and records
· Their work experiences
· The place they have lived in
· Family member’s identity
· Date of births
· Personal information regarding bank detail or similar data (Norton).
If employees put this data online, their personal information can be misused and they may face an issue which can be severe.
Employees also need to be trained to interact securely while they use the internet. They must take care of the confidential information while sharing it in an email because if the emails are not protected, company data may be at high risk. If they have to share any document or attachment with the management, they need to develop a special code or a password to safeguard the sensitive and confidential information. Employees need to frequently change the passwords because the si.
This document discusses information security and procedures to manage systems security. It identifies key aspects of information security including confidentiality, integrity and availability. It then outlines various policies and precautions for access control, backups, firewalls, passwords, auditing and infrastructure to maintain security. These include regular updates, encrypted data transmission, access privileges, physical security measures and security awareness training. The document also covers the four types of maintenance needed to manage an operational system and ensure ongoing security.
1. A safe embedded system is one that is designed to prevent harm, damage, or loss of life from failures. It uses measures like fail-safe behavior, redundancy, clustering, and event logging to ensure predictable and reliable performance.
2. A secure embedded system protects data, access, and communication from unauthorized access. It employs provisions like threat prevention and detection, access controls, cryptography, firewalls, and regular security updates.
3. Both safe and secure systems are important, as safe systems in fields like transportation and automation could have catastrophic consequences if compromised by attacks. For now, the preferred approach is to isolate safe systems on separate networks.
5 Things to Know about Safety and Security of Embedded SystemsMEN Micro
1. A safe embedded system is one that is designed to prevent heavy damages through measures like fail-safe behavior, redundancy, and clustering. It requires complex hardware, software, development rules, and certification.
2. A secure embedded system protects data, access, and communication through high assurance computing that considers security early in design. It provides protection before corporate firewalls.
3. Major provisions for safety include fail-safe behavior, redundancy, clustering, radiation resistance, supervisors, diversity, determinism, and event logging.
In computer security, a vulnerability is a weakness which allows an .pdfanandanand521251
In computer security, a vulnerability is a weakness which allows an attacker to reduce a system\'s
information assurance. Vulnerability is the intersection of three elements: a system susceptibility
or flaw, attacker access to the flaw, and attacker capability to exploit the flaw.[1] To exploit a
vulnerability, an attacker must have at least one applicable tool or technique that can connect to a
system weakness. In this frame, vulnerability is also known as the attack surface.
Vulnerabilities are flaws in computer software that create weaknesses in your computer or
network’s overall security. Vulnerabilities can also be created by improper computer or security
configurations. Threats exploit the weaknesses of vulnerabilities, resulting in potential damage to
the computer or its data.
The impact of a security breach can be very high. The fact that IT managers, or upper
management, can (easily) know that IT systems and applications have vulnerabilities and do not
perform any action to manage the IT risk is seen as a misconduct in most legislations.
Intrusion detection system is an example of a class of systems used to detect attacks. Some sets
of criteria to be satisfied by a computer, its operating system and applications in order to meet a
good security level have been developed: ITSEC and Common criteria are two examples.
Vulnerability falls under security like computer security, network security,etc.
How to mitigate the risk
§ Install Anti-Virus Software.
Ensure that reputable anti-virus software is installed on all computers. This should include all
servers, PCs and laptops. If employees use computers at home for business use or to remotely
access the network, these PCs should also have anti-virus software installed.
§ Ensure that the anti-virus software is up to date.
Everyday new computer viruses are being released and it is essential that businesses are
protected from these viruses by keeping the anti-virus software up to date. If possible, companies
should look at policies whereby computers that do not have the most up to date anti-virus
software installed are not allowed to connect to the network.
§ Employ a firewall to protect networks.
As computer viruses can spread by means other than email, it is important that unwanted traffic
is blocked from entering the network by using a firewall. For users that use computers for
business away from the protection of the company’s network, such as home PCs or laptops, a
personal firewall should be installed to ensure the computer is protected.
§ Filter all email traffic.
All incoming and outgoing email should be filtered for computer viruses. This filter should
ideally be at the perimeter of the network to prevent computer viruses. Emails with certain file
attachments commonly used by computer viruses to spread themselves, such as .EXE, .COM and
.SCR files, should also be prevented from entering the network.
§ Educate all users to be careful of suspicious e-mails.
Ensure that all users know to .
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
Part 1 List the basic steps in securing an operating system. Assume.pdffashiionbeutycare
Part 1: List the basic steps in securing an operating system. Assume that the O.S. is being
installed for the first time on new hardware.
Part 2: Name and briefly describe two ways that college students could be recruited into illegal
espionage.
Part 3: Explain the function of the trusted boot function of the trusted platform module (TPM.)
Tell how that is related to the current controversy between Apple and the FBI concerning
encryption. What could the FBI do in the absence of a trusted boot function?
Part 4: Define single loss exposure and annualized risk of occurrence. Explain in your own
words what these have to do with computer security.
Part 5: Explain why it is important to monitor outbound traffic as well as inbound traffic in a
corporate network. Give an example
Solution
Part1:-
There are three things that can enhance operating system security across an enterprise network:
First, provisioning of the servers on the network should be done once in one place, involving the
roughly tens of separate configurations most organizations require. This image, or set of images,
can then be downloaded across the network, with the help of software that automates this process
and eliminates the pain of doing it manually for each server. Moreover, even if you had an
instruction sheet for these key configurations, you wouldn\'t want local administrators to access
these key configurations for each server, which is very dangerous. The best way to do it is once
and for all.
Once the network has been provisioned, administrators need to be able to verify policy
compliance, which defines user access rights and ensures that all configurations are correct. An
agent running on the network or remotely can monitor each server continuously, and such
monitoring wouldn\'t interfere with normal operations.
Second, account management needs to be centralized to control access to the network and to
ensure that users have appropriate access to enterprise resources. Policies, rules and intelligence
should be located in one place—not on each box—and should be pushed out from there to
provision user systems with correct IDs and permissions. An ID life cycle manager can be used
to automate this process and reduce the pain of doing this manually.
Third, the operating system should be configured so that it can be used to monitor activity on the
network easily and efficiently—revealing who is and isn\'t making connections, as well as
pointing out potential security events coming out of the operating system. Administrators can use
a central dashboard that monitors these events in real time and alerts them to serious problems
based on preset correlations and filtering. Just as important, this monitoring system should be set
up so that administrators aren\'t overwhelmed by routine events that don\'t jeopardize network
security.
Part2:-
Two ways that college students could be recruited into illegal espionage:
First, the students may be trend before they sending out to the foreign .
Project Quality-SIPOCSelect a process of your choice and creat.docxwkyra78
Project Quality-SIPOC
Select a process of your choice and create a SIPOC for this process. Explain the utility of a SIPOC in the context of project management.
(
Application security in large enterprises (part 2)
Student Name:
) (
Instructor Name
)
Detailed Description:
Large enterprises of a thousand persons or more often have distinctly distinct data security architectures than lesser businesses. Typically they treat their data security as if they were still little companies.
This paper endeavors to demonstrate that not only do large businesses have an entire ecology of focused programs, specific to large businesses and their needs, but that this software has distinct security implications than buyer or small enterprise software. identifying these dissimilarities, and analyzing the way this can be taken advantage of by an attacker, is the key to both striking and keeping safe a large enterprise.
The Web applications are the important part of your business every day, they help you handle your intellectual property, increase your sales, and keep the trust of your customers. But there's the problem that applications re fast becoming the preferred attack vector of hackers. For this you really need something that makes your application secure.
And, with the persistent condition of today's attacks, applications can easily be get infected when security is not considered and scoped into each phase of the software development life cycle, from design to development to testing and ongoing maintenance of the application. When you take a holistic approach to your application security, you actually enhance your ability to produce and manage stable, secure applications. Applications need training and testing from the leading team of ethical hackers, for this there should be an authentic plan to recover these issues that can help an organization to plan, test, build and run applications smartly and safely.
Large enterprises of a thousand people or even more have distinctly different information security architectures than many other smaller companies. Actually, they treat their information security as if they were still small companies.
We are going to discuss some attempts to demonstrate that not only do large companies have an entire ecology of specialized software, specific to large companies and their needs, but that this software has different security implications than consumer or small business software for the applications. Recognizing these differences, and examining the way this can be taken advantage of by an attacker, is the key to both attacking and defending a large enterprise. It’s really important to cover up the security procedures in the large enterprise.
Key Features:
· Web application security checking from development through output
· Security check web APIs and world wide web services that support your enterprise
· Effortlessly organize, view and share security-test outcomes and histories
· Endow broader lifecycle adoption th ...
Student NameCYB110Playbook Runbook Parts 1-3S.docxdeanmtaylor1545
Student Name
CYB/110
Playbook / Runbook Parts 1-3
Student Name
University of Phoenix Online
CYB/110
Question 3
The scenario that happened involved the Win32/Virut malware that was notorious and wreaked havoc on one machine in the company (Microsoft). The malware was detected and stopped before it spread to any other computer on the network. It operates by modifying the software executables on the computers and spreads by targeting every software executable that opens and writes its code that introduces a backdoor that allows hackers to access the system from remote servers. The malware is introduced when an infected executable is run on the machine and once it has been installed along with the innocent-looking software, it copies itself to every other executable as soon as it is opened, meaning that it does not spread if no executable file is run. This, in turn, means that any software that is yet to be run is safe.
Upon realizing the corruption, which was done when an online scan using ESET antivirus was conducted, every executable was closed down (ESET). This allowed for antivirus to effectively isolate any executable affected and list it. Indeed, the executables were listed and it turned out that 7 executables had been affected already, these were immediately quarantined. Some of the software affected were office word and operating system executables. To effectively deal with the threat, I restored the quarantined files so that I could cleanly uninstall the software. After the uninstallation, the online scan was run again, since it was not vulnerable to infection through the executable corruption. This time around, every identified threat was removed and an operating system disc used to repair the corrupted operating system files. Finally, the ESET antivirus was installed so that such threats can be prevented before happening to reduce the extent of the damage. The affected software was then reinstalled and the system scanned with the offline antivirus and scheduled to automatically scan every day (Koret and Bachaalany).
Employees must be guided not to share the following information online:
· Usernames
· Office address
· Their medical history and records
· Their work experiences
· The place they have lived in
· Family member’s identity
· Date of births
· Personal information regarding bank detail or similar data (Norton).
If employees put this data online, their personal information can be misused and they may face an issue which can be severe.
Employees also need to be trained to interact securely while they use the internet. They must take care of the confidential information while sharing it in an email because if the emails are not protected, company data may be at high risk. If they have to share any document or attachment with the management, they need to develop a special code or a password to safeguard the sensitive and confidential information. Employees need to frequently change the passwords because the si.
This document discusses information security and procedures to manage systems security. It identifies key aspects of information security including confidentiality, integrity and availability. It then outlines various policies and precautions for access control, backups, firewalls, passwords, auditing and infrastructure to maintain security. These include regular updates, encrypted data transmission, access privileges, physical security measures and security awareness training. The document also covers the four types of maintenance needed to manage an operational system and ensure ongoing security.
1. A safe embedded system is one that is designed to prevent harm, damage, or loss of life from failures. It uses measures like fail-safe behavior, redundancy, clustering, and event logging to ensure predictable and reliable performance.
2. A secure embedded system protects data, access, and communication from unauthorized access. It employs provisions like threat prevention and detection, access controls, cryptography, firewalls, and regular security updates.
3. Both safe and secure systems are important, as safe systems in fields like transportation and automation could have catastrophic consequences if compromised by attacks. For now, the preferred approach is to isolate safe systems on separate networks.
5 Things to Know about Safety and Security of Embedded SystemsMEN Micro
1. A safe embedded system is one that is designed to prevent heavy damages through measures like fail-safe behavior, redundancy, and clustering. It requires complex hardware, software, development rules, and certification.
2. A secure embedded system protects data, access, and communication through high assurance computing that considers security early in design. It provides protection before corporate firewalls.
3. Major provisions for safety include fail-safe behavior, redundancy, clustering, radiation resistance, supervisors, diversity, determinism, and event logging.
The document discusses implementing a real-time security monitoring and management system using open-source tools. It describes how intrusion detection systems (IDS) can detect attacks by closely monitoring network and system activities. The document then discusses how open-source tools like Snort can be used to build an IDS, providing real-time monitoring to detect intrusions and security violations. It analyzes some advantages and limitations of Snort compared to other open-source IDS tools. Specifically, Snort provides tested signatures and is portable but may face information overload from large rule databases.
CISA GOV - Seven Steps to Effectively Defend ICSMuhammad FAHAD
INTRODUCTION
Cyber intrusions into US Critical Infrastructure systems are happening with increased frequency. For many industrial control systems (ICSs), it’s not a matter of if an intrusion will take place, but when. In Fiscal Year (FY) 2015, 295 incidents were reported to ICS-CERT, and many more went unreported or undetected. The capabilities of our adversaries have been demonstrated and cyber incidents are increasing in frequency and complexity. Simply building a
network with a hardened perimeter is no longer adequate. Securing ICSs against the modern threat requires well-planned and well-implemented strategies that will provide network defense
teams a chance to quickly and effectively detect, counter, and expel an adversary. This paper presents seven strategies that can be implemented today to counter common exploitable
weaknesses in “as-built” control systems.
Seven recommendations for bolstering industrial control system cyber securityCTi Controltech
Recommendations from ICS-CERT, the Industrial Control System Cyber Emergency Response Team, a division of Department of Homeland Security. Seven basic steps to follow that will substantially boost cyber security and generate awareness of the threat potential
NCCIC - Seven Steps for Achieving Cybersecurity for Industrial Control SystemsMiller Energy, Inc.
This paper presents seven strategies that can be implemented today to counter common exploitable weaknesses in “as-built” control systems for industrial processes and operations.
Defending Industrial Control Systems From CyberattackCTi Controltech
Industrial control systems of all types and vintages likely are exposed to some level of unauthorized intrusion. Individuals and organizations with nefarious intent will try to gain access to information or control elements, stealing data or causing a range of inappropriate operations.
This document outlines seven strategies that can be implemented to defend industrial control systems (ICSs) against cyber intrusions: 1) application whitelisting, 2) proper configuration/patch management, 3) reducing attack surface area, 4) building a defendable environment through network segmentation, 5) managing authentication securely, 6) implementing secure remote access, and 7) monitoring networks and having an incident response plan. The document estimates that implementing these strategies could have prevented 98% of incidents responded to by ICS-CERT in 2014-2015. It concludes that a layered defense approach is needed to protect internal systems and components.
This paper presents seven strategies that can be implemented today to counter common exploitable weaknesses in “as-built” control systems. Length is 6 pages.
This document describes an Unconstrained Endpoint Security System (UEPtSS) that uses passive scanning via the BRO intrusion detection system to fingerprint and catalog unmanaged endpoints on an enterprise network. It analyzes network traffic logs to determine key details about unmanaged devices including operating system, open ports, applications, browsers, and historical malware infections to provide useful context for incident response. The system leverages BRO's scripting framework to detect this information from log files and build an inventory without active scanning. This passive approach avoids potential denial of service issues and works regardless of when devices connect to the network.
Modern information security management best practices dictate that an enterprise assumes full
configuration control of end user computer systems (laptops, deskside computers, etc.). The benefit of this
explicit control yields lower support costs since there are less variation of machines, operating systems,
and applications to provide support on, but more importantly today, dictating specifically what software,
hardware, and security configurations exist on an end user's machine can help reduce the occurrence of
infection by malicious software significantly. If the data pertaining to end user systems is organized and
catalogued as part of normal information security logging activities, an extended picture of what the end
system actually is may be available to the investigator at a moment's notice to enhance incident response
and mitigation. The purpose of this research is to provide a way of cataloguing this data by using and
augmenting existing tools and open source software deployed in an enterprise network.
This document discusses strategies for preventing data leakage. It proposes using a firewall to scan outgoing messages from employees and detect if they contain unauthorized transfers of sensitive data. If confidential information is detected in a message, the employee's ID would be reported to the administrator. The firewall would help enforce a data leakage prevention policy by identifying attempts to send protected information outside the authorized circle. The goal is to catch data leaks early before any damage occurs, since detection after the fact may be too late to remedy the situation. The proposed system aims to help organizations better safeguard their confidential information through proactive monitoring of employee communications.
Tools and Mechanisms for Network Security in an Organization.
Physical Security, Administrative Security and Technical Security measures have been described.
Security Testing Tools are Nessus, THC Hydra, Kismet, Nikto, WireShark and NMAP.
How to Secure Your Enterprise Network.docxNeilStark1
With the advent of the digital age, businesses have gone digital with the help of adequate enterprise networking setup that comprises IT infrastructures that provides connectivity among users, devices, and applications.
How to Secure Your Enterprise Network.pdfNeilStark1
With the advent of the digital age, businesses have gone digital with the help of adequate enterprise networking setup that comprises IT infrastructures that provides connectivity among users, devices, and applications.
How to Secure Your Enterprise Network.docxNeilStark1
With the advent of the digital age, businesses have gone digital with the help of adequate enterprise networking setup that comprises IT infrastructures that provides connectivity among users, devices, and applications.
This document discusses security elements and goals in IT systems, including integrity, confidentiality, availability, non-repudiation, and authentication. It also covers threats to IT systems and technical controls like vulnerability management. Operating system security is then discussed, including changing threats, why OS's are hard to secure, trust models, threat models, and key security features like access control and network protection. Application security topics like malware protection, application verification, sandboxing, and execution are also summarized.
This document provides guidelines for handling a suspicious network activity or incident. It outlines six steps for incident response: preparation, identification, containment, remediation, recovery, and aftermath. The preparation step involves ensuring monitoring tools, contacts, and alert processes are in place. Identification involves detecting the incident from various sources and analyzing related logs, traffic, and impacted systems. Containment aims to limit the attack's impact by disconnecting compromised areas and isolating affected systems. Remediation takes actions to stop the malicious behavior by blocking sources and performing technical fixes. Recovery works to restore normal system operations. The aftermath step involves documenting details in a report and identifying improvements.
This document discusses web security and attacks. It begins with an abstract noting that the web presents problems for both web clients and servers, requiring steps to protect both. Chapter 1 defines web security and discusses general security concepts like privacy, integrity, and availability. It also outlines technical methods to secure systems, like encryption, passwords, firewalls, and monitoring. Chapter 2 defines types of computer attacks like denial of service, man-in-the-middle, and brute force attacks. It also discusses social engineering techniques used to manipulate users into revealing confidential information.
IRJET- Security from Threats of Computer SystemIRJET Journal
Governments are finding cyber security to be a major challenge as they store far more data than the private sector, often in older and more vulnerable systems, and are regularly targeted by hackers and sophisticated malware. The document discusses various threats to computer systems like malware, viruses, phishing, and zero-day attacks. It proposes solutions like usernames and passwords, firewalls, email encryption, updated anti-virus software, and regular backups to provide security from these threats. Analysis of existing security solutions can help determine weaknesses in data security.
Network security involves implementing multiple layers of defenses to protect a network from threats. It includes technologies like firewalls, antivirus software, and intrusion detection systems to manage access and detect malware and exploits. As networks increasingly face hacking threats, strong network security tools are essential for organizations to protect their systems, data, and reputation. Network security strategies aim to authorize only legitimate users while blocking malicious actors from harming the network.
Your initial post should be 2-3 paragraphs in length.Inclu.docxdanhaley45372
Your initial post should be
2-3 paragraphs
in length.
Include one peer reviewed journal article to support your post. You can search for a journal article from Welder Library EResources. (Ex: Risk of social media or social media polices, etc.).
Your
initial post is due by Thursday
. This allows you and your classmates time to read and reply.
Make sure to demonstrate critical thinking and analysis by using research and personal work experiences.
For full credit, you are required to
respond
to a minimum of two classmates
. Please begin your reply by addressing the student by name. Your
responses
must be completed by Sunday at midnight
.
Please refer to the rubric for the grading requirements. You can view the rubric by clicking on the wheel in the upper right corner and selecting "show rubric."
Scott Lefor,
The release of information to the public – including through social media – can impact everything from a company’s image before the public to an individual’s image before a company. Jackson et al. (2020) note that while “strategic HR use of social media can build the employer’s reputation in the labor market and help HR professionals to reach candidates and current employees,” the use of social media can also “lead to the disclosure of trade secrets” or present a negative image of the company (p. 21). While companies place substantial hours and dollars into cultivating a favorable brand image before the public, a careless comment or complaint by an employee or contractor on social media can go viral and counteract such marketing efforts. In such cases, companies may find themselves forced to address such comments or complaints before the public in an attempt to save the brand image they have worked so hard to build.
In addition to impacting the image of a company, careless social media posts can also impact potential and current employees before the company. According to Melton and Miller (2015), while “most students appear to know that the content they post” on social media could be viewed negatively by “potential employers,” many students continue to do so (p. 678). Through social media, what would have been a careless comment if spoken aloud becomes a permanent statement viewable by countless individuals. Furthermore, comments and images referencing illegal activities or poor decision-making and communicating abilities become enshrined for potential and current employers to reference and base hiring and firing decisions upon.
It is worth noting that careless comments via social media can go beyond “negative,” and can sometimes involve trade secrets (as noted). While negative comments can cast a shadow over a company’s brand, comments revealing trade secrets can jeopardize long-term strategies, losing hard-won competitive edges. As referenced above, Melton and Miller (2015) assert that even though individuals know of such risks, many continue to post comments that can be understood to be “careless.”
In short, informa.
Your initial post should be made during Unit 2, January 21st at 4.docxdanhaley45372
Your initial post should be made during
Unit 2, January 21st at 4:00 pm.
Submissions after this time will not be accepted.
Please respond to the following questions:
In 6-7 sentences, compare and contrast one of the dance television shows referenced in this unit (try to choose a show that has not already been referenced by another student) to that of the American Dance Marathons, considering such questions as:
How does the socioeconomic and sociopolitical climate of the time affect how dance is presented and how the participants are treated/portrayed?
Discuss the Issue of exploitation, who was exploited, who did the exploiting, and how?
What aspects were theatre, and what aspects were real? How were these exaggerated?
What are the reinforced stereotypes present in the competitions?
Tell us about the idea that drama sells.
Use specific terminology and concepts discussed in class thus far. Make sure that you are citing all sources, or being clear that your statement is your idea/belief/observation.
.
More Related Content
Similar to Part 3 ApplicationEnd-User Security Recommendations.docx
The document discusses implementing a real-time security monitoring and management system using open-source tools. It describes how intrusion detection systems (IDS) can detect attacks by closely monitoring network and system activities. The document then discusses how open-source tools like Snort can be used to build an IDS, providing real-time monitoring to detect intrusions and security violations. It analyzes some advantages and limitations of Snort compared to other open-source IDS tools. Specifically, Snort provides tested signatures and is portable but may face information overload from large rule databases.
CISA GOV - Seven Steps to Effectively Defend ICSMuhammad FAHAD
INTRODUCTION
Cyber intrusions into US Critical Infrastructure systems are happening with increased frequency. For many industrial control systems (ICSs), it’s not a matter of if an intrusion will take place, but when. In Fiscal Year (FY) 2015, 295 incidents were reported to ICS-CERT, and many more went unreported or undetected. The capabilities of our adversaries have been demonstrated and cyber incidents are increasing in frequency and complexity. Simply building a
network with a hardened perimeter is no longer adequate. Securing ICSs against the modern threat requires well-planned and well-implemented strategies that will provide network defense
teams a chance to quickly and effectively detect, counter, and expel an adversary. This paper presents seven strategies that can be implemented today to counter common exploitable
weaknesses in “as-built” control systems.
Seven recommendations for bolstering industrial control system cyber securityCTi Controltech
Recommendations from ICS-CERT, the Industrial Control System Cyber Emergency Response Team, a division of Department of Homeland Security. Seven basic steps to follow that will substantially boost cyber security and generate awareness of the threat potential
NCCIC - Seven Steps for Achieving Cybersecurity for Industrial Control SystemsMiller Energy, Inc.
This paper presents seven strategies that can be implemented today to counter common exploitable weaknesses in “as-built” control systems for industrial processes and operations.
Defending Industrial Control Systems From CyberattackCTi Controltech
Industrial control systems of all types and vintages likely are exposed to some level of unauthorized intrusion. Individuals and organizations with nefarious intent will try to gain access to information or control elements, stealing data or causing a range of inappropriate operations.
This document outlines seven strategies that can be implemented to defend industrial control systems (ICSs) against cyber intrusions: 1) application whitelisting, 2) proper configuration/patch management, 3) reducing attack surface area, 4) building a defendable environment through network segmentation, 5) managing authentication securely, 6) implementing secure remote access, and 7) monitoring networks and having an incident response plan. The document estimates that implementing these strategies could have prevented 98% of incidents responded to by ICS-CERT in 2014-2015. It concludes that a layered defense approach is needed to protect internal systems and components.
This paper presents seven strategies that can be implemented today to counter common exploitable weaknesses in “as-built” control systems. Length is 6 pages.
This document describes an Unconstrained Endpoint Security System (UEPtSS) that uses passive scanning via the BRO intrusion detection system to fingerprint and catalog unmanaged endpoints on an enterprise network. It analyzes network traffic logs to determine key details about unmanaged devices including operating system, open ports, applications, browsers, and historical malware infections to provide useful context for incident response. The system leverages BRO's scripting framework to detect this information from log files and build an inventory without active scanning. This passive approach avoids potential denial of service issues and works regardless of when devices connect to the network.
Modern information security management best practices dictate that an enterprise assumes full
configuration control of end user computer systems (laptops, deskside computers, etc.). The benefit of this
explicit control yields lower support costs since there are less variation of machines, operating systems,
and applications to provide support on, but more importantly today, dictating specifically what software,
hardware, and security configurations exist on an end user's machine can help reduce the occurrence of
infection by malicious software significantly. If the data pertaining to end user systems is organized and
catalogued as part of normal information security logging activities, an extended picture of what the end
system actually is may be available to the investigator at a moment's notice to enhance incident response
and mitigation. The purpose of this research is to provide a way of cataloguing this data by using and
augmenting existing tools and open source software deployed in an enterprise network.
This document discusses strategies for preventing data leakage. It proposes using a firewall to scan outgoing messages from employees and detect if they contain unauthorized transfers of sensitive data. If confidential information is detected in a message, the employee's ID would be reported to the administrator. The firewall would help enforce a data leakage prevention policy by identifying attempts to send protected information outside the authorized circle. The goal is to catch data leaks early before any damage occurs, since detection after the fact may be too late to remedy the situation. The proposed system aims to help organizations better safeguard their confidential information through proactive monitoring of employee communications.
Tools and Mechanisms for Network Security in an Organization.
Physical Security, Administrative Security and Technical Security measures have been described.
Security Testing Tools are Nessus, THC Hydra, Kismet, Nikto, WireShark and NMAP.
How to Secure Your Enterprise Network.docxNeilStark1
With the advent of the digital age, businesses have gone digital with the help of adequate enterprise networking setup that comprises IT infrastructures that provides connectivity among users, devices, and applications.
How to Secure Your Enterprise Network.pdfNeilStark1
With the advent of the digital age, businesses have gone digital with the help of adequate enterprise networking setup that comprises IT infrastructures that provides connectivity among users, devices, and applications.
How to Secure Your Enterprise Network.docxNeilStark1
With the advent of the digital age, businesses have gone digital with the help of adequate enterprise networking setup that comprises IT infrastructures that provides connectivity among users, devices, and applications.
This document discusses security elements and goals in IT systems, including integrity, confidentiality, availability, non-repudiation, and authentication. It also covers threats to IT systems and technical controls like vulnerability management. Operating system security is then discussed, including changing threats, why OS's are hard to secure, trust models, threat models, and key security features like access control and network protection. Application security topics like malware protection, application verification, sandboxing, and execution are also summarized.
This document provides guidelines for handling a suspicious network activity or incident. It outlines six steps for incident response: preparation, identification, containment, remediation, recovery, and aftermath. The preparation step involves ensuring monitoring tools, contacts, and alert processes are in place. Identification involves detecting the incident from various sources and analyzing related logs, traffic, and impacted systems. Containment aims to limit the attack's impact by disconnecting compromised areas and isolating affected systems. Remediation takes actions to stop the malicious behavior by blocking sources and performing technical fixes. Recovery works to restore normal system operations. The aftermath step involves documenting details in a report and identifying improvements.
This document discusses web security and attacks. It begins with an abstract noting that the web presents problems for both web clients and servers, requiring steps to protect both. Chapter 1 defines web security and discusses general security concepts like privacy, integrity, and availability. It also outlines technical methods to secure systems, like encryption, passwords, firewalls, and monitoring. Chapter 2 defines types of computer attacks like denial of service, man-in-the-middle, and brute force attacks. It also discusses social engineering techniques used to manipulate users into revealing confidential information.
IRJET- Security from Threats of Computer SystemIRJET Journal
Governments are finding cyber security to be a major challenge as they store far more data than the private sector, often in older and more vulnerable systems, and are regularly targeted by hackers and sophisticated malware. The document discusses various threats to computer systems like malware, viruses, phishing, and zero-day attacks. It proposes solutions like usernames and passwords, firewalls, email encryption, updated anti-virus software, and regular backups to provide security from these threats. Analysis of existing security solutions can help determine weaknesses in data security.
Network security involves implementing multiple layers of defenses to protect a network from threats. It includes technologies like firewalls, antivirus software, and intrusion detection systems to manage access and detect malware and exploits. As networks increasingly face hacking threats, strong network security tools are essential for organizations to protect their systems, data, and reputation. Network security strategies aim to authorize only legitimate users while blocking malicious actors from harming the network.
Similar to Part 3 ApplicationEnd-User Security Recommendations.docx (20)
Your initial post should be 2-3 paragraphs in length.Inclu.docxdanhaley45372
Your initial post should be
2-3 paragraphs
in length.
Include one peer reviewed journal article to support your post. You can search for a journal article from Welder Library EResources. (Ex: Risk of social media or social media polices, etc.).
Your
initial post is due by Thursday
. This allows you and your classmates time to read and reply.
Make sure to demonstrate critical thinking and analysis by using research and personal work experiences.
For full credit, you are required to
respond
to a minimum of two classmates
. Please begin your reply by addressing the student by name. Your
responses
must be completed by Sunday at midnight
.
Please refer to the rubric for the grading requirements. You can view the rubric by clicking on the wheel in the upper right corner and selecting "show rubric."
Scott Lefor,
The release of information to the public – including through social media – can impact everything from a company’s image before the public to an individual’s image before a company. Jackson et al. (2020) note that while “strategic HR use of social media can build the employer’s reputation in the labor market and help HR professionals to reach candidates and current employees,” the use of social media can also “lead to the disclosure of trade secrets” or present a negative image of the company (p. 21). While companies place substantial hours and dollars into cultivating a favorable brand image before the public, a careless comment or complaint by an employee or contractor on social media can go viral and counteract such marketing efforts. In such cases, companies may find themselves forced to address such comments or complaints before the public in an attempt to save the brand image they have worked so hard to build.
In addition to impacting the image of a company, careless social media posts can also impact potential and current employees before the company. According to Melton and Miller (2015), while “most students appear to know that the content they post” on social media could be viewed negatively by “potential employers,” many students continue to do so (p. 678). Through social media, what would have been a careless comment if spoken aloud becomes a permanent statement viewable by countless individuals. Furthermore, comments and images referencing illegal activities or poor decision-making and communicating abilities become enshrined for potential and current employers to reference and base hiring and firing decisions upon.
It is worth noting that careless comments via social media can go beyond “negative,” and can sometimes involve trade secrets (as noted). While negative comments can cast a shadow over a company’s brand, comments revealing trade secrets can jeopardize long-term strategies, losing hard-won competitive edges. As referenced above, Melton and Miller (2015) assert that even though individuals know of such risks, many continue to post comments that can be understood to be “careless.”
In short, informa.
Your initial post should be made during Unit 2, January 21st at 4.docxdanhaley45372
Your initial post should be made during
Unit 2, January 21st at 4:00 pm.
Submissions after this time will not be accepted.
Please respond to the following questions:
In 6-7 sentences, compare and contrast one of the dance television shows referenced in this unit (try to choose a show that has not already been referenced by another student) to that of the American Dance Marathons, considering such questions as:
How does the socioeconomic and sociopolitical climate of the time affect how dance is presented and how the participants are treated/portrayed?
Discuss the Issue of exploitation, who was exploited, who did the exploiting, and how?
What aspects were theatre, and what aspects were real? How were these exaggerated?
What are the reinforced stereotypes present in the competitions?
Tell us about the idea that drama sells.
Use specific terminology and concepts discussed in class thus far. Make sure that you are citing all sources, or being clear that your statement is your idea/belief/observation.
.
Your initial post should be at least 450+ words and in APA forma.docxdanhaley45372
Your initial post should be at least
450+ words
and in APA format (including Times New Roman with font size 12 and double spaced). Post the actual body of your paper in the discussion thread then attach a Word version of the paper for APA review
2 Replies each with minimum
100 words
.
.
Your initial post should be made during Unit 2, january 21st at 4.docxdanhaley45372
Your initial post should be made during
Unit 2, january 21st at 4:00 pm.
Submissions after this time will not be accepted.
Please respond to the following questions:
Using the “Tools to Analyze Dance on Screen” document (based off of the video about film analysis), find and provide a link to a music video (not yet shown in class or by another student). Analyze how the video is representing the “brand” for the artist, what the video is representing, and how dance is used to accomplish this. What does this video say about their values and interests and who they are?Analyze by focusing on some of the following: the use of the camera, editing, and art direction, in addition to the dancing/movement and use of the body. Use specific terminology and concepts discussed in class thus far. Make sure that you are citing all sources, or being clear that your statement is your idea/belief/observation.
.
Your initial post should be made during, Submissions after this time.docxdanhaley45372
Your initial post should be made during, Submissions after this time will not be accepted.
Please respond to the following questions:
Consider the movie caricature assigned to your last name, provide a brief description/definition of the caricatures and provide a movie/television/cartoon/internet character that fits this caricature, and one that counters it. Provide a brief explanation of how both do/do not fit. Make sure that you are citing all sources, or being clear that your statement is your idea/belief/observation.
Last names starting with A-E:
The Tom Caricature
Last names starting with F-J:
The Mammy Caricature
Last names starting with K-O:
The Brute/Buck Caricature
Last names starting with P-S:
The Coon Caricature
Last names starting with T-Z:
The Jezebel
.
Your essay should address the following.(a) How is the biologic.docxdanhaley45372
Your essay should address the following.
(a) How is the biological and social elements distinguished in Language?
(b) Explain briefly the phonology, syntax and semantics of language.
(c) The common features of language and pre linguistic mentality.
(d) What has language got that prelinguistic mentality lacks?
(e) What are the features of consciousness tat language lacks?
(f) What are the functions of language and explain the difference between representation and expression.
(g) Show the features of language that is active in creating society.
(h) Sho how commitments are part and parcel of using langue.
(i) How does language enable us to construct social institutions?
The essay should be written in nontechnical, straightforward, ordinary language. The essay should be a approximately a 1000 words, without errors that might impede their understanding as a reader. If you use a technical term please immediately say how the term is to be understood.
.
Your initial post is due by midnight (1159 PM) on Thursday. You mus.docxdanhaley45372
Your initial post is due by midnight (11:59 PM) on Thursday. You must write at least 400 words on Olive Senior's "The Pain Tree" and Ana Menéndez's "Her Mother's House" (in other words, at least 200 words for each story).
Instead of relying on plot summary you will support your interpretation by using and analyzing textual evidence. When you quote the story make sure you cite the page number: for instance, after the quotation put the page number in parenthesis (60). Avoid writing out "on page 60". When you quote a passage from the story make sure you introduce the context and that you are analyzing the meaning of what you quoted.
I encourage your own formulations, but address the following prompts (you can address them in any order and be sure to write at least three or more paragraphs):
In the short stories, you are going to encounter protagonists attempting to reconnect and remember (as in "putting together again") their Caribbean "home" spaces. How have their perceptions of their Caribbean homelands been shaped by their parents? What new perceptions do they gain and how does this transform their view of themselves and their history?
Victor Shklovsky argues that
ostranenie
("making strange" in Russian, and also translated as estrangement/defamiliarization) is the essence of literature. Where in the two stories do we encounter descriptions of estranged perception? Analyze the significance of these moments in the stories. Be sure to consult and cite Shkovsky's essay (especially his definition of
ostranenie
on page 80) to support your analysis.
For our annotation assignment, we learned how to notice patterns and overlooked meanings that helped us understand "Sonny's Blues" more fully. In "The Pain Tree" and "Her Mother's House" what patterns, connections or implied meanings did you notice structuring the stories?
.
Your individual sub-topic written (MIN of 1, MAX 3 pages)You.docxdanhaley45372
Your individual sub-topic written (MIN of 1, MAX 3 pages)
Your portion of the White Paper must include one of the following:
1. Introduction/Summary
2. History/Background and Context
3. Problem (Defined)
4. Discussion to relate point of view from sources used
5. Writer takes a position
6.
Solution
/s
7. Conclusion.
.
Your HR project to develop a centralized model of deliveri.docxdanhaley45372
Your HR project to develop a centralized model of delivering HR services has progressed through very critical stages of the project thus far. It is now time to present actionable, decision-making information to project leaders. This can be best accomplished when projects have been successfully managed, devoid of any major risks, and have been properly closed out and finalized.
Write a five to six (5-6) page paper in which you:
1. Explain what it means to successfully direct and manage project work and identify and discuss 3-4 strategies you might use to manage and sustain progress in your HR project. Be specific.
2. Identify and discuss a minimum of 3 strategies that could be used to address and resolve any risks within the control of the project. HINT: See Exhibit 14.5 in the textbook. Is any one of the strategies you selected more important than the others? Why?
Exhibit 14.5
RISK EVENT RESOLUTION STRATEGIES RISKS WITHIN PROJECT CONTROL
Understand and control WBS
Closely monitor and control activity progress
Closely manage all project changes
Document all change requests
Increase overtime to stay on schedule
Isolate problems and reschedule other activities
Research challenging issues early
RISKS PARTIALLY WITHIN PROJECT CONTROL
Establish limits to customer expectations
Build relationships by understanding project from client’s perspective
Use honesty in managing client expectations
Work with client to reprioritize cost, schedule, scope, and/or quality
Carefully escalate problems
Build team commitment and enthusiasm
RISKS OUTSIDE PROJECT CONTROL
Understand project context and environment
Actively monitor project environment
Understand willingness or reluctance of stakeholders to agree to changes
3. Describe 2-3 actions a project manager may take as they begin to close out the project. Be sure to justify using the actions you discuss.
4. Review Project Management in Action: The Power of Lessons Learned (pages 518-520 in the textbook) and provide an overview to the project team on the significance of the information. Be specific.
Pg 518-520 from book
PROJECT MANAGEMENT IN ACTION The Power of Lessons Learned Projects are discrete. They have a beginning and an end, at which time the project team disbands and moves on to other things. Despite the fact there has inevitably been significant tacit learning during the project, there is often only a limited capture of this into a sharable form for future reuse. Too often, as the project team dissolves, the learning fades into the memories of individuals minds. This makes it extremely difficult for others to benefit in the future from the insights learned. The usual excuses for this loss echoing through the corridors include just too hard, not enough time, team disbanded before we had the chance, and many more. The key error here is the incorrect assumption that learning during or from projects is an added bonus or a nice- to-have luxury. This is not the case in best.
Your Immersion Project for this course is essentially ethnographic r.docxdanhaley45372
Your Immersion Project for this course is essentially ethnographic research. When you hear the words
ethnography
or
ethnographic research
, you may think of Margaret Mead or Franz Boas performing their research on cultures outside their own countries and living among their research subjects. Contemporary ethnographic research includes many other types of research scenarios, such as urban ethnography, neighborhood studies, and even microstudies of groups as small as families and individuals.
Ethnography
is any systematic study of people and cultures, usually conducted through observation, interviews, dialogues, participation, and historical research. Ethnography is used across disciplines as varied as anthropology, linguistics, sociology, advertising, and of course, human services and social work.
Your Immersion Project is just that—a study of a population group with the goal of better understanding the culture of the group. As you complete this project over the course of the semester, keep in mind one of the classical hallmarks of ethnographic research, pioneered by Boas: The beliefs and activities of humans have to be interpreted within their own cultural terms and not evaluated or judged through the cultural lens or terms of the observer or researcher. That is, human beliefs and behavior are culturally relative.
This week, you submit your Immersion Project Paper, one of two culminating parts of your Final Project for this course (along with your narrated PowerPoint, which is due in Week 10).
This 7- to 10-page paper will be a culmination of what you have experienced and explored throughout your work on this project. Since everyone’s experience will be different, the content of the paper will vary for each student; however, there are two sections that everyone should include:
Reflection on your Immersion Project:
Observation: What observational activity did you attend and what insight did it give you into your selected population?
Dialogue: How did you carry out your dialogue? Reflect on your experience and what insight it gave you into your selected population.
Reaction and Critical Analysis of your experience: This section should incorporate your reflections on your experiences, what you learned about the group, what you learned about yourself, and how your perceptions of this group have changed over time.
Several areas to address in this section:
Description of the group
Values/belief orientation
Social interactions (relationships within and between group members)
Religious/spiritual beliefs
Roles and expectations
Language and communication
.
Your country just overthrew its dictator, and you are the newly .docxdanhaley45372
Your country just overthrew its dictator, and you are the newly elected President. Unfortunately, due to the divisions in the country and the years of war, economic, military, and political structures are non-existent. A group of loyalists to the old dictator have been detonating bombs, murdering civilians, assassinating leaders, and terrorizing towns with help from a neighboring country's dictator.
Create a comprehensive plan for your new government. While creating this government identify 1) the governing style of your government and the principles that govern your leaders (see rubric); 2) the functions of various branches of government; 3) how to maintain public good in domestic areas through at least two programs; 4) an economic structure that is most beneficial to your citizens; 5) ways to create national unity; 6) ways to combat terrorism and violence; and, 6) international organizations to join
.
Your have been contracted by HealthFirst Hospital Foundation (HHF),.docxdanhaley45372
Your have been contracted by HealthFirst Hospital Foundation (HHF),?
Your have been contracted by HealthFirst Hospital Foundation (HHF), a charitable organization that provides services to community clinics in Atlanta, Georgia. Due to the organization's tremendous growth, it will need to computerize its operations. By doing so, HHF will be able to continue to meet the needs of both its benefactors and their employees. To this end, it has decided to move its operation to a more modern facility, where it will install a Local Area Network (LAN), and you will be managing the network implementation.
Department # of Employees
Administration 18
Human Resources 9
Accounting 13
Hospital Relations 12
Media Relations 4
Board Room 0
MIS 6
Total 62
Feasibility of the proposed change
HHF has examined its resources and budgetary constraints and determined that the installation of the LAN is feasible. There is a need to maintain as low a budget as possible.
Project Goals
The goals for the LAN project are as follows:
Fully functional networked system
Design a boardroom in which any department's information can be accessed and expressed
Illustrate the complete network and boardroom design
Maintain as low a price as possible
Current state
The new facility consists of 5 six-cubicle work areas and a separate MIS Department and a boardroom. (See the schematic below) Each work area also includes a closed office for the department head.
Deliverables
The deliverables are outlined below:
Begin compiling your project plan by choosing network servers, routers, and hubs. Describe your network model, topology, and selections with an explanation of your choices in a memo to Roger Chen, the chief information officer at HHF. Be sure to use terms and concepts that you have learned in this course.
.
Your group presentationWhat you need to do.docxdanhaley45372
Your group presentation
What you need to do
Your presentation
groups
You can self-select groups (no more than 6)
Or I will put you into groups
Each group will present for a maximum of 20 minutes
You can self-select your topic
Everyone gets the same mark
Do not complain to me about the social loafers
Your presentation
Follow the rubric
Follow the format as presented in the applied cultural proficiency lectures
Let’s review..
How to get the most marks: (part a)
How to get the most marks in part b
During your tutorials, you will be required to peer review the other presentations. You need to demonstrate an understanding of the determinants of health in the presentation (0/10) and to demonstrate an understanding of the APIE system (0/10). See the rubric to get the best points:
Putting it all together
For your group assignments…
Choosing your topic:
Go to Australian Indigenous HealthInfoNet (http://www.healthinfonet.ecu.edu.au/)
Choose a topic that interests you
Choose a program that interests you
Your presentation might look like this:
6
Pick one of these
https://healthinfonet.ecu.edu.au/
Aunty Kerrie & Papa Ron
Aunty Kerrie & Papa Ron
Then you work your way
through the APIE
Check it out to see if you want to do it…
Your presentation MIGHT look like this…
Using the tools from the lectures…
assessment
How did the programmers decide it was a problem?
Eg, did they measure anything with the ABS? use any of the other assessment tools?
if the programmers did not demonstrate it, how do you think they should/might have assessed this problem?
Examples from the lectures:
Y
feel
hear
see
e.g. did the programmers ask the community?
Should they have?
How did they know it was a problem?
Did they do a holistic assessment?
Why was there a need in this community?
Why was there .
Your contribution(s) must add significant information to the dis.docxdanhaley45372
Your contribution(s) must add significant information to the discussion. Your reply should be a very minimum of 250 words.
Research, read, and then write in your own words. Explain examples and incorporate evidence. Cite your sources within your sentences.
Provide complete citations at the end of your posts. A complete citation includes both the website’s title and
Do not copy and paste stuff….that will cause you to lose points and far more importantly, you will have lost the richness of understanding this information.
ADD COMMENT AND INFORMATION TO THE TEXT BELOW
Many people are skeptical that climate change is even occurring on our beautiful planet. Some places worldwide feel its effects through increased temperatures, which is desirable to some. However, many other places, like the lovely island Fiji, are suffering from the effects of climate change. A Youtube video, “Climate Change Fiji,” posted by the user
UN Climate Change
describes the terrible circumstances faced by civilians who are forced to flee their homes due to rising sea levels (www#1). The loss of beach shores has resulted in a drastic decrease in marine life and land species who rely on coastal areas to survive. According to an article posted by author Sarah Taylor, to the site
EuroNews,
titled “Fiji prepares for ‘Climate Refugees’,” since the 19th century, sea levels have risen by around 25 centimeters worldwide (www#2). This rise in sea levels is attributed to the seemingly neverending rise of greenhouse gas emissions into our atmosphere. Another Youtube video, “Climate Change and Fiji,” posted by the user
COP23fj
emphasizes that Fiji is only one of many other Pacific Islands to be battling climate change (www#3). However, Fijians have taken the lead as the spokespeople for all Pacific Islanders to feel protected and not neglected.
These negative biological implications seem to occur in other places around the world, right? Wrong. Our very own city, San Diego, has been facing and will continue to tackle the negative effects of climate change. A typed interview conducted by the Environmental Health Coalition with Kayla Race exemplifies the many ways climate change appears in our communities, including prolonged heat waves, more intense wildfires, increased water costs, and disruptions on electricity (www#4). My family and I have personally been affected by the increased water (and energy) costs and the interruptions on our electricity. We don’t use our AC system and rely on fans for a cool down from our heatwave, yet are charged more than during the year and face blackouts quite often. A video posted in 2017 by the San Diego Union-Tribune, explains the differences between catastrophic and existential climate change (www#5). Catastrophic damage is survivable by humans, while existential climate change threatens the immediate safety of humans. Many still do not believe that these repercussions are created by car emissions into the air, affecting our atmospher.
Your good friends have just adopted a four-year-old child. At th.docxdanhaley45372
Your good friends have just adopted a four-year-old child. At this point, the only socialization decision they have made is that the child is going to preschool. Imagine that you are an expert in your chosen field. Your friends have come to you for advice and to devise a plan to raise their child. They ask you to be frank with them and give them specific examples to support your opinions. They are determined to raise this child to the best of their ability. Since they are new parents, they need advice on everything!
The summative assignment is to develop a user-friendly PowerPoint handbook of suggestions. The handbook will demonstrate your understanding of the material by applying the major topics discussed in the course to a real situation.
The PowerPoint presentation for the Final Project must include:
Title slide (one slide)
Introduction of the material for the new adoptive parents (one to two slides)
At least 15 slides summarizing each of the items listed below (one to two slides for each item). Please note that the content of each slide should appear in the notes section, while the slide itself should contain the information that would be presented to the parents.
An image that represents each item
Conclusion slide that clearly explains why the parents should review this material (one to two slides)
Reference slide with at least three scholarly sources and the course text properly cited (one slide)
Writing the PowerPoint Presentation of the Final Project
Summarize Bronfenbrenner's ecological model and describe why it is important for them to be aware of this theory (one to two slides).
Suggest and explain a parenting style/philosophy (authoritarian, authoritative, or permissive) that you believe will be most beneficial for the child and the family (one to two slides).
Explain which childcare (nanny, center-based, or family-based care) option (before/during/after preschool) you think is best for the child and why (one to two slides). Be sure to include discussion of the social factors that influence the likelihood of the family selecting a particular form of childcare.
Share specific suggestions, including at least two to implement safe technology use in the home. Explain how the media can (both positively and negatively) influence the child (one to two slides).
Discuss the importance of culture and ethnicity in the development of the self-concept. Share your ideas of ways that the new parents can create opportunities for the child to learn about his or her culture (one to two slides).
Describe at least two researched methods to increase the child's self-esteem and positive attitude (one to two slides).
Differentiate between the importance of socialization that occurs in the home and at school. Explain the importance of each venue as a positive haven for the child (one to two slides).
Explain the importance of the teacher’s role in the child's life. Give examples of how the school and the teacher will affect the child's soci.
Your good friends have just adopted a four-year-old child. At this p.docxdanhaley45372
Your good friends have just adopted a four-year-old child. At this point, the only socialization decision they have made is that the child is going to preschool. Imagine that you are an expert in your chosen field. Your friends have come to you for advice and to devise a plan to raise their child. They ask you to be frank with them and give them specific examples to support your opinions. They are determined to raise this child to the best of their ability. Since they are new parents, they need advice on everything!
The summative assignment is to develop a user-friendly PowerPoint handbook of suggestions. The handbook will demonstrate your understanding of the material by applying the major topics discussed in the course to a real situation.
The PowerPoint presentation for the Final Project must include:
Title slide (one slide)
Introduction of the material for the new adoptive parents (one to two slides)
At least 15 slides summarizing each of the items listed below (one to two slides for each item). Please note that the content of each slide should appear in the notes section, while the slide itself should contain the information that would be presented to the parents.
An image that represents each item
Conclusion slide that clearly explains why the parents should review this material (one to two slides)
Reference slide with at least three scholarly sources and the course text properly cited (one slide)
Writing the PowerPoint Presentation of the Final Project
Summarize Bronfenbrenner's ecological model and describe why it is important for them to be aware of this theory (one to two slides).
Suggest and explain a parenting style/philosophy (authoritarian, authoritative, or permissive) that you believe will be most beneficial for the child and the family (one to two slides).
Explain which childcare (nanny, center-based, or family-based care) option (before/during/after preschool) you think is best for the child and why (one to two slides). Be sure to include discussion of the social factors that influence the likelihood of the family selecting a particular form of childcare.
Share specific suggestions, including at least two to implement safe technology use in the home. Explain how the media can (both positively and negatively) influence the child (one to two slides).
Discuss the importance of culture and ethnicity in the development of the self-concept. Share your ideas of ways that the new parents can create opportunities for the child to learn about his or her culture (one to two slides).
Describe at least two researched methods to increase the child's self-esteem and positive attitude (one to two slides).
Differentiate between the importance of socialization that occurs in the home and at school. Explain the importance of each venue as a positive haven for the child (one to two slides).
Explain the importance of the teacher’s role in the child's life. Give examples of how the school and the teacher will affect the child's socializa.
Your goals as the IT architect and IT security specialist are to.docxdanhaley45372
As the IT architect and security specialist, you must develop solutions to issues facing multiple locations of IDI, ensure confidentiality, integrity and availability of information access across the company, and assess and mitigate risks of operating IT facilities in disparate locations. You will also analyze IDI's current systems, address secure access for remote and web users, propose a budget, and prepare network diagrams and a report with solutions to present to management.
Your essay should address the following problem.(a) What is .docxdanhaley45372
This document outlines several topics for an essay to address: the ideas of political power and bio-power as conceived by Foucault; the concept of background or network power and who exercises it; the paradox of political power; whether democratic and religious societies can be consistent; and the overall conclusion about political power presented in the textbook.
Your future financial needs will be based on the income you can reas.docxdanhaley45372
Your future financial needs will be based on the income you can reasonably expect to receive in your field and planning.
Assignment Information
Using the
template provided
, estimate what your budget may look like in the future. Include expenses such as:
Computer hardware and software
Continuing education
Certification and Recertification
Field or Lab Equipment
Any other needs to maintain professional credibility and marketability
This is the Template
CS204 Budget Worksheet
Monthly Expenses
Amount
Mortgage or rent
Taxes: property
Money to Savings Account
Food
Insurance
Health bills (not covered by insurance)
Car loan
Car expenses
Credit card bills
School loans
Other loans
Professional equipment expenses
Other professional development expenses
Child care
Clothing
Children's Education
Entertainment
Vacations
Charity
Miscellaneous
Total Monthly Expenses:
Yearly Income:
Monthly Income from Job:
Any other monthly income (child support, dividends, and interest):
Total Monthly Income*:
Total Monthly Income:
Total Monthly Expenses:
Difference:
.
Your friend Lydia is having difficulty taking in the informati.docxdanhaley45372
Your friend Lydia is having difficulty "taking in" the information in her history class, so she asks you to use your expertise in psychology to offer some suggestions on how to improve her memory performance.
Discuss how attention, deep processing, elaboration, and the use of mental imagery can affect the encoding process. Utilize your readings, lecture, and powerpoints and examples that you might have to help with your post.
Please submit a minimum of 250 words and cite your resources. Turnitin will be utilized. Please make sure, you write your post in your own words.
.
How to Make a Field Mandatory in Odoo 17Celine George
In Odoo, making a field required can be done through both Python code and XML views. When you set the required attribute to True in Python code, it makes the field required across all views where it's used. Conversely, when you set the required attribute in XML views, it makes the field required only in the context of that particular view.
Main Java[All of the Base Concepts}.docxadhitya5119
This is part 1 of my Java Learning Journey. This Contains Custom methods, classes, constructors, packages, multithreading , try- catch block, finally block and more.
How to Fix the Import Error in the Odoo 17Celine George
An import error occurs when a program fails to import a module or library, disrupting its execution. In languages like Python, this issue arises when the specified module cannot be found or accessed, hindering the program's functionality. Resolving import errors is crucial for maintaining smooth software operation and uninterrupted development processes.
Strategies for Effective Upskilling is a presentation by Chinwendu Peace in a Your Skill Boost Masterclass organisation by the Excellence Foundation for South Sudan on 08th and 09th June 2024 from 1 PM to 3 PM on each day.
How to Add Chatter in the odoo 17 ERP ModuleCeline George
In Odoo, the chatter is like a chat tool that helps you work together on records. You can leave notes and track things, making it easier to talk with your team and partners. Inside chatter, all communication history, activity, and changes will be displayed.
This slide is special for master students (MIBS & MIFB) in UUM. Also useful for readers who are interested in the topic of contemporary Islamic banking.
हिंदी वर्णमाला पीपीटी, hindi alphabet PPT presentation, hindi varnamala PPT, Hindi Varnamala pdf, हिंदी स्वर, हिंदी व्यंजन, sikhiye hindi varnmala, dr. mulla adam ali, hindi language and literature, hindi alphabet with drawing, hindi alphabet pdf, hindi varnamala for childrens, hindi language, hindi varnamala practice for kids, https://www.drmullaadamali.com
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...PECB
Denis is a dynamic and results-driven Chief Information Officer (CIO) with a distinguished career spanning information systems analysis and technical project management. With a proven track record of spearheading the design and delivery of cutting-edge Information Management solutions, he has consistently elevated business operations, streamlined reporting functions, and maximized process efficiency.
Certified as an ISO/IEC 27001: Information Security Management Systems (ISMS) Lead Implementer, Data Protection Officer, and Cyber Risks Analyst, Denis brings a heightened focus on data security, privacy, and cyber resilience to every endeavor.
His expertise extends across a diverse spectrum of reporting, database, and web development applications, underpinned by an exceptional grasp of data storage and virtualization technologies. His proficiency in application testing, database administration, and data cleansing ensures seamless execution of complex projects.
What sets Denis apart is his comprehensive understanding of Business and Systems Analysis technologies, honed through involvement in all phases of the Software Development Lifecycle (SDLC). From meticulous requirements gathering to precise analysis, innovative design, rigorous development, thorough testing, and successful implementation, he has consistently delivered exceptional results.
Throughout his career, he has taken on multifaceted roles, from leading technical project management teams to owning solutions that drive operational excellence. His conscientious and proactive approach is unwavering, whether he is working independently or collaboratively within a team. His ability to connect with colleagues on a personal level underscores his commitment to fostering a harmonious and productive workplace environment.
Date: May 29, 2024
Tags: Information Security, ISO/IEC 27001, ISO/IEC 42001, Artificial Intelligence, GDPR
-------------------------------------------------------------------------------
Find out more about ISO training and certification services
Training: ISO/IEC 27001 Information Security Management System - EN | PECB
ISO/IEC 42001 Artificial Intelligence Management System - EN | PECB
General Data Protection Regulation (GDPR) - Training Courses - EN | PECB
Webinars: https://pecb.com/webinars
Article: https://pecb.com/article
-------------------------------------------------------------------------------
For more information about PECB:
Website: https://pecb.com/
LinkedIn: https://www.linkedin.com/company/pecb/
Facebook: https://www.facebook.com/PECBInternational/
Slideshare: http://www.slideshare.net/PECBCERTIFICATION
Film vocab for eal 3 students: Australia the movie
Part 3 ApplicationEnd-User Security Recommendations.docx
1. Part 3: Application/End-User Security Recommendations
Introduction
A robust network security strategy is one that actively involves
the entire stakeholders of the system. The network administrator
has the responsibility of ensuring that best practices in
information security management are implemented throughout
the entirety of the system they oversee. Threats to a system
exist both within and outside an organization. This necessitates
the need for a comprehensive security strategy that can cover all
those potential threats. Information security threats are of a
dynamic nature and the network administrator should take this
consideration to ensure that they are always on top of any
emerging threats. System vulnerabilities should be sought and
effectively sealed and this should be a regular task.
End User Security Recommendations
Best practice in network security will require that the users and
the firm abide by the following:
• Training and awareness – all employees of the
company should have a firm grasp of matters pertaining network
security. This will come through the training that should be
offered by the company. The training should involve how to
spot and identify threats, how to combat them, and how to
handle them should they occur. As new threats emerge, the firm
will need to create a continuous awareness program to inform
its employees on them.
• Effective monitoring program – even after training
has been done, this is not reason enough to believe employees
will adhere to the lessons learnt. As such, the IT personnel
2. should be empowered to conduct random checks on the security
behavior of the firm’s employees. This will help in identifying
potential weak spots.
• Unique user credentials – each and every employee
that has been granted use of computer resources should do so
with their own unique username and a password that should not
be shared with any other user. The password should be complex
enough that no one could possibly guess. The user should avoid
using passwords from familiar objects or people. A strong
password should have a mix of alphanumeric and special
characters. For every activity a user does on any computer, they
will be required to use their own unique credentials. This should
leave an audit that can be followed should there be an incident.
• Automatic logoff – it is possible that a user might
leave a computer without logging out from their session. This
opens the possibility that another user might access resources
using the logged in credentials. This could be devastating
should the unauthorized have malicious intent and the logged on
credentials have advanced permissions. Automatic logoff should
be set to happen after a given period of time. This should
especially happen after the end of prescribed business hours.
• Regular event log audits – event logs are very
important when it comes to monitoring the performance of a
given system. They can also be used to spot any anomalies
within the system. Event logs collected over a long period of
time can establish a baseline of operations for a system. Any
deviations from this baseline can then be checked further to
identify if they are a threat to the system. (Huang, MacCallum,
& Du, 2013).
• Least privilege – the principle of least privilege has it
that a user should only be granted permissions only to the extent
of their job description and responsibilities. This will ensure
that no single user has complete or unnecessary control over the
system. The network administrator account with power over the
entire system should be used sparingly and only when necessary
to do so.
3. • Incident reporting procedures – employees should
now how they can report a security incident. This could a
suspicion of an intruder or even another user’s activity.
Whatever reason, users should be provided with a clear cut
procedure to make sure these reports reach the right people who
can handle them. (Pardoe, & Snyder, 2015).
• Anti-malware programs – the entire system should be
protected by a regularly updated anti-virus program that can
identify and prevent any threats before they get into the system.
• Up to date disaster recovery and business continuity
plan – even with all the above security measures implemented,
there still exists the chance that a security breach event might
occur. It is important have a response ready for such an
eventuality. A disaster recovery and business continuity plan
can go a long way in mitigating the effects of a security breach.
References
Huang, S. C.-H., MacCallum, D., & Du, D. (2013). Network
security. New York: Springer.
Pardoe, T. D., & Snyder, G. F. (2015). Network security.
Clifton Park, NY: Thomson/Delmar Learning.
4. Part 2: Network System Security Recommendations
Introduction
For any organization that has embraced technology, data has
become an invaluable asset that the organization cannot do
without. As with the protection of other tangible assets, the
protections provided to data assets should be commensurate
with their importance to the organization. An effective
information security strategy implements its safeguards after a
careful analysis of potential threats and covering the bases as
strongly as possible. The vulnerabilities that exist within the
network will need to be identified and patched as soon as they
are identified. A wide range of security measures will need to
be implemented simultaneously within the system. These will
include both hardware and software options as well as intensive
security training for users of the system. Threat and risk
assessment should not be a one-off activity at the installation of
the system. Rather, it is continuous process that is cognizant of
the evolving nature of information where newer threats are
emerging every day. The most secure system then becomes one
whose security strategy is meant to be proactive rather reactive.
Network System Security Recommendations
An effective firewall is one that will ensure that the traffic
that gets through it is one that is safe and only originating from
legitimate sources. An intrusion prevention system (IPS) will be
required to both detect and prevent any potential threats and
5. stem off attacks. A secure and robust network must have its
components well configured if it is to effectively identify and
fend off threats.
• Configuring the firewall – the firewall will be
configured to identify all traffic that can be definitively traced
to be within the company. It will have the capabilities to
identify any traffic that does not come from within the company
and effectively drop it. Hackers targeting a networking will
usually attempt to do so by disguising inbound traffic to appear
as if from a legitimate source. If data appears to be from a
legitimate source, it has higher chances of gaining entry. But
this is not always the case. With ingress filtering, a firewall is
granted the capabilities of accurately determining whether that
particular data is indeed from the source computer it claims to
be from. Microsoft provides Windows Firewall for its operating
and this will be the one in use for the firm. The firewall has a
primary purpose of limiting communication between the
network and the internet. However, this can limit functionality
as there will be aspects of the network that will require
accessing the internet. As such, there will be the need to
configure exceptions. A notifications dialog will provide
options for total blocking of a program, unblocking and a third
option for when the administrator has not yet decided on
whether to block or not. For the last option, the program will
stay blocked. Under program exceptions, only a few of them
will be granted that exception. This should include the web
browser and the email client. Any other programs will be
blocked from accessing the internet without the permission of
the administrator. The scope of the excepted programs will then
be limited to the firm’s network for added protection. All ports
should be closed when not in use. Whether under TCP or UDP
protocols, the ports to be provided with the exceptions are to be
directly specified. The scope for the ports will also be limited to
the local network [1].
• Configuring the router – as the gateway for internet
traffic to and from the network, it is important that the
6. configurations of the router are as robust as they can be. The
web server and the email server will need to be accessed from
the internet. This will require that port forwarding be
configured first. Router manufacturers deliver them with default
IP addresses and login credentials. If this default credentials are
not changed by the end users, there is always the chance they
could be used by hackers to access the router. As such, they
must be changed once the router has been acquired. The security
mode of the NETGEAR MR814 router will need to be set to the
64-bit WEP Wi-Fi encryption protocol that should provide
adequate security for this network. Also, it is advisable to
disable the Universal Plug and Play (UPnp) feature to keep out
rogue devices and software. This will ensure only authenticated
devices and software access the network. The password to be
used should be long and include an alphanumeric and special
character combination. Remote management is unnecessary for
single premise firm and should be disabled. Permissions and
access control should next be implemented to restrict access to
the router to only authorized users and control the flow of
information. As with other components of the network all
activities of the router will be logged and sent to the syslog
server [2].
• Setting up Microsoft Server 2012 – a big
improvement on the Microsoft Server 2008 version, Microsoft
Server 2012 will provide the firm with opportunities for
centralized management and deployment of services and
functions. The Active Directory will be installed from the
server manager console. Access control will be managed under
organizational units that will correspond with the firm’s various
departments. Given that employees within the same departments
will have close to similarly defined responsibilities, their access
to company resources will then be governed under similar
privileges. Server virtualization is to be implemented within the
Windows Server 2012 environment. This will provide multiple
virtual environments that can be used to run separate tasks and
also for backing up company data. Virtualization should also do
7. away with instances of application collisions and
incompatibility issues within the system. Microsoft Server 2012
provides a system failover option that will ensure that the fail
of one section of the system does not jeopardize the entire
system. This is achieved by the virtualized systems that take
over should any other break down [1].
• Configuring the intrusion prevention system (IPS) –
the intrusion prevention should be configured under global
settings that will have it that any rogue connections are dropped
silently and in the background. Identifying potential threats will
be set to spot protocol anomalies, server-side attacks, client-
side attacks, operating system level attacks, and targeted
malware attacks. By configuring flood protection in protocols
like ICMP, and TCP SYN, anti-DOS attacks will be contained
effectively. The intrusion prevention system is meant to operate
automatically on its own for the most part. This should enable it
to work at all times even outside normal business hours.
However, it will important that the system regularly provide
alerts to the network administrator who will then analyze the
extent of the attacks. The alerts will consist of event logs that
provide details on the nature of all the potential threats. The
administrator will then be able to implement any measures to
meet any emerging threats. Implemented on the perimeter of the
system, the intrusion prevention system (IPS) will be able to
monitor every communication in the system and identify the
threats [3].
Addressing Identified Vulnerabilities
• Network backdoors – regular scanning and a network
discovery tool will be needed to find any rogue access points
within the network. Each and every device and software
deployed within the network will require to be mapped and a
baseline for their operations established. A network discovery
tool should do this even without the input of the network
administrator [3].
• Mobile and personal devices – should an employee
8. wish to use their device for work responsibilities, they should
be required to submit the device to the IT team who then go
ahead and check its security features. Only after it is deemed
secure will the user be allowed. As for company-issued mobile
devices, an encryption program should be installed on all
devices to secure not just the communication in and out of the
device, but also the data stored within the device. There should
be also for conditions placed by the firm on the use of the
devices [3]. An example would be the requirement that
employees only use the devices for company work only and not
personal. They should also be regularly submitted to the IT
team for inspections.
• Removable media – there should be a company-wide
rule that no personal devices should attached to company
computers. This regulation should work for the most. However,
just in case, an up-to-date anti-virus program should be
installed within the network to prevent any malware from
infecting the network [3].
• Distributed denial of service (DDoS) attacks - these
attacks are meant to push a system to its breaking point. To
prevent the adverse impact of such attacks, the firm should
conduct regular stress tests on its system to gauge its resilience.
These tests will provide answers on how far the system can go
under stress without breaking down. Any improvements on the
system can then be done on the basis of the results [4].
• Security loopholes – for software and hardware that
has been delivered by their manufacturers with loopholes in
them, they should be swiftly patched. These patches are usually
provided by the manufacturer after the loopholes have been
identified. Also, the company should endeavor to only acquire
software and hardware components from vendors that have
secure track record [4].
References
[1] D. Rountree, Windows 2012 Server Network Security:
9. Securing Your Windows Network Systems and Infrastructure.
Newnes. 2013.
[2] D. Jacobson and J. Idziorek, Computer security literacy:
Staying safe in a digital world. CRC Press, 2016.
[3] C.F. Endorf, E. Schultz, and J. Mellander, Intrusion
detection & prevention. New York: McGraw-Hill/Osborne,
2014.
[4] S.C. Huang, D. MacCallum and D. Du, Network
security. New York: Springer, 2013.
Part 1: Vulnerability Assessment
Nambo Francis
Network Security
October 3, 2016
Introduction
Every computer network is a target for attack by virtue of
being on. It is therefore necessary that every organization
understand where it stands on matters of network security. A
vulnerability assessment is done to provide an organization with
the state of its network components. The assessment also
identifies potential points of weakness within the network
infrastructure and the extent to which those vulnerabilities
could be exploited. While some attacks on an organization can
be targeted specifically to it, others could be as a result of a
vulnerability that was identified by attackers after scouring for
vulnerable networks. Any exploitable vulnerability in a network
no matter how small can cause significant damage to the
network. This necessitates the vulnerability assessment that
10. should be a regular activity. A vulnerability assessment will
enable the organization to rank the gravity of the danger posed
by all vulnerabilities and allocate the appropriate resources to
its handling.
Network Vulnerability Assessment
• Network backdoors – a backdoor within a system is
an access point whose existence is unknown by a network
administrator and users of that system. A backdoor can be
implemented on a software running in the network or even to
hardware devices that are connected to the network. A hacker
then uses that backdoor to access the network and collect data
without the knowledge anyone involved with the network. A
backdoor can grant the hacker administrator level access
privileges and as such their activities within the network can go
unnoticed [1].
• Security loopholes in software and hardware
components – while the above backdoors are usually created by
a hacker, security loopholes are as a result of the manufacturer
delivering unpatched components. A piece of software or
hardware equipment could have been developed and shipped to
users without being checked for those loopholes. These
unpatched loopholes can then be exploited by hackers to enter a
network [1].
• Distributed denial of service attacks – networks are
made to handle a certain amount of requests to function
properly. A hacker the above attacks will exploit by presenting
the network with a large number of illegitimate requests. In a
bid to service these requests, the network resources will be
overwhelmed to the point of the network shutting down after
failing to do so. This attack will then lock out legitimate users
and their requests. [1]
• Mobile and non-firm devices – a lot more companies
are implementing a program where employees get to bring their
devices to work. The firms are also issuing their employees with
mobile devices like tablets and smartphones for conducting
11. their tasks. Bringing personal devices to do work on present a
potential vulnerability. As these are personal devices, they are
secured the same way as other company devices. They could be
used to introduce viruses into the network and jeopardize the
company’s information. As for company-issued mobile devices,
they cannot be secured with the same capabilities as PCs. They
have different form factors and also different underlying
infrastructure [2]. Given that their use within the workplace is
recent, then it means that there isn’t an acceptable method to
secure them. This makes them very vulnerable.
• Removable media – just as employees are bringing
their mobile devices to work, so are they also bringing
removable USB media. This includes thumb drives and external
hard disks. Most of these devices are usually used across many
computers and this increases the chances of them getting
infected with viruses. Allowing these devices with questionable
history to be plugged into company computers creates the risk
that viruses and other malware might get introduced into the
network [2].
• Wireless networks – while wired networks can be
physically secured by limiting access to ports, this can’t be said
of wireless networks. All that is required is proximity. A hacker
with a laptop would only have to be near the company premises
to view their wireless network. Unsecured wireless networks
can be viewed and access with any Wi-Fi connection. It is also
possible that a user on a neighboring network could be able to
access the network. This open wireless network then exposes
the company’s entire network to not just unauthorized users but
malicious ones as well [1].
• Operating system platform – between the Windows
operating system from Microsoft and Mac operating system
from Apple, it has been found that the latter has lesser chances
of being a target for attacks than the former. Windows OS as the
dominant and ubiquitous platform makes that hackers will lean
more towards developing ways to access the systems. Mac OS
devices on the other hand are also developed by Apple and the
12. security implementation is usually far much superior to
Windows OS. So, if the company has chosen to use Windows
devices, then it has to contend with the fact that it has increased
the chances of being a target [1].
• False sense of security in defense in depth – this
company will have a firewall, intrusion detection system and
anti-virus programs as part of its network security strategy. On
the face of it, it is a recommended one as it provides multiple
security layers. However, it is important to note that this
strategy is only effective if those different aspects of security
are all operating at peak level. Even with all of them present, if
they are poorly configured and maintained, they become
liabilities instead of assets as they create multiple points of
vulnerability for the network [1].
References
[1] D. Jacobson and J. Idziorek, Computer security literacy:
Staying safe in a digital world. CRC Press, 2016.
[2] G. Held, G, Network design: Principles and applications.
Boca Raton: Auerbach, 2014.