Please enable JavaScript.
Coggle requires JavaScript to display documents.
Lesson 11 (SecurityAudits (First Examine Security risks (Consider effect…
Lesson 11
SecurityAudits
Examination of System and Network
First Examine Security risks
Consider effect of breach
More serious the consequences, more attention requires
Time based
Quarterly, annually
Event based
After major upgrade/update
Led by
in house,3rd party
Security Vulnerabilities
Associated with People
Human errors,ignorance or omissions
Securing physical access with sensitive data
Securing access to workstations
Phising
Improper user config
Overlooks in network design
Associated with Protocols & Software
TCP/IP is not secure
TCould open access to more than one system
NOS might have backdoors
Associated with Transmission and Hardware
NIC's ,hubs,swithcers,routers
Protocol anayzer connected to a port
Attack by disabling routers flooding with TCP/Ip Transm.
Netwroks that use T!, DSL connections
Man in the middle attack
Associated with Internet Access
Security Holes in web browser
Improperly configured firewall
Flashing attacks to chat sessions
Detection of Intrusion Attempts
Analysis of log files
Implementation of Intrusion Detections Systems (IDS)
Implementation of securty auditing (Tripwire)
Mitigation Vulnerabilities
Access Control
Restrict access permissions to resources by users
Proper use of root account
Strong Password Policy
Implement Password for GRUB boot
Systems Admin Best Practices
Staying abreast of current threats
Unloading unneeded services
Installing security updates
Use of encryption
Implementing Firewalls