FYT2

Topics: Computer security, Information security, Computer network Pages: 7 (2170 words) Published: September 30, 2014
Private Investigators LLC
Controls and Countermeasures

Private Investigators Limited Liability Company (LLC) has a small office with one server and six workstations. This LLC partnership hosts its own website that allows clients to log in and enter case information. An evaluation of the network and security configuration to determine threats and weakness to the existing system has been completed. A list of the top five associated threats for the Server, Workstations, and Website are outlined below. The following memo discusses the likelihood of the threats occurrence and recommended security controls and countermeasures that should be used to mitigate these threats. Shown illustrated below are network drawings of the current configuration and a proposed security solution. The addition of a router, firewall, domain controller, and a DMZ will be discussed. Current business practices that allow user downloads, installation of software, lack of an application updates, and operating system patches policies will be discussed. A lack of security methods to provide Confidentiality, Integrity, and Availability (CIA) will be covered and the development of an Acceptable Use Policy (AUP) that includes training on the AUP will be laid out.

A1.

Server Threats
1. Malicious software (Malware): The introduction of computer viruses, worms, Trojan horses, spyware, adware, and rootkits can allow attackers to gain control on the device or computer. This allows attackers to steal, damage, or destroy files and data on infected machines.

2. Operation System (OS) Flaws: Weaknesses or flaws in the OS which allow an attacker exploit these flaws to gain root access to the underlying OS. This can allow Malware to be installed and manipulation of code on compromised machines.

3. Application Bugs: Also known as software bugs describe errors, flaws, or faults in a program that causes unintended results. These bugs can be exploited by an attacker to gain access to the underlying OS or system. Much like OS flaws these attacks are directed at the programs or software running on a system such as Microsoft Office, Internet Explorer (IE), or other vender specific applications (Adobe, Java, QuickTime, etc.). Servers should have any unused or unneeded application removed to reduce exposure or threats. 4. Connectivity: Proper management of network access and connectivity is essential. The shutting down of unused ports of protocols that may allow attackers back-door sessions or alternate data streams to existing devices. These connections can be used to modify or steal data stored or accessed by the local devices.

5. Password Management: Authentication processes to prevent unauthorized users from accessing computers, applications, and network devices. Attackers will exploit weak or default passwords to gain access to launch attacks on additional equipment on the network.

File:FYT2_Task1
By Thomas A. Groshong Sr
Page 1 of 7

Private Investigators LLC
Controls and Countermeasures

A2.

Workstations Threats
1. Malware: The introduction of computer viruses, worms, Trojan horses, spyware, adware, and rootkits can allow attackers to gain control, damage or destroy files and data on infected machines.
2. OS Flaws: Weaknesses or flaws in the OS which allow an attacker exploit these flaws to gain root access to the underlying OS. This can allow Malware to be installed and manipulation of code on compromised machines.

3. Application Bugs: Also known as software bugs describe errors, flaws, or faults in a program that causes unintended results. These bugs can be exploited by an attacker to gain access to the underlying OS or system. Much like OS flaws these attacks are directed at the programs or software running on a system such as Microsoft Office, Internet Explorer (IE), or other vender specific applications (Adobe, Java, QuickTime, etc.). Workstations need to have applications up-to-date and properly managed to prevent exposure to these...
Continue Reading

Please join StudyMode to read the full document

Become a StudyMode Member

Sign Up - It's Free