Unit_5_WorkSheet_2
docx
keyboard_arrow_up
School
Lone Star College, CyFair *
*We aren’t endorsed by this school
Course
2279
Subject
Information Systems
Date
Dec 6, 2023
Type
docx
Pages
3
Uploaded by EarlBear1147
Unit 5 Security Assessment Procedure
Instructions: Given a Request for Proposal (RFP) and a security analysis project plan, prepare a
procedure to conduct a security assessment for the
Workstation
and
System/Applications
domains in
the client’s information technology (IT) infrastructure. Provide sufficient details that would enable a person
in a position of responsibility in each area to conduct a security assessment by following the steps in the
procedure. It is not necessary to provide low-level details that would enable an untrained person to follow
the steps in the procedure. Your procedure should address the major areas of concern in each domain.
Each procedure step should include the following information:
▪
Procedure step: A brief description of the step
▪
Explanation: A narrative describing the step and its purpose
▪
Action: A narrative describing the action to take to carry out this step
Procedure Step
Explanation
Action
Credential Thef
●
Theft of user login informations, can
be passwords and usernames ect
●
Require MFA
●
Conduct security awareness
training
●
Update passwords regularly,
ensure the use of different
passwords per site
Exposed Network Ports
●
Computer communication channels
set to open, this allows unwanted
traffic to flow through
●
Close unused ports
●
Port scanners; Nmap, Zenmap,
Ping Sweep
●
Install firewalls and patch
regularly
●
Monitor open ports
Privilege Escalation
(Vertical and Horizontal)
●
Network attack used to gain
unauthorized access to critical
systems
●
Limit access to sensitive systems
and applications
●
Patch and update software
●
Regularly scan network and ports
●
Security awareness training
●
Implement a strong incident
response plan
Anti-malware Bypass
●
Obfuscation of malware, this hides
●
Use secure authentication
Unit 5 Security Assessment Procedure
Application Whitelist
Bypass
the malware in the form of another
trusted program
●
Encryption of malware so that
antimalware software can’t detect the
malware
techniques
●
Limit usage of Admin accounts
●
Keep software updated
●
Control access to systems
●
Limit application privileges
●
Implement email security and
spam protection
●
Security awareness training
●
Install antivirus and antispyware
software
Security Patch
●
The process of applying updates to
software, drivers and firmware
●
Establish asset management
●
Prioritize vulnerabilities
●
Development partnerships and
support
Assigned Permissions
●
Determine the information users can
access and the task they can perform
●
Create roles
●
Determine user privilege
Group Policies
●
Hierarchical infrastructure that allows
network admins to implement specific
configurations for users and
workstations
●
Do not modify the default
domain policy and default
domain controller policy
●
Create a well-designed
organizational unit
●
Give GPOs descriptive names
●
Add comments to GPOs
●
Don’t set GPOs at the domain
level
●
Don’t disables GPOs
Malware Identification and
Analysis
●
Identify and analyze malicious code
●
Static and Dynamic
●
Implement a triage for incidents
●
Examine files for malicious intent
Endpoint Device Security
●
Implement and operate endpoint
device security
●
Utilize sandbox environment to
investigate malware in a safe
environment
Cloud Based Security
●
Operate and configure cloud security
●
Use strong authentication
●
Implement encryption
Unit 5 Security Assessment Procedure
●
Implement access control
●
Utilize APIs
●
Implement regular security
assessments to find holes in
firewalls
●
Implement Zero Trust
●
Conduct regular employee
security training
VMWare Security
●
Operate and secure virtual
environments
●
Maintain VM templates with the
most up to date OS security
patches
●
When deploying new VM utilize
existing VM templates
●
Disable unnecessary functions
●
Disable command line window
●
Utilize antivirus suite
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help