Lab 1 Of Aligning An It Security Assessment Cbu Security Compliance Lab

1112 words - 5 pages

Juan Carlos
Dr. Marshall
Security Compliance
Lab 4: Aligning an IT Security Assessment
Vulnerability Life Cycle
· Death is the culmination of this vulnerability cycle. When the number of systems vulnerable to an exploit is reduced to an insignificant amount then this stage occurs. It can happen by patching vulnerable systems, retiring old systems, or lack of interest in the exploit by hackers.
Types of Disclosure
· The types of disclosure are listed below
· This policy would mean to keep the information tightly contained so as the general public never learns of its existence.
Full Disclosure
· This would mean that the information about system vulnerabilities and attack tools would be revealed as possible so that potential victims are as knowledgeable as those who attack them.
Limited Disclosure
· The main concept behind limited disclosure is that vulnerability information is shared as few individuals as possible.
Responsible Disclosure
· During this stage of the vulnerability life cycle the method of discovery will determine how responsible disclosure will proceed. Initial contact signals the start of the disclosure stage.
Existing Policies and Proposals
· NTBug Traq Disclosure policy
· Rain Forest Puppy “RF Policy”
· IETF draft
· The Fisher Plan
Threat Activity Trends
· Organizations should monitor all network- connected computers for signs of malicious activity including bot activity and potential security breaches, ensuring that any infected computers are removed from the network and disinfected as soon as possible.
Vulnerability Trends
· Web browser vulnerabilities are a serious security concern due to their role in online fraud and in the propagation of malicious code, spyware, and adware.
Malicious Code trends
· Monitoring trends in the number of new malicious threats can help improve awareness of their danger and underscores the importance of maintaining robust security, including up-to-date antivirus signatures and software patches.
Phishing, Underground Economy Servers, Spam Trends
· Symantec recommends that enterprise users protect themselves against phishing threats by filtering email at the server level through the mail transfer agent. Organizations can also use IP-based filtering upstream as well as HTTP filtering.
There is a long list of reasons why you want to do periodic assessments and an equally long list of why you shouldn’t. An increasing number of organizations are bound by governmental regulations that dictate what security measures you should have in place and how they should be audited. You get to find out whether your security has already been compromised. You might not know unless you look, and you will sleep better at night if you know.
Lab Assessment Questions and Answers
1. What is a PHP Remote File Include attack and why are these prevalent in today’s Internet world? An inclusion attack wherein an attacker can cause the web application to include a remote file by exploiting a web app that...

Other Essays On Lab 1 of Aligning an IT Security Assessment - CBU Security Compliance - Lab

Chemoselective of Aromatic Compounds Lab Report - organic chemistry - Lab Report

1624 words - 7 pages , whose structures are shown below. Figure 1: Structures of the three starting materials: citral, geraniol, and carvone. A type of oxidation reactions that was looked at were epoxidation reactions, which removed a double bond, and replacing it with an oxygen of citral and carvone. Another type of oxidation reaction is the copper oxidation of geraniol that starts with an already present alcohol group, which loses its hydrogen and creates a carbon

Science Lab Report On Finding The Boiling Point Of An Unknown Substance

494 words - 2 pages temperature suddenly rised from 80 to 86 degrees.Modifications to Original Plan:I got an idea of doing it in turns during the setup for the investigation. Since Sam agrees in my idea, we changed our way of working.Evaluation:Our method used here was fine, if we have turned the fire smaller, there, it may be slow, but the information is more accurate.

Lab report on lakes and health of rivers - AP environmental - lab report

584 words - 3 pages calculations of biological testing, we were able to determine that the river was indeed healthy. For the biological testing, there were many Class 1 macroinvertebrates, which is expected in any river. However, there was not an abundance of Class 2 which have medial tolerance to pollution. Despite the lack of Class 2 macroinvertebrates, the high water quality of the river was confirmed when there were multiple Class 3 macroinvertebrates, which are

Comparison of Strength and Power - Exercise Physiology - Lab Report

1425 words - 6 pages quite consistently. Figure 1. Figure 2. Subject four yielded the greatest Vertical Jump score by a reasonable margin, with a result of 0.74m. Despite it testing muscular anaerobic power like two of the other forms of testing batteries, it contained only a weak correlation to them, with no correlation with the isokinetic dynamometry assessment. Across the 28 subjects, the group produced an average jump score of .50metres, and a standard deviation

Chemical Reactivity of Chemicals - Chemistry Grade 11 - Lab

546 words - 3 pages Chemical Reactivity of Metals Purpose ❖ The purpose of this lab is to study the chemical reactivity of five different metals and discover the periodic trend for the chemical reactivity (most reactive to least reactive) of metals using the observations from the lab. Hypothesis ❖ My prediction was that the metal that is farthest down and to the left on the periodic table (Potassium) will be the most reactive and the metal farthest up and to the

Extraction of benzoic acid and benzocaine - Organic Chemistry - Lab report

663 words - 3 pages compounds. Dichloromethane and hydrochloric acid were used to extract benzocaine while benzoic acid was extracted with the use of dichloromethane and sodium hydroxide. In both cases, the dichloromethane will be the bottom layer in the funnel since it is chlorinated.. To start the lab, 2.035 grams of benzocaine and benzoic acid mixture was obtained and dissolved into forty milliliters of dichloromethane and put into the separatory funnel. Benzocaine

Effect of Temperature on Enzyme Activity - AP biology - Research Lab

898 words - 4 pages The Effect of Temperature on Enzyme Activity The purpose of this lab practice is to investigate the effects of temperature on the denaturation of enzymes. Introduction: The main biological concept explored was enzyme activity, enzymes are biological molecules (proteins) that act as catalysts and help complex reactions occur everywhere in life. Enzymes are impacted by temperature and pH of their environment, because these factors can denature an

The Effects of Smoking on Lung Tissue - Biology - Lab Report

2559 words - 11 pages analyzing our data, we found evidence that when exposed to cigarette smoke, cilia will have a lower beat frequency, specifically with the high tar levels. The data displayed in Figure 1 displays that extract A (low tar) had an average beat frequency of 216 BPM which showed a 25% drop from the original control frequency of 285 BPM. Extract B (high tar) had a beat frequency of 175 BPM which was about a 40% drop from the original control frequency. It

the importance of the constitution - lab school 8 - essay

560 words - 3 pages 1 Bryant Camille Bryant Ms. Parham Humanities A 16 November 20 The importance of the First amendment and the Preamble “We hold these truths to be self-evident, that all men were created equal; that they are endowed by their Creator with certain unalienable rights, and that among these are life, liberty, and the pursuit of happiness (Jefferson, Declaration of independence)” The Declaration of Independence states that all men were created and are

security survey of the university - bachelors - Research

2177 words - 9 pages UMT SECURITY SURVEY NAME: HAMZA JAVED ID: S2016001003 SUBMITTED TO: SIR KALEEM UR REHMAN INTRODUCTION Now a days security is the major concern of every institute, organization, city, country and even our houses because of the prevailing threats that are increasing with the passage of time. If you don’t take security measures properly, you might face huge loss of equipment, theft or even your life therefore it is very important to take security

Experiment 38 Pre - Lab notes and agenda - University of Texas Rio Grande Valley - Pre-Lab explanation on the process.

537 words - 3 pages first two flame tests. THE FOLLOWING PROCEDURE SHOULD BE DONE FOR BOTH REFERENCE AND THEN UNKNOWN. TEST TUBES SHOULD BE HELD WITH TEST TUBE CLAMPS TO AVOID ACCIDENTAL SPILLING OF CHEMICALS ON STUDENTS WHILE HOLDING TEST TUBES. Part C – Fume Hood Preparing Sample ➢ 5 mL in a 100mL beaker on a wire gauze with Bunsen burner under and heat until moist residue (condensation starts) DON’T LET IT EVAPORATE COMPLETELY. Add 1-2 mL of D.I. Water Confirmatory

Similar Papers

Lab Report 4 Chocolate Cookie Experiment Prevention 1 Lab Report

450 words - 2 pages student in the class, Preet. · What were your findings? -The findings for this lab was to disclose and write up a BFS sheet for the other student. -Found out how difficult it is being in someones mouth for the very first time. -Discovered the use of many different inter dental products available in the market for every client. · What did you learn? -Learned how to use the new methods we have been taught on each other. Learned how to disclose an agent

Network Security Proposal Part 1 Cmit 320 Assignment

1226 words - 5 pages I. Analysis and Planning A. Vulnerability Assessment Requirements The security and availability of the school network plays a huge role in the success of those who attend it. In order to provide a secure network environment for the betterment of the students and faculty a vulnerability assessment needs to take place. This vulnerability assessment is used to find where the weaknesses are in a network in order to assist in the protection of the

Network And Security Homework 1 George Mason University Assignment

657 words - 3 pages network interface identification and location addressing. We are currently using IPv4 which uses 32 bit numbers but we are slowly migrating to IPv6 which uses 128bits; making it more secure. An example of an IP address is in IPv4 is and in IPv6 is 2001:db8:0:1234:0:567:8:1. 8. Explain the function of the Transport layer. it’s main function is to provide end-to-end communication over a network as well as is responsible for the

Lab Report The Stoichiometry Of An Oxidation Reduction Reaction

444 words - 2 pages = .0005 moles/10 mL = moles of hydroxylammonium chlorideRatio of Fe+2 to NH3OH+ = 2:12e- + 2Fe+3 --> 2Fe+2 so transfer of 2 electronsNH3OH+ --> something + 2e-Oxidation number of N in NH3OH+ is -1, therefore the oxidation number for N on the product side must be +1 because it gains 2 electrons.N2O has an oxidation number of +1 for N, so that would work.Data:Equation 1: NH3OH+ + 2Fe+3 --> something + 2Fe+2Equation 2: 8H+ + 5Fe+2 + MnO4