SEC 410 – Discussion – Week 2

What is the value of the Common Vulnerabilities and Exposure (CVE) standard?

Before CVE, different Cybersecurity tools had their own databases of information. Sometimes they would refer to the same problem by different ID and therefor hard to compare databases. There were also not standards for identifying threats so different tools were providing different reports on the same problems. Due to these problems, CVE compatible tools allow for better security.

https://cve.mitre.org/about/index.html

 

How can the CVE be used to improve an organization’s network security?

 View Full Post

SEC 410 – Discussion – Week 1

What are today’s most significant threats to network security?

Phishing is pretty common. It’s a type of social engineering. Social engineering gets people to do what you want them to, thereby allowing an attack to proceed regardless of security.

https://www.youtube.com/watch?v=pnaoUEVx9wI

Poor passwords –

https://www.youtube.com/watch?v=7U-RbOKanYs

Not having two-factor authentication on wireless access points leaves them more vulnerable to attack. While not so common, I think it will become more common once more criminals figure out how easy it can be to exploit a wireless access point regardless of the password used. 

 View Full Post

SEC 410 – Network Defense and Countermeasures – Report 1

Part One:

Research the following bulleted items below, using the relevant reading resources for this week and supplementary ones you may come up with:

  • What should a Firewall protect against?
    • Most threats that can travel over the network. For example, denial of service attacks, access from unauthorized locations (outside of the network and inside), vulnerable type of traffic like ptp sharing.
    What can’t a Firewall protect against?
    • Non-network related security problems. They also aren’t 100% effective. So that’s why a layered security approach is necessary.
    Why would you want firewalls at various locations of your network?
    • I would want them in places where I need to manage things separately (because there are typically routing capabilities combined with firewalls), to isolate part of a network, or even to connect different locations over vpn.
    Where would you locate them?
    • One would be where the internet connection terminates. For example, Comcast has their modem, then the firewall goes after that. Others could be connected to switches throughout the building where appropriate.
    What information did you gain learn from using Nmap about the effectiveness of the Windows Firewall?
    • You can see what ports are open by default
    Could the Windows Firewall be made as secure as the ZoneAlarm Firewall? What would you need to do to accomplish that?

SEC 340 – Network Security Exercise

A small, financial focused business is looking to organize and secure its network. It currently has a single public IP address from a local telecom.

 View Full Post

SEC 340 – MCSA Windows Server 2012 Complete Study Guide – Chapter 1 – 4 Review Questions

Chapter 1 Review Questions Page 140

1. You are the administrator for the ABC Company. You are looking to install Windows Server 2012 R2, and you need to decide which version to install. You need to install a version of Windows that is just for logon authentication and nothing else. You want the most secure option and cost is not an issue. What should you install?

A. Windows Server 2012 R2 Datacenter with GUI
B. Windows Server 2012 R2 Datacenter Server Core
C. Windows Server 2012 R2 Standard with GUI
D. Windows Server 2012 R2 Web Server Core

 View Full Post

SEC 340 – Windows Server 2012 Group Policy Object and Organizational Unit Basic Practice

Design a Group Policy for a Small Business Network that needs to focus strict network security. Be sure to include at least 10 GPOs and explain how and why you configured them.

 View Full Post

Networking case-projects 6

Case Projects 6-1,6-2,6-3 Guide to Networking Essentials 7th Edition by Greg Tomsho.

 View Full Post

Networking case-projects 5

Case Projects 5-1,5-2 Guide to Networking Essentials 7th Edition by Greg Tomsho.

 View Full Post