preview

Computer Security and Educational Services

Better Essays

Unit 5 Assignment 1: Testing and Monitoring Security Controls
Learning Objectives and Outcomes
 You will learn to recognize security events and baseline anomalies that might indicate suspicious activity.
 You will learn to identify policy violations and security breaches and to appropriately monitor threats and control activity across the network.
Assignment Requirements
Refer to the handout Testing and Monitoring Security Controls. It contains information on security events or breaches and baseline anomalies.
After studying the handout, answer the following questions:
 Identify at least two types of security events and baseline anomalies that might indicate suspicious activity.
 Given a list of policy violations and security …show more content…

 Open network drive shares allow storage privileges to outside users.
 Sensitive laptop data is unencrypted and susceptible to physical theft.
 Remote users do not have recent patches or current updates.
 Legitimate traffic bearing a malicious payload exploits network services.
 An invalid protocol header disrupts a critical network service.
 Removable storage drives introduce malware filtered only when crossing the network.
 Predictable passwords meet minimum length requirements but remain easily guessable.
 Bad router permissions allow attackers to modify configurations or disrupt traffic.
© ITT Educational Services Page 2
NT2580 Introduction to Information Security STUDENT COPY: Graded Assignment Requirements
Unit 5 Assignment 2: Define an Acceptable Use Policy (AUP)
Learning Objectives and Outcomes
 You will learn to successfully identify inappropriate activity on a network and to develop a basic AUP that describes the handling of such incidents.
Assignment Requirements
Richman Investments requires the enforcement of strict ingress-egress filtering policies for network traffic. Certain traffic is expressly forbidden:
 No peer-to-peer file sharing or externally reachable file

Get Access