Unit 4 – Network Threats and Vulnerabilities

Slides:



Advertisements
Similar presentations
PowerPoint presentation of first 25 pages of instructional manual Edith Fabiyi Essentials of Internet Access.
Advertisements

5.1 Overview of Network Access Protection What is Network Access Protection NAP Scenarios NAP Enforcement Methods NAP Platform Architecture NAP Architecture.
1 Configuring Internet- related services (April 22, 2015) © Abdou Illia, Spring 2015.
System Security Scanning and Discovery Chapter 14.
Lesson 14-Desktop Protection. Overview Protect against malicious code. Use the Internet. Protect against physical tampering.
Creating WordPress Websites. Creating a site on your computer Local server Local WordPress installation Setting Up Dreamweaver.
TOPIC 1 – SERVER SIDE APPLICATIONS IFS 234 – SERVER SIDE APPLICATION DEVELOPMENT.
Course 201 – Administration, Content Inspection and SSL VPN
Guide to Operating System Security Chapter 9 Web, Remote Access, and VPN Security.
Configuring a Web Server. Overview Overview of IIS Preparing for an IIS Installation Installing IIS Configuring a Web Site Administering IIS Troubleshooting.
1 Week #7 Network Access Protection Overview of Network Access Protection How NAP Works Configuring NAP Monitoring and Troubleshooting NAP.
DATA COMMUNICATION DONE BY: ALVIN SAMPATH CARLVIN SAMPATH.
14 Publishing a Web Site Section 14.1 Identify the technical needs of a Web server Evaluate Web hosts Compare and contrast internal and external Web hosting.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Application Layer Functionality and Protocols.
Microsoft Internet Information Services 5.0 (IIS) By: Edik Magardomyan Fozi Abdurhman Bassem Albaiady Vince Serobyan.
Implementing Network Access Protection
Vulnerabilities in peer to peer communications Web Security Sravan Kunnuri.
Course ILT Internet/intranet support Unit objectives Use the Internet Information Services snap-in to manage IIS, Web sites, virtual directories, and WebDAV.
Chapter 1: The Internet and the WWW CIS 275—Web Application Development for Business I.
FTP Server and FTP Commands By Nanda Ganesan, Ph.D. © Nanda Ganesan, All Rights Reserved.
MCTS Guide to Microsoft Windows Server 2008 Applications Infrastructure Configuration (Exam # ) Chapter Four Windows Server 2008 Remote Desktop Services,
Module 11: Implementing ISA Server 2004 Enterprise Edition.
Remote Desktop Services in Windows Server 2008 R2.
Internet Business Foundations © 2004 ProsoftTraining All rights reserved.
Mr C Johnston ICT Teacher BTEC IT Unit 09 - Lesson 09 Network Services.
12 Steps to Cloud Security A guide to securing your Cloud Deployment Vishnu Vettrivel Principal Engineering Lead,
Configuring Network Access Protection
OV Copyright © 2005 Element K Content LLC. All rights reserved. Hardening Internetwork Devices and Services  Harden Internetwork Connection Devices.
Accessing Evitech network via FTP by Susan Jansson.
SonicWALL SSL-VPN Series Easy Secure Remote Access Cafferata Cristiano SE Italia.
1 Chapter Overview Creating Web Sites and FTP Sites Creating Virtual Directories Managing Site Security Troubleshooting IIS.
Understand Internet Security LESSON Security Fundamentals.
Protocols Monil Adhikari. Agenda Introduction Port Numbers Non Secure Protocols FTP HTTP Telnet POP3, SMTP Secure Protocols HTTPS.
Mr C Johnston ICT Teacher BTEC IT Unit 09 - Lesson 09 Network Services.
Vmware 2V0-621D Vmware Exam Questions & Answers VMware Certified Professional 6 Presents
VIRTUAL SERVERS Chapter 7. 2 OVERVIEW Exchange Server 2003 virtual servers Virtual servers in a clustering environment Creating additional virtual servers.
Security fundamentals
CompTIA Security+ Study Guide (SY0-401)
Chapter 5 Electronic Commerce | Security Threats - Solution
Contents Software components All users in one location:
Fortinet NSE8 Exam Do You Want To Pass In First Attempt.
Instructor Materials Chapter 5 Providing Network Services
Level 2 Diploma Unit 10 Setting up an IT Network
Grades4sure PDF Dumps CompTIA Security + Certification Exam
Implementing Network Access Protection
Securing the Network Perimeter with ISA 2004
Chapter 5 Electronic Commerce | Security Threats - Solution
Configuration for Network Security
Business Risks of Insecure Networks
Introduction to Computers
ICT meeting Business needs
NSE4-5.4 Dumps
NERC CIP Implementation – Lessons Learned and Path Forward
Welcome To : Group 1 VC Presentation
Services Provided by Network Operating Systems
CompTIA Security+ Study Guide (SY0-401)
Unit 27: Network Operating Systems
الخطوات المطلوب القيام بها قبل انشاء الموقع
ما هي خدمة بروتوكول نقل الملفات؟
Section 14.1 Section 14.2 Identify the technical needs of a Web server
IS 4506 Server Configuration (HTTP Server)
Configuring Internet-related services
Web Servers / Deployment
Unit# 5: Internet and Worldwide Web
APACHE WEB SERVER.
Designing IIS Security (IIS – Internet Information Service)
Test 3 review FTP & Cybersecurity
Instructor Materials Chapter 8: Applied Networking
Computer Networks Protocols
Introduction to Networking Security
Presentation transcript:

Unit 4 – Network Threats and Vulnerabilities Coursework Piece Yellow

Investigate and document the ethical responsibilities of a cyber security professional: Ethics http://www.bcs.org/upload/pdf/conduct.pdf - British Computer Society Code of Ethics http://www.ieee.org/about/corporate/governance/p7-8.html - Institute of Electical and Electronics Engineers Code of Ethics http://www.iconsulting.org.uk/~/media/Files/PDF/IC/Code-of-Conduct-and-Practice- Leaflet.pdf - Chartered Management Institute Code of Conduct https://www.sans.org/security-resources/ethics - SANS Institute (Cyber Security Training) IT Code of Conduct https://huit.harvard.edu/it-professional-code-conduct-protect-electronic-information - Harvard University IT Professional Code of Conduct

Investigate and document the ethical responsibilities of a cyber security professional: Ethics Consider the similarities with the codes of conduct provided: What types of thing do they all contain? How are most of them presented? Is this the best way? Are infographics useful? What topics must be covered in an ethical code of conduct? What is an ethical responsibility? How can a code of conduct be enforced?

Investigate and document the ethical responsibilities of a cyber security professional: Employee Handbooks http://www.valvesoftware.com/company /Valve_Handbook_LowRes.pdf https://www.dropbox.com/s/u6suqbbk2 w1vbwz/Disqus%20Culture%20Book.pd f https://www.slideshare.net/reed2001/c ulture-2009 http://www.businessinsider.com/nordstro ms-employee-handbook-2014-10?IR=T What is an employee handbook? What is the purpose of it? What similarities do these handbooks have? Are there any huge differences?

Task: Create a form of guidance suitable for an employee handbook that documents the ethical responsibilities of a cyber security professional Controlled Assessment Piece 1, Task 1: Investigate and document the ethical responsibilities of a cyber security professional Remember this doesn’t have to be a word document. You could create a: Leaflet Poster Strapline (Nordstrom) Infographic (CMI) Make sure you include the key themes discussed in class: Data Security Privacy Access to information Crime Causing Harm To others To Companies

Controlled Assessment Piece 1, Task 1: Task: Create a form of guidance suitable for an employee handbook that documents the ethical responsibilities of a cyber security professional Controlled Assessment Piece 1, Task 1: Investigate and document the ethical responsibilities of a cyber security professional Document your: Research References Create your: Form of Guidance

Describe five different types of configuration that can affect network security Apply security settings to network technologies Switch configuration Implementing virtual local area networks (VLANs). Protection from loops, ie using Spanning Tree Protocol (STP). Antivirus Configuration Frequency of virus signature updates. ‘On demand’ scanning settings for downloads and email attachments. Scanning frequency. Integration with operating systems and email systems. Domain Configuration Authentication of users. Authorisation of users. User permissions and default behaviours. Creation, maintenance and application of group security policies. Bandwidth throttling. Roaming user profiles and desktops. Remote Desktop Services (RDS). Remote Desktop Protocol (RDP)

Describe five different types of configuration that can affect network security Web technology security and configuration Awareness of WAMP, LAMP, MAMP stacks. Web server configuration: suppressing web server footprint (eg name, version etc) aliases and virtual hosts ports for HTTP/HTTPS traffic (eg 80, 443, 8080 etc) automatic HTTP to HTTPS directs • session timeout constraints allowed/blocked IP ranges suppressing directory views directory/folder permissions file permissions file type execution (eg ASP .Net, .ASP, .PHP etc) suppressing web application code errors limit maximum concurrent connections. File Transfer Protocol (FTP) (client) access: use of FTPS (also known as FTP-ES, FTP-SSL and FTP Secure). Secure Shell (SSH) remote access. Relational database remote access and authorisation: non-standard ports user permissions, especially for DDL and DML SQL statements limit maximum concurrent connections securing web-based front-ends, eg PHPmyadmin. Web application configuration and deployment. Web browser client security (eg security settings, plug-ins etc).

different types of configuration that can affect network security - Research Choose 1 device technology: Switches VLAN STP Choose 1 service: Active Directory FTP HTTP/HTTPS SSH Remote Desktop Services / Remote Desktop Protocol Choose 1 technology: VPN Web Servers Relational Databases (Remote Access and Authorisation) In a presentation: Find out what it is Find out what it does Explain how it can improve security Explain how it can pose security threats

Describe five different types of configuration that can affect network security. Make sure you: Explain what the technology is Explain what it is used for Explain how it helps a user / system Explain how it can improve security Explain how it can pose security threats