Monday, April 8, 2019

Access Control Essay Example for Free

Access Control EssayIn this scenario, the seaworthiness club was hacked from an unknown source. The fitness club has contracted Malcom Testing Solutions to do penetration tests and find all vulnerabilities along with make some security changes to prevent this issue from happening again. The security policies need to be changed as far as account management. For starters, the security policies for account management need to be updated. The exploiters password needs to changed every 90 days. Any employee that has remote access should have a token key on a USB drive that provides the users credentials. When an employee retires, quits, or gets fired, they accounts should be locked until IT administrators clear go through the account. If the employee had a USB token for remote access, it should be taken back by the IT personnel department to prevent unauthorized remote access. Penetration testing should be d wizard to test the network for vulnerabilities. in that respect are seve ral types of penetration testing. An automated bearing ground s feces is generally one of the introductory steps in a traditional penetration test because it helps obtain a basic overview of what whitethorn be available on the target network or host. Port based scanners check to picture whether a port on a remote host is able to receive a connection. cipher moreFirst Poem for You EssayGenerally, this will involve the protocols which utilize IP (such as TCP, UDP, ICMP, etc.), However, ports on other network protocols could be present as well dependent on the environment (for example, its quite common in large mainframe environments for SNA to be in use). Typically, a port can have one of two possible states open the port is able to receive data and close the port is not able to receive data. A return based vulnerability scanner is one which utilizes specific protocols to authorise with open ports on a remote host, to determine moreabout the service that is running on that po rt. This is more precise than a port scan, because it does not rely on the port alone to determine what service is running. For example, a port scan may be able to identify that TCP port 8000 is open on a host, but it will not know based on that information alone what service is running there. A service scanner would attempt to spend with the port using different protocols.If the service running on port 8000 is able to correctly communicate using HTTP, then it will be identified as a web server. Lastly, banner grabbing is the put to work of connecting to a specific port and examining data returned from the remote host to identify the service/application give to that port. Often in the connection process, software will provide an identification string which may imply information such as the name of the application, or information about which specific version of the software is running. (Vulnerability Analysis, 2014) After the penetration testing, the system can be updated to mi tigate any vulnerabilities that were found. Firewall changes, IP addresses can be allowed or denied, and software updates are some simple changes that can be made to make a network system more secure.ReferencesVulnerability Analysis. (2014, August 16). http//www.pentest-standard.org/. Retrieved from http//www.pentest-standard.org/index.php/Vulnerability_Analysis

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.