Thursday, July 18, 2013

Company vulnerability assessment & review




Paper instructions:
Evaluating and addressing IT infrastructure concerns based on vulnerabilities that have been shown in the case study. Providing an analysis and recommended options utilizing various combinations of technologies available that could remediate concerns. Both Network and Systems Reviewing carefully the 3 vendor companies and incorporating similar like abilities with COTS software already available as part of OS.
Vulnerabilities Viewed:
Insufficient logging of network activity. Loggin Audit control, . No means to identify audit trails.
Allowing firewall ports to be opened, even if only for a short time, can become a security concern if vulnerability testing is not conducted first.
Storage quotas are not implemented. Shared drive auditing and access control.
Password Security Password Security: The problem – Some of the users store passwords on their desktops as reminders. Letting users store their passwords in their systems is unsecure; attackers could gain access to other systems based on the passwords stored there.
i. The Solution – Periodically comb files for active password data and alert the user that IT will remove these files. This process is possible to be implemented by using scheduled tasks on Windows servers or embed a scheduled task on workstations which send reports to a centralized files managed by the IT department. This could be possible with the use of scripts.
A user could fill the all available storage and bring file shares down.
Allowing users to place files in a share folder that is available to anyone could compromise confidentiality and privacy of sensitive data.
 

No comments:

Post a Comment