Premium Essay

Lab 6: Auditing the Workstation Domain for Compliance

In: Computers and Technology

Submitted By joshhager
Words 951
Pages 4
Lab 6: Auditing the Workstation Domain for Compliance
Question 1 – What are some common risks, threats, vulnerabilities commonly found in the Remote Access Domain that must be mitigated through a layered security strategy?
a. Some common risks, threats, or vulnerabilities are company laptop stolen, software keyloggers being put on computers and having passwords and user accounts stolen, data leakage, and unauthorized access to the network.
Question 2 – File-sharing utilities and client-to-client communication applications can provide the ability to share files with other users (i.e. Peer-to-Peer networking or Sharing). What risk and/or vulnerabilities are introduced with these applications?
a. A lot of these are shared through clear text. If a user uses the same password for logging into one of these utilities as they do for their network login or any other data sensitive login the password can be easily compromised.
Question 3 – Explain how confidentiality can be achieved within the Workstation Domain with security controls and security countermeasures.
a. You can achieve this by using GPO’s and WMI filters. This will help push Workstation security policies to the computers such as if the computer is idle for more than 5 minutes it locks, or access to different parts of the computer like control panel are blocked.
Question 4 – Explain how data integrity can be achieved within the Workstation Domain with security controls and security countermeasures.
a. Security controls and countermeasures help to ensure that only authorized people can access and change data. You can do this through Access Control List (ACL’s).
Question 5 – Explain how availability can be achieved within the Workstation Domain with security controls and countermeasures.
a. This can achieved by have up to date backups of the data. This way it can be restored if needed. Also having a…...

Similar Documents

Free Essay

Unit 9 Workstation Domain Antivirus Policy

...Workstation Domain Anti-virus and Anti-malware Policy Improvements Employ automated tools to continuously monitor workstations, servers, and mobile devices for active, up-to-date anti-malware protection with anti-virus, anti-spyware, personal firewalls, and host-based IPS functionality. All malware detection events should be sent to enterprise anti-malware administration tools and event log servers. The endpoint security solution should include zero-day protection such as network behavioral heuristics. Employ anti-malware software and signature auto-update features or have administrators manually push updates to all machines on a daily basis. After applying an update, automated systems should verify that each system has received its signature update. Configure laptops, workstations, and servers so that they will not auto-run content from USB tokens (i.e., "thumb drives"), USB hard drives, CDs/DVDs, Firewire devices, external serial advanced technology attachment devices, mounted network shares, or other removable media. If the devices are not required for business use, they should be disabled. Configure systems so that they conduct an automated anti-malware scan of removable media when it is inserted. All e-mail attachments entering the organization's e-mail gateway should be scanned and blocked if they contain malicious code or file types unneeded for the organization's business. This scanning should be done before the e-mail is placed in the user's inbox. This......

Words: 335 - Pages: 2

Premium Essay

Auditing the System/Application Domain for Compliance

...The System/ Application Domain involve servers that host server-level applications. Mail servers hand receipt and sending of e-mail. Database servers host databases that are accessed by users, applications, or other servers. DNS servers provide names to IP addresses for clients. To protect this domain the following methods should be utilized; removal of unnecessary services and protocols, changing of default passwords, regular patch and updates, enable local firewalls. The major threats to these areas are unauthorized access, hardware failure, and data loss. Since the system/ application domain consists of all of a business’s mission-critical systems, applications, and data it is important to ensure that this domain is secure at all times. Failure to do so will result in large amounts of sensitive information as well as the threat of having productions cease to function. Unauthorized physical access is gaining access to a physical entity without permission. This is potentially dangerous because if an individual were to gain such access they could destroy the systems and data within the systems. This threat is centered on access to such places as data centers with a great deal of sensitive information. To prevent unauthorized physical access policies, standards, procedures and guidelines must be followed. For example, all guest must be escorted by an employee at all times. Staff should immediately report any suspicious activity and question persons that do not have...

Words: 485 - Pages: 2

Free Essay

Auditing It Infrastructures for Compliance

...and combine them into one final report. These reports will consist of: - The two auditing frameworks or hardening guidelines / security checklists used by the DoD. - How a security assessment addressing modern day risks, threats, and vulnerabilities throughout the 7-domains of a typical IT infrastructure can help an organization achieve compliance. - How to gather and obtain needed information to perform a GLBA Financial Privacy & Safeguards Rules compliance audit and what must be covered. - The top workstation domain risks, threats, and vulnerabilities which will not only include possible causes, but mitigations as to prevent these issues from happening. - The top LAN – to – WAN risks, threats, and vulnerabilities which will not only include possible causes, but mitigations as to how we can prevent these issues from happening. - The top Remote Access Domain risks, threats, and vulnerabilities as well as ways to mitigate these types of issues. - The top Systems / Application Domain risks, threats, and vulnerabilities as well as ways to mitigate these types of issues. Part 1: Purpose: The purpose of part 1 for this lab is to develop an executive summary in regards to either the two auditing frameworks or hardening guidelines/security checklists used by the DoD. For this, I have chosen to discuss the two auditing frameworks. Background: A little background about the AF (Auditing Framework) for the DoD is that it provides a foundation for developing and......

Words: 2140 - Pages: 9

Premium Essay

Auditing Ethics and Compliance

...Instructions 1. Construct a template that will be the guide throughout the writing process. This will improve how the document looks, feels and reads. Consistency in these three items is key to a good case study. 2. Draw your reader in with a unique title. It should attract the reader and make them want to read more. 3. Begin writing the paper. Start by identifying the problem that is being explored in the case study. 4. Explore the problem, including cause, effect and theory. Give as much background as possible. 5. Discuss the possible solution, and/or how this issue was specifically resolved. Tell what methods were used in the process. 6. Describe benefits of the study. Tell how the benefits overall affect the group to which your case study is aimed. 7. Utilize the general-to-specific-to-general approach. This is the approach to use because it draws the reader in, demonstrates a specific example, and then shows how it applies to the group as a whole. It also shows the reader how they can address their own problem this way. Tips & Warnings • Use facts and numbers where possible. This is specifically aimed at the benefits portion of the case study. Potential readers will be compelled with the numbers and how they are affected by them and remain interested. • Use photos if necessary. If photos are used, be sure they are professionally done so as to not sully the quality of the case study. • Have an executive sign......

Words: 5555 - Pages: 23

Premium Essay

Research Specific Requirements for Workstation Domains

...Business of IT Understanding Regulatory Compliance In the last few years, governments the world over have taken up the job of protecting consumers and companies against poor management of sensitive information. Unfortunately, this has led to a steady stream of confusing laws and regulations coming from all directions. In this column I'll look at these laws, go into depth on a few of them, and discuss how you, as an IT pro charged with making your company compliant, can approach the issue. Laws and Regulations Depending on the industry you're in, your organization may be used to regulations or completely new to them. Late 90s and early 2000s ushered in the era of laws governing information security, privacy, and accountability, thanks to companies like Enron and to the sheer volume of personal and sensitive information stored in and transmitted though vulnerable channels. At the root of most regulations is the importance of protecting the confidentiality, integrity, and availability of information that impacts a corporation and its stakeholders. These laws can be distilled down to their essential goals: Establish and implement controls Maintain, protect, and assess compliance issues Identify and remediate vulnerabilities and deviations Provide reporting that can prove your organization's compliance Taking a look at the laws and regulations having immediate impact on IT pros, to understand what each law is about. Don't assume this list represents all of the laws and......

Words: 1573 - Pages: 7

Free Essay

Auditing It Infrastructures Compliance

...In the given table, you need to fill in the name of the laws, and correspondingly, fill the sector related to each law. You need to provide a rationale of compliance laws with which a public or a private organization may have to comply. |Compliance Laws |Description of Compliance Law |Rationale for Using this Law | | |This act is the result of public company account |Corporate accountability and responsibility act. | | |reform and investor protection act. | | | |This act mandate many reforms to enhance corporate | | |Sarbanes-Oxley Act (SOX) |responsibility, financial disclosure, and prevent | | | |fraud. | | |Health Insurance Portability and |Provides for helping citizens maintain their health |Health care | |Accountability Act (HIPPA) |insurance coverage. |Protection of health insurance coverage | | |Improves efficiency and effectiveness of the American...

Words: 414 - Pages: 2

Free Essay

Unit 6 Lab 2

...Unit 6 Lab 6.2 1. What are the available Password Policy options that could be enforced to improve security in a Group Policy? * Enforce password history: * Maximum password age * Minimum password age * Minimum password length * Passwords should always meet complexity requirements 2. How could you se security permissions and user access rights on a home computer using Windows XP Professional or similar that is not a member of the domain? Security permissions and user access can still be managed locally on the computer with local groups and applying the proper permissions to local users on the computer. Local group policies can also be managed. 3. Why is the use of different password policy options available and why is it important to implement complexity and length requirements? There are different policy options to have different options for companies to use, if it were all the same then hackers would know exactly what to look for, in this case it can be vary. It is important implement complexity and length requirements to secure and assure the company that proper passwords are being used to prevent easy hacking access for hackers. 4. Microsoft defines user rights in two types of categories: Logon rights and privileges. Explain the difference of the two from an access control perspective. Log on rights manage and control who can log in to a specific computer. Privileges determine what the user can access one they log in, they go hand and hand. ...

Words: 657 - Pages: 3

Premium Essay

Is3110 Lab 6

...Lab 6 1. Why is it important to prioritize your IT infrastructure risks, threats, and vulnerabilities? It is important to prioritize because you must be aware of what the risks, threats, and vulnerabilities there are to your infrastructure. You need this so that you know where the most attention needs to be focused on. 2. Based on your executive summary produced in Lab #4 Perform a Qualitative Risk Assessment for an IT infrastructure, what was the primary focus of your message to executive management? Setting up security measures through various means includes the following: * Forcing users to update password every X number of days. * Educating the users. * Firewalls - Anti-malware 3. Given the scenario for your IT risk mitigation plan, what influence did your scenario have on prioritizing your identified risks, threats, and vulnerabilities? Common things such as user activity can be a very big risk, so your best bet is to consider all options as potential threats. You will have to rank some risk higher than the others. 4. What risk mitigation solutions do you recommend for handling the following risk element? A user inserts a CD or USB hard drive with personal photos, music, and videos on organization owned computers. A good antivirus program and have all devices scanned as soon as they are plugged in. Educate employees Disable optical drives/USB ports. 5. What is security baseline definition? A baseline is a starting point or a......

Words: 759 - Pages: 4

Free Essay

Auditing and Compliance Lab 4

...an organization? It is a contract where the parties agree not to disclose information covered by the agreement. It outlines confidential material, knowledge, or information that the parties wish to share with one another for certain purposes, but wish to restrict access to or by third parties. 4. What Trends were tracked when it came to Malicious Code in 2009 by the Symantec Report researched during this lab? DoS attacks are always common, however targeted attacks using advanced persistent threats (SPT) that occurred in 2009 made headlines. 5. What is Phishing? Describe what a typical Phishing attacks attempt to accomplish? Phishing is a term used to describe various scams that use fraudulent e-mail messages, sent by criminals, to trick you into divulging personal information. The criminals use this information to steal your identity, rob your bank account, or take over your computer. Counterfeit web sites, using “hijacked” company brands and logos, are created to lure you into revealing information you would not want to be public knowledge. 6. What is the Zero Day Initiative? Do you think this is valuable, and would you participate if you were the managing partner in a large firm? A program for rewarding security researchers for responsibly disclosing vulnerabilities. It is valuable for firms in that vulnerabilities are shared so that they can be mitigated before more harm can be done. 7. What is a Server Side Include (SSI)? What are......

Words: 1109 - Pages: 5

Premium Essay

Lab 6

...Lab Assessment Questions & Answers 1. What is the difference between roles and features in Windows Server 2008? A server role is a set of software programs that lets a computer perform a specific function for multiple users or other computers within a network. Features are software programs that can support or increase the functionality of one or more roles, or improve the functionality of the server, regardless of which roles are installed. 2. What is installed when you choose the Windows Server Backup Feature? Windows Server Backup Microsoft Management Console (MMC) snap-in. 3. How often should servers be backed up? It is recommended to do them frequently. About every 90 days should be fine. 4. What are the different types of backup that are performed in servers? Copy Backup, Daily Backup, Differential Backup, Incremental Backup, Normal Backup. 5. What are the primary purposes of backing up a server? Recover information after it is lost. 6. Besides performing and scheduling changes, what else can you do in the Windows XP Backup and Restore program? In the Backup you can backup everything on the computer, selected files, drives, or network data, only backup the System State data. In the Restore you can only restore from a backup file. 7. Can you restore a server’s operating system image using the restore application? Yes, by using Windows Recovery Environment and a backup that you created earlier with Windows Server Backup. 8. What are the options to......

Words: 304 - Pages: 2

Premium Essay

Lab 6

...will also be in compliance with regulations such as the Federal Information Security Management Act, Department of Defense, Department of Homeland Security, National Institute of Standards and Technology ,Control Objects for Information and Technology, and Information Assurance Certification and Accreditation . Scope This risk management plan is for the organizations use only and its network including remote access. Any outside sources from the scope and risk management plan may cause the network infrastructure to fail or will make it a high risk structure due to outside sources that are not protected to interact with other outside sources allowing hackers to infiltrate the system is steal important files. The scope of this project will include the planning, scheduling, budgeting, and consultation needed to perform an in depth risk assessment and research to determine which compliance laws this organization must follow. We must identify all the risks and vulnerabilities associated with this organization and create viable solutions that may mitigate these risks as quickly and as inexpensively as possible without compromising the integrity and confidentiality of any business assets. A cost benefit analysis should also be conducted prior to the planning phase of this project as well. Implementing and executing these policies and procedures in order to mitigate these risks is a critical part of this projects process. Security features such as controls, auditing logs, applying......

Words: 1881 - Pages: 8

Free Essay

70-687 Lab 6

...Lab 6 Controlling Access to local hardware and applications ------------------------------------------------- This lab contains the following exercises and activities: Exercise 6.1 | Installing Remote Server Administration Tools | Exercise 6.2 | Configuring Removable Storage Access Policies | Exercise 6.3 | Using AppLocker | Lab ChallengeLab Challenge | Creating an AppLocker Rule Based on File Hash Using Assigned Access | BEFORE YOU BEGIN The lab environment consists of student workstations connected to a local area network, along with a server that functions as the domain controller for a domain called adatum.com. The computers required for this lab are listed in Table 6-1. Table 6-1 Computers Required for Lab 6 Computer | Operating System | Computer Name | Server | Windows Server 2012 R2 | SERVERA | Client | Windows 8.1 Enterprise | CLIENTB | In addition to the computers, you will also need the software listed in Table 6-2 to complete Lab 6. Table 6-2 Software Required for Lab 6 Software | Location | Remote Server Administration Tools for Windows 8.1 (Windows8.1-KB2693643-x64.msu) | \\SERVERA\Downloads | Lab 6 student worksheet | Lab06_worksheet.docx (provided by instructor) | Working with Lab Worksheets Each lab in this manual requires that you answer questions, shoot screen shots, and perform other activities that you will document in a worksheet named for the lab, such as Lab06_worksheet.docx. You will find these......

Words: 2361 - Pages: 10

Premium Essay

Ethics, Compliance Auditing, and Emerging Issues

...Ethics, Compliance Auditing, and Emerging Issues INTERNAL MEMO TO: John Doe CEO FROM: Glen Leonard RE: Ethics Program / Training /Compliance Auditing ------------------------------------------------- DATE: February 22, 2016 This memo serves as notice that we will soon initiate efforts to develop and implement an ethics program as well as the appropriate training and an effective way to monitor those plans. As you are aware, consumers and partners want to work with companies they can trust, and having a program that will build management skills and effectively structure business controls is a great way to become transparent and build that trust. Overall, an effective ethics and compliance program will protect the organization by identifying and preventing inappropriate conduct while promoting adherence to the legal and ethical responsibilities of the organization. The core components of the proposed ethics program will include: * Establishing Standards and Procedures – this will include code of conduct, policies and procedures * Training and Education, to ensure employees are trained on the code of conduct, policies and procedures and other programs and objectives that are relevant to the program * Monitoring, Auditing and Evaluation establishing a system to detect and prevent unethical conduct and to ensure the system is effective and being adhered to. To close, with the establishment of an effective ethics......

Words: 1669 - Pages: 7

Premium Essay

Is3110 Lab 6

...potential threats with some being higher and lower than others. 4. Disable auto-run, deny USB storage devices for users, and restrict installation rights from within Active Directory 5. Security baselines are security settings which establish duties, but nothing else. 6. What are your plans/goals? What will the budget cost be? 7. Evaluating risk interactions and common causes because if you don’t know what the risk is, you can’t possibly mitigate it. 8. All short-term mitigation tasks need to be implemented immediately. Long-term mitigation tasks should be implemented immediately following all critical tasks. On- going is exactly that, the tasks involved here are part of day-to-day operations and need to be handled. 9. User Domain 10. System-Application 11. WorkStation 12. Because it allows users to access the private network 13. Because you do not know how it will react to the already implemented software. Just because there is a security does not mean you install it to the live servers. You basically need to know how well it plays with the rest of the system 14. Yes. You want a reference point. 15. Very crucial because compliance laws can be strict and carry heavy penalties if not followed. You do not want the company to incur fines because of laws that can be avoided....

Words: 290 - Pages: 2

Premium Essay

Compliance Auditing

...Project: Compliance Auditing | Final DraftAdvanced Auditing | | | | | OUTLINE I. Compliance Audits a. Objective, Scope, and Methodology b. Regulations II. Features & Benefits a. Assessment of overall security b. Exposures that create the greatest risk c. Internal Controls III. The Compliance Audit Process d. Interviews and Reviews e. Preparation f. Procedural Component IV. Conclusion Compliance Auditing Compliance auditing determines whether a process or transaction has or has not followed applicable rules. If rules are violated, the auditor determines the cause and recommends ways to prevent future deviations. The rules being tested can be those created by the organization for itself through corporate by-laws, policies, plans, and procedures; can be those imposed on the organization through external laws and regulations; or can be those external standards that the organization has chosen to follow. In addition Compliance auditors gather evidence regarding fraudulent or abusive activity affecting governmental entities. Their audits are designed to detect and deter the misappropriation of public assets and to reduce future fraud risks. (Associates, 2003) Compliance auditors must have the skills to research issues effectively using authoritative materials, understand how to apply the knowledge gained to the circumstances being tested, and be able to explain to the......

Words: 1780 - Pages: 8