07 Jun SAINT COM520 ALL MODULES ASSIGNMENTS
Question
In this assignment, you will identify network security controls to protect the Ken 7 Windows network environment. The students will also provide rationale for their choices.
Assignment: Network Security Controls Assignment Requirements Securing Windows networks requires recognizing potential vulnerabilities and selecting the best control to address that vulnerability. You as a network administrator working for Ken 7 Windows Limited have been given the task of reviewing the current network security policy and recommending the best network security control to satisfy the policy. You can select from a short list of network security controls. For each policy statement, select the best control to ensure Ken 7 Windows Limited fulfills the stated requirements and provide a rationale. Required Resources
? Case Scenario for Rationale: Importance of Windows Access Control and Authentication (see below) ? Worksheet: Network Security Requirements Policy (see below)
Submission Requirements ? Format: Microsoft Word ? Font: Arial, Size 12, Double-Space ? Citation Style: APA ? Length: 1–2 pages Self-Assessment Checklist ? I have selected appropriate network security controls for each domain of the Ken 7 IT environment. ? I have provided rationale for my choices by explaining how each control makes the environment more secure. ? I have followed the submission requirements.
Evidence Collection Policy
In this assignment, you will first go through the various incident handling tools as listed on the text sheet titled “Tools Summary.” You will then recommend ways to secure incidents for Ken 7 Windows Limited.
COM520 Written Assignment 7
Assignment: Windows Incident Handling Tools
Assignment Requirements
Responding to incidents in an efficient and repeatable manner depends on having the right tools in place before incidents occur. While there are many types of tools and utilities available for different purposes, some tools support incident handling tasks well. As a security administrator for Ken 7 Windows Limited, you have been given the task of evaluating various software tools for computer security incident response team (CSIRT) use.
You should recommend at least one tool for each of the main CSIRT categories of functional needs. You can select from the list of functional needs given below. For each software tool you should select the most appropriate functional need(s), it best meets.
Review the text sheet titled Tool Summary (provided below). After you identify the functional needs each tool fulfills, describe which tool, or tools, you would recommend for the Ken 7 Windows Limited CSIRT. Explain the reasons for your choice.
Submission Requirements
· Format: Microsoft Word
· Font: Arial, Size 12, Double-Space
· Citation Style: APA Style
Self-Assessment Checklist
üI have identified the correct function to secure incidents of Ken 7 Windows Limited.
üI have explained and given proper reasoning for my choice of tools.
Required Resources (provided below)
· Text Sheet: Case Scenario for Rationale: Importance of Windows Access Control and Authentication
· Text Sheet: Tools Summary
· Worksheet: Match Tools to CSIRT Functional Needs
Case Scenario for Rationale: Importance of
Windows Access Control and Authentication
Ken 7 Windows Limited is a manufacturer of Windows for residential and commercial builders. Ken 7 Windows Limited carries a variety of Windows and related products. It supplies builders with all of the tools and supplies to install finished Windows in any type of building.
Ken 7 Windows Limited has just purchased a new enterprise resource planning (ERP) software package to help control costs and increase both quality and customer responsiveness. The ERP software collects and stores information including:
§Raw material costs
§Labor costs
§Materials and labor requirements for products
§Purchasing requirements
Ken 7 Windows Limited has identified six basic roles for users in the new ERP software:
§Administrators—maintain ERP data and system operation.
§Planners—run planning software and generate requirements reports.
§Shop Floor users —enter operational data (receiving, shipping, and product progress during manufacturing).
§Managers—manage department personnel.
§Purchasing users—generate purchasing documents based on planning requirements.
§Accounting users—maintain cost and accounting data.
Access controls limit what users or roles can do with different types of data. For example, consider the following types of data:
§Cost information—raw materials and labor costs, including the cost of finished goods.
§Manufacturing details—cost, amount of labor, and time required to produce finished goods.
§Purchasing requirements—rules for determining when raw materials, components, or supplies should be purchased.
Through access control:
§Cost information can be viewed only by Accounting users.
§Manufacturing details can be viewed only by Shop Floor users.
§Purchasing requirement can be viewed only by Purchasing users.
During the analysis phase of the ERP implementation, Ken 7 Windows Limited raised concerns about users being able to access restricted data.
§Accounting users are able to login to shop floor computers.
§Purchasing users are able to access human resource (HR) applications and data.
The ERP implementation team suggested the following access control measures to protect restricted data.
§Create an organizational unit (OU) in Active Directory for shop floor computers.
§Deploy Group Policy Objects (GPOs) to restrict shop floor users to the shop floor OU.
§Define data access controls in the ERP software to deny access for all non-HR users to restricted data.
Implementation of several access control measures helped Ken 7 Windows Limited to restrict the data access. Hence access control and authentication is important, as it helped Ken 7 Windows Limited in reducing costs and increasing profits.
© 2014 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved.
www.jblearning.com Page 1
Tools Summary
§Archer Incident Management: http://www.emc.com/security/rsa-archer/rsa-archer-incident-management.htm
“Archer Incident Management centralizes and streamlines the complete case management lifecycle for cyber and physical incidents and ethics violations. Archer’s web-based solution allows you to capture organizational events that may escalate into incidents, evaluate incident criticality, and assign response team members based on business impact and regulatory requirements. You can also consolidate response procedures, manage investigations end-to-end, and report on trends, losses, recovery efforts and related incidents. Powered by the Archer SmartSuite Framework, the Incident Management software solution allows you to effectively handle incidents that occur anywhere you do business from detection through analysis and resolution.”
§D3 Incident Reporting: http://www.d3security.com/products/incident-reporting
“The Incident Reporting Software module is at the core of D3’s end-to-end integrated security management technology or virtual Security Operations Center (vSOC). The incident reporting application is easy-to-use and fully customizable. The flexible customization options allow incident forms, tasks and analysis reports to be designed to your organizations unique requirements. This greatly reduces unnecessary incident form fields, streamlines adoption of the system by staff and ensures the appropriate information is being collected.”
§Application for Incident Response Teams (AIRT): http://airt.leune.com/
“AIRT is a web-based application that has been designed and developed to support the day to day operations of a computer security incident response team. The application supports highly automated processing of incident reports and facilitates coordination of multiple incidents by a security operations center.”
© 2014 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved.
www.jblearning.com Page 1
Tools Summary
§Request Tracker for Incident Response (RTIR): http://www.bestpractical.com/index.html
“RT for Incident Response helps your CERT or CSIRT team to efficiently track computer security incidents big and small. Collaborating with staff from top Incident Response teams, we’ve built a tool designed to help you manage your entire incident handling workflow. RTIR builds on RT to track Incident Reports, Incidents which tie together those reports and your Investigations into root causes and ideal remediation’s. RTIR extends RT with custom data extraction, reporting and workflow tools as well as a user experience centered around the Incident handling process. Best Practical offers a full suite of customization, training, deployment and support services for RTIR. Please contact us for more information.”
§BMC Remedy Action Request System: http://www.bmc.com/products/product-listing/22735072-106757-2391.html
“Build powerful business workflow applications for Web, Windows, UNIX, and Linux environments AR System provides a consolidated Service Process Management platform for automating and managing Service Management business processes.
§Replace outdated manual systems with process automation that speeds the handling of unique processes
§Out-of-the-box workflow modules commonly used in automating service processes, such as notifications, escalations and approvals
§Integrate processes with systems across the enterprise
§Adapt and evolve your processes to continually align with the needs of the business
§Manage business process performance in real-time
§Rapidly prototype, deploy, maintain, and iterate service management applications
§Capture and track critical business data”
Web References:Links to Web references in this document are subject to change without prior notice.
These links were last verified on June 26, 2013.
© 2014 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved.
www.jblearning.com Page 2
Match Tools to CSIRT Functional Needs
Responding to incidents in an efficient and repeatable manner depends on having the right tools in place before incidents occur. While there are many types of tools and utilities available for different purposes, some tools support incident handling tasks well. As a security administrator for Ken 7 Windows Limited, you have been given the task of evaluating various software tools for CSIRT use. You should recommend at least one tool for each of the main CSIRT categories of functional needs. You can select from the list of functional needs given below. For each software tool you should select the most appropriate functional need(s), it best meets.
Review the text sheet titled Tool Summary given to you as a handout. After you identify the functional needs each tool fulfills, describe which tool, or tools, you would recommend for the Ken 7 Windows Limited CSIRT. Explain the reasons for your choice.
Select from these CSIRT functional needs:
- Tracking incidents
- Reporting on incidents
- Archiving incidents
- Communicating incident information
- Managing an incident’s tasks and activities
Software tools (note which CSIRT functional needs each product meets):
- Archer Incident Management
- D3 Incident Reporting
- Application for Incident Response Teams (AIRT)
- Request Tracker for Incident Response (RTIR)
- BMC Remedy Action Request System
Which of the tools listed would you recommend for Ken 7 Windows Limited CSIRT? Why?
Assignment Requirements This assignment requires you to prepare a procedure guide for a security audit in Ken 7 Windows Limited. Ken 7 Windows Limited has acquired several new servers and workstations to support the new enterprise resource planning (ERP) software. You want to ensure the new computers comply with Microsoft’s initial secure baseline. You choose to use the Microsoft baseline security analyzer (MBSA) tool to assess the basic security for all of your Windows computers. MBSA will identify many of the basic vulnerabilities found in Windows environments. MBSA’s vulnerability report provides a good starting point for securing new and existing Windows computers. You need to develop procedures to ensure that each computer in your environment has no reported vulnerabilities. Using the format below, describe the steps to follow to scan multiple computers for security vulnerabilities using MBSA. Include steps to research and address any reported vulnerabilities. Assume you plan to run MBSA on a new server that does not have MBSA installed.
Fill in the details for each procedural step to audit each computer and address discovered vulnerabilities. 1) Acquire and install MBSA.
2) Scan computers.
3) Review scan results.
4) Identify vulnerabilities you need to address.
5) Document the steps to address each vulnerability.
Submission Requirements ? Format: Microsoft Word ? Font: Arial, Size 12, Double-Space ? Citation Style: APA Style ? Length: 1–2 pages Self-Assessment Checklist ? I have properly organized the
In this assignment, you will determine the most probable malware infecting a set of devices.
Assignment: Identifying Types of Malware Infection Assignment Requirements You have learned that any computer or device can be vulnerable to malware. Vulnerabilities differ depending on how the computer or device is used and what software is installed. For each of the scenarios listed on the worksheet, select the most likely type of malware that is present on the computer or device and provide a rationale for doing so.
Select from: a. Virus b. Worm c. Trojan horse d. Rootkit e. Spyware Suspected malware scenarios: _________
1. You notice that your computer is getting slower each day. You have terminated unneeded programs, disabled unneeded services, and have recently defragmented the disks. Your computer has plenty of memory but it still seems slow. Since it only started getting slow within the last two weeks—you suspect malware. You have carefully examined each of the programs running but there are no unusual programs. However, you do notice that there is a substantial disk activity, even when no programs are running that should be using the disk. What kind of malware do you think is present in your computer? _________
2. You downloaded a new program to display the current weather on your desktop. Since you installed the weather application, you noticed a lot of network activity, and your computer is getting slow. When you terminate the weather application your computer speeds up. What kind of malware do you think is present in your computer? _________
3. Within a week after ordering a new widescreen television (TV) from an online retailer, you start getting many e-mail messages advertising products related to TVs. What kind of malware do you think is present in your computer? _________
4. You downloaded a new game to your personal mobile device that runs Windows Mobile. You notice on your mobile service bill that several charges appeared for calls to premium numbers that started three days after loading the new game. What kind of malware do you think is present in your computer?
Submission Requirements ? Format: Microsoft Word ? Font: Arial, Size 12, Double-Space ? Citation Style: APA Style ? Length: 1–2 pages Self-Assessment Checklist ? I have matched correctly each type of malware with each scenario. ? I have provided a sound rationale for each answer
COM520 Written Assignment 8
Assignment: Best Procedures to Secure Windows Applications
Assignment Requirements
Part of implementing Ken 7 Windows Limited new enterprise resource planning (ERP) software is ensuring all workstations and servers run secure applications. Since the ERP software is new, Ken 7 Windows Limited needs a new policy to set security requirements for the software. This policy will guide administrators in developing procedures to ensure all client and server software is as secure as possible. The goal is to minimize exposure to threats to any part of the new ERP software or resources related to it.
Using the format below, describe the goals that define a secure application. Specifically, you will write two policies to ensure Web browsers and Web servers are secure. All procedures and guidelines will be designed to fulfill the policies you create.
Answer the following questions for Web browser and Web server software:
- What functions should this software application provide?
- What functions should this software application prohibit?
- What controls are necessary to ensure this applications software operates as intended?
- What steps are necessary to validate that the software operates as intended?
Once you have answered the questions above, fill in the following details to develop your policies to secure application software. Remember, you are writing policies, not procedures. Focus on the high-level tasks, not the individual steps.
· Type of application software
· Description of functions this software should allow
· Description of functions this software should prohibit
· Known vulnerabilities associated with software
· Controls necessary to ensure compliance with desired functionality
· Method to assess security control effectiveness
You will write two policies—one for Web server software and one for Web browser software.
Submission Requirements
· Format: Microsoft Word
· Font: Arial, Size 12, Double-Space
· Citation Style: APA Style
· Length: 1–2 pages
Self-Assessment Checklist
üI have provided all requirements necessary to secure application software.
üI have explained and gave a proper reasoning for each step to secure application software.
COM520 Written Assignment 8
Case Scenario for Rationale
Ken 7 Windows Limited is a manufacturer of Windows for residential and commercial builders. Ken 7 Windows Limited carries a variety of Windows and related products. It supplies builders with all of the tools and supplies to install finished Windows in any type of building.
Ken 7 Windows Limited has just purchased a new enterprise resource planning (ERP) software package to help control costs and increase both quality and customer responsiveness. The ERP software collects and stores information including:
• Raw material costs
• Labor costs
• Materials and labor requirements for products
• Purchasing requirements
Ken 7 Windows Limited has identified six basic roles for users in the new ERP software:
• Administrators—maintain ERP data and system operation.
• Planners—run planning software and generate requirements reports.
• Shop Floor users —enter operational data (receiving, shipping, and product progress during manufacturing).
• Managers—manage department personnel.
• Purchasing users—generate purchasing documents based on planning requirements.
• Accounting users—maintain cost and accounting data.
Access controls limit what users or roles can do with different types of data. For example, consider the following types of data:
• Cost information—raw materials and labor costs, including the cost of finished goods.
• Manufacturing details—cost, amount of labor, and time required to produce finished goods.
• Purchasing requirements—rules for determining when raw materials, components, or supplies should be purchased.
Through access control:
• Cost information can be viewed only by Accounting users.
• Manufacturing details can be viewed only by Shop Floor users.
• Purchasing requirement can be viewed only by Purchasing users.
During the analysis phase of the ERP implementation, Ken 7 Windows Limited raised concerns about users being able to access restricted data.
• Accounting users are able to login to shop floor computers.
• Purchasing users are able to access human resource (HR) applications and data.
The ERP implementation team suggested the following access control measures to protect restricted data.
• Create an organizational unit (OU) in Active Directory for shop floor computers.
• Deploy Group Policy Objects (GPOs) to restrict shop floor users to the shop floor OU.
• Define data access controls in the ERP software to deny access for all non-HR users to restricted data.
Implementation of several access control measures helped Ken 7 Windows Limited to restrict the data access. Hence access control and authentication is important, as it helped Ken 7 Windows Limited in reducing costs and increasing profits
Our website has a team of professional writers who can help you write any of your homework. They will write your papers from scratch. We also have a team of editors just to make sure all papers are of HIGH QUALITY & PLAGIARISM FREE. To make an Order you only need to click Ask A Question and we will direct you to our Order Page at WriteDemy. Then fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.
Fill in all the assignment paper details that are required in the order form with the standard information being the page count, deadline, academic level and type of paper. It is advisable to have this information at hand so that you can quickly fill in the necessary information needed in the form for the essay writer to be immediately assigned to your writing project. Make payment for the custom essay order to enable us to assign a suitable writer to your order. Payments are made through Paypal on a secured billing page. Finally, sit back and relax.
About Writedemy
We are a professional paper writing website. If you have searched a question and bumped into our website just know you are in the right place to get help in your coursework. We offer HIGH QUALITY & PLAGIARISM FREE Papers.
How It Works
To make an Order you only need to click on “Order Now” and we will direct you to our Order Page. Fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.
Are there Discounts?
All new clients are eligible for 20% off in their first Order. Our payment method is safe and secure.
