Premium Essay

Is3440

In:

Submitted By BigSam85
Words 3253
Pages 14
Project: Project Part 1: Executive Summary

First World Savings and Loan is a financial institution that processes credit card transactions and loan applications online. We are currently considering implementing an open source infrastructure. This could potentially save us over $4,000,000 per year in licensing fees for the software we are currently using. However, due to our business needs; we must still comply with the Sarbanes-Oxley Act (SOX), Payment Card Industry - Data Security Standard (PCI-DSS), and the Gramm-Leach-Bliley Act (GLBA). We must comply with SOX, because we are a publicly-traded financial institution; PCI-DSS, because we process online credit card transactions; and GLBA, because we are a financial institution. All of the regulations of these three compliancy laws must be met, while still maintaining the Confidentiality, Integrity, and Availability (CIA) triad. All security requirements for SOX, PCI-DSS, and GLBA can be achieved using Linux and open source infrastructure. Some examples of open source software that we might use are:
Web Server - Apache Web Filtering - DansGuardian Network Firewall - Turtle Firewall VPN - Endian Firewall Community IDS/IPS - Suricata Database - MySQL File Server - Samba SMTP Server - hMailServer
I would recommend that we use a "Defense in Depth" strategy, having multiple layers of access protection. We need to have an IDS/IPS on both sides of our edge firewall. The inside IDS/IPS will be used as additional protection for our network and the outside IDS/IPS will serve as an early warning system from attacks. We will also use the outside IDS/IPS for additional protection and to monitor what types of attacks are occurring. Our web server and mail server should be completely separated from the rest of our network in a

Similar Documents

Free Essay

Is3440 Assignment

...Dalton Hoff IS3440 Unit 8 Discussion 1 8/11/2014 To help evaluate an open-source community here are a few things to consier: - How big is the community? It is important to look at the numbers of program developers and contributors to the code, as well as user groups and events around the specific needs. Are training resources available? -How advanced are they? Look for a community that has well constructed and motivated plans that are the same as you would. Make sure that the community is full of technologists challeging each other for mutual respect. -How well does the community support its users? Open-source communities are supported b a core community of developers and users through IM. Making helpfulness and responsiveness of that community a key concern Reasons many organizations pay for vendor-provided software and support. Including: - Easy of getting started - Organizations that don't already have experience with open source projects often find commercial vendors less-daunting to getting up and running. Vendors ofte provide sales support and staff to make that happen. - Documentation - Vendors provide up-to-date, well-written, and easy to use documentation because it is someone's job to write it and keep it up-to-date for each release for version distributed. - Accountability - "Bugs" and defects are expected and are openly discussed as a risk of using certain products provided by vendors, but while in the open-source community you are generally on your own...

Words: 472 - Pages: 2

Premium Essay

Is3440 Discussion 6

...IS 3440 Discussion 6 As the Linux system administrator of insurance company Secure All, Inc., you need to design firewall rules for the organization’s bastion host file sever, which uses Samba. Located on the LAN the sever should allow Web application access for it’s online transaction platform to mount the filesystem, using a Linux computer as a gateway between a private network and the internet. Any internet connection whether it be a dial-up PPP, DSL, cable modem or a T1 line can be used. In the case of most dial-up PPP connections and cable modem connections, only a single IP address is issued allowing only one computer to connect to the internet at a time. Using Linux and iptables / ipchains one can configure a gateway which will allow all computers on a private network to connect to the internet via the gateway and one external IP address, using a technology called "Network Address Translation" (NAT) or masquerading and private subnets. Iptables/ipchains can also be configured so that the Linux computer acts as a firewall, providing protection to the internal network. Using NAT a bastion host should allow administrators to access Samba and SSH for remotely managing the server through NAT or PAT. These two filter methods will allow for a one way only gateway that is only accessed through certain ports or network addresses. Using this sort of port or network address filtering administrators can access the Samba server to perform administrative tasks, while...

Words: 265 - Pages: 2

Free Essay

Is3440 - Unit 1 Lab Assessment Sheet

...Assessment Worksheet Installing a Core Linux Operating System on a Server IS3440 - Linux Security Course Name and Number: _____________________________________________________ Student Name: ________________________________________________________________ Instructor Name: ______________________________________________________________ Lab Due Date: ________________________________________________________________ Overview The foundation of host-based security starts with the installation of the operating system (OS). Contrary to popular opinion, there is no such thing as a secure operating system, but in this lab, you learned how to install the Linux CentOS operating system in a secure manner. You created a new virtual machine, partitioned the hard drive, and installed the Linux operating system. You also created a non-root user account and verified that key services were (or were not) running. Lab Assessment Questions & Answers 1. During the Minimal install, NTP (Network Time Protocol) server was not installed. From a security perspective, why is it important for a system to keep accurate time? To keep the system in sync and up to date for logging purposes such as any incidents that occur. Otherwise a time may not be correct when checking logs for an incident. 2. During the install, you set a password for the root user. What is the root user, and when is it appropriate to use this account? The root user is the system administrator. It is only appropriate...

Words: 503 - Pages: 3

Premium Essay

Is3440 Linux Security Lab 1

...Week 1 Lab This lab consists of two parts: Make sure you label each section accordingly and answer all the questions. For this lab it is recommended that you review the Demo Lab presentations in the Unit 1 and Unit 2 Learning Space. Click the PRACTICE link > DEMO LAB > then click the hyperlink to launch the demonstration. Part # 1 Install a Core Linux Operating System on a Server Learning Objectives and Outcomes Upon completing this lab, students should know more about the following tasks: * Install a base Linux operating system using a Fedora core Linux server for production use on the VM server farm * Create secured partitions within the core Linux server for desired security hardening, performance, and application support * Enable a network time server during installation to maintain a synchronized time setting throughout the system * Set a hostname that is descriptive of the role of the server to maintain standard and concise naming conventions during installation * Create a non-privileged user account for system administration access as a secure alternative to logging in as root user Overview In this lab the students will see how to install and partition a Fedora Core Linux Server. The installation process, applying passwords, creating partitions, and system administrator access controls will be part of the operating system configuration requirements. The demonstration will show how to use the terminal or terminal emulator for...

Words: 1494 - Pages: 6

Free Essay

Lab 1 Is3440 Linux Security

...--------------------------------------------------------------------------------------------------------------------- 1. During the install, the option to sync with a NTP (Network Time Protocol) server was checked. From a security perspective, why is it important for a system to keep accurate time? The most interesting importance of NTP would be the auto key system, if your system doesn’t keep correct time a attacker who needs to change time so that a replay attack can happen could be very damaging, that is why today’s version of NTP shields against this in several ways. 2. During the install, a password has been set for the “root” user, and when is it appropriate to use this account? It is highly recommended that you only use this account when there are tasks that require root privileges such as moving files or directories into or out of system directories. 3. During the install, X-Window and a Desktop Manager were installed. However, in a production environment it is recommended NOT to run the X-Windows Environment. Explain the purpose for this recommendation? In a production environment hardware requirements and not to run the X-Windows Environment may sometimes vary, X-Window is intended for primarily workstation use only example personal computing on a Linux box. The X-Window was intended and developed for the network GUI only, X-Windows by itself doesn’t even have an interface. 4. During the install process it asks what the options given to create the partition...

Words: 1158 - Pages: 5

Free Essay

Is3440 Project Part 1 Task 3

...The account policy for first World Bank would be a very simple and easy policy. Basically all personnel will only have one account at a time, each person will only have their account on the system that they have business being on. You can be assigned to multiple groups within the system if need be. Before anyone can be added to the system, they will have to read and sign the User Account Policy; this will make sure that no one can say that they “didn’t know”. Now for creating users and groups there will be no special permissions in order to “create” them but when it comes to the specific users and groups there will be. The Web Administrators will have their own permissions and groups, the Linux administrators will have their own users and group, and the Security Analyst will have their own groups. I think that there should be a group set up so that all departments can talk with each only to help each other and inform each other of certain things. The Security group I feel should have access to the maintenance group so that they can get regular updates and patches, and to the Web Admin group so they can apply the updates/patches. Web and Linux groups will not have access to the Security so that way no one can go in and change anything with security. The Web admin and Linux admin will have permissions for each other so they can make changes that are needed but they will only have certain permissions for that, for example, Linux will not be able to go in to Web Admin and change how...

Words: 296 - Pages: 2

Free Essay

It Computer

...com/sitemap/schools/1177-ITT.../1724144-IS3340/ Looking for help with IS 3340 at ITT Tech Flint? Course ... IS 3340 - Windows Security - ITT Tech Flint Study Resources ...... Quality answers or your money back. IS3340 Lab Unit 5 Assignment 1 : WINDOWS SE IS3340 ... www.coursehero.com/file/8721414/IS3340-Lab-Unit-5-Assignment-1/ Jan 26, 2014 - MOST POPULAR MATERIALS FROM WINDOWS SE IS3340. 1 Page ... IS3340 Lab Unit 5 Security Assessment Potential Risk ... Access Security > Ali > Notes > IS4670_15_Syllabus.pdf ... www.studyblue.com/notes/note/n/is4670_15_syllabuspdf/.../9759518 Feb 7, 2014 - Find and study online flashcards from Access Security. ... IS3350 Security Issues in Legal Context IS3230 Access Security IS3340 Windows Security IS3440 .... Don?t assume there is only one correct answer to a question ? You've visited this page 2 times. Last visit: 5/28/14 [DOC] Assignment www.webonthecloud.com/is3340/Assignments.docx This assignment builds on the scenario of Ken 7 Windows Limited, which was ... Provide the answers to the following questions to satisfy the key points of ... IS3340 Windo ws Security STUDENT COPY: Graded Assignment Requirements. [DOC] Syllabus - ITT Tech. www.webonthecloud.com/is3340/Syllabus.docx IS3340. Windows Security. Instructor name. Francisco Morales .... Don't assume there is only one correct answer to a question. § Don't be afraid to share your ... Is3340 windows security answers - free ebook downloads www.freebookez.com/is3340-windows-security-answers/ ...

Words: 287 - Pages: 2

Premium Essay

Securing a Linux Server

...Erik Thompson IS3440 21 Sep 2015 Unit 1 Discussion 1 Securing a Linux System As the significant prevalence of Linux web servers globally grows, security is often touted as strength of the platform for such a purpose. However, a Linux based web server is only as secure as its configuration and very often many are quite vulnerable to compromise. While specific configurations vary wildly due to environments or specific use, there are various general steps that can be taken to insure basic security considerations are in place. Many risks are possible from a compromise including using the web server into a source of malware, creating a spam-sending relay, a web or TCP proxy, or other malicious activity. The operating system and packages can be fully patched with security updates and the server can still be compromised based purely on a poor security configuration. Security of web applications first begins with configuring the server itself with strict security in mind. Many will often deploy various layers of security to react in real time to various hacking and threats for HTTP requests. Securing the entire server and any running services with a high level of security in mind is the first fundamental step to avoid the risk of being hacked or compromised. With the abundance of malware being installed into web applications hosted on Linux based servers, it is clear many servers are configured with little or no security in mind. For small and large businesses, having a site...

Words: 555 - Pages: 3

Premium Essay

Test

...ITT Technical Institute IS3340 Windows Security Onsite Course SYLLABUS Credit hours: 4.5 Contact/Instructional hours: 60 (30 Theory Hours, 30 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisite: NT2580 Introduction to Information Security or equivalent Course Description: This course examines security implementations for a variety of Windows platforms and applications. Areas of study include analysis of the security architecture of Windows systems. Students will identify and examine security risks and apply tools and methods to address security issues in the Windows environment. Windows Security Syllabus Where Does This Course Belong? This course is required for the Bachelor of Science in Information Systems Security program. This program covers the following core areas:    Foundational Courses Technical Courses BSISS Project The following diagram demonstrates how this course fits in the program:    IS4799 NT2799 IS4670 ISC Capstone Project Capstone ProjectCybercrime Forensics NSA    NT2580 NT2670  Introduction to  Information Security IS4680 IS4560 NT2580 NT2670 Email and Web Services Hacking and Introduction to  Security Auditing for Compliance Countermeasures Information Security Email and Web Services      NT1230 NT1330 Client-Server Client-Server  Networking I Networking II  IS3230 IS3350 NT1230 NT1330  Issues Client-Server Client-Server  SecurityContext in Legal Access Security Networking I Networking II   NT1110...

Words: 2305 - Pages: 10