...Creating a baseline through log files can help identify several security anomalies. You can run your own tests and setup monitoring with the server tools available. After this is done you can compare these baseline readings with current usage to look for security events. Failed logins- This can be a very useful anomaly if login monitoring is set up right. You need to set criteria to record only out of the ordinary login failures. You can set a clipping level to five so “ordinary” human logon errors are not written to a log file. This can help you see larger numbers of logon failures in a short time span. This can help an administrator pin point hackers or non authorized personnel that are trying to gain unauthorized access to the network/databases. Bandwith elevation- Baselines can be set for both typical network traffic as well as band-with usage. You can have security alerts set when unacceptable traffic deviations occur. Also, you may set detection to alert administrator when band-with exceeds preset levels. This can help detect file movement as well as floods or attacks. Sensitive laptop data Is unencrypted and susceptible to physical theft. To help secure: - Set up strong user/password authentication system. - Encrypt the hard drive, password protect the files and also use an anti-theft technology like intel’s anti-theft. It makes the user to re-authenticate when it is turned on or woke up from sleep mode. It will not leave the...
Words: 407 - Pages: 2