...control over offsite computers. One of the more critical security risk's lies in remote access management. Today, the vast majority of organizations store their passwords, user names, IP addresses, server names in an unsecure location available to its employees. Security mechanisms and access policies should be independent of user access methods. Therefore, strong authentication and encryption are essential services for remote access. You can configure Routing and VPN access in many ways; it is designed to be flexible. However you configure Routing and Remote Access, you can do certain things to better secure your remote access server. To help reduce the surface area available for attack, I will remove any ports for tunneling protocols that are not intended to for use. To help prevent random password attacks, I will limit the number of times that a user can specify credentials before the account is locked out. Also, I would configure the firewall to filter inbound and outbound data and deny all traffic except that addressed to specific ports and protocols. In addition to securing the VPN server, I will configure it to help protect the intranet from direct attacks. If you configure the remote access server to provide network address translation, the server will act as an IP router that translates addresses for packets being forwarded between the intranet and the Internet. This way the remote access server helps provide NAT flexibility with security. I will be requiring connections...
Words: 349 - Pages: 2
...Securing a POS System John Fischer Security Research Paper 9/22/2014 For several years we have been using the point of sale (POS) system for payment at major retailers. In the last year there have been several attacks on major retailers POS systems. In this paper, I will focus specifically on the breach of security at Neiman Marcus. In this discussion I will explain how to help secure a POS system. Neiman Marcus was founded in 1907 by Herbert Marcus with his sister, Carrie Marcus Neiman, and her husband A.L. Neiman. Their initial investment was $25,000. The original Neiman Marcus was on the corners of Elm and Murphy streets in Dallas, Texas. In 1913 a fire destroyed the companies building and its entire inventory. A new building was built in 1914 on the corners of Main and Ervay, also in Dallas, Texas. Neiman Marcus’ headquarters is still located in this building. Neiman Marcus is a high end retail store. The target market for Neiman Marcus is the top 2% of the income bracket of the United States, plus the wealthiest people around the world. Neiman Marcus retails high end goods such as clothes, jewelry, cosmetics, home furnishings, antiques and even rare books. Neiman Marcus also has an online store, started in 1999, that offers customers access to high end luxury goods. In 1926 Neiman Marcus first issued their holiday catalog. Many different items have been offered in their holiday catalog, including life size robots and jetliners. They currently have 15...
Words: 1694 - Pages: 7
...1. What are the five steps of a hacking attack? a. Reconnaissance, network and system scanning, gaining access, maintaining access, and covering their tracks. 2. During the reconnaissance step of the attack, describe what ZenMap GUI performs to do passive OS fingerprinting? a. 3. What step in the hacking attack process uses ZenMap? a. Reconnaissance 4. What step in the hacking attack process identifies known vulnerabilities and exploits? a. The gaining access step is where the attacker identifies and exploits the open vulnerabilities in the network. 5. During the scanning step of the hacking attack process, you identified known software vulnerabilities in a Windows XP Professional workstation. List the name and number of the critical Microsoft vulnerabilities identified. What is vulnerability “MS08-067”? a. There were a total of 6 High Risk vulnerabilities found. 1 - MS08-067: Microsoft Windows Server Service Crafted RPC Request Handling Remote Code Execution (958644) (un-credentialed check) 2- MS05-027: Vulnerability in SMB Could Allow Remote Code Execution (896422) (un-credentialed check) 3 - MS06-040: Vulnerability in Server Service Could Allow Remote Code Execution (921883) (un-credentialed check) 4 - MS09-001: Microsoft Windows SMB Vulnerabilities Remote Code Execution (958687) (un-credentialed check) 5 - MS06-035: Vulnerability in Server Service Could Allow Remote Code Execution (917159) (un-credentialed check) 6 – Says it is Nessus Scan information. MS08-067...
Words: 430 - Pages: 2
...help avoid this risk. User media, as well as, personal USB’S are another security risk to the User Domain. This risk is protected by disabling the internal CD drives and USB ports, and enabling automatic antivirus scans for inserted media drives, files, and email attachments. Content filtering network devices are configured to permit or deny specific domain names in accordance with AUP definition. The last way to protect the User Domain will be to restrict access to only those systems, applications, and data needed to perform the employee’s particular job requirement, this will help protect user destruction of systems. Workstation Domain The Workstation Domain consists of desktops, laptops, and or personal data assistants (smartphones). The following will list some of the most common threats followed by the security solution: Unauthorized access to workstation- enable password protection and automatic lockout during time of inactivity, Unauthorized access to data or applications- strict access control to policies, procedures and guidelines, Viruses or Malicious code- workstation anti- virus, enable an anti virus to automatically scans and...
Words: 992 - Pages: 4
...Risks Associated with Web Applications Web applications allow visitors access to the most critical resources of a web site, the web server and the database server. Like any software, developers of web applications spend a great deal of time on features and functionality and dedicate very little time to security. Its not that developers don’t care about security, nothing could be further from the truth. The reason so little time is spent on security is often due to a lack of understanding of security on the part of the developer or a lack of time dedicated to security on the part of the project manager. For whatever reason, applications are often riddled with vulnerabilities that are used by attackers to gain access to either the web server or the database server. From there any number of things can happen. They can: •Deface a web site •Insert spam links directing visitors to another site •Insert malicious code that installs itself onto a visitor’s computer •Insert malicious code that steals session IDs (cookies) •Steal visitor information and browsing habits •Steal account information •Steal information stored in the database •Access restricted content •And much more… Preventing Web Application Attacks With dotDefender web application firewall you can avoid many different threats to web applications because dotDefender inspects your HTTP traffic and checks their packets against rules such as to allow or deny protocols, ports, or IP addresses to stop web applications...
Words: 830 - Pages: 4
...down specialized and procedural security highlights and controls used to ensure the framework. Weakness investigation includes the accompanying five security control territories: (FAA) * Technical – the computer hardware and software, modes of communication, and the system architecture. * Operational - methods that individuals perform as for as information system * Administrative - feeble countermeasures in the authoritative methodology that influence the information systems. * Physical - frail countermeasures in the physical design of, and access to, offices and fenced in areas where computerized data frameworks are house. * Personnel - feeble countermeasures in approach, procedure, and methods utilized for security screening of staff having entry to the system. I would like to focus my paper on Wireless Vulnerabilities, because assailants have discovered new parkways to exploit shortcomings in remote systems that, as a rule, have yet to be tended to by associations. There are a few known vulnerabilities that happen for the most part as a result of the very way of the LAN, which utilizes radio frequencies...
Words: 2588 - Pages: 11
...1. What are the five steps of a hacking attack? Reconnaissance, network and system scanning, gaining access, maintaining access, and covering their tracks 4. What step in the hacking attack process identifies known vulnerabilities and exploits? The gaining access step is where the attacker identifies and exploits the open vulnerabilities in the network. 5. During the scanning step of the hacking attack process, you identified known software vulnerabilities in a Windows XP Professional workstation. List the name and number of the critical Microsoft vulnerabilities identified. What is vulnerability “MS08-067”? There were a total of 6 High Risk vulnerabilities found. 1 - MS08-067: Microsoft Windows Server Service Crafted RPC Request Handling Remote Code Execution (958644) (un-credentialed check) 2- MS05-027: Vulnerability in SMB Could Allow Remote Code Execution (896422) (un-credentialed check) 3 - MS06-040: Vulnerability in Server Service Could Allow Remote Code Execution (921883) (un-credentialed check) 4 - MS09-001: Microsoft Windows SMB Vulnerabilities Remote Code Execution (958687) (un-credentialed check) 5 - MS06-035: Vulnerability in Server Service Could Allow Remote Code Execution (917159) (un-credentialed check) 6 – Says it is Nessus Scan information. MS08-067 is vulnerability in Server Service that Could Allow Remote Code Execution. 6. Which tool and application was used to exploit the identified vulnerability on the targeted Microsoft 2003 XP SP2 workstation...
Words: 315 - Pages: 2
...the five steps of a hacking attack? Reconnaissance (Footprinting) Scanning (Port Scanning, Enumeration) Gaining Access (System Hacking) Maintaining Access (Planting Backdoors, Rootkits, Trojans) Covering Tracks (Disabling Auditing, Data Hiding) 2. During the reconnaissance step of the attack, describe what task Zenmap GUI performs to do passive OS fingerprinting. A) Nmap uses the –O option to perform OS fingerprinting. The process monitors and captures network traffic. The traffic is then analyzed for patterns that would suggest which operating systems are in use. 3. 3. What step in the hacking attack process uses Zenmap GUI? A) The Zenmap GUI is used during scanning 4. What step in the hacking attack process identifies known vulnerabilities and exploits? A) Vulnerabilities and exploits are identified by enumeration, which is the most aggressive of the scanning stage. 5. During the scanning step of the hacking attack process, you identified known software vulnerabilities in a Windows XP Professional Workstation. List the name and number of the critical Microsoft® vulnerabilities identified. What is vulnerability “MS08-067”? MS04-022: Microsoft Windows Task Scheduler Remote Overflow (841873) MS04-012: Cumulative Update for Microsoft RPC/DCOM (828741) MS03-043: Buffer Overrun in Messenger Service (828035) MS06-035: Vulnerability in Server Service Could Allow Remote Code Execution (917159) MS06-040:...
Words: 579 - Pages: 3
...Security Assessment and Solutions for Quality Web Design Course Project Final Executive Summary The first phase of this paper is to identify inherent security weaknesses on a specific component among one of two businesses; Quality Web Design, an organization specializing in Web site and Web site content design; and Aircraft Solutions, a well-known manufacturer in the design and fabrication of component products and services for companies in the electronics, commercial, defense, and aerospace industry. The assignment includes identifying the organization’s weaknesses by selecting one of their assets and addressing two of the following three areas: software, hardware and policy. A general description of the company’s overview and business processes is provided, along with a list of digital assets mapped into their respective network diagrams. Phase two follows with recommended solutions to the weaknesses, and its impact to the security controls of the business. Security Assessment and Solutions for Quality Web Design Course Project Final Protecting our valuables, whether they are expressed as information or in some other way, ranges from quite unsophisticated to very sophisticated. We can think of the Wild West days as an example of the “unsophisticated” end of the security spectrum. And even today, when we have more sophisticated means of protection than ever before, we still see a wide range in how people and businesses actually use the protections available to them...
Words: 2438 - Pages: 10
...Impact/Factor | Unauthorized access from public Internet | LAN-WAN | Major | User destroys data in application and deletes all files | USER | Minor | Hacker penetrates your IT infrastructure and gains access to you internal network | SYSTEM APPLICATION | Critical | Intra-office employee romance gone bad | USER | Minor | Fire destroys primary data center | LAN | Major | Service provider SLA is not achieved | WAN | Major | Workstation OS has a known software vulnerability | LAN-WAN | Major | Unauthorized access to organization owned workstations | USER | Major | Loss of production data | SYSTEM APPLICATION | Minor | Denial of Service attack on organization DMZ and e-mail server | LAN-WAN | Critical | Remote communications from home office | REMOTE ACCESS | Minor | LAN server OS has a known software vulnerability | LAN | Major | User downloads an unknown e-mail attachment | USER | Minor | Workstation browser has software vulnerability | WORKSTATION | Major | Mobile employee needs secure browser access to sales order entry system | REMOTE ACCESS | Minor | Service provider has a major network outage | WAN | Critical | Weak ingress/ egress traffic filtering degrades Performance | LAN-WAN | Major | User inserts CDs and USB hard drives with personal photos, music, and videos on organization owned computers | USER | Minor | VPN tunneling between remote computer and ingress/egress router | REMOTE ACCESS | Major | WLAN access points are needed for...
Words: 296 - Pages: 2
...exploited. LAN Domain: Any data on the network that is not secured with appropriate access controls is vulnerable. Weak passwords can be cracked. Permissions that aren’t assigned properly allow unauthorized access. LAN to WAN Domain: Users can visit risky web sites and download and execute infected software. Firewalls with unnecessary ports open allow access to the internal network from the internet. WAN Domain: Any public facing server is susceptible to DoS and DDoS attacks. A FTP server that allows anonymous uploads can host worms from hackers. Remote Access Domain: An attacker can access unprotected connections allowing the attacker to capture and read the data. System/Application Domain: Threats would be not changing default passwords, unneeded services and protocols. 2. Identify the vulnerability’s in the seven domains. User Domain: User’s going to unrestricted websites and executing infected software. Workstation Domain: If computers anti- virus software is not up to date then it is exploited. LAN Domain: A user that doesn’t change their password on a regular basis is vulnerable to having their account hacked. LAN to Wan: Once leaving the LAN network anything done on the WAN network can be compromised because it’s not on the company’s local network. WAN Domain: If a user is using the WAN domain then anything they are doing is untrusted and accessible by hackers. Remote Access Domain: If a user fails to encrypt their data then it can be...
Words: 553 - Pages: 3
...Remote Desktop Project ====================== (Work In Progress) Mark McLoughlin (mark@skynet.ie) December 1st, 2003 1. Problem Description ====================== In enterprise installations system administrators typically have to deal with a large number of pretty basic problems on users' machines. Remotely taking control of a user's desktop to fix the problem while at the same time training the user as to how to resolve the problem for themselves is an effective and simple way to handle these types of support scenarios. Currently there is no way to do this with GNOME. 2. Overview =========== The basic requirement for such a tool is some method of sharing a desktop session between multiple users. The sysadmin sees what the user sees and the user sees what the sysadmin sees. However, the technology behind this is obviously useful in other ways. Here in Sun, for example, we make widespread use of VNC for some basic collaboration. Targetting this project purely at the Remote Assistance use case will leave some users wondering "why ... why on earth did you make it impossible for us to use this like VNC?". This project, therefore, also encompasses the use case of a simple form of collaboration by sharing access to a desktop session. There are various existing technologies in this area which all work in very similar ways. This project will follow...
Words: 7447 - Pages: 30
...Prevention & Removal Approaches …………………………………12 Rootkit Detection & Prevention Tools ………………………………………..13 CHAPTER 4 …………………………………………………………………….14 CONCLUSION……………………………………………………………..……14 CHAPTER 5 ………………………………………………………….…………15 REFERENCES …………………………………………………………………15 EXECUTIVE SUMMARY This research paper is divided into 5 main chapters like introduction, literature review, discussion, conclusion and references. The major points of this detailed research are summarized as below. * Rootkit technologies cause severe security attacks in today’s cyber world. This research discusses the significance of effective security strategies that should be formulated against security attacks. * Detailed analysis of rootkit technologies and functionalities are done. Different rootkit types, attack tools and approaches are analyzed. * Several rootkit detection & prevention systems are evaluated for preventing these security attacks effectively. Various rootkit prevention tools and methodologies analyzed as well. * This research paper concludes with the significance of effective security tactics against rootkits. Utilization of rootkit technology for legitimate purpose is...
Words: 2465 - Pages: 10
...Workstation, Local Area Network (LAN), Local Area Network-to-Wide Area Network (LAN-to-WAN), Wide Area Network (WAN), Remote Access and System/Application domains. The answer is the seven domains of an IT infrastructure are classified below, and their risk factors. A. User Domain: Any user, worker, employee, contractor, or individual. They are considered to be the weakest link in IT security and the risk. B. Workstation Domain: The work station, client or standalone home system. The risk is Hackers use malicious software known as malware. C. LAN Domain: The private LAN, from SOHO’s to large corporations. To protect this domain it must be inside of a firewall if it does not have a firewall it is vulnerable and a risk. D. LAN to WAN Domain: Wan connections between LAN locations, like which are controlled by the third party entities. Here where LAN is in a trusted zone and the WAN is in an untrusted zone, so the LAN to WAN can be protected by firewalls. E. Remote Access Domain: It connects remote users to the organization’s infrastructure. It can be used by VPN and Dialup connections. This can provide access to a private network on a public network, this is where it is untrusted and attackers can attack and can be a major risk. F. WAN Domain: WAN domains are networks, such as ATM’s, frame relays which are owned by a carrier network which gives access to the corporation. This is very vulnerable because they are shared with other companies and it is quite risky. G. System/application...
Words: 558 - Pages: 3
...Hacking Countermeasures & Techniques Distributed Denial of Service (DDoS) Best Practices Guide to Counter DDoS attacks: This Guide will cover Best Practices to counter DDoS attacks like the attack on the Universities Registration System Server (RSS) by infected computers (Bots). The attack by rogue software installed on computers located in University Computer Labs resulted in the shutting down web access to the RSS system. Coordinated by a central controller these Bots established web connections (HTTP protocol) to the RSS using up all available bandwidth. This prevented students from accessing the Web site/server for legitimate traffic during the attack. (Schifreen, R. (2006)) This is considered a Consumption of Resources attack using up all the resources of RSS bandwidth. (Specht, S. M., & Lee, R. B. (2004)) These best practices would help prevent and/or reduce the effects of such attacks. Industry best practices to counter DDoS attacks start with documentation that addresses procedures to be followed before, during, and after an attack. (Schifreen, R. (2006)) The establishment of a Security Incident Response Team (SIPT) trained to react to incidents reduces damage and duration of outages. Best practices include; training, network configuration, patch management, access control lists, encryption, intrusion detection, intrusion prevention, and traffic shaping. (Cunningham, B, Dykstra, T, Fuller, E, Gatford, C, Gold, A, Hoagberg, M, Hubbard, A, Little, C, Manzuik, S,...
Words: 1240 - Pages: 5