The Project Paper part-1 covers chapters read during Week #1 through Week #8.The Project Paper part-2 covers chapters read during Week #9 through Week #13. Review the information provided in the tex

The Project Paper part-1 covers chapters read during Week #1 through Week #8.The Project Paper part-2 covers chapters read during Week #9 through Week #13.   Review the information provided in the tex 1

Fundamentals of Information Systems Security

© 2012 Jones and Bartlett Learning, LLC www.jblearning.com

Seven Domains of a Typical IT Infrastructure

The Project Paper part-1 covers chapters read during Week #1 through Week #8.The Project Paper part-2 covers chapters read during Week #9 through Week #13.   Review the information provided in the tex 2

Fundamentals of Information Systems Security

© 2012 Jones and Bartlett Learning, LLC www.jblearning.com Page 13

User Domain Common Threats

  • Lack of user awareness

  • User apathy toward policies

  • User violating security policy

  • User inserting CD/DVD/USB with personal files

  • User downloading photos, music, or videos

  • User destructing systems, applications, and data

  • Disgruntled employee attacking organization or committing sabotage

  • Employee blackmail or extortion


© 2012 Jones and Bartlett Learning, LLC www.jblearning.com

The Project Paper part-1 covers chapters read during Week #1 through Week #8.The Project Paper part-2 covers chapters read during Week #9 through Week #13.   Review the information provided in the tex 3

Fundamentals of Information Systems Security Page 14

Workstation Domain Common Threats

  • Unauthorized workstation access

  • Unauthorized access to systems, applications, and data

  • Desktop or laptop operating system vulnerabilities

  • Desktop or laptop application software vulnerabilities or patches

  • Viruses, malicious code, and other malware

  • User inserting CD/DVD/USB with personal files

  • User downloading photos, music, or videos

The Project Paper part-1 covers chapters read during Week #1 through Week #8.The Project Paper part-2 covers chapters read during Week #9 through Week #13.   Review the information provided in the tex 4

Fundamentals of Information Systems Security

© 2012 Jones and Bartlett Learning, LLC www.jblearning.com Page 16

LAN Domain Common Threats

    • Unauthorized physical access to LAN

    • Unauthorized access to systems, applications, and data

    • LAN server operating system vulnerabilities

    • LANupdatesserver application software vulnerabilities and software patch

  • Rogue users on WLANs

  • Confidentiality of data on WLANs

The Project Paper part-1 covers chapters read during Week #1 through Week #8.The Project Paper part-2 covers chapters read during Week #9 through Week #13.   Review the information provided in the tex 5

LAN server configuration guidelines and standards

The Project Paper part-1 covers chapters read during Week #1 through Week #8.The Project Paper part-2 covers chapters read during Week #9 through Week #13.   Review the information provided in the tex 6

Fundamentals of Information Systems Security

© 2012 Jones and Bartlett Learning, LLC www.jblearning.com Page 18

LAN-to-WAN Domain Common Threats

  • Unauthorized probing and port scanning

  • Unauthorized access

  • Internet Protocol (IP) router, firewall, and network appliance operating system vulnerability

  • Local users downloading unknown file types from unknown sources

The Project Paper part-1 covers chapters read during Week #1 through Week #8.The Project Paper part-2 covers chapters read during Week #9 through Week #13.   Review the information provided in the tex 7

WAN

The Project Paper part-1 covers chapters read during Week #1 through Week #8.The Project Paper part-2 covers chapters read during Week #9 through Week #13.   Review the information provided in the tex 8

Fundamentals of Information Systems Security

© 2012 Jones and Bartlett Learning, LLC www.jblearning.com Page 20

WAN Domain Common Threats

  • Open, public, and accessible data

  • Most of the traffic being sent as clear text

  • Vulnerable to eavesdropping

  • Vulnerable to malicious attacks

  • Vulnerable to corruption of information and data

The Project Paper part-1 covers chapters read during Week #1 through Week #8.The Project Paper part-2 covers chapters read during Week #9 through Week #13.   Review the information provided in the tex 9

 Vulnerable to Denial of Service (DoS) and

WAN

Distributed Denial of Service (DDoS) attacks

  • Insecure Transmission Control Protocol/Internet Protocol (TCP/IP) applications

  • Hackers and attackers e-mailing Trojans, worms, and malicious software freely and constantly

The Project Paper part-1 covers chapters read during Week #1 through Week #8.The Project Paper part-2 covers chapters read during Week #9 through Week #13.   Review the information provided in the tex 10

Fundamentals of Information Systems Security

© 2012 Jones and Bartlett Learning, LLC www.jblearning.com Page 21

Remote Access Domain Common Threats

  • Brute force user ID and password attacks

  • Multiple logon retries and access control attacks

  • Unauthorized remote access to IT systems, applications, and data

  • Confidential data compromised remotely

The Project Paper part-1 covers chapters read during Week #1 through Week #8.The Project Paper part-2 covers chapters read during Week #9 through Week #13.   Review the information provided in the tex 11

 Data leakage in violation of data classification

standards Internet

The Project Paper part-1 covers chapters read during Week #1 through Week #8.The Project Paper part-2 covers chapters read during Week #9 through Week #13.   Review the information provided in the tex 12

Fundamentals of Information Systems Security

© 2012 Jones and Bartlett Learning, LLC www.jblearning.com Page 23

Systems/Applications Domain

Common Threats

  • Unauthorized access to data centers, computer rooms, and wiring closets

  • Difficult-to-manage servers that require high availability

  • Server operating systems software vulnerability management

  • Security required by cloud computing virtual environments

The Project Paper part-1 covers chapters read during Week #1 through Week #8.The Project Paper part-2 covers chapters read during Week #9 through Week #13.   Review the information provided in the tex 13

 Corrupt or lost data

Cloud

Computing

The Project Paper part-1 covers chapters read during Week #1 through Week #8.The Project Paper part-2 covers chapters read during Week #9 through Week #13.   Review the information provided in the tex 14

Fundamentals of Information Systems Security

© 2012 Jones and Bartlett Learning, LLC www.jblearning.com Page 24