Question

In: Computer Science

At the end of the lab, you will be asked to respond to the following in...

At the end of the lab, you will be asked to respond to the following in a 2- to 2.5-page response at the end of your Microsoft Word document:

Describe what information was contained in the logs and what value they might have in a security investigation.

Address the following in your response:

  • Think about the challenges of getting all the Active Directory audit policy settings right. For an infrastructure administrator, how important are these types of settings?
  • What are the risks associated with logging too little data or not auditing the correct events?
  • What are the risks associated with logging too many events?
  • When the default configuration is to create audit logs, what impact can this have on security incident investigations?
  • This was just a single domain with 2 systems on a local LAN. How much more complicated would auditing and log management be for 100 computers? What about an enterprise with 10,000 computers in several domains on their LAN/WAN?
  • Considera cloud-hosted Infrastructure as a Service (IaaS) environment with many new, Internet-accessible systems regularly being built and brought online. What challenges might there be managing audit policies and logs in such an environment?

Finally, conclude this week's assignment with a page explaining how the tools and processes demonstrated in the labs might be used by an infrastructure administrator to help secure an environment.

Solutions

Expert Solution

1 . Describe what information was contained in the logs and what value they might have in a security investigation.

User ID :

This information aids in identifying an account user.

Date and time of log on and log off :

Provides precision on the temporal variation that is important in determining its link with the time a fraud occurred.

Files and networks accessed :

This provides the extent to which the system might have been manipulated by determining the exposed data.

System configuration changes :

This indicates whether the system settings weremanipulated during the time of the crime.

E.g., disabling specific configurations.

2 . Think about the challenges of getting all of the Active Directory audit policy settings right. For an infrastructure administrator, how important are these types of environments?

The Active Directory Audit Policy settings are essential for an infrastructure administrator in enabling total control over Account login activities, Account management, detailed tracking, DS access, Object access, policy change, privilege use, system operation, and enable global object access auditing.

3 . What are the risks associated with logging too little data or not auditing the actual events?

In the event of logging too little data the associated risks include weak protection of log information, the system remains vulnerable to hacking, poor system response in case of unusual activities due to low threshold faculties, and poor diagnosis of software damage or in identifying corrupted files.

4 . What are the risks associated with logging too many events?

Logging too many events may result in slowing down the functioning of the system which includes the configuration to protect itself against hacking. Besides, too many events occur in redundancy that keeps junk data which is not useful and thus making auditing difficult.

5 . When the default configuration is to create audit logs, what impact can this have on security incident investigations?

- There will be no further security events that will be recorded when the security log is full.

- The SQL server will be incapable of detecting that the system is not able to record the events within the security log. This causes loss of audit information.

6 . This was just a single domain with two operations on a local LAN. How much more complicated would auditing and log management be for 100 computers? What about an enterprise with 10,000 computers in several domains on their LAN/WAN?

- In the case of 100 computers, there can be the application of a known attacker allowed in network assessment. This helps in identifying traffic from known blacklisted sources . Besides, determining possible outbreak is also essential in managing an audit and log activities.

- In the case of 10,000 computers, it is crucial for the management to incorporate a "repeat attack-multiple detection sources" to be able to find hosts that may be infected and deal with the infection as soon as possible. Besides, this kind of system can apply real-time fraud detection to enable narrow down the scope of audit and execution .

7 . Consider a cloud-hosted Infrastructure as a Service (IaaS) environment with many new, internet- accessible systems regularly being built and brought online. What challenges might there be managing audit policies and logs in such a situation?

- There is difficulty in dealing with suspicious posts from untrusted source due to web server Apache. Besides, such an environment makes it challenging to monitor log sources and in determining whether a log source has stopped sending events or not.

8 . Finally, conclude this week's assignment with a page explaining how the tools and processes demonstrated in the labs might be used by an infrastructure administrator to help secure an environment.

PDCA, or the security administration process, is the process of implementing security controls within the IT infrastructure. The security administration process is not implemented once; instead, it is a cyclic process whose phases are performed continuously for security administration.

Plan – Consider what you need to accomplish to meet your security goal and establish objectives and processes to achieve that goal. A specification document will be created during the planning activity. It details how to measure the results to determine if meet the goal.

Do – Implement the processes established in the Plan phase.

Check – Ensure the plan includes clear definitions of a success or a failure. The check phase contains activities performed to evaluate the results of the Do phase to ensure that the actions taken meet the defined success criteria.

Act – Take an action to respond to any unexpected or undesired behavior in the Check phase. Analyze the distinctions between expected outcomes and determined outcome. Find out the basis for any discrepancies and go back to the Plan phase to create a framework to advance performance.

The security administration process includes any tasks that directly support an organization's security policy. The security administration tasks keep a Windows environment secure. Every precautionary measure arranged ought to unswervingly tackle a security guiding principle objective. Every objective in the security policy ought to sustain one or more of the A-I-C arpeggio characteristics—availability, veracity, and confidentiality. As controls are developed

and deployed, be sure to protect all three properties for data at multiple layers. Any unaddressed security property leaves data vulnerable to attack (Solomon, 65).

Everyday security administration tasks include but not limited to: provide input for acceptable use policies, enforce password controls, enforce physical security standards, deploy controls to meet encryption requirements, implement backup policies, keep software current, ensure antimalware controls up-to-date and in force, monitor system and network performance (Solomon, 67). These tasks help to secure an IT network and environment.


Related Solutions

At the end of the lab, you will be asked to respond to the following in...
At the end of the lab, you will be asked to respond to the following in a 2- to 2.5-page response at the end of your Microsoft Word document: Explain the types of information that can be stored in an Active Directory user record. Address the following in your response: What are some of the additional tabs that are available in the Active Directory Users and Computers "Advanced Features" mode? What are some of the specific challenges and risks associated...
Linfei Ltd. has a 31 December year-end, and a tax rate of 25%. Management has asked you to respond to the following situations:
Linfei Ltd. has a 31 December year-end, and a tax rate of 25%. Management has asked you to respond to the following situations:1. The company has always used the FIFO method of determining inventory costs; starting in 2017, it will now use average cost. Opening and closing inventories for 2017 under FIFO are $540,000 and $671,100, respectively. Opening and closing inventories under average cost are $427,200 and $529,000, respectively.Provide the journal entry to record the change. (If no entry is...
Each week, you will be asked to respond to the prompt or prompts in the discussion...
Each week, you will be asked to respond to the prompt or prompts in the discussion forum. Your initial post should be 75-150 words in length, and is due on Sunday. By Tuesday, you should respond to two additional posts from your peers. Discussion A It is very helpful to use the new words you are learning in the context they will be used. It helps you relate the MTs to the meaning. Each week you will practice using the...
PART 2 Each week, you will be asked to respond to the prompt or prompts in...
PART 2 Each week, you will be asked to respond to the prompt or prompts in the discussion forum. Your initial post should be 75-150 words in length, and is due on Sunday. By Tuesday, you should respond to two additional posts from your peers. Discussion B: I have found that learning is increased when students practice going in both directions; formal to informal, and informal to formal. The primary focus is the Pathophysiology in this discussion. Anatomy and Physiology...
Respond to the following in a minimum of 175 words: Imagine that you’ve been asked to...
Respond to the following in a minimum of 175 words: Imagine that you’ve been asked to explain 1 of the major accounting ratios to a group of high school students who have no background in business or accounting but are eager to learn. Using the term Current Ratio describe how you would explain it in your own words, using a specific example.
In a lab you are asked to pipette 130 microL using a pipette with a range...
In a lab you are asked to pipette 130 microL using a pipette with a range of 20-200 microL. This pipette has recently been calibrated so is functioning correctly. You correctly move the dial of the pipette to 130 microL. On your first attempt to dispense 130 microL, you realise that the volume expelled was only 105 microL. On the second occasion it was 170 microL. Give explanations to what operator errors could have led to these outcomes?
You are an experienced, certified nurse working in an endoscopy lab. You have been asked to...
You are an experienced, certified nurse working in an endoscopy lab. You have been asked to prepare a presentation for staff education days at your facility. Select a digestive disorder for this discussion and, if necessary, research the clinical manifestations of the disorder. Describe the alterations in digestive functioning associated with the disorder you have chosen. Be sure to present it in a format that is appropriate for the type of presentation you are giving and to the audience you...
The following questions are asked by students after a unit on mean, median, and mode. Respond...
The following questions are asked by students after a unit on mean, median, and mode. Respond as if you were responding to your student. Use correct grammar, spelling and punctuation and be thorough in your responses. 1) A student asks , " Can a median number be a decimal? " How do you respond. Use the definition of median in your answer. 2) A student asks, " If the mean income of 10 people is $10,000 and one person gets...
. On your first day working in a biochemistry research lab, you are asked to prepare...
. On your first day working in a biochemistry research lab, you are asked to prepare 500 mL of a 0.15 M sodium phosphate buffer solution at pH 6.5. Your lab contains stock solutions of H3PO4, NaH2PO4, Na2HPO4, and Na3PO4, each at 0.5 M, as well as plenty of double-distilled water.(a). (6 points) What do you mix and in what amounts in order to prepare the desired buffer?
PROBABILITY QUESTION Assume that, as a clinic worker, you are asked to conduct lab tests for...
PROBABILITY QUESTION Assume that, as a clinic worker, you are asked to conduct lab tests for diagnosis of a disease. From ex- periments, it is known that any person in the population is either has the disease (positive), or has not (negative), i.e. there is no carrier. Over the entire population of people only 0.005 have this disease and the lab test returns a correct positive result in only 97% of the cases in which the disease is actually present...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT