Question

In: Computer Science

what is The benefits of using the security administration tools?

what is The benefits of using the security administration tools?

Solutions

Expert Solution

Total, hundreds of millions of users depend on reliable access to computing and information services for business, educational, and personal activities. The growth of the Internet puts a world of information and services at our fingertips, yet also opens computers to attack from anywhere around the globe. The same networks that permit a tourist to read email from an airport in Singapore also permit a student in Romania to release a computer virus that disables computers and the businesses that depend on them. In addition, as the complexity of computer systems increases, new vulnerabilities are discovered each day. There is a worldwide community of people, usually referred to as hackers or crackers, who work to discover and exploit such vulnerabilities to attack and gain control of systems, sharing their techniques through various underground channels. Computers across the Internet have been subject to worms, denial-of-service attacks, password-sniffing, and other malicious activity, leading to significant inconvenience and loss of productivity for legitimate users. On the other side, vendors and computer system administrators race to discover vulnerabilities and to create, release, and apply patches before those vulnerabilities are exploited. On the front lines of this battle are security administrators, the people responsible for continually monitoring both their own systems using security administration tools.

Benefits of security administration tools:

global intusion detection tools :

These monitor network traffic to analyze and report suspicious patterns—for example, Bro Intrusion Detection System

Scanning tools :

These probe machines remotely for known vulnerabilities in their installed software— for example,Nessus Open Source Vulnerability Scanner Project

File/host integrity tools :

These run locally to check for compromised states; such tools include:

• Virus detection and repair tools—for example, Symantec AntiVirus.

• Change management tools that track and compare system configuration information, including file organization, and alerting administrators when unauthorized changes occur—for example, Tripwire Change Auditing Solutions

• Rootkit hunters (a rootkit is a prepackaged set of programs and/or files used to exploit a vulnerability and gain control of a machine), etc.

Communication tools :

These are used to coordinate work and share information between administrators, such as email, phone, instant messaging, and chat rooms.

Samples of code:

Such code exploits vulnerabilities and runs in a secure setting (e.g., VMWare) to better understand attacks.

Honeypots:

These are tools that emulate information system resources to attract attacks and capture attack data—for example, Sebek Open Source Honeypot.

Public information sources:

These contain data about vulnerabilities and attacks, including mailing lists and web sites such as FIRST (Forum of Incident Response and Security Teams), SecurityFocus.com, bugtraq,University Security Operations Group, unisog CERT (Computer Emergency Readiness Team), and SANS (SysAdmin, Audit, Network, Security).


Related Solutions

why we Needs the Security Administration Tools, and what is benefits from these tools?
why we Needs the Security Administration Tools, and what is benefits from these tools?
Tax Drill - Social Security Benefits Determine the taxable amount of social security benefits for the...
Tax Drill - Social Security Benefits Determine the taxable amount of social security benefits for the following situations. If an amount is zero, enter "$0". a. Erwin and Eleanor are married and file a joint tax return. They have adjusted gross income of $36,000, no tax-exempt interest, and $12,400 of Social Security benefits. As a result, $_____ of the Social Security benefits are taxable. b. Assume Erwin and Eleanor have adjusted gross income of $12,000, no tax-exempt interest, and $16,000...
What is the benefits of using cfd?
What is the benefits of using cfd?
Do social security benefits change, and if so what is the basis.
Do social security benefits change, and if so what is the basis.
What is the calculation of benefits from the u.s social security program?
What is the calculation of benefits from the u.s social security program?
Formulate a response to these essential questions: What are the benefits and hindrances of private security?...
Formulate a response to these essential questions: What are the benefits and hindrances of private security? Is the cost of providing private security in the best interest of a company compared to the use of public law enforcement security? Now you are to create two Essentials Questions you think will help you focus the writing of your Portfolio Project. Briefly discuss how your questions will guide the development of your Portfolio Project.
What are the benefits to using Jidoka? What are the negative affects to using Jidoka? What...
What are the benefits to using Jidoka? What are the negative affects to using Jidoka? What companies use Jidoka and what impact does it make on an industry?
The Transportation Security Administration (TSA) collects data on wait time at each of its airport security...
The Transportation Security Administration (TSA) collects data on wait time at each of its airport security checkpoints. For flights departing from Terminal 3 at John F. Kennedy International Airport (JFK) between 3:00 and 4:00 PM on Wednesday, the mean wait time is 12 minutes, and the maximum wait time is 16 minutes. [Source: Transportation Security Administration, summary statistics based on historical data collected between February 18, 2008, and March 17, 2008.] Assume that x, the wait time at the Terminal...
You’ll create a security infrastructure design document for a fictional organization. The security services and tools...
You’ll create a security infrastructure design document for a fictional organization. The security services and tools you describe in the document must be able to meet the needs of the organization. You’ll create a security infrastructure design document for a fictional organization. Your plan will be evaluated according to how well you met the organization's requirements. The following elements should be incorporated into your plan: *Authentication system *External website security *Internal website security *Remote access solution *Firewall and basic rules...
Security auditors deploy many of the tools routinely used by penetration testers of an organization’s security...
Security auditors deploy many of the tools routinely used by penetration testers of an organization’s security staff during their security assessments. The key difference is that they are performed by an independent auditor. Auditors provide an impartial and unbiased view of the state the security landscape of an organization. Using credible sources, outline the rules of engagement (best practices) that a security auditor would follow as an ethical practicing professional. (minimum 450 words)
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT