Chapter 2 Monitoring and Diagnosing Networks Flashcards
Network Monitors (sniffers)
A machine that watches network traffic and collects data. Nowadays all you need to have is a computer with an NIC in promiscuous mode (picking up all packets that run past it).
Application Log (event viewer)
-Events logged by applications or programs
Security Logs (event viewer)
- Successful and unsuccessful login attempts
- Events related to creating, opening, and deleting files
- By default, both successes and failures are not logged. You should change this.
Hardening
Locking down the operating system or your software’s code as much as you practically can
Services
Programs that run on startup, and often are in the background. You should carefully disable any you don’t need.
File and Print Server Security Risks
- Very vulnerable to DoS and access attacks
- Deactivate all ports and protocols you don’t need to use
Directory Sharing
Should be limited to what’s essential to performing system functions
-Hide root directories from browsing
Service Pack
Patches that address issues in the operating system that needed major reworking
Updates
General fixes with program code
Security updates
Fix various vulnerabilities that may be found on an operating system. These should be deployed within 30 days of their release
User Account Control
- Disable, but don’t delete, all unneccesary accounts
- Pay attention not only to domain accounts, but to local accounts as well
- Make sure set passwords meet the company’s minimum requirements
Principle of Least Privilege
Give employees access to the bare minimum of resources they need to successfully do their jobs
802.11x
Use MAC Filtering and port authentication together for exponential security increase
Remember, all ports you’re not using can be a security risk
Security Posture
Make sure your security posture baselines are in compliance with HIPAA, ICI, or whoever is setting your standards.
Security Audits
Scheduled, in-depth checks of security
- Review security logs and compliance
- Check security device configuration