Consider the following Security Analysis categories that were discussed in class
ID: 3596829 • Letter: C
Question
Consider the following Security Analysis categories that were discussed in class and are contained in the security analysis template:
Network/Wireless Security
System (PC/Server) Security
Backups/Disaster Recovery
Physical Security
AAA (Authorization/Authentication/Accounting)
User Education
For EACH of the above categories, create five to seven topics/questions in each category that you will analyze for your customer.
Then, for each topic/question, write a brief action item describing how you will approach that topic for your customer.
For example:
Category: Wireless Network Security
Topic: Is the wireless network password protected?
Action: Use laptop to try and connect to wireless network.
Explanation / Answer
Notes: There are almost 5 or 6 topis , I have given for 3 topics. Please posth remaining of them as another question. Thanks.
Network/Wireless Security :
Is the encryption wpa2 enabled ?
Login to the router using laptop browser and check for the same.
Is the default username and password of the router changed ?
If not, login to that using browser and change it.
Is the network security for firewall enabled ?
Turn it on from windows settings.
The number of devices connected are the auhorised ones or not ?
Check for the same using laptop's browser by logging into your router and check in management.
System (PC/Server) Security:
Is your Pc virus free ?
Check for the same by doing a complete system scan.
Is your pc password protected ?
Try turning it on and see if it asks for password or not
Is your pc secure from realtime password ?
Open the antivirus and check in real time security
Backups/Disaster Recovery:
Backup kept in an external device ?
Plugin the external device to your system and check for the same
Is there enough extra storage available for creating backup
Plugin the external device to laptop and check for spaces
Is the reset point set in the system ?
Check for the same by going in the system reset settings.
Has the data been placed at a safe location ?
Inspect through the location by creating various audits
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.