Consider the following Security Analysis categories that were discussed in class
ID: 3888182 • Letter: C
Question
Consider the following Security Analysis categories that were discussed in class and are contained in the security analysis template:
Network/Wireless Security
System (PC/Server) Security
Backups/Disaster Recovery
Physical Security
AAA (Authorization/Authentication/Accounting)
User Education
For EACH of the above categories, create five to seven topics/questions in each category that you will analyze for your customer.
Then, for each topic/question, write a brief action item describing how you will approach that topic for your customer.
For example:
Category: Wireless Network Security
Topic: Is the wireless network password protected?
Action: Use laptop to try and connect to wireless network.
Explanation / Answer
Answer)
Network/Wireless Security :
1. Topic : Is the encryption wpa2 enabled ?
Action : Login to the router using laptop browser and check for the same.
2. Topic : Is the default username and password of the router changed ?
Action : If not, login to that using browser and change it.
3. Topic : Is the network security for firewall enabled ?
Action : Turn it on from windows settings.
4. Topic : The number of devices connected are the auhorised ones or not ?
Action : Check for the same using laptop's browser by logging into your router and check in management.
5. Topic : Is your password length strong ?
Action : Check for the same using laptop's browser by logging into your router and check in wireless security.
System (PC/Server) Security:
1. Topic : Is your Pc virus free ?
Action : Check for the same by doing a complete system scan.
2. Topic : Is your pc password protected ?
Action : Try turning it on and see if it asks for password or not
3. Topic : Is your pc secure from realtime password ?
Action : Open the antivirus and check in real time security
Backups/Disaster Recovery:
1. Topic : Backup kept in an external device ?
Action : Plugin the external device to your system and check for the same
2. Topic : Is there enough extra storage available for creating backup
Action : Plugin the external device to laptop and check for spaces
3. Topic : Is the reset point set in the system ?
Action : Check for the same by going in the system reset settings.
4. Topic : Has the data been placed at a safe location ?
Action : Inspect through the location by creating various audits
Physical Security:
1. Topic : Is the placement of device accurate ?
Action : Check for the edges by slightly moving your device
2. Topic : Is the area you are keeping your device have only authorised access ?
Action : Try going in that place and see if any security is there or not
3. Topic : Is the device covered with some external safety ?
Action : Inspect the outer areas of device by simply touching the outer surface for checking the quality
AAA (Authorization/Authentication/Accounting):
1. Topic : Is the username and password asked ?
Action : Check by logging in to the system.
2. Topic : After access granted, are the commands running ?
Action : Try by giving various commands on the system.
3. Topic : Is the calculation of resources used being done ?
Action : Keep yourself logged in for a while and have access to some of the commands. Logout and see if the records are there or not
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.