Unit 3 Assignment 1: Malicious Process Monitoring

Improved Essays
• Malicious process monitoring: We could make use of a tool like a windows registry accesses which helps tracks all the malicious programs trying to access the system. Such a tool on the dashboard greatly benefits the user since they can try keep the system safe without any external threats entering the system without notifying the user. The real time updating of the tool in this case will be easier because the user needs to only notified of programs that require them to look at the program as fast as they can.

o Requires attention: The sub-point inside this metric could be a metric that can be called Requires Immediate attention. Not all the malicious software trying to access the system are of level 10 danger. Some programs are more dangerous
…show more content…
Also, very beneficial to the users since they keep track of the code without ever executing it. Since mostly the analysis is performed on source code, it helps the tool and thus the user to know of problems beforehand. Any updates made to the source code will also be checked. Real time updates can be done whenever new code is checked by the tool. If issues are found in the source code, the user will be notified and then make the required changes.

• Network and memory activity indicator: This metric keeps track of the network and memory usage of the system. The users need these metrics because knowing the memory of programs in a system is very important. This metric will not be extremely active. It will keep checking the network and memory activity of the system at a periodically consistent time. But if there is a memory leak or very high memory usage, it will notify the user of a certain program which is the cause. Similarly, only when the network activity suddenly peaks or suddenly drops, the user will be
…show more content…
The system will not like it if the user enters a string in an integer field. Letting the user know of programs which don’t involve validating their fields could result in unsafe programs being generated. So this tool will then check the programs for validation of inputs and then notify the user. The user then gets to decide whether to give access to the tools to make the changes or does the user want to make the changes itself. o Privilege levels: Although not directly related, this is not a very important check that needs to have a metric of its own. But users’ needs to be told of the different privileges of other users and programs by the system. Although, this is not expected to be a very active metric, there could be instances where other users are accessing something that they have not been given permission for.
• Vulnerability trends: This metric could detect patterns among programs that are vulnerable to attacks. This metric could analyze the previous programs that became malicious and based on that could from a pattern regarding how frequently programs turn malicious, programs are vulnerable etc. There is no pressing need for real time updates in this metric since this metric is to be treated as a means to assist the user in checking

Related Documents

  • Decent Essays

    The main objective of this process is to find all kind of risk and protect the organization against them. In fact, some of the Continuous monitoring may be required by regulation or nonprofit recommendation to keep certain certification such ISO. It is known Continuous monitoring is more required for financial institutions such as banks where a lot of transaction happens. ************************ OSI stands for Open Systems Interconnection model which is a network model that contains the network standard protocols for communication between nodes. The OSI model consists of 7 layers: 1.…

    • 442 Words
    • 2 Pages
    Decent Essays
  • Superior Essays

    Introduction The current information technology (IT) infrastructure consists of a mix of 2008 and 2008 R2 servers, with two legacy Windows 2000 servers, and four Windows Server 2012. In addition to the Windows server environment, the network consists of routers, switches, and security appliances, such as firewalls. The environment also consists of important services to ensure the security, and stability of the network.…

    • 922 Words
    • 4 Pages
    Superior Essays
  • Superior Essays

    Pt1420 Unit 5 Lab Report

    • 1875 Words
    • 8 Pages

    Such behavior frequently includes things like gaining control of a computer system, allowing privilege escalation, or a denial-of-service attack. It is run on web servers, with the purpose of identifying software susceptibilities in client machines, communicating with it and exploiting discovered vulnerabilities to upload and execute malicious code on the client. 3 e. How many options are there? How many of these are required?…

    • 1875 Words
    • 8 Pages
    Superior Essays
  • Improved Essays

    The business that I will use for my paper’s subject matter is a cabinet making company. Currently the company uses several business information systems. The corporation uses Peachtree accounting software, Microsoft Office for document publishing, an internally written MRP (material request planning), and Infinity QS systems for quality enhancement. All of these programs are currently running on the internal intranet but the systems do not communicate without cyborg intervention.…

    • 721 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Nt1330 Unit 2

    • 369 Words
    • 2 Pages

    Based on the findings obtained from the analysis of security information then compiled recommendations for improvement of the condition of the company. Some recommendations are: 1. Describe in detail the confidentiality agreement and specifically including maintaining the confidentiality of the password 2. Reexamination of the access rights of each and updating access rights in case of transfer of part or advancement in accordance with their respective access rights. 3.…

    • 369 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Threat Assessment of ‘Important Security Alert From Windows’ Pop-Ups: ‘Important Security Alert From Windows’ Pop-Ups has created havoc among computer users that does not allow them to usually work in the computer. Where this adware has found its own method to attack the targeted system and to make the infected computer almost useless. In order to trouble computer user, it performs several malicious activities to use the security gaps in the system and it leads to freeze the entire running programs of the computer. Firstly, this malware program affect the processing speed of the infected computer to stop the basic functions of the system so that the computer will respond very slowly when user give any instructions.…

    • 425 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    VPN A virtual private network is used by organisations to help secure data on a network. It’s very hard to access these private networks meaning that the data becomes much more secure and it can be used across a large area of a network, including many computers. This isn’t an expensive thing to do anyone can do it by using simple publicly available infrastructures. VPN also makes use of encryption firewalls and authentications services when sending data across the web.…

    • 767 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Figure 6 shows Internal Security settings that were not set as high as they might have been to aide in threats that require a human response. Lesson 7: Invest in good technological defenses, but do not under invest in people who will be operating this equipment. Another, related lesson learned here is the need to strive to be excellent, rather than average. This stems from the view that we had taken during many simulation results that we were still doing "pretty good" when looked at in the context of all sectors taken together.…

    • 1194 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Nt1330 Unit 7

    • 1149 Words
    • 5 Pages

    1. Focus on the overall “security assessment” risk rating that appears at the top of your report. Considering what security measures you (or the computer owner) have undertaken for your computer, does the assessment surprise you? Why or why not? What measures should you plan to undertake if the green checkmark did not appear?…

    • 1149 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    HGC Case Study

    • 1025 Words
    • 4 Pages

    The security systems will be focused on management security, operational security and technical security controls. Management Security: These are management controls that will focus on the management of the IT security system and the management of risk for interconnected systems in HBWC environment, and includes techniques and concerns usually addressed by IT management. Operational Security: The operational controls address security methods focusing on mechanisms primarily implemented and executed by people (as opposed to systems). These controls are put in place to improve the security of a particular system (or group of systems). Often, they require technical or specialized expertise and rely upon management activities as well as technical controls.…

    • 1025 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    This means when you are able to change or edit your computer software or hardware, or the peripherals. This can be things such as the ability to customize your keyboard, the ability to customise what is displayed, and the ability to enable visual alerts for those who can’t hear alerts. This is basically troubleshooting.…

    • 156 Words
    • 1 Pages
    Decent Essays
  • Superior Essays

    Identify strategies to control and monitor each event to mitigate risk and minimize exposure Identify at least two types of security events and baseline anomalies that might indicate suspicious activity. One type of a security event that might indicate supicious activity is an authentication failures found in audit logs. Audit logs contain a high volume of events so particular attention on which events that should be specifically tracked and managed require consideration. An audit log can identify patterns of activity that can signal a security a potential breach. Whether the attack was successfull or not the audit information should be stored in a central respository for future forensic refernce if ever needed.…

    • 1084 Words
    • 5 Pages
    Superior Essays
  • Superior Essays

    chapter{Conclusion} label{cap:conclusion} Fix software defects is a complex activity, tedious and time consuming. To address these shortcomings, developers often exploit applications through debugging. As a result, this process produces a lot of information about the system context. This information is, however, extbf{usually lost after the end of the debugging session}.…

    • 1546 Words
    • 7 Pages
    Superior Essays
  • Decent Essays

    Tammie, You did an excellent job answering this week’s discussion board question. Suspicious exceptions is an excellent way to identify activity which could potentially be attempts of system compromisation. One thing to be careful of when automating policy enforcement through suspicious exception is to ensure to minimizes or eliminate false positive and false negative alerts. Failure to have correctly functioning security detections or having false security detections causes a huge security risk.…

    • 188 Words
    • 1 Pages
    Decent Essays
  • Superior Essays

    Candlestick Chart Analysis

    • 2368 Words
    • 10 Pages

    3.4 Chart pattern: 3.4.1 Candlestick charting: Candlestick charts have been around for hundred years. They are often referred to as “Japanese candles” because the Japanese would using them to analyze the price of rice contract. Similar to a bar chart, candlestick charts also display the, daily high and daily low, open, close. The difference is the use of colour to show if the stock went up or down in a day.…

    • 2368 Words
    • 10 Pages
    Superior Essays